All Posts2021Introducing My Brain Dump09-23GNU parallel is xargs on Steroids02-22Soak up Pipelines with sponge01-042020Year in Review 202012-31Hamefura S0112-08Programmer Strings11-24Max Positive Slice Sum10-20BST In-Order Successor10-19Numbers Disappeared in an Array10-14Equal Split (2 Array)10-12Stone Wall10-08Avoid Code Smells With Lazy Iterables10-02Fish09-30Passing Cars09-29Tape Equilibrium09-26Binary Gap09-23Frog Jump09-22Django09-17Galton Board09-10EDN is the JSON of My Dreams09-03The Case for Terminal File Managers08-29Combination Sum08-27Array Product Excluding Self08-26Gold Rush08-25Word Search08-24Generate Text Messages08-23String Case Permutations08-22Same Leaves08-21Using fzf as a dmenu Replacement08-20Symmetric Binary Tree Predicate08-20Validate Binary Search Tree08-19Level Based Tree Traversal08-18Root to Leaf Path Sum08-17Middle of a Linked List07-21Group Anagrams07-20Move Zeroes07-19Happy Number07-18Unique Number07-17Number Intersection07-16Spot the Difference07-15kotlin07-15First Unique Character07-14Valid Anagram07-13Jewels and Stones07-12Two Sum07-11Longest Common Prefix07-09Variance in Java07-07Capitalization Check07-07Vacuum Robot Route07-06Check Palindrome07-05Reversing a String07-04go07-03Gradle04-25Decorators Are Awesome!04-01Zone IndexesZombie ProcessZero Order ModelZero Crossing RateZbufferZ-TransformZ-Plane Transfer FunctionZ-PlaneYellow KeyXSSXorgXORXftWriting SystemsWorking CapitalWord SizeWindows RegistryWindows ForensicsWindowingWhite NoiseWeighted GraphWeb Services PipelineWeb App SecurityWeak AIWavelengthWaterfall with FeedbackWaterfall ModelVowelsvon-Neumann ArchitectureVon-Hann WindowVolume Boot RecordVoice Onset TimeVocoderVocal TractVocal CordsVisible Surface Ray TracingVirtual MemoryVirtual MachineVirtual Disk MemoryView VolumeVertex ProjectionVertex NormalVertex Buffer ObjectsVertex AttributesVertex Array ObjectVernam CipherVerificationVenture CapitalVenn DiagramVector Space ModelVectorVariant FlowVarianceVariable Length CodingVariable CostValue Based PricingValidationValenceV-ModelUser Story PointsUser Interface DesignUse CasesUse Case DiagramURLUnsupervised LearningUnliquidated DamagesUniverse SetUniversal QuantificationUnique QuantificationUnicodeUnary RelationUnallocated SpaceUML ConstraintsUMLUmbra & PenumbraUDPType SafetyTuring TestTube HarmonicsTrusted Computer BaseTrojan HorseTrivial File Transfer ProtocolTrigonometric FunctionsTriangleTrespassTree TraversalTreeTraversable NetworkTravelling Salesman ProblemTrapezium RuleTranslation Lookaside BufferTransitive RelationTransform Centre ArchitectureTrademarkTotal Turing TestTotal Order ReflectionTotal FunctionTortTopological SortingTopic DetectionTLSTLDTimesharingTime Value of MoneyTime Invariant FilterTime Domain FilteringTimbreThreat TreeThreat ModellingThread SafetyThreadThrashingThin Skull RuleTheta NotationThe WebThe Painters AlgorithmThe Iron TriangleTexturesTexture UnitTexture MappingTexture FilteringTexture AtlasText SegmentText ProcessingText CompressionText CodingTest CoverageTerm WeightingTerm ManipulationTemplate Method PatternTCPTBN-spaceTautalogyTarget CostingTap SequenceTail Call OptimisationTable DiagramSystem Design InterviewSystem BoundarySystemSyntaxsyncSymmetric-key EncryptionSymmetric RelationSymbolwise Text CompressionSyllableSwitchSwapSurjectionSurdsSupervised LearningSupervised ClassifierSuperpositionSuperblockSuper SamplingSunk CostSummationSubstitution Permuation NetworkSubstitution Permuation CipherSubstitution CipherSubsetsSubjectivity ClassificationSubjectivity AnalysisSubjectSub-GraphStrong AISTRIDEStream GeneratorStream CipherStraight LineStory CardsStoplistStochastic SamplingStochastic Ray TracingStochastic Gradient DescentSticky NoteSteganographyStatutory DefencesStationary SignalsStationary PointStationary AssumptionStatic ModellingStatic Code AnalysisStatement of Financial PositionStatement of Cash FlowsState PatternState Machine DiagramState Based DesignstatStarvationStanding WaveStandardisationStack SmashingStack ProtectorsStackStable SortSSLSSHSQL InjectionSQLSpotlightSpoofingSpiral ModelSpeech SegmentationSpeech ProcessingSpeech FramesSpeechSpecular MappingSpecular LobeSpectrogramSpectreSpectral LeakageSpectral AnalysisSpectraSpecificationSpecial Pricing DecisionsSpeakingSpatial PartitioningSparse GraphSpanning TreeSpace SubdivisionSource Filter ModelSound Pressure LevelSoundSorting AlgorithmSolvency AnalysisSolid Texture MappingSolid State DriveSohCahToaSoftware TestingSoftware SystemSoftware Security TestingSoftware SecuritySoftware SafetySoftware Metrics And EstimationsSoftware EngineeringSoftware Development Life CycleSoftware ArchitectureSoftware ArchitectSoft-Max Reward PolicySoft TokensSoft LinkSocketSocial EngineeringSocial ConstraintsSMTP ProtocolSmoothing KernelSLDSlack SpaceSkyboxSkip GramSingular MatrixSingle-factor AuthenticationSingle Layer Feed-Forward Neural NetworkSine CorrelationSimultaneous EquationsSignal ProcessingSignal CorrelationSignalSignalSieve of EratosthenesShoulder SurfingShortest-Job-First SchedulerShort Time EnergyShort Term SchedulingShellShadowsShadow ZbufferShadow VolumesShader ProgramShaderSetsSet UnionSet IntersectionSet DifferenceSet ComplementSession KeyServiceSequence PointsSequence DiagramSentiment SummarySentiment ClassificationSentiment AnalysisSemi-supervised LearningSemi-CircleSemaphoreSemanticsSemantic WebSelf Balancing TreesSegregated AllocatorSegmental AnalysisSecurity SystemSecurity ServicesSecurity ProtocolSecurity ConstraintsSecurity AttackSecuritiesSecure SDLCSector and SegmentSearch AlgorithmsearchSCRUMScreen ExtentsScintillationSchedulingSchedulerScene GraphScenarioScatter DiagramScalabilitySaturationSashimi WaterfallSARSA AlgorithmSamplingSamplingS-PlaneS-boxRuntime Recurrence RelationsRuntime PerformanceRSARPMRouterRoute Inspection ProblemRound Robin SchedulerRotoscopingROT13ROMRole Based Access ControlRogue CertificateRogueRod Cutting ProblemRing BufferReward PolicyReverberationReturn on Capital EmployedRESTResource Allocation GraphResonanceRequirements EngineeringRequirements AnalysisRemote Procedure CallRemainder TheoremRelevance FeedbackRelative Refactory PeriodRelational DatabaseRelation ExtractionRelation CompositionReinforcement Neural NetworkReinforcement LearningReflexive RelationRefactoringReducing the FootprintRecursive DefinitionRecurrence RelationRectangular HyperbolaRecessionReceptive FieldReasonReader Writer ProblemReactive SystemsRay TracingRay Sphere IntersectionRay Polygon IntersectionRay Plane IntersectionRay CastingRay Box IntersectionRationalityRational AgentRatio AnalysisRanked AlgorithmsRangeRandom AlgorithmsRandom Access ModelRAIDRadix SortRadiansRace ConditionQuotient Remainder TheoremQuick SortQueuesQuery LogsQuery ExpansionQuefrency DomainQuantisationQuantificationsQuadratic EquationQuadrantQ-valuesQ-learningPythonPytestPure TonePublic or Private LawPublic Key CryptographyPsuedo-random Number GeneratorPseudo Relevance FeedbackProxyPrototype ModelProtocol State MachineProsodyPropositionsPropositional VariablesProper SubsetsProof by InductionProof by ContradictionProgramming LanguageProgram BreakProgramProfit vs. CashProfit Volume GraphProfit MarginsProductProcessor RegistersProcessor CachingProcess StackProcess HeapProcessProbability Tree DiagramProbability DistributionProbability Density FunctionProbabilityPriority QueuePrinciple of ModularityPrinciple Component AnalysisPrime NumberPrimary KeyPrim's AlgorithmPrice & DemandPretextingPreemptive Shortest-Job-First SchedulerPredictive Design ModelsPrediction by Partial MatchingPredicatePre-Synaptic NeuronsPowersetPower SpectrumPost-Synaptic NeuronsPortPolygon MeshPolygonPoly-alphabetic Substitution CipherPoles & ZerosPointersPoint LightPlasticityPlain-text AttackPitchPipesPipelined ArchitecturePiling Up LemmaPhysical ConstraintsPhonologyPhonological ProcessPhong Interpolative ShadingPhong IlluminationPhoneticsPhonetic Writing SystemsPhonemicsPhonemePhonePhonationPhisingPhilosophy in AIPhase ShiftPerspective ProjectionPermutation CipherPeri Stimulus Time HistogramPerfect Forward SecrecyPercept SequencePerceptPenetration TestingPCMCIAPCIPayment PeriodPattern AttackPath TracingPathPatentPartitioned ArchitecturePartitionPartial Order ReflectionPartial FunctionPartial FractionsParametric PatchesParametric FunctionParametric CurvesParabolaPairwise Constrained K-Means ClusteringPair ProgrammingPage TablePage RankPage FilesPage FaultPagePacketPackage DiagramP-code LanguageP-boxOverdraftOutput Feedback ModeOut-of-Order ExecutionOSI ModelOS ForensicsOrphan ProcessOptimistic-Greedy Reward PolicyOptimal SubstructureOpportunity CostOpinion MiningOperating SystemOperating CycleOpenGLOne-to-One FunctionOmega NotationOja's RuleOfferOctalObserver PatternObject Oriented ProgrammingObject DiagramObject Constraint LanguageObjectNyquist-Shannon TheoremNumerical MethodsNumeric IntervalsNumbersNumber NotationNuisanceNTPNotch FilterNormalised Device CoordinatesNormal MatrixNormal MappingNormal DistributionNordVPNNon-Stationary SoundsNon-interferenceNoise ReductionNoiseNode ValencyNo-Write-Down, No-Read-Up PolicyNLMS-algorithmNibbleNext Generation Access ControlNeuronNeural Spike RateNeural NetworkNetwork ProtocolNetwork InterfaceNetwork CertificateNet Asset TurnoverNegligenceNatural FrequencyName ServerName Entity RecognitionNaive Ray TracingNaive Bayes ClassifierN-Ary RelationsMVP-MatrixMutexMultitaskingMulti-factor AuthenticationMulti SamplingMulti Level SecurityMoving Weighted AverageMount PointsMotion CaptureMotherboardMost Vexing ParseMOSCOW MethodMosaicingMoral RightsMonotonic FunctionMonopthongsMono-alphabetic Substitution CipherMoire PatternsModulus FunctionModulusModular ProtectionModular ArithmeticModel-View-ControllerModel-DelegateMode, Median, ModalMobile ForensicsMMUmmapMipmapsMinimum Spanning TreeMinimal PairsMinimal Hebbian RuleMini-Batch Gradient DescentMin-Max TransformationMin HeapMicroserviceMicrophoneMetric Pairwise K-Means ClusteringMerge SortMemory TranslationMemory SafetyMemory ManagementMemory AllocationMemoryMemoizationMel FrequencyMedium Term SchedulingMedium Level AnimationMediator PatternMeatusMcCabe MetricsMaximal MatchingMax-Heap SortMax HeapMatrix TransformationsMatrixMatchingMaster Boot RecordMaskingMarkovian Decision ProcessMarket TheoryMarket PriceMarginal CostingMarginal CostMargin of SafetyMandatory Access ControlMan in the Middle AttackmanMalwareMalleus, Incus, StapesMake or BuyMain MemoryMachine LanguageLRU CacheLow Level AnimationLoop InvariantLong Term SchedulingLondon Stock ExchangeLogistic AILogical ConstraintsLogical Block AddressingLogarithmsLocusLocalityLocalhostLoansLoad BalancerLMS-AlgorithmLittle-O NotationLittle Omega NotationLiquidityLinux ForensicsLinuxLinked ListLines of CodeLinear TransformationsLinear Time SortingLinear RelationsLinear ProgrammingLinear PredictionLinear FiltersLinear Feedback Shift RegistersLinear Feedback FunctionLinear ExpressionsLinear CryptanalysisLimited CompanyLife Cycle AnalysisLiabilitiesLexiconLeast Squares Regression LineLeast Common MultipleLeasingLearning CurveLearning AlgorithmsLayered ArchitectureLaw of CopyrightLaw of Confidential InformationLawLatency vs. ThroughputLaplace SmoothingKruskal's AlgorithmKronecker DeltaKISSKinds of IntelligenceKeyed-Stream CipherKey Agreement ProtocolKernel RingKernelKanban BoardK-Means ClusteringJournalIterative Design ModelISAIrreflexive RelationIR vs. IEIPAIP InfringementIP AddressIPInvitation to TenderInvestmentINVESTInverse MatrixInverse FunctionInverse Fourier TransformInventory Holding PeriodInvention ProtectionInterrupt RequestInterruptInterpreted LanguageInterpolative ShadingInternetInternal FragmentationInternal CacheInter-Process CommunicationIntentionIntelligent AgentsIntellectual PropertyIntegrityIntegration Platform as a ServiceIntegrationIntegerInsertion SortinodeInjectionInitInformation Retrieval EvaluationInformation RetrievalInformation ModellingInformation HidingInformation ExtractionInflexion PointInfinite Impulse Response FilterInequalitiesIndexingIncremental WaterfallIncome StatementIn-place AlgorithmImpulse ResponseImplicit FunctionImplicit DifferentiationImplementationImperative LanguagesImaginary NumberImaginary ConstantIlluminationIdentity MatrixIdentificationIdempotenceIAAAi-nodeHyperthreadingHyperbolaHuman Voice SynthesisHuffman CodingHTTPSHTTPHSTSHostHomomorphic FilteringHomogeneous RelationhledgerHistogramHigher Level LanguagesHigh Level AnimationHierarchial DesignHidden Surface RemovalHexalHeuristic Atmospheric AttenutationHeterogeneous RelationHebbs PostulumHebbian Synaptically Gated RuleHebbian RuleHebbian Post-synaptically Gated RuleHebbian LearningHebbian Constant Decay RuleHearing ResolutionHearingHeapHarmonicsHarmonic Trig FormHardware InterruptHard LinkHard DiskHappy FlowHands Free SystemHamming WindowGUID Partition TableGTestGreedy Reward PolicyGreedy AlgorithmsGreatest Common DivisorGraphics PipelineGraph TransformationsGraphGrandmother CellGram-Schmidt ProcessGradient DescentGradient AlgorithmGradable LexiconGovernment SecuritiesGouraud Interpolative ShadingGolangGlobal IlluminationGimbal LockGeometric ShadowsGeometric SeriesGeneral Digital FilterGeneral Adversarial NetworkGeffe GeneratorGearingFuzzingFURPSFundamental Theorem of ArithmeticFundamental FrequencyFunctions as RelationsFunction RepresentationFunction Pre-ImageFunction PointsFunction ImageFunction GraphFunction