I am so impressed! This guy made his own robot: story.md.
Category Archives: Design
1968 “Mother of All Demos” with Doug Engelbart & Team (1/3) [re-mastered]
This is awesome! It’s an old demo from IBM from back in 1968: 1968 “Mother of All Demos” with Doug Engelbart & Team (1/3) [re-mastered].
555 timer
One day I intend to Build My Own 555 Timer.
In the recent past I posted How a 555 Works as a Timer which refers to an interesting video on the topic.
In that video the speaker gives us a mnemonic for remembering the transistor schematic symbols. Referring to the direction of the arrow on the symbol the “NPN” transistor “Never Points iN”. Good to know!
This Guy Built Apple’s 1980s iPad Concept
In this video a person actually builds an iPad concept from Apple from 1980: I Built Apple’s 1980s iPad Concept!
Stuff Made Here
Today I discovered a new YouTube channel Stuff Made Here. They had this fun video: What if we made a camera that sees in reverse?
Books by Bill Inmon
This is a note for Future John.
I am reading Fundamentals of Data Engineering which says that beside Ralph Kimball, Bill Inmon had a lot to do with data warehousing in the early days. I’m going to try and read a few of his books, many of which are available in Kindle (and Audible) format from Amazon.
Maker’s Schedule, Manager’s Schedule
Over on Rory Sutherland – Are We Now Too Impatient to Be Intelligent? | Nudgestock 2024 the inimitable Rory Sutherland made reference to Maker’s Schedule, Manager’s Schedule by Paul Graham. It’s helpful to be aware of these two types of schedule.
In the same video Mr Sutherland also referred to The Unaccountability Machine: Why Big Systems Make Terrible Decisions – and How The World Lost its Mind which looks like it would be an interesting read.
Oh, and he referred to Social Acceleration: A New Theory of Modernity as well. I don’t think I’m going to spend the money or the time on that one, more’s the pity. I only have one life and can’t do everything I might wish I could.
Extra Content #18: Four New Books on Data Warehousing and Data Engineering | In The Lab With Jay Jay
This post is part of my video blog and you can find more information about this video over here.
You can support this channel on Patreon: patreon.com/JohnElliotV
In this video I get four new books on database design which have arrived from Amazon:
- Fundamentals of Data Engineering: Plan and Build Robust Data Systems 1st Edition
- Kimball’s Data Warehouse Toolkit Classics, 3 Volume Set 2nd Edition
Thanks very much for watching! And please remember to hit like and subscribe! :)
Following is a product I use picked at random from my collection which may appear in my videos. Clicking through on this to find and click on the green affiliate links before purchasing from eBay or AliExpress is a great way to support the channel at no cost to you. Thanks!
Wozniak Solder Lugs notes |
Let’s go shopping!
RORY SUTHERLAND’S 10 RULES OF ALCHEMY
The YouTube recommender algorithm seems to have decided that I need plenty of Rory Sutherland in my diet. Which is fine by me, I think he’s great! This one is good: RORY SUTHERLAND’S 10 RULES OF ALCHEMY.
What is elliptic curve cryptography?
The following quotation is taken from Elliptic Curve Cryptography for Developers.
What is elliptic curve cryptography?
First, there are no ellipses. Second, there are no curves. So why is it called an “elliptic curve”? The primary reason is history. Performing integrals of the elliptical orbits of planets gave rise to formulas labeled elliptic curves. These formulas were then used in other areas of mathematics, and the label stuck.
The areas of mathematics used in public key cryptography involve number theory (the properties of integers), combinatorics (the study of counting), and finite fields (sets with finite objects and specific rules). Elliptic curves are used in just about every area of mathematics. This makes studying elliptic curve math very difficult because it is hard to determine what you really need to know and what is just really interesting.
For example, elliptic curves have been used for factoring numbers and solving Fermat’s Last Theorem. In chapter 3, I explain how elliptic curves on the complex plane are used to understand elliptic curves over finite fields. It’s all interesting but not necessarily applicable to cryptography.
