Not So Standard Deviations | A statistics (etc.) blog by Hilary Parker. The Geek Stuff. John Resig - JavaScript Programmer. Autarchy of the Private Cave. What You're Doing Is Rather Desperate | Notes from the life of a bioinformatician. Git ready » learn git one commit at a time. Sending redis traffic through an SSL tunnel with stunnel. Lately if you have been paying attention to tech or even mainstream media you might have seen a few stories about data breaches. Sometimes these data breaches have allowed attackers to gather unencrypted passwords or credit card numbers.
In the past these types of attacks still happened, but there was not as many attacks as today and when they happened they were kept secret. With more and more internet based services becoming part of peoples lives, there is even more targets for attackers who are looking to get sensitive data. These attackers can often be quite crafty on the ways they get this data, many times they do it by gaining access to a database but another common place to capture and steal data is through unencrypted network traffic. There are many commonly used services that either do not support SSL encryption or that option is rarely used.
Redis a distributed memory cache is a newer service that at this time does not support SSL connections. Redis Security What is stunnel Find: A practical introduction to functional programming at Mary Rose Cook. Many functional programming articles teach abstract functional techniques. That is, composition, pipelining, higher order functions. This one is different. It shows examples of imperative, unfunctional code that people write every day and translates these examples to a functional style. The first section of the article takes short, data transforming loops and translates them into functional maps and reduces. The second section takes longer loops, breaks them up into units and makes each unit functional. The third section takes a loop that is a long series of successive data transformations and decomposes it into a functional pipeline.
The examples are in Python, because many people find Python easy to read. A guide rope When people talk about functional programming, they mention a dizzying number of “functional” characteristics. Ignore all that. This is an unfunctional function: a = 0def increment1(): global a a += 1 This is a functional function: def increment2(a): return a + 1 Map Reduce. Blog | Jean-Philippe Fortin | PhD Student in Biostatistics at Johns Hopkins. Last semester, John Muschelli and I had to collaborate on two class projects, one consisting of writing a report for a DNA methylation data analysis, the other about presenting a fascinating paper on the asymptotics of subsampling estimators.
That means we had 3 latex documents — one article and two beamer presentations that we were simultaneously working on every day (and every night). Synchronizing the files, even if we both use regularly version control (like GitHub or BitBucket), would have been a nightmare: who really wants to commit every 30 seconds? Thankfully, John knew about shareLatex, and I called it an end-of-semester miracle. Here is why shareLatex is awesome: Have you ever been lost in translation (or to be L.I.T. as Muschelli likes to say)?
I experience the L.I.T. on a daily basis, and believe me, it is sometimes really embarrassing. Thankfully, I have good friends out there to help me. L.I.T. L.I.T. Coin I have a major deficiency for this word. L.I.T. L.I.T. My conclusion. Alyssa frazee. Healthy Algorithms | A blog about algorithms, combinatorics, and optimization applications in global health informatics. Hack and frogs. Red Blob Games. Pythonic Perambulations.