Defusing a Binary Bomb (phase 1)
Defusing a Binary Bomb (phase 1) I password protected the original post (email me for the password if you are interested in reading it). When I posted the orig...
Defusing a Binary Bomb (phase 1) I password protected the original post (email me for the password if you are interested in reading it). When I posted the orig...
There is no excerpt because this is a protected post.
As a programmer, I’ve written a line or two of code that includes the modulus operator (i.e. “return x % 2“). But, never have I paused to thi...
A wide grin formed on my face, after successfully completing an exercise (from Computer Systems a Programmer’s perspective) that required me to write C co...
Like a huge swath of other millennial, I dibbled and dabbled in building websites —writing in html, css, and javascript—during my youth, but these days, I prima...
How many page table entries are required given a virtual address size and page size? I was confronted with this question when reading Computer Systems from a pr...
I’m pursuing a master’s degree in computer science and most of the schools I’m applying to— Seattle University, University of Washington, Univ...
Working the normal nine to five job leaves little time for personal reading, which is why every morning, as soon as I situate myself on the bus, I immediately r...
My plan on completing Data Structures and Algorithms in Java by December 31st, 2016, requires changing my reading strategy. Reading technical books cover to cov...