CompositionFunctionFTPFrequency-Analysis AttackFrequency DomainFrequency AnalysisFrequencyFrameFrameFragmentsFourier TransformFourier TheoremFourier SeriesFountain LifecycleFormantFormal Systems DevelopmentFork-Exec-Wait PatternFork BombForkForensic ToolsForeign KeyFlow ChartFloorFloating PointFlaws vs. VulnerabilitiesFlat ShadingFlashlightFirst-Come-First-Served SchedulerFirmwareFinite Impulse Response FilterFinite Context ModelFingerprint AuthenticationFinancial StatementsFilter OrderFilter Model of SpeechFilter CoefficientsFilter ApproximationFilterFile SystemFile SignaturesFile DescriptorFile DescriptionFile CarvingFileFibonacci NumbersFeistel CipherFeature SpaceFeature SelectionFeature ExtractionfcntlFake ShadowsFail OverFactual vs. Subjective DataFacial AnimationExtreme ProgrammingExternal FragmentationExternal ConstraintsExternal CacheExponential Moving AverageExponentExpert SystemsExistential QuantificationExecExcitory Post Synaptic PotentialExcitationEverything is a FileEvent ExtractionEulers Totient FunctionEulers TheoremEulers FormulaEulerian GraphEuler AnglesEuclidean DistanceEuclid's AlgorithmEquivalence RelationEquivalence ClassEquityEpsilon-Greedy Reward PolicyEPROMEpochEpicEnvironmental LawEnvironment MappingEntity Relationship ModellingEntity Relationship ModelEnigma MachineEndiannessEnd Point DetectionEncryptionEncodingEncapsulationElementary Row OperationsElement Buffer ObjectsElectronic Code BookElectrolarynxElectroglottographEigenvectorEEPROMEcho-Return-Loss-EnhancementDynamical StabilityDynamic SetDynamic Security TestingDynamic ProgrammingDuty of CareDrawing MethodsDrawing a TriangleDouble Entry ConceptDot ProductDomain Name SystemDomain NameDomainDomainDocker ComposeDockerDividendDivide & ConquerDistributed SystemDisplacement MappingDisk MemoryDisk BlockDisjoint SetsDiscretionary Access ControlDiscrete Uniform DistributionDiscrete Random VariablesDiscrete Log ProblemDiscrete Cosine TransformDiscontinue DecisionDirectoryDirectional LightDipthongsDijkstra's AlgorithmDigraphDigital to AnalogueDigital SignalsDigital Rights ManagementDigital ImageDigital ForensicsDigital EvidenceDigital CircuitsDiffuse MapsDifferential EquationDifferential CryptanalysisDifference EquationDictionary Text CompressionDiagram CodingDiagonalisationDeterministic AlgorithmDeterminantDetecting Light IntersectionDesign PatternDesign MetricsDerivativesDepth First SearchDeployment DiagramDense GraphDenaryDemandDeep Reinforcement LearningDeep Feed-Forward Neural NetworkDeductionDeclarative LanguagesDecision MakingDecision BoundaryDecibelsDeadlockDBMSDatabase SystemDatabase ReplicationDatabase OptimisationDatabase NormalisationDatabase Normal FormsDatabase DenormalisationData StructureData SpaceData SegmentData NormalisationData HidingData Encryption StandardData DestructionDaemonCylinder Head SectorCycleCyberneticsCyber CrimeCVC SequenceCurse of DimensionalityCumulative Distribution FunctionCullingCubic EquationCryptographyCryptographic SystemCryptanalysisCriminal LawCRC Card PrototypingCrawlingCPUCPPCovert ChannelsCovariance MatrixCouplingCounting SortCounter ModeCostCosine CorrelationCorrelation MatrixCorrelation AttackCorrelationCoreference ResolutionCopy ElisionCoprimeCoordinate SystemsConvoy EffectConvolutional Neural NetworkConvolutional FilterConvolutionConvergenceController CardControl