Electronics projects mentioned by friends

Today on IRC some of my friends recommended or mentioned:

Also, honorable mention: Eliza for the Neo6502 running Morpheus firmware and Neobasic.

And there are heaps more boxes at HackerBoxes.

Books by Bill Inmon

This is a note for Future John.

I am reading Fundamentals of Data Engineering which says that beside Ralph Kimball, Bill Inmon had a lot to do with data warehousing in the early days. I’m going to try and read a few of his books, many of which are available in Kindle (and Audible) format from Amazon.

Maker’s Schedule, Manager’s Schedule

Over on Rory Sutherland – Are We Now Too Impatient to Be Intelligent? | Nudgestock 2024 the inimitable Rory Sutherland made reference to Maker’s Schedule, Manager’s Schedule by Paul Graham. It’s helpful to be aware of these two types of schedule.

In the same video Mr Sutherland also referred to The Unaccountability Machine: Why Big Systems Make Terrible Decisions – and How The World Lost its Mind which looks like it would be an interesting read.

Oh, and he referred to Social Acceleration: A New Theory of Modernity as well. I don’t think I’m going to spend the money or the time on that one, more’s the pity. I only have one life and can’t do everything I might wish I could.

Extra Content #18: Four New Books on Data Warehousing and Data Engineering | In The Lab With Jay Jay

This post is part of my video blog and you can find more information about this video over here.

You can support this channel on Patreon: patreon.com/JohnElliotV

In this video I get four new books on database design which have arrived from Amazon:

Thanks very much for watching! And please remember to hit like and subscribe! :)


Following is a product I use picked at random from my collection which may appear in my videos. Clicking through on this to find and click on the green affiliate links before purchasing from eBay or AliExpress is a great way to support the channel at no cost to you. Thanks!

Wozniak Solder LugsThis is an image of the product.notes

Let’s go shopping!

What is elliptic curve cryptography?

The following quotation is taken from Elliptic Curve Cryptography for Developers.

What is elliptic curve cryptography?

First, there are no ellipses. Second, there are no curves. So why is it called an “elliptic curve”? The primary reason is history. Performing integrals of the elliptical orbits of planets gave rise to formulas labeled elliptic curves. These formulas were then used in other areas of mathematics, and the label stuck.

The areas of mathematics used in public key cryptography involve number theory (the properties of integers), combinatorics (the study of counting), and finite fields (sets with finite objects and specific rules). Elliptic curves are used in just about every area of mathematics. This makes studying elliptic curve math very difficult because it is hard to determine what you really need to know and what is just really interesting.

For example, elliptic curves have been used for factoring numbers and solving Fermat’s Last Theorem. In chapter 3, I explain how elliptic curves on the complex plane are used to understand elliptic curves over finite fields. It’s all interesting but not necessarily applicable to cryptography.

Handling Cookies is a Minefield

I read an interesting article today Handling Cookies is a Minefield. It’s basically about what characters are supported in cookies across browsers and servers.

As a rule I only use two cookies: a session cookie, which identifies the session, and a persistent browser cookie, which identifies the user and their browser.