Published on: 2025-04-17 05:02:39
Procedural Textures with Hash Functions and Hash Playground I'm the sort of person who gets very excited when simple rules create complex behaviour. The other day, I needed a simple hash function that maps $(x, y)$ coordinates to a colour, and found a straightforward equation that ended up being astoundingly rich. Hence this post; to talk about and play with this function. TL;DR: The boolean predicate $(c_x \, x + c_y \, y + c_{xy} \, x \, y + c_{x^2} \, x^2 + c_{y^2} \, y^2)$ $\mathrm{mod} \
Keywords: c_ hash mathrm mod pattern
Find related items on AmazonPublished on: 2025-04-23 00:02:41
I recently posted a blog post about a new hash table, and whenever I do something like that, I learn at least one new thing from my comments. In my last comment section Rich Geldreich talks about his hash table which uses “Fibonacci Hashing”, which I hadn’t heard of before. I have worked a lot on hash tables, so I thought I have at least heard of all the big important tricks and techniques, but I also know that there are so many small tweaks and improvements that you can’t possibly know them all
Keywords: fibonacci function hash hashing table
Find related items on AmazonPublished on: 2025-05-18 22:19:26
During the Game Developers Conference in San Francisco earlier this month, I got the chance to sit down with Keita Takahashi, the creator of the iconic Katamari Damacy, Wattam and many other silly and wholesome games. He came to the event to showcase his upcoming game, to a T, which follows a young teenager who's stuck in a T pose -- in other words their elbows and shoulders can't bend. As I discovered while playing a chunk of the game in a preview session, Takahashi's to a T has a much stronge
Keywords: game just like takahashi think
Find related items on AmazonPublished on: 2025-05-30 14:22:38
Free unofficial patches are available for a new Windows zero-day vulnerability that can let remote attackers steal NTLM credentials by tricking targets into viewing malicious files in Windows Explorer. NTLM has been widely exploited in NTLM relay attacks (where threat actors force vulnerable network devices to authenticate to attacker-controlled servers) and pass-the-hash attacks (where they exploit vulnerabilities to steal NTLM hashes, which are hashed passwords). Attackers then use the stole
Keywords: file hash microsoft ntlm windows
Find related items on AmazonPublished on: 2025-06-13 21:19:37
The original version of this story appeared in Quanta Magazine. Sometime in the fall of 2021, Andrew Krapivin, an undergraduate at Rutgers University, encountered a paper that would change his life. At the time, Krapivin didn’t give it much thought. But two years later, when he finally set aside time to go through the paper (“just for fun,” as he put it), his efforts would lead to a rethinking of a widely used tool in computer science. The paper’s title, “Tiny Pointers,” referred to arrowlike
Keywords: hash krapivin new paper pointers
Find related items on AmazonPublished on: 2025-06-13 15:00:00
The original version of this story appeared in Quanta Magazine. Sometime in the fall of 2021, Andrew Krapivin, an undergraduate at Rutgers University, encountered a paper that would change his life. At the time, Krapivin didn’t give it much thought. But two years later, when he finally set aside time to go through the paper (“just for fun,” as he put it), his efforts would lead to a rethinking of a widely used tool in computer science. The paper’s title, “Tiny Pointers,” referred to arrowlike
Keywords: hash krapivin new paper pointers
Find related items on AmazonPublished on: 2025-06-14 06:00:00
The original version of this story appeared in Quanta Magazine. Sometime in the fall of 2021, Andrew Krapivin, an undergraduate at Rutgers University, encountered a paper that would change his life. At the time, Krapivin didn’t give it much thought. But two years later, when he finally set aside time to go through the paper (“just for fun,” as he put it), his efforts would lead to a rethinking of a widely used tool in computer science. The paper’s title, “Tiny Pointers,” referred to arrowlike
Keywords: hash krapivin new paper pointers
Find related items on AmazonPublished on: 2025-07-10 07:28:49
ARMONK, N.Y., Feb. 27, 2025 /PRNewswire/ -- IBM (NYSE: IBM ) today announced it has completed its acquisition of HashiCorp , whose products automate and secure the infrastructure that underpins hybrid cloud applications and generative AI. Together the companies' capabilities will help clients accelerate innovation, strengthen security, and get more value from the cloud. Today nearly 75% of enterprises are using hybrid cloud1, including public clouds from hyperscalers and on-prem data centers, w
Keywords: cloud hashicorp hybrid ibm infrastructure
Find related items on AmazonPublished on: 2025-07-10 22:28:49
ARMONK, N.Y., Feb. 27, 2025 /PRNewswire/ -- IBM (NYSE: IBM ) today announced it has completed its acquisition of HashiCorp , whose products automate and secure the infrastructure that underpins hybrid cloud applications and generative AI. Together the companies' capabilities will help clients accelerate innovation, strengthen security, and get more value from the cloud. Today nearly 75% of enterprises are using hybrid cloud1, including public clouds from hyperscalers and on-prem data centers, w
Keywords: cloud hashicorp hybrid ibm infrastructure
Find related items on AmazonPublished on: 2025-07-12 08:20:49
IBM has finalized its multi-billion dollar HashiCorp acquisition, two days after the U.K.’s antitrust regulator gave the deal its blessing. A spokesperson confirmed to TechCrunch that the U.S. Federal Trade Commission (FTC) had quietly greenlighted the acquisition earlier this week prior to the U.K.’s Competition and Markets Authority (CMA) on Tuesday. Today’s announcement comes 10 months after IBM first revealed plans to pay $6.4 billion for HashiCorp, an enterprise software company best know
Keywords: acquisition billion cloud hashicorp ibm
Find related items on AmazonPublished on: 2025-07-15 06:31:37
The U.K.’s antitrust authority has given the go-ahead to IBM’s planned multibillion acquisition of infrastructure software company HashiCorp. In a brief case update published today, the Competition and Markets Authority (CMA) said it had “cleared the anticipated acquisition by IBM of HashiCorp,” and it would publish the full rationale for its decision in due course. The announcement comes some 10 months after IBM first revealed it was doling out $6.4 billion for HashiCorp as it sought deeper i
Keywords: billion case cma hashicorp ibm
Find related items on AmazonPublished on: 2025-07-11 18:38:06
Psst: 🔍 Get Favicon Drag this bookmarklet to automatically get the favicon of the active webpage About Our Free Favicon Hash Generator This free online tool helps security researchers and web analysts generate favicon hashes instantly. Simply enter a website URL to get multiple hash formats and direct search links to popular security platforms. Key Features Instant hash generation (MMH3, MD5, SHA256) Direct search links to security platforms Visual favicon preview with size analysis Suppo
Keywords: favicon free hash search security
Find related items on AmazonGo K’awiil is a project by nerdhub.co that curates technology news from a variety of trusted sources. We built this site because, although news aggregation is incredibly useful, many platforms are cluttered with intrusive ads and heavy JavaScript that can make mobile browsing a hassle. By hand-selecting our favorite tech news outlets, we’ve created a cleaner, more mobile-friendly experience.
Your privacy is important to us. Go K’awiil does not use analytics tools such as Facebook Pixel or Google Analytics. The only tracking occurs through affiliate links to amazon.com, which are tagged with our Amazon affiliate code, helping us earn a small commission.
We are not currently offering ad space. However, if you’re interested in advertising with us, please get in touch at [email protected] and we’ll be happy to review your submission.