Pages tagged hash:

Rails Forms microformat « Trek
http://wonderfullyflawed.com/2009/02/17/rails-forms-microformat/

Trek Rails Forms microformat This article has been updated to reflect the latest patterns in Rails 2.3 edge (based mostly on this commit) If you’ve been relying on Rails form helpers to generate forms, then you may have missed the interesting little microformat used to pass application data to and fro. In case you didn’t know, form data is passed as part of the request body as a set of key/values pairs in plain text (if you’re using get as a method for a form, it’s that url section like this: ?name=widget12&price=22). The name attribute of the form inputs are the keys (here name and price), and the value is whatever the user entered or selected (widget12 and 22). Most languages/frameworks for the web will reconstitute these pairs as objects accessible to the programmer. For example <input name='widget_name' /> is accessed with $_POST["widget_name"] in php, self.request.get("widget_name") on App Engine, and params[:widget_name] in Rails. This format can only pass a single value f
One of the most comprehensive articles on rails forms. Includes the newly added nested attributes stuff.
pHash.org: Home of pHash, the open source perceptual hash library
http://www.phash.org/
a fingerprint of an audio, video or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions which rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar
A method for producing hashes so that similar objects produce similar hashes. Applied mostly to audio and video. Doesn't appear to be a general theory. Rather, special cases for files such as pictures and audio are derived. This is an open source library that runs under linux only at the moment.
definition of Twitter-tags, what do they mean?
http://tagdef.com/
Ever seen a hashtag on Twitter, and wondered what it is all about? Now you can look it up, and cast your vote on the definitions. And if you don't like the definitions, or none exists, you can create your own in seconds.
definition of Twitter-tags, what do they mean?
Useful for when you see a hashtag trending and have no idea what it means.
Text utilities
http://streetpc.free.fr/text/
Text utilities
Chroma-Hash Demo
http://mattt.github.com/Chroma-Hash/
a sexy, non-reversible live visualization of password field input
Creates a color-bar visualization of the password field useful to avoid mistakes and non-reversible.
a non-reversible live visualization of password field input
Ben Alman » jQuery BBQ: Back Button & Query Library
http://benalman.com/projects/jquery-bbq-plugin/
backbutton
jQuery BBQ enables simple, yet powerful bookmarkable #hash history via a cross-browser window.onhashchange event. In addition, jQuery BBQ provides a full jQuery.deparam() method, along with both fragment and query string parse and merge utility methods.
jQuery BBQ enables simple, yet powerful bookmarkable #hash history via a cross-browser window.onhashchange event.
Chroma-Hash Demo
http://foxxtrot.github.com/Chroma-Hash/
Chroma-Hash is a sexy, secure visualization of password field input
Kind of pointless but cool
awesome password confirmation tool using color
<elderec> a sexy, secure visualization of password field input - http://foxxtrot.github.com/Chroma-Hash/
Benlog » Don’t Hash Secrets
http://benlog.com/articles/2008/06/19/dont-hash-secrets/
I know very little about cryptography, but I do find it fascinating. This article seems to have solid, real-world advice, yet it is written in a way that even I can understand it. People who can write like this impress me.
why hash is not security
How To Safely Store A Password | codahale.com
http://codahale.com/how-to-safely-store-a-password/
bcrypt
2010-01-31, by Coda Hale, "Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt."
mixi Engineers’ Blog » PerlとRubyで省メモリなハッシュを使おう
http://alpha.mixi.co.jp/blog/?p=791
assertTrue( ): One of the toughest job-interview questions ever
http://asserttrue.blogspot.com/2009/05/one-of-toughest-job-interview-questions.html
I mentioned in a previous post that I once interviewed for a job at a well-known search company. One of the five people who interviewed me asked a question that resulted in an hour-long discussion: "Explain how you would develop a frequency-sorted list of the ten thousand most-used words in the English language." I'm not sure why anyone would ask that kind of question in the course of an interview for a technical writing job (it's more of a software-design kind of question), but it led to a lively discussion, and I still think it's one of the best technical-interview questions I've ever heard. Ask yourself: How would you answer that question?
I mentioned in a previous post that I once interviewed for a job at a well-known search company. One of the five people who interviewed me asked a question that resulted in an hour-long discussion: "Explain how you would develop a frequency-sorted list of the ten thousand most-used words in the English language."
The author talks about a question he got at a job interview, and goes on to provide a reasonable recap/discussion about hash tables. This is generally the kind of answer I look for when I ask similar questions. 9/10 candidates I talk with can't actually discuss a hash function, and don't know how to create one.
mixi Engineers’ Blog » DBMによるテーブルデータベース
http://alpha.mixi.co.jp/blog/?p=290
テーブルデータベースとは 簡単に言えば、リレーショナルデータベースのテーブルのように、複数の列からなるレコードを格納できるデータベースです。SQLや表結合などの複雑な機能はサポートしませんが、そのぶん高速に動作します。つまり、DBMの速度で動くリレーショナル風データベースです(厳密にはリレーショナルデータベースではありません)。
Tokyo Cabinet DBM の使い方に関するチュートリアル
またひとつbigtableに近づいた感じ。mikioプロダクトはどのバージョンをどうやって入れて運用するのが楽なのかよく分からんところか。
table database
HASHCRACK.COM - Reverse Hash Lookup for MD5, SHA1, MySQL, NTLM and Lanman-Password-Hashes
http://hashcrack.com/index.php
HASHCRACK.COM - Reverse Hash Lookup for MD5, SHA1, MySQL, NTLM and Lanman-Password-Hashes
http://hashcrack.com/index.php
A 10-MINUTE DESCRIPTION OF HOW JUDY ARRAYS WORK AND WHY THEY ARE SO FAST
http://judy.sourceforge.net/doc/10minutes.htm
As the inventor of the Judy algorithm I've been asked repeatedly, "What makes Judy so fast?" The answer is not simple, but finally I can share all of the details.
A complex (to implement) but efficient scalable data-structure that obtains very high performance by minimising the number of cache-line fills required.
A 10-MINUTE DESCRIPTION OF HOW JUDY ARRAYS WORK AND WHY THEY ARE SO FAST
http://judy.sourceforge.net/doc/10minutes.htm
As the inventor of the Judy algorithm I've been asked repeatedly, "What makes Judy so fast?" The answer is not simple, but finally I can share all of the details.
A complex (to implement) but efficient scalable data-structure that obtains very high performance by minimising the number of cache-line fills required.