Dennis Reyes

286 Added | 8 Magazines | 31 Likes | 11 Following | @dbrecology | Keep up with Dennis Reyes on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Dennis Reyes”

Designing a Tree Diff Algorithm Using Dynamic Programming and A*

17 June 2017<p>During my internship at Jane Street1, one of my projects was a config editing tool that at first sounded straightforward but culminated …

Programming

Download & Play with Cryptocurrencies Historical Data in Python

To access the CryptoCompare public API in Python, we can use the following Python wrapper available on GitHub: cryCompare.<p>With the coinList() …

How Uploadcare Built a Stack That Handles 350M File API Requests Per Day - Uploadcare Tech Stack

<i>By Dmitry Mukhin, CTO at Uploadcare.</i><p>Uploadcare is a file infrastructure as a service solution. We offer building blocks for handling files that …

Cloud Computing

SailfishOS - sailfishos.org

Users<p>Magical User Experience<p>We believe that user experience is the key to users’ hearts.<p>Sailfish OS is smooth and fast to use with effortless swipe …

Fish

The Marketing Behind MongoDB

Much like a good scientist, to make good engineering decisions requires one to be dispassionate and thoughtful.<p>First, realize that 10gen’s marketing …

Product Management

Implementing State Machines in PostgreSQL

Finite-state machine (FSM) is a wonderful model of computation that has many practical applications. One of my favorites is turning business logic …

Databases

FCC says its cybersecurity measures to prevent DDoS attacks must remain secret

The FCC has provided a few — very few — details of the steps it has taken to prevent attacks like the one that briefly took down its comment system in May. The agency has faced criticism over its secrecy regarding the event, and shows no sign of opening up; citing “the ongoing nature of the …

Cybersecurity

Data Structures for Coding Interviews: Computer Science in Plain English

Computer science in plain English<p>To really understand how data structures <i>work</i>, we're going to derive each of them from scratch. Starting with …

Mathematics

Why aren’t distributed systems engineers working on blockchain technology?

For the last 15 years, I have predominantly worked on Distributed Systems of various size and complexity. Over the last couple of years, I have …

Blockchain

Docker vs. Kubernetes vs. Apache Mesos: Why What You Think You Know is Probably Wrong

There are countless articles, discussions, and lots of social chatter comparing Docker, Kubernetes, and Mesos. If you listen to the …

Microservices

Practical Guide to SQL Transaction Isolation

You may have seen isolation levels in the documentation for your database, felt mildly uneasy, and went on with life. Few day-to-day examples of …

How a VC-funded company is undermining the open-source community

A San Francisco startup called Kite is being accused of underhanded tactics.<p>Is a $4 million venture capital-funded startup stealthily taking over …

AI May Soon Replace Even the Most Elite Consultants

Amazon’s Alexa just got a new job. In addition to her other 15,000 skills like playing music and telling knock-knock jokes, she can now also answer economic questions for clients of the Swiss global financial services company, UBS Group AG.<p>According to the <i>Wall Street Journal</i> (WSJ), a new …

Artificial Intelligence

Real time collaborative diagramming for teams

A diagram is worth more than 1000 words<p>Explain ideas and designs effectively with diagrams using Vecta's powerful SVG editor<p>Easily create amazingly …

Project Management

How a New Breed of Android Malware Could Steal Your Password

"Cloak & Dagger" exploits can hide in plain sight.<p>Android users beware, there's a new kind of malware with the ability to snoop on whatever you do on your phone. Dubbed "Cloak & Dagger" exploits by their discoverers, these techniques abuse a few basic permissions that are granted without a user's …

Bombshell Report: 200% ROI on Open Source Participation

From the World Bank Data Blog: in a stunning report from the OpenDRI, an initiative sponsored by the Global Facility for Disaster Reduction and …

World Bank

Counting Down to the New Ampere

After it's all over, your lights will be just as bright, and your refrigerator just as cold. But very soon the ampere -- the SI base unit of …

NSA OSS Technologies

A sorted, distributed key/value store that provides robust, scalable data storage and retrieval. It adds cell-based access control and a server-side …

National Security Agency (NSA)

Introducing Forest 1.0

Today, I’m extremely excited to announce the public beta availability of Forest 1.0, the world’s first full-stack programming and execution …

Quantum Computing

An Ancient Kernel Hole is (Not) Closed

The following is an analysis of a currently (at the time of this writing in early June) unnecessarily embargoed vulnerability in multiple OSes …

The API for your bank account

The preferred business model of the incumbent screen-scrapers seems to be:<p>Provide a poor quality product<br>• Charge you a large setup fee<br>• Make you commit …

Customers

The PH parties to Duterte’s China deals

<b>By Kenneth Cardenas*</b><br>Fellow, Philippine Center for Investigative Journalism<br>———————————————————————————————————————————————————————————<b>AVLB Asia</b> …

Asia

North Hollywood High team wins national cybersecurity competition

Russians and Chinese hackers beware.<p>Americans, breathe a sigh of relief. Students from North Hollywood High have got your back.<p>Team Togo, consisting of five juniors, just won a national cybersecurity championship, which is joining the Academic Decathlon among the ranks of activities to which really …

Interesting data structures: the BK-tree

April 03, 2017, Michele Lacchia<p>python data-structures<p>A BK-tree is a tree data structure specialized to index data in a metric space. A metric space …

Why You Should Be Cautious Of The Cult Of Metrics And KPIs

One of the most repeated mantras of the corporate world in recent years is that “you can’t manage what you can’t measure.” This mindset means rigid performance measurements such as key performance indicators (KPIs) or the balanced scorecard (BSC) are now increasingly used by companies to manage all …

LIST: Arroyo, Imelda, Ate Vi lead 54 solons who voted vs death bill

1 Abayon, Harlin Neil III J. – Party List – AANGAT TAYO<p>2. Abu, Raneo E. – Batangas, 2nd District<p>3. Abueg, Frederick “Erick” F. – Palawan, 2nd District<p>…

APL in R

1 Introduction<p>APL was introduced by Iverson (1962). It is an array language, with many functions to manipulate multidimensional arrays. R also has …

How setting the TZ environment variable avoids thousands of system calls

TL;DR<p>This blog post explains how setting an environment variable can save thousands (or in some cases, tens of thousands) of unnecessary system calls …

Linux

API Design Guide

Current Version of the API Design Guide: <b>2017-02-21</b><p>Introduction<p>This is a general design guide for networked APIs. It has been used inside Google since …