• Home
  • Hubs
  • Companies
  • Stream

    KUKURUKU HUB

    Find the Best Engineering Talks Write Articles Earn Karma Curate Content

    DIY. An Astro Tracker in Two Nights

    Written by Alex Kuzmuk
    After reading an article about amateur astronomy, I decided to take pictures of stars with the help of a...
    December 10, 2014 DIY
    •  
    • 7567

    Java 8 vs Scala. The Difference in Approaches and Mutual Innovations

    Written by Ruslan Shevchenko
    I was really glad to find out that my presentation about Scala and Java 8 was retweeted more than...
    December 9, 2014 Scala
    • 1
    • 11938
    • 9

    YAWNDB. Time Series Database Written in Erlang

    Written by Pavel Abalihin
    I work at Selectel and a lot of our clients, who are leasing dedicated servers, require the information about...
    December 8, 2014 Erlang
    • 1
    • 11670

    Meet Kukuruku Hub v2.0

    Written by Kukuruku Hub
    We are happy to announce a new, redesigned version of Kukuruku Hub! First of all, we would like to...
    December 7, 2014 Site News
    • 3
    • 1237
    • 6

    A Point Localization in a Polygon

    Written by Nikolai Ershov
    I have recently come across a post dedicated to solving the task of locating a point in a polygon:...
    October 13, 2014 Algorithms
    • 1
    • 5570

    How to Analyze Distributed Denial-of-Service (DDos) Attack

    Written by Kukuruku Hub
    What is DDoS Attack? As per Wikipedia,  denial-of-service ( DoS ) or distributed denial-of-service (DDoS) attack is an attempt...
    October 11, 2014 Information Security
    •  
    • 4158

    Erlang for the Little Ones. The Basic Syntax of Functions

    Written by Victor Pikaev
    Dear %username% , Let’s continue learning Erlang for the little ones. In the previous post we’ve reviewed the way...
    September 29, 2014 Erlang
    • 1
    • 3257

    Copyright and a Bit of Porn

    Written by Art Afian
    The basic thesis of the traditional copyright system protection lies in the following postulate: if we allow to steal...
    September 26, 2014 Media
    • 2
    • 2427

    Something About Cats, Dogs, Machine and Deep Learning

    Written by Artem Hurshudov
    Deep Blue beat Kasparov at chess in 1997. Watson beat the brightest trivia minds at Jeopardy in 2011. Can...
    September 16, 2014 Image Processing
    • 4
    • 12551
    • 1

    Radix Trees

    Written by Nikolai Ershov
    Having read some articles about tries (aka prefix trees aka radix trees), I decided to write one of my...
    September 11, 2014 Algorithms
    • 5
    • 8517

    Are Time Travels Possible?

    Written by forgotten
    Being a fan of scientism , I am going to tell you about the nature of time, causality and...
    September 8, 2014 Popular Science
    • 3
    • 2503

    Reactive Actors in Java

    Written by harati
    There are plenty of technologies to organize parallel computing. One of the most promising and simple ones is the...
    August 30, 2014 Java
    •  
    • 16567
    • 1

    AVL Trees

    Written by Nikolai Ershov
    In the previous article we’ve reviewed Randomized Binary Search Trees . Today we are going to review the implementation...
    August 28, 2014 C++
    • 3
    • 19628
    • 18

    Crowdfunding an Open Source Science for Our Complex World

    Written by Shaun Swanson
    In short, the crowdfunding campaign to launch the new physics discipline of Complex Thermostatistics ends this weekend, and we...
    August 26, 2014 Open Source
    • 2
    • 1841

    Randomized Binary Search Trees

    Written by Nikolai Ershov
    I have always been surprised by the contrast between the grace of the main concept of binary search trees...
    August 21, 2014 C++
    • 1
    • 9452
    • 2

    A Little Lisp Interpreter in Python

    Written by Basic Wolf
    When reading the “Binary trees” chapter in Programming Interviews Exposed by John Mongan, I thought about the ways recursion...
    August 18, 2014 Python
    •  
    • 3389

    What is grep and How do We Use It?

    Written by Simple Admin
    When reading some articles about Unix commands, I noticed that the examples provided in them were not practically useful....
    August 15, 2014 *nix
    • 1
    • 4193
    • 2

    Working for Google. A Rotten Apple

    Written by Larysa Aharkava
    Disclaimer : I’ve been working at Google as an engineer for almost 4 years. Google is really a great...
    August 15, 2014 IT
    •  
    • 4660

    Cellular Automata Using Comonads

    Written by Curly Brace
    I have recently come across an article about implementing a one-dimensional cellular automaton using comonads. But this material is...
    August 14, 2014 Haskell
    • 4
    • 4290

    KernelCare: Patching the Kernel On-the-Fly

    Written by Andrey Yemelianov
    As for today, we do not have to turn off and reboot a server with Linux operating system for...
    August 13, 2014 SysAdmin
    • 1
    • 1949
    • ←
    • First
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • Last
    • →

    READ NEXT

    • I Do Not Know C
    • Quantum Search Using Grover’s Algorithm
    • A Short Course in Computer Graphics. How to Write a Simple OpenGL. Article 1 of 6
    • USB Killer
    • Secrets of the Conditional (ternary) Operator
    • A Short Course in Computer Graphics. How to Write a Simple OpenGL. Article 2 of 6
    • Undefined Behavior and Fermat’s Last Theorem
    • Multitasking in the Linux Kernel. Workqueues
    • Introduction to Machine Learning with Python and Scikit-Learn
    • About
    • Rules
    • Privacy Policy
    • ·
    • Twitter
    • Facebook

    Log In

    Forgot password?
    

    or
    • Sign in with Github
    • Sign in with Twitter

    

    or
    • Sign in with Github
    • Sign in with Twitter
    Don't have an account? Sign up now

    Sign Up

    

    or
    • Sign in with Github
    • Sign in with Twitter
    Already have an account? Log in here

    Reset Password

    Enter the email address associated with your account, and we'll email you a link to reset your password.

    Already have an account? Log in here