By adapting textbook networking data transfer protocols, a methodology is proposed to send pictures of my pocket rocket to my tinder matches
Tag Archives: Computer Science
38 Things Real Programmers Do, and you probably aren’t one if you don’t do them all
There’s a lot of different ways of coding, but when it comes to programming professionally, here are 38 things you HAVE TO DO!
Can you guess what sorting algorithm we used on this data?!?
In this quiz, you’ll test your knowledge of sorting algorithms by determining what we used to sort different data sets. This quiz is HARD!
Novel Techniques for Random Number Generation: Toddler Behavioral Sampling
Using my son Ethan and his friends, we develop methods to use toddlers to generate random numbers for scientific experiments
A Loopy Belief Propagation Factor Graph Simulation of my Grandma Nonna’s Insane Facebook Feed
Using a Loopy Belief Propagation network, the fine researchers of CLU were finally able to explain their grandparents online radicalization.
What is the Plus Plus Plus Language and why Programmers and Scientists everywhere are using it!
This new revolutionary language is about to replace all other programming languages with it’s easy to understand syntax!
How well can you code in Plus Plus Plus
Test your knowledge of Plus Plus Plus with this comprehensive coding quiz which will put your understanding to the limit!
Top 100 Variable Names for Boy and Girl Variables of 2021
Compiled from thousands of public git hub repos, we not have the top 50 boy and girl variable names used by coders!
A Time-Series Analysis of my Girlfriends Mood Swings
Tiffany’s mood swings have become even more difficult to predict. Using Time-Series Analysis, these models can effectively find the best time to binge video games without starting an argument
The Nihilistic Network Management Model: An Optimal Approach to Cybersecurity
The Nihilistic philosophy, while a terrible philosophy to live by, is a fantastic framework for a network management model. It balances flexible configuration management, performance while creating a secure network environment.