atlas news
    
Algorithms, Blockchain and Cloud
15  octobre     20h59
Tetration Operator in Math Simply Explained with Python Algorithms
ACMer    What is Tetration Operator in Math Tetration is an operation in mathematics that involves iterated exponentiation. It is part of the sequence of hyperoperations that extend beyond addition, multiplication, and exponentiation. In tetration, a number is raised to the power of itself repeatedly a...
14  octobre     19h41
Teaching Kids Programming - Convert Array to Linked List and Vice Versa
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Here’s a step by step tutorial on how to convert an array to a linked list and vice versa in Python. This can be useful for different scenarios where you need to change data structures based on specific use cases, such as memory...
    10h59
Simply Explained: Matthew Effect
ACMer    The Matthew Effect is a sociological and economic phenomenon that describes how the rich get richer and the poor get poorer. This concept originates from a passage in the Gospel of Matthew in the New Testament: For to everyone who has, more will be given, and they will have an abundance; but...
13  octobre     21h25
Two Interview Experience with ByteDance Tiktok London
ACMer    First TikTok London Interview Four years ago, in December , I applied for the System Engineer position at TikTok London. At that time, the TikTok team in London was being established, and the engineer who interviewed me was from Beijing. The first round was mainly a background check. They went...
12  octobre     15h37
Docker, Virtual Machines (VMs) and Kubernetes (K8s)
ACMer    Docker vs. Virtual Machines VMs Overview: Both Docker and VMs are used for deploying and running applications in isolated environments, but they do so differently. Docker Containers Lightweight: Containers share the host OS kernel, making them more lightweight and faster to start up than VMs....
09  octobre     10h38
ChatGPT Use Case for Software Engineer: Review Pull Requests (Code Reviews)
ACMer    One interesting use case for ChatGPT is its ability to assist in reviewing code in a Pull Request, which can be incredibly beneficial. By pasting the code into ChatGPT and asking for a review, it can identify potential issues and offer suggestions to enhance the overall quality of the code. However...
05  octobre     14h23
What is the Enterprise Engineer in Meta? (Comparisions to Software Engineer Roles)
ACMer    I’ve recently got an invitation email from a Meta Recruiter about a Staff Enterprise Engineer role in Meta London: What is Enterprise Engineer in Meta An Enterprise Engineer at Meta focuses on designing, developing, and maintaining the internal tools and systems that help the company’s employees...
04  octobre     12h38
Software Engineer Interview Question: What is TCP IP (4 Layer vs OSI 7 Layer)?
ACMer    Note: recently this has been asked in the first round of the technical interviews by Tiktok Bytedance for a Site Reliable Engineer role in London. TCP IP Protocols is a fundamental concept in Computer Networking Computer Science , which every Software Engineer should be faimilar with. TCP IP ...
02  octobre     20h34
The Memory Manager in C C (Heap vs Stack)
ACMer    This is one of the most frequently asked interview questions for Software Engineer roles. In C C, memory management is a critical aspect of controlling how a program allocates and manages its resources. The memory in a C C program is typically divided into different areas: stack and heap being...
28  septembre     19h35
Software Engineering Interview Question: What Happens When You Type Google.com in the Browser Address Bar?
ACMer    I think this is one of the most popular interview questions for Software Engineering Positions. Recently it has been said this has been asked in one of the Tiktok Interview. To answer the question What happens when you type https: www.google.com in the browser in a detailed and structured...
    15h48
Crypto is Just the Tip of the Blockchain Iceberg
ACMer    When most people hear the word blockchain, they instantly think of cryptocurrencies like Bitcoin and Ethereum. While crypto has garnered the lion’s share of attention, it’s important to recognize that it’s just one application of the underlying technology: blockchain. Imagine an iceberg floating...
26  septembre     16h08
Teaching Kids Programming - Generate Binary Strings Without Adjacent Zeros (Recursive Depth First Search Algorithm)
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms You are given a positive integer n. A binary string x is valid if all substrings of x of length contain at least one . Return all valid strings with length n, in any order. Example : Input: n Output: Explanation: The...
