SEARCH KEYWORD -- PROTECTION KID
How big are PHP arrays (and values) really? (Hint: BIG!)
Upfront I want to thank Johannes and Tyrael for their help in finding some of the more hidden memory usage. In this post I want to investigate the memory usage of PHP arrays (and values in general) using the following script as an example, which creates 100000 unique integer array elements and measures the resulting memory usage: <?php $startMemory = memory_get_usage(); $array = range(1, 100000); echo memory_get_usage() - $startMemory, ' bytes'; How much would you expect it to ...
PHP,Array,Memory occupation,Garbage collection 2011-12-16 10:06:04
What Can We Learn From Dennis Ritchie?
As we noted earlier this week, one of the founding fathers of UNIX and the creator of C, Dennis Ritchie, passed away last weekend. While I feel that many in computer science and related fields knew of Ritchie’s importance to the growth and development of, well, everything to do with computing, I think it’s valuable to look back at his accomplishments and place him high in the CS pantheon already populated by Lovelace, Turing, and (although this crowing will be controversial, at lea...
C,Father,Dennis Ritchie,Death,Father of C,UNIX 2011-10-17 10:12:02
How I Learned to Program Computers
I’ve been asked this question a lot lately, especially after I built YouTube Instant. So, here’s the answer, once and for all, for those who are interested.In short:I learned how to program by building lots of websites.The full story:I learned how to program by working on lots of different website projects starting from a pretty young age. What follows is a full account of all the major websites I’ve built, back to the very first site I made when I was 11 years old. Wha...
Programming,Computer,Tips,Feross Aboukhadijeh 2011-10-17 10:25:32
Secure Your Go Code With Vulnerability Check Tool
Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...
GOVULNCHECK,GOSEC,GOLANG 2022-10-29 23:43:20
How I Learned to Program
Programming is, without a doubt, the most mentally rewarding thing I've ever done. Programming taught me that life should be fun, filled with creativity, and lived to the fullest. Programming taught me that anything is possible; I can do anything I want using only my mind. Programming also taught me that learning is fun. It showed me that the more you know, the more power you have. Programming showed me that a life filled with learning is a life worth living. Programming revealed to me wh...
Programming,Tips,Write,Practice,Interest 2012-02-04 21:37:12
How Query Optimizer Works in RDBMS
In a previous post, we discussed how the various relational operators are implemented in relational database systems. If you have read that post, you probably still remember that there are a few alternative implementations for every operator. Thus, how should RDBMS determine which algorithm (or implementation) to use? Obviously, to optimize the performance for any query, RDBMS has to select the correct the algorithm based on the query. It would not be desirable to always use the same algori...
DATABASE,DATABASE DESIGN,DATABASE OPTIMIZATION 2019-04-20 07:26:32
Speed Hashing
A given hash uniquely represents a file, or any arbitrary collection of data. At least in theory. This is a 128-bit MD5 hash you're looking at above, so it can represent at most 2128 unique items, or 340 trillion trillion trillion. In reality the usable space is substantially less; you can start seeing significant collisions once you've filled half the space, but half of an impossibly large number is still impossibly large. Back in 2005, I wondered about the difference between a checksum and...
Speed hashing,Security,MD5 2012-04-07 10:35:15
How VR technologies take over the world
Virtual Reality (VR) literally may get it beneficial to experience anything, anywhere, anytime. It is normally the several immersive type of legitimate fact technology and can convince the real real human human brain that it is usually normally someplace it can get absolutely critically not really seriously. Brain installed displays happen to be used with earphones and hands controllers to offer a entirely immersive arrive across. With the major technology businesses on whole world community (Fa...
Designing Fun
What is “Fun?â€â€œI’ll know it when I see it.â€In 1964, in Jacobellis v. Ohio, the US Supreme Court needed to decide whether the state of Ohio could ban a film it called “obsceneâ€â€”a concept people understood but were hard-pressed to define. Justice Potter Stewart, in his concurring opinion, wrote: “I shall not today attempt further to define the kinds of material I understand to be embraced within that shorthand description; and perhaps I ...
Python internals: how callables work
[The Python version described in this article is 3.x, more specifically - the 3.3 alpha release of CPython.] The concept of a callable is fundamental in Python. When thinking about what can be "called", the immediately obvious answer is functions. Whether it’s user defined functions (written by you), or builtin functions (most probably implemented in C inside the CPython interpreter), functions were meant to be called, right? Well, there are also methods, but they’re not very ...
Python,Callable work,Rationale 2012-03-24 05:20:27
RECENT
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- Flows.network: Writing an LLM Application in Rust
- more>>