Authenticated Encryption
Glossary Cryptographic Hash Function It is a one-way function that maps data of arbitrary size (often called the message) to a bit array of a fixed...
Information Security
Information Security Information security(infosec), is the practice of protecting information by mitigating information risks like ...
Testable Design
Guidelines for Testable Design Testability issues A programmer struggling to write a test is facing off against one of a few common show-stoppers....
SOLID Design Principles
In object-oriented computer programming, SOLID is acronym and stands for a set of five design principles documented by Robert C. Martin. Keep your...
Test Case Design Techniques
| Approach/Implementation | White Box | Black Box | | | |-------------------------|---------------------------|-------------------|---|---| |...
Build Simple Bootstrap Linux System Image
Kernel Image for Emulation We will create a tiny Linux system with absolute minimum additional software. We reuse host kernel image vmlinuz to...
Java Stream
Streams A stream represents a sequence of elements and can perform a series of operations on them strings.stream() .filter(s -> !s.equals(""))...
MongoDB
Scalability NoSQL is intented to offer more scalability. A balance between the scalability and the consistency. Vertical Functional decomposition ...
Matrices in Computer Graphics
Matrix Transformations The matrices are used frequently in computer graphics and the matrix transformations are one of the core mechanics of any 3D...
Tree Diameter
Definition The diameter of a tree is the distance of the longest path between two end nodes $\arg\max_{(u, v) \in G}d(u, v)$, where $d(u, v)$ is the...