Finding tangent circles
If three circles are all tangent to each other, you can find two more circles that are tangent to all three, and the equation for finding these new circles is remarkably elegant. This is Descartes’ theorem. Two tangent circles To illustrate Descartes’ theorem, we first need three mutually tangent circles.
Read moreHow to develop technical interview questions this year and beyond
Several years ago, technical interviews were dominated by whiteboard exercises and brain teasers. But ask any engineer or developer today, and they’ll tell you: old-school tests and quiz methods rarely reflect the work they actually do. Thankfully, hiring teams have caught on. Now, the most effective interviews look a lot
Read moreThe innovation, leadership, and team agility inside U.S. Bank’s cloud journey
In this episode of Leaders of Code, Jody Bailey, Stack Overflow’s CPO, Anirudh Kaul, Senior Director of Software Engineering, and Paul Petersen, Cloud Platform Engineering Manager, discuss the U.S. Bank’s journey from traditional banking practices to embracing new technologies.
Read morePrimitive Pythagorean triangles with the same area
A Pythagorean triangle is a right triangle with integer sides. A primitive Pythagorean triangle is one in which the sides have no factor in common. For example a triangle with sides (30, 40, 50) is a Pythagorean triangle but not a primitive Pythagorean triangle. It is possible for two primitive Pythagorean
Read moreBase58Check encoding in Python
The previous post began by saying “Bitcoin’s Wallet Import Format (WIF) is essentially Base58 encoding with a checksum.” More specifically, WIF uses Base58Check encoding. This post will fill in the missing details and show how to carry out computing Base58Check in Python. There are multiple ways to stub your toe
Read moreMost legible font for WIF
Bitcoin’s Wallet Import Format (WIF) is essentially Base58 encoding with a checksum. It is meant to a human-friendly way to display cryptographic private keys. It’s not that friendly, but it could be worse. The checksum (the first four bytes of SHA256 applied twice) is appended before the conversion to Base58, so
Read moreEmpowering Developers and Fueling AI Adoption with AmpereOne Design Innovations
Explore AmpereOne's Memory Tagging, QoS enforcement, and Nested Virtualization features that empower developers to build secure, efficient applications and accelerate AI adoption. Continue reading Empowering Developers and Fueling AI Adoption with AmpereOne Design Innovations on SitePoint.
Read moreHow a data science intern uses CodeSignal Learn to master programming skills
Whether you’re trying to break into a new field, prepare for the job search, or level up in your current role, it helps to know that you’re not alone in your journey to build your skills. That’s why we’re sharing stories from learners like you: to motivate and inspire others
Read more