Nicky ReinertHow does the SHA256 algorithm…in detail? (part 2/2)Once you have successfully processed the first part, you are well prepared to learn in this part how the individual components or. Now…Oct 6Oct 6
Nicky ReinertThe Bitcoin PuzzleAlmost 10 years ago, when Bitcoin was a cheap and largely unappreciated niche phenomenon, someone initiated the “Bitcoin Puzzle.” It isn’t…Oct 4Oct 4
Nicky ReinertHow does the SHA256 algorithm…in detail? (part 1/2)SHA-256 (Secure Hash Algorithm) is the name of a “cryptographic hash function”. SHA-256 is part of an , with the same goal: to create a…Oct 4Oct 4
Nicky ReinertHow to achieve persistence in a Gradio AppI am currently building some kind of playground for Huggingface’s text-2-image models. This app offers more than a dozen configuration…May 5May 5
Nicky ReinertNE #34: JavaScript was developed within 10 daysJavaScript is one of the most widely used programming languages in the world and is of great importance for the function and popularity of…Feb 21Feb 21
Nicky ReinertNE #33: GCJ-02“Don’t trust any navigation system whose algorithm you have not manipulated yourself” — George Washington, at 545 right after Christ’s…Feb 18Feb 18
Nicky ReinertNE# 49: POPCOUNTDer Befehlssatz einer CPU ist so etwas wie die natürliche Sprache der Maschinen — die Maschinensprache! Sie besteht aus sehr einfachen…Feb 16Feb 16
Nicky ReinertNE #32: What do PHP, Visa and Mandelbrot have in common?Part 32 of the Nerd Encyclopedia on the undoubted joy of recursive acronyms.Feb 15Feb 15
Nicky ReinertNE# 48: Die dienstälteste SoftwareSo ganz genau lässt sich nicht feststellen, welche Software am längsten in Verwendung ist. Wer weiß schon, welches seltsame Konstrukt im…Feb 13Feb 13
Nicky ReinertNE #31: The very first bugEvery computer science lecture probably begins with this sentence: “Did you know that the term bug comes from the fact that a moth was…Feb 12Feb 12