Extra Content #18: Four New Books on Data Warehousing and Data Engineering | In The Lab With Jay Jay

This post is part of my video blog and you can find more information about this video over here.

You can support this channel on Patreon: patreon.com/JohnElliotV

In this video I get four new books on database design which have arrived from Amazon:

Thanks very much for watching! And please remember to hit like and subscribe! :)


Following is a product I use picked at random from my collection which may appear in my videos. Clicking through on this to find and click on the green affiliate links before purchasing from eBay or AliExpress is a great way to support the channel at no cost to you. Thanks!

Wozniak Solder LugsThis is an image of the product.notes

Let’s go shopping!

What is elliptic curve cryptography?

The following quotation is taken from Elliptic Curve Cryptography for Developers.

What is elliptic curve cryptography?

First, there are no ellipses. Second, there are no curves. So why is it called an “elliptic curve”? The primary reason is history. Performing integrals of the elliptical orbits of planets gave rise to formulas labeled elliptic curves. These formulas were then used in other areas of mathematics, and the label stuck.

The areas of mathematics used in public key cryptography involve number theory (the properties of integers), combinatorics (the study of counting), and finite fields (sets with finite objects and specific rules). Elliptic curves are used in just about every area of mathematics. This makes studying elliptic curve math very difficult because it is hard to determine what you really need to know and what is just really interesting.

For example, elliptic curves have been used for factoring numbers and solving Fermat’s Last Theorem. In chapter 3, I explain how elliptic curves on the complex plane are used to understand elliptic curves over finite fields. It’s all interesting but not necessarily applicable to cryptography.

Handling Cookies is a Minefield

I read an interesting article today Handling Cookies is a Minefield. It’s basically about what characters are supported in cookies across browsers and servers.

As a rule I only use two cookies: a session cookie, which identifies the session, and a persistent browser cookie, which identifies the user and their browser.

USB on Hackaday

Some articles about USB on Hackaday recently: