Video series teaching the most common patterns and techniques to pass coding interviews
https://youtu.be/0l2nePjDFuA
https://redd.it/ke5tfe
@programmingreddit
https://youtu.be/0l2nePjDFuA
https://redd.it/ke5tfe
@programmingreddit
YouTube
Two Pointer Technique (Coding Interview Patterns #1)
In this video, I cover the two pointer technique. This is an important technique for solving coding interview questions.
Learning to program a computer is similar to learning a new language. However, MIT neuroscientists found that reading computer code does not activate language processing brain regions. Instead, it activates a network for complex cognitive tasks such as solving math problems or crossword puzzles.
https://news.mit.edu/2020/brain-reading-computer-code-1215
https://redd.it/kee8hj
@programmingreddit
https://news.mit.edu/2020/brain-reading-computer-code-1215
https://redd.it/kee8hj
@programmingreddit
MIT News
To the brain, reading computer code is not the same as reading language
MIT neuroscientists have found reading computer code does not rely on the regions of the brain involved in language processing. Instead, it activates the “multiple demand network,” which is also recruited for complex cognitive tasks such as solving math problems…
How to set up a Smashing dashboard on your Raspberry Pi
https://blog.sweethuman.tech/raspberry-pi-smashing-dashboard
https://redd.it/kergch
@programmingreddit
https://blog.sweethuman.tech/raspberry-pi-smashing-dashboard
https://redd.it/kergch
@programmingreddit
sweethuman's Blog
How to set up a Smashing dashboard on your Raspberry Pi
As an OS we are going to use DietPi because it automates most of the setups. There is a 64Bit version available but at the time of writing this, I can't install Chromium on it.
To install DietPi you can follow their Guide. For flashing I used RPi Ima...
To install DietPi you can follow their Guide. For flashing I used RPi Ima...
A minimal and easy-to-use C testing framework, in plain C with no dependencies
https://github.com/ollelogdahl/ihct
https://redd.it/kevfwi
@programmingreddit
https://github.com/ollelogdahl/ihct
https://redd.it/kevfwi
@programmingreddit
GitHub
GitHub - ollelogdahl/ihct: 'I Hate C Testing': A minimal testing framework for C.
'I Hate C Testing': A minimal testing framework for C. - ollelogdahl/ihct
No cookie for you - The GitHub Blog
https://github.blog/2020-12-17-no-cookie-for-you/
https://redd.it/kf3aam
@programmingreddit
https://github.blog/2020-12-17-no-cookie-for-you/
https://redd.it/kf3aam
@programmingreddit
The GitHub Blog
No cookie for you
Good news: we removed all cookie banners from GitHub! 🎉 No one likes cookie banners. But cookie banners are everywhere. So how did we pull this off? Well, EU law requires you to use cookie
I made a (free) application that lets you group taskbar shortcuts
https://github.com/tjackenpacken/taskbar-groups
https://redd.it/kew3p5
@programmingreddit
https://github.com/tjackenpacken/taskbar-groups
https://redd.it/kew3p5
@programmingreddit
GitHub
GitHub - tjackenpacken/taskbar-groups: Lightweight utility for organizing the taskbar through groups
Lightweight utility for organizing the taskbar through groups - tjackenpacken/taskbar-groups
Starting today, GitHub Code Search will only index repositories that have had recent activity within the last year.
https://github.blog/changelog/2020-12-17-changes-to-code-search-indexing/
https://redd.it/kfauwk
@programmingreddit
https://github.blog/changelog/2020-12-17-changes-to-code-search-indexing/
https://redd.it/kfauwk
@programmingreddit
The GitHub Blog
Changes to Code Search Indexing · GitHub Changelog
Double Blind Passwords (aka Horcruxing)
https://kaizoku.dev/double-blind-passwords-aka-horcruxing
https://redd.it/kfk1d9
@programmingreddit
https://kaizoku.dev/double-blind-passwords-aka-horcruxing
https://redd.it/kfk1d9
@programmingreddit
Kaizoku Dev
Double Blind Passwords (aka Horcruxing)
Before we get into Horcruxing, here's a quick prologue on online security hygiene. You can skip to the Horcruxing section if it seems redundant.
Rules for Strong Online Security
1.
Longer passwords (atleast 16 characters) are better than shorter on...
Rules for Strong Online Security
1.
Longer passwords (atleast 16 characters) are better than shorter on...
Hallucinations re: the rendering of Cyberpunk 2077
http://c0de517e.blogspot.com/2020/12/hallucinations-re-rendering-of.html
https://redd.it/kf9p5y
@programmingreddit
http://c0de517e.blogspot.com/2020/12/hallucinations-re-rendering-of.html
https://redd.it/kf9p5y
@programmingreddit
Blogspot
Hallucinations re: the rendering of Cyberpunk 2077
Realtime rendering and videogame programming mostly, but I love computer science and visuals in all their forms. This is a notepad of my ideas.
Norman Abramson, information theorist and creator of the Ethernet precursor ALOHAnet (shared access wireless packet network), dead at 88
https://www.i-programmer.info/news/82-heritage/14212-the-legacy-of-norman-abramson.html
https://redd.it/kfuf47
@programmingreddit
https://www.i-programmer.info/news/82-heritage/14212-the-legacy-of-norman-abramson.html
https://redd.it/kfuf47
@programmingreddit
www.i-programmer.info
The Legacy of Norman Abramson
Programming book reviews, programming tutorials,programming news, C#, Ruby, Python,C, C++, PHP, Visual Basic, Computer book reviews, computer history, programming history, joomla, theory, spreadsheets and more.
Made our subscription management system open source after our startup failed
https://github.com/itshubble
https://redd.it/kg46mv
@programmingreddit
https://github.com/itshubble
https://redd.it/kg46mv
@programmingreddit
Bouncy Castle crypto authentication bypass vulnerability revealed: "This means that passwords that result in hashes that, for instance, don’t contain bytes between 0x00 and 0x3B match every other password hash that don’t contain them."
https://www.bleepingcomputer.com/news/security/bouncy-castle-crypto-authentication-bypass-vulnerability-revealed/
https://redd.it/kg6ja4
@programmingreddit
https://www.bleepingcomputer.com/news/security/bouncy-castle-crypto-authentication-bypass-vulnerability-revealed/
https://redd.it/kg6ja4
@programmingreddit
BleepingComputer
Bouncy Castle crypto authentication bypass vulnerability revealed
A severe authentication bypass vulnerability has been reported in Bouncy Castle, a popular open-source cryptography library. When exploited, the vulnerability (CVE-2020-28052) can allow an attacker to gain access to user and administrator accounts due to…
Better Quake strafe-jumping with genetic algorithms (video)
https://www.youtube.com/watch?v=xBodLDT_yrg
https://redd.it/kgab2f
@programmingreddit
https://www.youtube.com/watch?v=xBodLDT_yrg
https://redd.it/kgab2f
@programmingreddit
YouTube
Better Quake strafe-jumping with genetic algorithms
In this video I write a bot to speed-run Quake's 100m level by reverse engineering a human's run and improving it using genetic algorithms.
00:00 Introduction
01:00 Demo files
03:20 Physics state updates
05:28 Input recovery theory
06:58 Genetic algorithms…
00:00 Introduction
01:00 Demo files
03:20 Physics state updates
05:28 Input recovery theory
06:58 Genetic algorithms…
A modern port of Turbo Vision 2.0, the classical framework for text-based user interfaces. Now cross-platform and with Unicode support.
https://github.com/magiblot/tvision
https://redd.it/kg6fww
@programmingreddit
https://github.com/magiblot/tvision
https://redd.it/kg6fww
@programmingreddit
GitHub
GitHub - magiblot/tvision: A modern port of Turbo Vision 2.0, the classical framework for text-based user interfaces. Now cross…
A modern port of Turbo Vision 2.0, the classical framework for text-based user interfaces. Now cross-platform and with Unicode support. - magiblot/tvision
How U.S. agencies' trust in untested software opened the door to hackers
https://www.politico.com/news/2020/12/19/how-federal-hack-happened-448602
https://redd.it/kgnt7u
@programmingreddit
https://www.politico.com/news/2020/12/19/how-federal-hack-happened-448602
https://redd.it/kgnt7u
@programmingreddit
POLITICO
How U.S. agencies' trust in untested software opened the door to hackers
The government doesn’t do much to verify the security of software from private contractors. And that’s how suspected Russian hackers got in.
Ryzen 5800X vs Apple M1: Programming-focused benchmarks
https://github.com/tuhdo/tuhdo.github.io/blob/c3b417ba2fc81768f656dadf87bf3dd28ba47182/emacs-tutor/zen3_vs_m1.org
https://redd.it/kgg76f
@programmingreddit
https://github.com/tuhdo/tuhdo.github.io/blob/c3b417ba2fc81768f656dadf87bf3dd28ba47182/emacs-tutor/zen3_vs_m1.org
https://redd.it/kgg76f
@programmingreddit
GitHub
tuhdo.github.io/emacs-tutor/zen3_vs_m1.org at c3b417ba2fc81768f656dadf87bf3dd28ba47182 · tuhdo/tuhdo.github.io
Emacs Mini Manual. Contribute to tuhdo/tuhdo.github.io development by creating an account on GitHub.