Keith C. Perry on 7 Jan 2016 09:09:21 -0800 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] Notes on Mark's hash table talk at Central |
Walt, Can you confirm with Mark its ok to post the video? If so, I'll include the below information in the post. ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Keith C. Perry, MS E.E. Owner, DAO Technologies LLC (O) +1.215.525.4165 x2033 (M) +1.215.432.5167 www.daotechnologies.com ----- Original Message ----- From: "Walt Mankowski" <waltman@pobox.com> To: plug@lists.phillylinux.org Sent: Thursday, January 7, 2016 12:06:02 PM Subject: [PLUG] Notes on Mark's hash table talk at Central Mark asked me to forward this to this mailing list. I don't believe he's subscribed to the list, so please direct questions about the talk directly to him. Walt ----- Forwarded message from Mark Dominus <mjd@plover.com> ----- Date: Thu, 07 Jan 2016 16:59:25 +0000 From: Mark Dominus <mjd@plover.com> To: Walt Mankowski <waltman@pobox.com> Subject: Re: Slide corrections X-Mailer: Perl5 Mail::Internet v2.14 Thanks for corrections! Would you please forward this note to the PLUG mailing list for me? Thanks for inviting me to speak and for being such an engaged audience; this was my 13th annual December talk for PLUG, and I hope to see you back next year. The slides from last night's presentation are at http://perl.plover.com/yak/HashHistory/ and there are detailed notes at http://perl.plover.com/classes/HashHistory/samples/NOTES.html In particular, the discussion of SNOBOL tables, which I had to omit because I wasted too much time with a long introduction, is at http://perl.plover.com/classes/HashHistory/samples/NOTES.html#snobol Rachel asked a question about the suitability of MD5 as a random number generator. MD5 is no longer considered sufficiently secure to be used for cryptographic applications. Differential cryptography techniques have resulted in successful collision attacks on MD5; this means it is now possible to find two inputs that hash to the same output. (See https://en.wikipedia.org/wiki/MD5#Collision_vulnerabilities ) However, as far as I know there is still no effective way to predict what the output will be for a given input, so MD5's usefulness as a random number generator is unimpaired. Disclaimer: Cryptography is difficult and I am not an expert. I'll be glad to answer questions by email. P.S. At Clarkville I posed the following problem: If a right triangle has a hypotenuse with length 10, and the perpendicular dropped from the opposite vertex has length 6, what is the area of the triangle? The obvious answer, 30, is wrong, and the puzzle is to figure out why. The answer, should you want to see it, is at http://math.stackexchange.com/q/1594740/25554 ----- End forwarded message ----- ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug