Tag: software

  • 채교수의 통계학/확률모형 강의

    받아놓고 하나도 읽지 않고 있었지만 좋은 자료입니다. ^^ ANOVA의 원리가 뭘까 궁금해하고 있었는데, 통계학강의에 이미 한 챕터가 ANOVA강의군요.. 채교수의 통계학 강의 채교수의 확률 모형 강의

  • Free machine learning books

    http://metaoptimize.com/qa/questions/186/ Among these, I’m studying Andrew Ng’s lecture from itunes univ. (It’s also available at youtube.) It’s one of the best lectures on ML.

  • Port knocking – knock

    http://www.ibm.com/developerworks/aix/library/au-sshlocks/index.html Use knock / knockd to configure secret knocking sequence. For example, knock 7000, 8000, and 9000 ports in sequence opens a ssh port at, say, 21978. Until then, 21978 is kept closed. It’s a brilliant idea!

  • Cross Channel Scripting Attack, or XCS

    http://bojinov.org/professional/ccs2009-xcs-paper.pdf Attacks on consumer devices with web interfaces, e.g., NAS, by exploiting not-necessarily http protocol, e.g., FTP. As an example, an attacker loads crafted contents via FTP to victims’s web based control panel. When the admin visits the admin web app, it’s owned by the attacker.

  • Javascript Boolean and Array – oh my!

    Output: Never use new Boolean. new Boolean is an Object and it’s always true. I told you. Object is true! Also, stay away from new Array. Use []. See. new Array is confusing. undefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefinedundefined 1020 [elem1, elem2, …] is obvious. 10 1020

  • Google Javascript style guide

    Google Javascript style guide

  • Javascript string and number

    “3” + 1 : “31” 1 + “3” : “13” But, “3”-1 : 2 “4” / 2 : 2 “2” * 2 : 4 “2” * “2”: 4

  • Consistent Hashing

    http://en.wikipedia.org/wiki/Consistent_hashing A hash scheme that does not affects the entire hash table when a node is inserted or deleted. Machines are assigned to the circular nodes, and if a machine crashes, the keys in the crashed machine are moved to the following node in the circle. This is becoming really popular due to no SQL…

  • Gossip Protocol

    http://en.wikipedia.org/wiki/Gossip_protocol Pairewise periodic comm. based protocol to spread information which resembles the way how gossip spreads among ppl. This protocol assumes a faulty network and decentralized. Epidemic algorithms are the ones that adopt gossip protocol. Simple algorithm w/ cute name.

  • Hash Teee(Merkle Tree)

    http://en.wikipedia.org/wiki/Hash_tree A tree where a parent contains hash of it’s children. Likewise, root has hash of all nodes. Useful for contents comparison without downloading entire tree or files. Also useful for file synchronization(e.g., Amazon Dynamo); detect missing files easily and sync.