background preloader

Holding a Program in Ones Head

Holding a Program in Ones Head
August 2007 A good programmer working intensively on his own code can hold it in his mind the way a mathematician holds a problem he's working on. Mathematicians don't answer questions by working them out on paper the way schoolchildren are taught to. That's particularly valuable at the start of a project, because initially the most important thing is to be able to change what you're doing. Your code is your understanding of the problem you're exploring. It's not easy to get a program into your head. Even the best programmers don't always have the whole program they're working on loaded into their heads. Avoid distractions. Even more striking are the number of officially sanctioned projects that manage to do all eight things wrong. It's not merely true that organizations dislike the idea of depending on individual genius, it's a tautology. Maybe we could define a new kind of organization that combined the efforts of individuals without requiring them to be interchangeable.

0 A.D. Open Source Release Welcome to Rosetta Code Learn to Program With Code Academy Did you ever want to be a huge nerd your whole life, but didn’t know where to start? Don’t have the shelf space for the O’Reilly books, or found the various "in a nutshell" books too dry? I think Codecademy has an offer you can’t refuse. It’s an interactive site you start off simply with some naming conventions and math equations inside an interactive "terminal" window. The depth of the lessons look excellent, and the site is advertising a teacher beta once you log in, so if you want to contribute to the learning experience, you should absolutely get in touch with them. What about you? As an old coder, however, the interface and interaction this site provides looks pretty invaluable. Are you still here? [Update Oct 4, 2011: It's "Codecademy", not "Code Academy".

25 Best SSH Commands / Tricks OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Have Fun

uWall.tv | Listen to a Wall of Music © 2021 - Privacy - Terms Headmagnet | Get stuff in your head and keep it there! - StumbleUpon Binpress Binpress is a source-code marketplace, allowing developers to publish and discover ready components for a variety of needs. Binpress makes releasing souce-code a viable business. We allow you to focus on what you do best, while we take care of the business details: Build a line-drawing game such as Flight Control quickly using this full-featured starterkit. The Comic Book App project is an exciting new way to publish digital comics on the App Store, without the need to learn how to develop an Ap... A single-player view of a multi-player universe: a player's Intelligence Center. Simple jQuery help popups / tooltips interface tutorial system.

Awakening As One | uniting the way to the new world Life Hack - The 30/30 Minute Work Cycle Feels ... - StumbleUpon A year ago, I switched to the Colemak keyboard layout. I’ve since had zero pain in my hands when typing for many hours straight, I’ve been able to type faster, and I make fewer mistakes while typing. A few months ago, I decided to try the biphasic sleep cycle. It worked as advertised, allowing me to get better sleep and need less of it. I used to sleep for 9 - 10 hours each day, and now I need just 6 - 7.5 to stay just as sprightly, if not more. A few weeks ago, after these successful life hacks, my friend told me about the eccentric work cycle that he follows. “You might think it’s crazy and stupid, but it works for me,” he said. Immediately, I thought, ‘That won’t work for me.’ ‘Hmmm. You can probably tell by now where this story is going. Abracadabra It works. While working on a software project, I would get stuck on a bug and spend hours trying to figure out what went wrong, addicted to the quest and unable to stop, even when I run out of ideas on what else to try. Revealing the trick

Neural Networks in PHP - PHP Classes blog - PHP... Contents Introduction The concepts Parts of a Neural Network Designing a Network Hidden Neurons Training the Network How are Neural Networks useful? Using Neural Mesh Using the API Using the Framework Using Neural Mesh (continued) Plans for the future Introduction Neural networks are a relatively new technology that aims to reverse engineer the functionality of the brain within a mathematics model. In a Web environment NNs (neural networks) are considered too slow and complex to warrant effort on what might even be a trivial task. The API and framework has been simplified to implement in PHP projects. The concepts Because neural networks utilize fuzzy logic, the standard system architecture is slightly different. Neural networks work much similar except the processing is done behind curtains. The magic behind neural networks is its ability to learn. The main types of training are supervised and unsupervised training. Figure 1 A reasonable threshold would be anything greater than 0.8 should be 1.

Skulpt

Related: