Recently I encountered the issue of having to call some functions from an third-party library, which is available as .NET DLL only (is it called “assembly” in .NET jargon?). It doesn’t worth the effort to learn and write code in C# just to be able to use the library. So...
[more]
Lamport et al (1982) The Byzantine Generals Problem
About fault tolerance in a distributed system. Using the metaphor of a number of Byzantine generals have to come to a consensus of action, while the communication may not be accurate. For example, the sender of a message may be a traitor such that the message may be different to...
[more]
Tupaj et al (1996) Extracting Tabular Information From Text Files
A paper on how to identify and extract tables from scanned text documents. The
author describe the whole process as four phrases: (1) isolate potential table
areas, (2) OCR, (3) isolate the beginning and end of the tables, (4) isolate
table components, i.e., header, cells, footer.
[more]
Encrypting a file with OpenSSL
A natural question from using SSH for a while is whether we
can reuse the SSH authentication key for other use, say, encrypting a file. The
answer is affirmative in OpenSSL but it is not straightforward.
[more]
"Advanced" OpenSSH
I’ve written something about SSH and here are more, on authentication, tunnelling and some other.
[more]