Speeding up the I/O-heavy app: Q&A with Malte Ubl of Vercel
We recently published an article exploring what sort of infrastructure is needed to run edge functions. For that piece, we talked to several industry experts in wide-ranging conversations. While we weren’t able to use all of the conversation in the article, we wanted to share them in full so you
Read moreBetter-than-Cubic Complexity for Matrix Multiplication in Rust
Midjourney: Cubic matrix multiplicationYears ago, I wrote an implementation of the Strassen matrix multiplication algorithm in C++, and recently re-implemented it in Rust as I continue to learn the language. This was a useful exercise in learning about Rust performance characteristics and optimization techniques, because although the algorithmic complexity of
Read moreThe Secret World of Utility-based Agents
Utility-based agents are flexible problem solvers that optimize decision-making.Continue reading on Better Programming »
Read moreSwish function and a Swiss mathematician
The previous post looked at the swish function and related activation functions for deep neural networks designed to address the “dying ReLU problem.” Unlike many activation functions, the function f(x) is not monotone but has a minimum near x0 = -1.2784. The exact location of the minimum is where W
Read moreSwish, mish, and serf
Swish, mish, and serf are neural net activation functions. The names are fun to say, but more importantly the functions have been shown to improve neural network performance by solving the “dying ReLU problem.” Softplus can also be used as an activation function, but our interest in softplus here is
Read moreThe Best Free Online Image Editors
We delve into the top free online photo editors and explore their features to help you discover the solution for your design needs. Continue reading The Best Free Online Image Editors on SitePoint.
Read moreGenerating and inspecting an RSA private key
In principle you generate an RSA key by finding two large prime numbers, p and q, and computing n = pq. You could, for example, generate random numbers by rolling dice, then type the numbers into Mathematica to test each for primaility until you find a couple prime numbers of
Read moreRSA encryption in practice
At its core, RSA encryption is modular exponentiation. That is, given a message m, the encrypted form of m is x = me mod n where e is a publicly known exponent and n is a product of two large primes. The number n is made public but only the
Read moreBest Material UI Themes for Stunning Web Applications
In this article, we will explore the best Material UI themes available, each offering unique features to suit various project needs. Continue reading Best Material UI Themes for Stunning Web Applications on SitePoint.
Read moreCode to convert words to Major system numbers
A few days ago I wrote about using the CMU Pronouncing Dictionary to search for words that decode to certain numbers in the Major mnemonic system. You can find a brief description of the Major system in that post. As large as the CMU dictionary is, it did not contain
Read more