23  septembre     14h31
Excel Tutorial: SUMIF Function
ACMer    The SUMIF function in Excel allows you to sum the values in a range that meet a specific condition criterion . Here’s the basic syntax: SUMIF range, criteria, range The range of cells that you want to apply the condition to. criteria The condition that must be met. It can be a number,...
    10h16
The String Memory Comparision Function memcmp in C C
ACMer    memcmp is a standard library function in C and C that compares two blocks of memory byte by byte. It’s declared in the header in C and the string.h header in C. Syntax of memcmp int memcmp const void ptr , const void ptr , size t num ; Parameters of memcmp ptr : Pointer to the first block...
    10h10
The minpoll and maxpoll in Network Time Protocol (NTP)
ACMer    The Network Time Protocol NTP can be installed via: sudo apt install ntp The configuration for the NTP server time synchronization is located at: etc ntp.conf. In Network Time Protocol NTP , the minpoll and maxpoll settings control the minimum and maximum intervals between polling requests to...
22  septembre     21h32
45 Minute Mock Interview (Coding, System Design) Career Development Advices
ACMer    Many major tech companies, including FANG Facebook Meta, Apple, Netflix, Google and Microsoft, require multiple rounds of interviews before extending a job offer. These typically include coding, system design, and behavioral assessments to evaluate cultural fit. I’m offering minute mock...
20  septembre     12h36
P versus NP problem (NP Complete, NP Hard)
ACMer    P, NP, NP hard, and NP complete are key concepts in computational complexity theory, which helps us classify problems based on how hard they are to solve. Here’s a breakdown: P Polynomial Time P represents the class of problems that can be solved efficiently by a deterministic algorithm, meaning...
19  septembre     16h03
Teaching Kids Programming - Find Cubic Root of an Integer (Brute Force, Binary Search Algorithm) - a 3 54872
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Example: Find the integer cubic root of a First of all, we need to find out how many digits of a, which is easy to find out. a is a digit number since is between and . Also, the digit at One is,...
16  septembre     12h25
Modern C Language Features
ACMer    When you are writing C code, especially on your interviews, you want to impress the interviewer with the modern C features. Modern C introduces several powerful features, including algorithms like std::transform and std::for each, which leverage functional programming paradigms for concise...
    10h57
Comparisions of push back and emplace back in C std::vector
ACMer    In C, both push back and emplace back are methods of the std::vector class used to add elements to the end of the vector, but they have some differences in how they handle the elements. push back Usage: push back const T value or push back T value Behavior: This method copies or moves the...
14  septembre     09h42
C : Access a Non-existent Key in std::map or std::unordered map
ACMer    Note: I have been asked this question by a Google Recruiter in the early stage of Interview Process e.g. Screening. In C, when you access a non existent key in std::map, the behavior depends on how you access it: Using the subscript operator If the key does not exist, std::map will automatically...
09  septembre     20h28
Teaching Kids Programming - Find the Maximum Achievable Number (Greedy Algorithm, Math)
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Given two integers, num and t. A number is achievable if it can become equal to num after applying the following operation: Increase or decrease the number by, and simultaneously increase or decrease num by . Return the maximum...
    19h22
List and Vector Comparisions in C
ACMer    In C, both list and vector are container classes provided by the Standard Template Library STL . However, they differ in several key aspects, such as their underlying data structures, performance characteristics, and use cases. Here’s a comparison: Underlying Data Structure vector: Implemented...
02  septembre     21h27
The Computers at Early 2000s
ACMer    In , I took the college entrance exam and then spent the summer in Beijing. In September, I enrolled at the International College at Beijing ICB of China Agricultural University. However, I was admitted through a self funded program since my entrance exam score wasn’t high enough to secure a...
    08h20
Backtracking Algorithm Depth First Search Pruning
ACMer    The statement Backtracking DFS Pruning is a concise and intuitive description of the backtracking algorithm. To understand this, let’s break down the key concepts in this equation. Depth First Search DFS Algorithm DFS is an algorithm for traversing graphs or trees. It starts from the root...
01  septembre     11h17
Teaching Kids Programming - Minimum Number of Chairs in the Room (Max Prefix Sum)
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms You are given a string s. Simulate events at each second i: If s E’, a person enters the waiting room and takes one of the chairs in it. If s L’, a person leaves the waiting room, freeing up a chair. Return the minimum...
19  août     20h27
Teaching Kids Programming - Minimum Increment to Make Array Unique (Sorting Greedy)
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms You are given an integer array nums. In one move, you can pick an index i where i nums.length and increment nums by . Return the minimum number of moves to make every value in nums unique. The test cases are generated so...
05  août     09h46
The Simplest String Hash Function: djb2 Algorithm and Implementations
ACMer    A simple yet effective hash function for strings is the well known djb algorithm by Daniel J. Bernstein. It is simple to implement and has good performance characteristics for many use cases. C djb Hash Function Here is the implementation of the djb hash function in C : include iostream ...
03  août     21h08
Hot Weather Causes Intel CPU Throttle and NVidia GPU Crashes on Windows 11 (Blue Screen)
ACMer    My Microsoft Surface Laptop Studio becomes extremely laggy, slow, and nearly unusable in hot weather. Restart didn’t help and after a slow reboot, I managed to open the Windows Task Manager and surprised to see that the CPU frequency is throttled. The high CPU temperature causes it to throttle ...
31  juillet     20h21
Teaching Kids Programming - Using Stack to Remove Digits and Characters on the Left
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms You are given a string s. Your task is to remove all digits by doing this operation repeatedly: Delete the first digit and the closest non digit character to its left. Return the resulting string after removing all digits. Example...
26  juillet     14h13
Teaching Kids Programming - SQL to Determine the Binary Tree Node Types (Left Right Join - Process Elimination)
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Table: Tree Column Name Type N int P int N is the column of unique values for this table. Each row includes N and P, where N represents the...
21  juillet     11h23
How to Get the Last Requests to Apache2 Server?
ACMer    The apache server logs the access requests in var log apache so we can analyse this log file to find out the last few requests. The following parses the apache server logs, and print the requests line by line. It is based on the BASH commands: awk and tail. bin bash NUMBER OF REQUESTS LOG...
19  juillet     18h02
Two Windows Tips: Turn Off Delivery Optimization and Tweak Privacy Settings
ACMer    The following two features when enabled are the performance killer on Windows . As we navigate the intricacies of our Windows operating systems, ensuring optimal performance and safeguarding our privacy are top priorities. One way to achieve this is by tweaking a few essential settings,...
18  juillet     12h03
Teaching Kids Programming - Redistribute Items to Boxes (Knapsack Problem, Binary Search Algorithm)
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Apple Redistribution into Boxes You are given an array apple of size n and an array capacity of size m. There are n packs where the ith pack contains apple apples. There are m boxes as well, and the ith box has a capacity of...
16  juillet     11h19
Beware of the Malicious Transactions on TRON Blockchain
ACMer    I have seen such transactions of small amounts on both TRON and ETH blockchains. This transaction shown below in the tron scan blockchain explorer is suspected to be an attack from an account with the same ending characters as that of the user’s account. Please be cautious of such scams. What are...
29  juin     20h30
The Experience of On-call (Paging) for Amazon Software Engineers
ACMer    From to , I worked as a Software Development Engineer SDE at Amazon AWS Amazon Web Services . Some say SDE stands for Someone Does Everything, and that’s quite accurate. Every SDE at Amazon is responsible for their code from design to testing and must also handle on call duties...
16  juin     10h59
Introduction to Crypto Defi: Flexi Max (HTX)
ACMer    HTX Crypto Exchange has a range of different DeFi Products De centralised Finance and Flexi Max is one of the interest ones. TLDR; you can transfer your Crypto coins e.g. USDT and subscript to Flexi Maxi product. After subscription, you can withdraw your funds at any time, however, different...
13  juin     11h51
Teaching Kids Programming - Introduction to SQL Join Queries (Inner, Left, Right, Full and Cross Joins)
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Previously: Teaching Kids Programming Introduction to SQL and the SELECT We can visualize the Different Types of Joins using the Venn Diagrams, for example, the Inner Joins can be seen as finding the common intersecting parts of...
