The Illustrated TLS Connection
Every byte of a TLS connection explained and reproduced. This demonstration a client has connection to a server, negotiated a TLS 1.2 session, sent “ping”, received “pong”, and then terminated the session.
Google Interview Questions Deconstructed: The Knight’s Dialer
This is the part of a series of posts on preparing for and understanding interviews at big tech companies, drawing from my experience recruiting and interviewing for Google. I’ll be using real banned interview problems I and other Google engineers have used in interviews.
Raytracing is a relatively simple way to render images of 3D objects. The core is an elegant idea, that one can simulate the real-world behavior of photons of light bouncing off of surfaces and colors accumulating from their paths. It’s not inherently fast, but the simplicity of the core lets it model interesting things like reflections and depth of field in ways that mirror natural processes.
Masstree: A cache-friendly mashup of tries and B-trees
This paper proposes an efficient tree data structure that relies on splitting variable length keys into a variable number of fixed-length keys called slices. As you go down the tree, you compare the first slice of each key, then the second, then the third and so on, but each comparision has constant cost.
Graph Databases for Beginners: Graph Search Algorithm Basics
Part of Graph Databases for Beginners blog series by Neo4J. This post discuss different graph search algorithms and how they’re used, including Dijkstra’s algorithm and the A* algorithm. Our discussion will focus on what graph search algorithms do for you (and your business) without diving too deep into the mathematics of graph theory.
Memory Allocators 101 - Write a simple memory allocator
This is a beginner level article, so I will not spell out every detail.
This memory allocator will not be fast and efficient, we will not adjust allocated memory to align to a page boundary, but we will build a memory allocator that works. That’s it.
Computer Networking: Principles, Protocols and Practice, 2nd edition
Have ever feel frustrated because you don’t understand the network layer? what
are layer4, layer7 or layer2/3 routing? What kind of data is in a TCP packet?
What is exactly happen during a TLS handshake?
All of these requires some fundamental knowledges and cannot answer in a short post.
That’s why this free ebook is available.
Code to read
Efficient text segmentation; support english, chinese, japanese and other
This library is designed to assist in testing distributed states in Elixir which require a number of local nodes
View your app on different device and font sizes
A very fast static spatial index for 2D points and rectangles
The Ruby Formatter
Cranelift code generator
a low-level retargetable code generator. It translates a target-independent intermediate representation into executable machine code
WebRTC and ORTC implementation for Python using asyncio
Succinct Data Structure Library 2.0
The Bε-tree File System is an in-kernel file system that uses Bε trees to organize on-disk storage
An implementation of the Scmutils system for math and physics investigations
A modular network stack
Quick, convenient, expression-centric, graphical Python debugger using the AST
a cross data-center data replication tool for Apache Kafka
Locate and fix overly complex lines of code in Go
RobotGo, Go Native cross-platform GUI automation
Open source video encoder written in GO and based on ffmpeg C bindings
📮Untangle your GitHub Notifications
Compose data-driven layers to create interactive visualizations with relational algebra data model
The automatic indexer for Postgres
Secure Secret management for Kubernetes (with gpg, Google Cloud KMS and AWS KMS backends)
PDF Table Extraction for Humans
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this