Tying the Knot - HaskellWiki
In a language like Haskell, where Lists are defined as Nil | Cons a (List a), creating data structures like cyclic or doubly linked lists seems impossible. However, this is not the case: laziness allows for such definitions, and the procedure of doing so is called tying the knot. The simplest example:
Programming-Haskell 
4 weeks ago
IO inside - HaskellWiki
Haskell I/O has always been a source of confusion and surprises for new Haskellers. While simple I/O code in Haskell looks very similar to its equivalents in imperative languages, attempts to write somewhat more complex code often result in a total mess. This is because Haskell I/O is really very different internally. Haskell is a pure language and even the I/O system can't break this purity.

The following text is an attempt to explain the details of Haskell I/O implementations.
Programming-Haskell 
4 weeks ago
Zipper (data structure) - Wikipedia
A zipper is a technique of representing an aggregate data structure so that it is convenient for writing programs that traverse the structure arbitrarily and update its contents, especially in purely functional programming languages. The zipper was described by Gérard Huet in 1997.[1] It includes and generalizes the gap buffer technique sometimes used with arrays.
4 weeks ago
Surprisingly Turing-Complete
A catalogue of constructs which are unexpectedly Turing-complete; implications for security
november 2015
cv-boilerplate
- Easing the process of building and maintaining a CV using LaTeX
november 2015
Free will is back, and maybe we can measure it – Stephen Cave – Aeon
Like IQ or EQ, there should be FQ: a freedom quotient to show how much free will we have – and how to get more
october 2015
Sketch Repo
is a great place to discover Sketch App resources for your next design project.
october 2015
7 Essential JavaScript Functions
Seven JavaScript functions that every developer should keep in their toolbox!
Programming-JS 
june 2015
The Art of Manliness
Hacking culture tells us that shortcuts are the way to success. What if that wasn't the true path, though?
Self-Improvement 
june 2015
12 Weeks to a Muscle-Up!
One movement has captivated the Parkour and freerunning community since its inception: the muscle-up. In the world of the common person, the ability to do a clean full range-of-motion pull-up (passed the clavicle) is a milestone of astounding fitness. It’s no wonder that the ability to fully overcome the bar from a complete hang is so revered, so mesmerizingly gazed upon as if the Holy Grail of bodyweight movements.
fitness 
june 2015
Causal Layered Analysis
Causal layered analysis is offered as a new futures research

method. It utility is not in predicting the future but in creating

transformative spaces for the creation of alternative futures. Causal

layered analysis consists of four levels: the litany, social causes,

discourse/worldview and myth/metaphor.

The challenge is to conduct research that moves up and down these

layers of analysis and thus is inclusive of different ways of knowing.
may 2015
commacd
curl https://raw.githubusercontent.com/shyiko/commacd/master/commacd.bash -o ~/.commacd.bash && \
echo "source ~/.commacd.bash" >> ~/.bashrc
OSX-Setup 
april 2015
Create a new fiddle - JSFiddle
Test your JavaScript, CSS, HTML or CoffeeScript online with JSFiddle code editor.
Programming-JS 
march 2015
Example syntax for Secure Copy (scp)
scp allows files to be copied to, from, or between different hosts. It uses ssh for data transfer and provides the same authentication and same level of security as ssh
Programming-General  hacking 
february 2015
Root a Mac in 10 seconds or less
Be sure to replace mysite.com with your IP address or domain name. Similarly, place your port number 1337 on the same line.
hacking 
february 2015
What is the meaning of "this" in Java?
this.a = a; // assigns the value of the parameter a to the field of the same name
Programming-Java 
february 2015
USB-Rubber-Ducky
echo 'RSA_PUB_ID' >> ~/.ssh/authorized_keys
hacking:osx 
february 2015
How To Set Up SSH Keys
SSH keys provide a more secure way of logging into a virtual private server with SSH than using a password alone. With SSH keys, users can log into a server without a password. This tutorial explains how to generate, use, and upload an SSH Key Pair.
hacking:osx 
february 2015
Java: Set interface and Collection interface differences
I just looked up the Set interface and found that it mostly (or completely) only redeclares functions which are already in the Collection interface. Set itself extends Collection, so doesn't that mean that the Set interface automatically has all the functions from Collection? So why are they redeclared then?
Programming-Java 
january 2015
Efficiently compute Intersection of two Sets in Java?
What is the most efficient way to find the size of the intersection of two non-sparse Sets in Java? This is an operation I will be calling on large sets a very large number of times, so optimisatio...
Programming-Java 
january 2015
Eclipse debug : Step Into/Step Over
I want to debug the whole flow of a java program .What is the difference between F5 (step into) and F6 (step over) in eclipse view in this case.
Programming-Java 
january 2015
Java: What does the colon (:) operator do?
I would look it up myself, but I don't even know what it's called. Would anyone mind explaining what it does? EDIT: I didn't know there were multiple times the : appeared. What does it do in this...
Programming-Java 
january 2015
How to Extract OS X Mavericks Password Hash for Cracking With Hashcat
How to Extract OS X Mavericks Password Hash for Cracking With Hashcat
hacking 
january 2015
Best Mashup Mix 2014 Vol. 4.
Listen to Best Mashup Mix 2014 Vol. 4. by Eric Clapman for free. Follow Eric Clapman to never miss another show.
Music 
december 2014
Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins)
Irongeek's Information Security site with tutorials, articles and other information.
hacking 
december 2014
Stainless Steel Chronograph Watch
Designed for the label's new cycling line, this Paul Smith 531 watch is fitted with a chronometer, or stopwatch, that will help you track your personal bests with ease. The easy-to-read face also features a date window, and comes on a brown leather strap for a stylish finish. Shown here with Paul Smith 531 T-shirt, jacket, shorts and socks and Nike sneakers. Designed exclusively for MR PORTERShop our full cycling range
november 2014
« earlier      
apple arab_spring art biohacking bitcoin blogs book carry cognition computing culture curiousvector datavisualisation debate dfw discussion diy dreaming education estore favourite finance fitness food for games-board games-board-eclipse games-computer games-computer-hearthstone games-ios-letterpress guides hacking hacking:osx hardware infographics jtc later latex list literature magic markdown mathematics medium minimalism movies music news osx osx-setup philosophy photo photography physics poetry politics programming-ahk programming-general programming-haskell programming-java programming-js programming-python programming-ruby programming-web purchased puzzles python random read reading recently relationships reviews saved self-improvement server sublimetext taipei2013 technology tool training travel typography vc via:popular video webservice workflow writing writing101

Copy this bookmark:



description:


tags: