How to Sort Three Numbers
Quick: how do you sort three numbers in ascending order?
Continue reading "How to Sort Three Numbers"
2005.11.17 How to Sort Three NumbersQuick: how do you sort three numbers in ascending order? Continue reading "How to Sort Three Numbers"2005.11.14 Supporting Java's Foreach ConstructJava 1.5 supports a new foreach construct for iterating over collections. The construct can be used on arrays and on all classes in Java's Collection framework. I searched the internet for an example on how to make my own classes iterable with this construct, but could not find an example. Continue reading "Supporting Java's Foreach Construct"2005.11.09 US Military Removes Word Documents from the Web?On August 25th 2004 the comp.risks forum run an article I submitted regarding the large number of Microsoft Word documents available on US milatary sites (sites in the .mil domain) through Google searches (23.50 "U.S. military sites offer a quarter million Microsoft Word documents"). The article documented how such documents could lead to the leakage of confidential data. A week later I setup a script to watch the number of Word documents available through Google searches to see if and when the military would recognise the threat those documents posed and remove them. Continue reading "US Military Removes Word Documents from the Web?"2005.11.01 Working with Unix Tools
A successful [software] tool is one that was used to do something undreamed of by its author. — Stephen C. Johnson Line-oriented textual data streams are the lowest useful common denominator for a lot of data that passes through our hands. Such streams can be used to represent program source code, web server log data, version control history, file lists, symbol tables, archive contents, error messages, profiling data, and so on. For many routine, everyday tasks, we might be tempted to process the data using a Swiss army knife scripting language, like Perl, Python, or Ruby. However, to do that we often need to write a small, self-contained program and save it into a file. By that point we've lost interest in the task, and end-up doing the work manually, if at all. Often, a more effective approach is to combine programs of the Unix toolchest into a short and sweet pipeline that we can run from our shell's command prompt. With the modern shell command-line editing facilities we can build our command bit by bit, until it molds into exactly the form that suits us. Nowadays, the original Unix tools are available on many different systems, like GNU/Linux, Mac OS X, and Microsoft Windows, so there's no reason why you shouldn't add this approach to your arsenal. Continue reading "Working with Unix Tools" |
Navigation
Recent Entries
Revision Control Smells (2016.09.13) The Computer Tube (2016.05.07) Verifying the Substitution Cipher Folklore (2016.03.18) Raspberry Pi vs USB vs Mac Audio (2015.12.13) Raspberry Pi Zero vs Elliott 405 (2015.11.29) Impact Factor of Computer Science Journals 2014 (2015.06.28) Grady Booch on the Future in Software Engineering (2015.05.22) ABS's 2015 Academic Journal Guide (2015.02.28) What's the Best Time and Day to Tweet? (2015.01.13) First, Do No Harm (2014.09.25) Category Tags
AWS (3) Android (2) Apple (9) C (18) C++ (16) Computers (54) Discussion (5) Electronics (14) Environment (1) FreeBSD (25) Funny (14) GSIS (5) Google (6) Government (1) Hacks (25) Hardware (22) History (2) Internet (12) Java (25) Linux (5) Management (25) Microsoft (11) One Laptop Per Child (3) Open source (56) Opinion (28) Parenting (11) Perl (13) Photos (13) Politics (3) Programming (101) R (1) Raspberry Pi (2) Risks (5) Scala (1) Science (31) Security (26) Sights (18) Smartphones (3) Software (19) Software engineering (80) Standards (6) System administration (39) Teaching (8) Technology (24) Tips (39) Tools of the Trade (52) Travel (9) UML (6) Unix (31) Web (30) Windows (13) Writing (40) XML (9) vim (5) Archive
Complete contents (321)
September 2016 (1) May 2016 (1) March 2016 (1) December 2015 (1) November 2015 (1) June 2015 (1) May 2015 (1) February 2015 (1) January 2015 (1) September 2014 (1) August 2014 (1) July 2014 (1) April 2014 (1) January 2014 (1) December 2013 (2) October 2013 (1) September 2013 (1) July 2013 (2) June 2013 (2) May 2013 (1) March 2013 (2) February 2013 (1) January 2013 (1) December 2012 (3) October 2012 (2) September 2012 (3) August 2012 (1) July 2012 (1) June 2012 (1) May 2012 (1) March 2012 (2) February 2012 (1) January 2012 (2) December 2011 (3) November 2011 (1) October 2011 (1) September 2011 (1) July 2011 (3) May 2011 (3) February 2011 (1) January 2011 (1) November 2010 (1) October 2010 (2) August 2010 (3) July 2010 (1) June 2010 (1) May 2010 (1) April 2010 (1) March 2010 (2) January 2010 (1) December 2009 (1) November 2009 (1) October 2009 (2) September 2009 (2) August 2009 (5) July 2009 (3) June 2009 (3) May 2009 (4) April 2009 (6) March 2009 (4) February 2009 (5) January 2009 (4) December 2008 (3) November 2008 (2) October 2008 (5) September 2008 (4) August 2008 (4) July 2008 (3) June 2008 (2) May 2008 (5) April 2008 (3) March 2008 (2) February 2008 (2) January 2008 (5) December 2007 (3) November 2007 (3) October 2007 (3) September 2007 (4) August 2007 (2) July 2007 (2) June 2007 (4) May 2007 (3) April 2007 (5) March 2007 (5) February 2007 (3) January 2007 (4) December 2006 (5) November 2006 (5) October 2006 (5) September 2006 (7) August 2006 (1) July 2006 (5) June 2006 (3) May 2006 (3) April 2006 (4) March 2006 (2) February 2006 (3) January 2006 (5) December 2005 (3) November 2005 (4) October 2005 (3) September 2005 (6) August 2005 (1) July 2005 (4) June 2005 (2) May 2005 (6) April 2005 (3) March 2005 (4) February 2005 (6) January 2005 (2) December 2004 (3) November 2004 (3) October 2004 (5) September 2004 (3) August 2004 (5) July 2004 (1) June 2004 (1) May 2004 (1) April 2004 (2) March 2004 (1) February 2004 (2) January 2004 (3) October 2003 (2) September 2003 (1) July 2003 (1) June 2003 (2) May 2003 (1) Syndication
Search
|