BlogHide Resteemsresteemedkrishtopa (67)in programming • 8 years agoCode Optimization: MemoryMost programmers think that computing system is a processor which executes instructions and a memory that stores instructions and data for the processor. In this simple model, the memory is…resteemedkrishtopa (67)in programming • 8 years agoBloom Filter for web developersIt is a data structure that allows you to verify belonging of an element to the set, without storing this element itself. There is a possibility of false-positive response, but a negative response…resteemedkrishtopa (67)in science • 8 years agoThe algorithm of polynomials real roots calculationThe basic idea of this algorithm is very simple and can be described in two sentences. A real root of the polynomial can always be calculated on the area of monotonic variation of the polynomial…resteemedkrishtopa (67)in popularscience • 8 years agoOptimization of transmission delayLow latency - an important factor that ensures reliable operation and high performance of networks. Applications for real-time communication and streaming are highly dependent on the waiting time.…resteemedkrishtopa (67)in popularscience • 8 years agoQuantum communication: perspectivesTelegraph replaced pigeon mail. Radio replaced the telegraph. Radio, of course, will not disappear, but there are other data transmission technologies - wired and wireless. Generations of…resteemedkrishtopa (67)in technology • 8 years agoPaaS, DBaaS, SaaS ... What does it mean?Over the past few years, a lot of new terms related to the telecommunications sector appeared in the English language. We often work with the terms that are connected with the "cloud" sphere. And if…resteemedkrishtopa (67)in popularscience • 8 years agoHow your WhatsApp Messages are secured with end-to-end encryptionEnd-to-end encryption provides the highest level of protection for users who are seriously concerned about data privacy. For private data management you no longer have to rely on third-party…resteemedkrishtopa (67)in security • 8 years agoRetroShare - a tool for private communication and data exchangeRetroshare - a cryptographically secure decentralized platform for anonymous communication and file sharing. The system allows you to organize separate server less Friend-to-Friend network or a…resteemedkrishtopa (67)in popularscience • 8 years agoHave you ever heard about Data Mining methods?The rapid development of information technology, in particular, progress in methods of data collection, storage, and processing has allowed many organizations collect massive amounts of data that…resteemedeneismijmich (69)in travel • 8 years agoAmerica + Canon = Photostory to share (part 2 – New York City)For the last half hour I'm trying to figure out a good introduction for the 2nd part of my American story. As you can see in the title, it's about New York. The problem is that I have a feeling that…resteemedkrishtopa (67)in popularscience • 8 years agoThe easiest hacking method - Brute forceThe easiest hacking method - Brute force Brute force - one of the most popular methods of hacking passwords on servers and in various programs. Program-cracker tries to get access to a program…resteemedkrishtopa (67)in popularscience • 8 years agoHow to recognize data on your credit cardRecognition of data from the credit card is a highly actual and very interesting task from the standpoint of algorithms. Well implemented card recognition software can save people from the need to…resteemedsirwinchester (75)in sirwinchester • 8 years agoThe New MacBook Pro with Touch Bar - Everything You Need To Know!Yesterday, Apple presented the new Macbook Pro 2016. While Apple launched the "Macbook" in 2015, Mac fans have been eagerly waiting for an updated version of the macbook pro since 4 years…resteemedkrishtopa (67)in popularscience • 8 years agoMonte Carlo simulation - the best risk analysing methodMonte Carlo method can be defined as a method for simulating random variables with the purpose of calculation the characteristics of their distributions. The Monte Carlo method have a…resteemedkrishtopa (67)in popularscience • 8 years agoBig Data - modern and problematic method of data storage and analyzingDigital technologies are presented in all areas of human life. The amount of data recorded in the global warehouse is growing every second, which means that storage conditions and new opportunities…resteemedkrishtopa (67)in popularscience • 8 years agoThe fastest sort method - FlashSortThere are numerous sorting methods, each of which has its advantages and disadvantages. Sorting algorithms are widely used in programming, but sometimes developers do not even think what algorithm…resteemedkrishtopa (67)in popularscience • 8 years agoThe best way to analyze a huge amount of corporate data - Decision treeThe rapid development of information technology and progress in methods of data collection, storage, and processing has allowed many organizations collect massive amounts of data that must be…resteemedkrishtopa (67)in popularscience • 8 years agoGreat image compression method - JPEGUsing of new classes of images is the main trend in recent years. Older algorithms no longer meet the requirements of archiving. Many of the images were not compressed, although they had obvious…resteemedkrishtopa (67)in popularscience • 8 years agoDijkstra’s algorithm of finding optimal pathsOne of the common tasks of graph theory is the one in which you need to find the most optimal path between two points. It can be solved on the plane as the graph in which the vertices - cities - are…resteemedkrishtopa (67)in popularscience • 8 years agoIP-telephony or global modern way of communicationIP-telephony - a modern technology of voice data transmission via the Internet. Previously, there were two separate systems: telephony and the Internet, which worked on various cable systems. If to…