Press ESC to close

57744
7
USA
7 Min Read

CAP Theorem explained You’ll often hear about the CAP theorem which specifies some kind of an upper limit when designing distributed systems. As with most of my other introduction tutorials, lets try understanding CAP by comparing it with a real world situation. Chapter 1: “Remembrance…

9979
5
USA
5 Min Read

I recently came up with what I think is an intuitive way to explain Bayes’ Theorem. I searched in google for a while and could not find any article that explains it in this particular way. Of course there’s the wikipedia page, that long article by Yudkowsky, and a bunch…

48668
10
USA
10 Min Read

I decoded a recording I made with the Allen Telescope Array. I used an IQ sample rate of 3.84 Msps when doing this recording because I wanted to see if there were any ranging signals. Usually, ranging signals have a bandwidth of 1.5 MHz or…

5669
4
USA
4 Min Read

A few months ago we saw a post on the r/programminghorror subreddit: A developer describes the struggle of identifying a syntax error resulting from an invisible Unicode character hidden in JavaScript source code. This post inspired an idea: What if a backdoor literally cannot be seen and thus evades detection even from thorough code reviews?…

23697
2
USA
2 Min Read

Why should you learn at least the basic Architecture Patterns as Software Engineer? I believe there are many articles answering to this question, but I will give you a few reasons to consider. First of all, if you know the basics of architecture patterns, then…

87148
9
USA
9 Min Read

Bayesian histograms are a stupidly fast, simple, and nonparametric way to find how rare event probabilities depend on a variable (with uncertainties!). My implementation of Bayesian histograms is available as the Python package bayeshist. So if you think this could be useful, just install the package…

23773
6
USA
6 Min Read

People sometimes wonder how the set of primitives in BQN was chosen. Outsiders to array programming might assume that the “big idea” of APL is just to take the most common tasks and write them with symbols instead of names—even Dijkstra said something like this,…

33629
11
USA
11 Min Read

After a month of reverse-engineering, we’re excited to release documentation on the Valhall instruction set, available as a PDF. The findings are summarized in an XML architecture description for machine consumption. In tandem with the documentation, we’ve developed a Valhall assembler and disassembler as a…

3243
24
USA
24 Min Read

Explanation of the various GPU architectures The behavior of the graphics pipeline is practically standard across platforms and APIs, yet GPU vendors come up with unique solutions to accelerate it, the two major architecture types being tile-based and immediate-mode rendering GPUs. In this article we…

5038
2
USA
2 Min Read

Challenge/Opportunity The customer managed their projects, clients, invoicing and finance, as well as the contractors engaged in each project, using a variety of different platforms and spreadsheets. The majority of data entry and aggregation were performed manually or through Excel files, and data integration and…

1649
14
USA
14 Min Read

CVE-2021-22555 is a 15 years old heap out-of-bounds write vulnerability in Linux Netfilter that is powerful enough to bypass all modern security mitigations and achieve kernel code execution. It was used to break the kubernetes pod isolation of the kCTF cluster and won 10000$ for…