TheoryContradictionContract vs. TortContract LawContract DischargementContinuous Word RepresentationsContinuous IntegrationContinuous Bag of WordsContinuantsContainersConstructive Solid GeometryConstraintConsonantConsistent HashingConsistencyConsiderationConnected GraphConfusion MatrixConfidentialityCondition VariablesComputer WormComputer VirusComputer Security & ForensicsComputer NetworkComputer GraphicsComputer BusComputerCompression Random AccessCompression ModelCompression EntropyCompound KeyCompositionComposite PatternComposite NumberComposite CipherComponent Based DevelopmentComponentComplex NumbersCompleting the SquareComplete MatchingComplete GraphCompiled LanguageCompetitive Neural NetworkComparison SortsCommon Cost ModelCommercial ConstraintsCommand PatternColor MappingCollection PeriodCohesionCognitive ScienceCoffman ConditionsCoding TheoryCodebookCode SynchronisationCode SegmentCode MetricsCochleaCoarticulationCo-DomainCMakeClusteringCloneClickjackingClick ThruClassificationClass DiagramCivil LawCircleCipher Feedback ModeCipher Block ChainingCipherCielingCharacters & GlyphsChannelChain of ResponsibilityChain of CustodyChain LoadingCGICertifying AuthorityCertaintyCepstral AnalysisCartesian ProductCardinal VowelCapital RationingCapital Investment AppraisalCAPECCAPCameraCaesar CipherCByteBusiness FinanceBump MappingBuffer OverflowBubble SortBSDBridge PatternBrickwall FilterBreak Even ChartBreak Even AnalysisBreadth First SearchBreach of Conduct RemediesBox PlotsBounding VolumesBootingBoot ManagerBoot LoaderBoolean RetrievalBoolean AlgebraBoehm's First LawBlock ProcessingBlock DeviceBlock Cipher Modes of UseBlock CipherBitwise AgreementBitTorrentBitcoinBitBiquad FilterBipartite GraphBIOSBiometricsBinomial TheoremBing-Liu ModelBinary TreeBinary Search TreeBinary SearchBinary RelationBinary LexiconBinary FunctionBinary Buddy AllocatorBin PackingBillboardBijectionBig-O NotationBezier CurvesBERTBernstein Blending FunctionBellman EquationBehavioural State MachineBCM RuleBayes ClassifierBatch Gradient DescentBatchBarrierBand AnalysisBaitingBag of wordsBackdoorBack PropagationB+ TreeAVL TreesAvailabilityAvailabilityAutoprobingAutocorrelation FunctionAuthorisationAuthenticationAuditory PathwaysAuditAttenuationAtomic OperationsAsymptotic NotationAsymmetric-key EncryptionAsymmetric RelationAssociationAssetsAssembly LanguagesAssemblyAsciiArtificial NeuronsArtificial IntelligenceArticulatory PhoneticsArticulatorsArrays as TreesArithmetic SeriesArithmetic CodingArbitrationApproximationAP-AlgorithmAnti-Symmetric RelationAnti-ForensicsAnti Hebbian RulesAnti AliasingAnimationAmplitude QuantisationAllophoneAll PostsAlice and BobAlgorithmAlgebraAgile Software DevelopmentAggregationAgent ProgramAgent FunctionAgentAdvanced Ray TracingAdjoint MatrixAdjacency MatrixAdjacency ListAddress Space Layout RandomisationAdaptive Tree Depth ControlAdaptive ModellingAdaptive IntelligenceAdaptive FilterAcyclic GraphActorActivity DiagramAcoustic PhoneticsAcoustic Echo CancelerAcoustic EchoAcid Test RatioACIDAccountingAccess Control ModelAccess Control Matrix ModelAccess ControlAcceptance TestsAcceptance CriteriaAcceptanceAbstract Factory PatternAbstract ClassAbsorption CostingAbout5th Generation Languages4th Generation Languages404 Page Not Found4-Tier Architecture3D Texture Mapping3D Representations3-Tier Architecture