Programming Leftovers
-
8 elements of securing Node.js applications | Red Hat Developer
Making your Node.js applications secure is an essential part of the development of Node.js modules and applications. Security practices apply to both the code itself and your software development process. This installment of the ongoing Node.js Reference Architecture series focuses on some of the key security elements that JavaScript developers should address.
-
Generating Random Floats in [0, 1)
Recently, I found myself in a situation where I needed to generate a random float between 0 and 1 using a random 32-bit integer in C. This subject has been done to death before, but I felt like feeling a little pain so I decided to figure it out myself before using someone else's better solution.
-
Queueing Systems 2: Percentiles and Simulation
In response to the previous article on Markov chains to model queueing systems I received a lot of requests on how to compute percentiles.
I’m happy about that! More people need to realise that the upper percentiles is where it’s at. That’s what you need to know to evaluate most systems. The average is useful for things like capacity planning and resource allocation, but not to determine user experience.
-
The Ideal Continuous Integration System, part two
Continuing my continuous integration system adventures, in today's episode, I will explore a few ideas I had since.
As you may recall, I was unhappy with how the build stage turned out to be with the templates. It was reasonably short, but I felt bad about bolting templating on top of YAML, it also wasn't exactly clear what's going on,when are we overriding stuff in the template, and when are we adding to a list? The way I handled matrices and templating wasn't much to my liking either, it put too much burden on the CI, and some scenarios were totally opaque for anyone not versed in the language and its features.
-
How to write insertion sort in R
The insertion sort algorithm works by constructing a sorted vector one element at a time: [...]