    10h23
The defer keyword in GoLang
ACMer    In GoLang, the defer keyword is used to ensure that a function call is performed later in a program’s execution, typically for purposes of cleanup. Deferred function calls are executed in last in first out order just before the surrounding function returns. This makes defer especially useful for...
12  juin     12h52
Best Security Practices for Holding Cryptocurrencies on Exchanges
ACMer    Previously, I was scammed about USDT because I clicked a phishing link that I shouldn’t have. A lesson learned: The Major Security Flaws of Wirex WirexApp Exchange In the world of cryptocurrencies, security is paramount. While the decentralized nature of blockchain offers robust protection...
09  juin     10h25
Review: Keychron K8 Wireless Mechanical Keyboard for Software Engineers
ACMer    Use: ZHIHUA for additional discount when you purchase a Keychron keyboard here. I have been in love with the keychron keyboards for years. And recently I have purchased another Keychron keyboard: Keychron K Wireless Mechanical Keyboard US ANSI Layout à I also have a C Keychron Full...
07  juin     18h52
Teaching Kids Programming - SQL to Determine the Binary Tree Node Types (Nested Select - Process Elimination)
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Table: Tree Column Name Type N int P int N is the column of unique values for this table. Each row includes N and P, where N represents the...
04  juin     18h18
Teaching Kids Programming - Using Hash Map to Count the Right Triangles in a Binary Matrix
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms You are given a D boolean matrix grid. Return an integer that is the number of right triangles that can be made with the elements of grid such that all of them have a value of . Note: A collection of elements of grid is a...
01  juin     16h35
Teaching Kids Programming - The cache Function Decorator in Python
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Introduction to the Function Decorator in Python In Python, we can add decorate a function by using the symbol, following by the decorator. For example: def sample decorator func : def wrapper n : print Before ans func n ...
31  mai     11h03
Implement and Test the Go Version of Redis Caching Class
ACMer    This post writes a go version of caching layer using redis, wrapps it in a class and provides a usage. Let’s create a Go package that provides a caching layer using Redis. We’ll use the popular go redis redis v package to interact with Redis. We’ll define a Cache struct with methods to set and get...
29  mai     14h04
Why and How You Should Stop the ChatGPT and Bytedance Bots Crawling Your Pages?
ACMer    Recently, I have seen my servers overloaded High CPU Usage and I looked into the apache logs and I see the access logs from ChatGPT Bot aka GPTBot . and Bytedance Bots aka Bytespider. You can check the top IPs that access your server via the following BASH command: bin bash awk ’ a END...
    10h54
The Major Security Flaws of Wirex (WirexApp) Exchange
ACMer    Beware of the Wirex Crypto Phishing Email Scam: I Lost GBP worth of USDT I have been a victim of a scam yesterday and I lost about USDT Crypto token worth of GBP due to opening a phishing email on the phone and had my phone number verified . I was doing some housework, and I...
21  mai     13h21
Teaching Kids Programming - Implement the Pairwise Function in Python using the Iterator Yield
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Implement the Pairwise Function in Python using the Iterator Yield The pairwise is from itertools where we can iterate over a iterable list array, tuple, set, dictionary, string and etc in Python, and then returns an iterator to...
18  mai     15h23
Teaching Kids Programming - Greedy Algorithm to Redistribute Items to Boxes (Knapsack Problem)
ACMer    Teaching Kids Programming: Videos on Data Structures and Algorithms Apple Redistribution into Boxes You are given an array apple of size n and an array capacity of size m. There are n packs where the ith pack contains apple apples. There are m boxes as well, and the ith box has a capacity of...
14  mai     11h19
Rust Cargo Manifest Files Explained: What are the the Cargo.lock and Cargo.toml files?
ACMer    In Rust programming, Cargo is a package manager and build system. It’s used for managing your Rust project’s dependencies, building your project, and managing its distribution. Cargo relies on two main files to manage these tasks: Cargo.toml and Cargo.lock. What is Cargo.toml This is the manifest...