Skip to main content

Questions tagged [hashing]

A hash function is any algorithm that maps data of arbitrary length to data of a fixed length. The values returned by a hash function are called hash values, hash codes, hash sums, checksums or simply hashes. From Wikipedia: http://en.wikipedia.org/wiki/Hash_function

0 votes
1 answer
136 views

I'm considering embarking on an operating system kernel project. One of the "features" that I intend it to have, is a mandatory access control framework that can be purposed to sandbox ...
DannyNiu's user avatar
  • 374
3 votes
3 answers
194 views

I was implementing a hashing function for a class and I took a minute to look at the first-party collection package for Dart to see how they implemented their hashing function for collections. They ...
Abion47's user avatar
  • 141
-1 votes
2 answers
304 views

I have a repository with many files (mostly binary, images and raw data) and some documentation. The files are stored in a hierarchical folder structure; I want to allow checking the fixity of the ...
G M's user avatar
  • 273
0 votes
1 answer
189 views

I am implementing a message queue where messages are distributed across nodes in a cluster. The goal is to design a system to be able to auto-scale without needing to keep a global map of each message ...
poundifdef's user avatar
4 votes
2 answers
764 views

We store zipped files in the storage of a cloud provider which contain certain fields (metadata). These files are derived from other, larger files. Every time we (re)generate these files, their 'last ...
MPIchael's user avatar
  • 269
5 votes
5 answers
6k views

I am developing a .NET Windows application and I need to make requests to a SQL Server instance. How do I secure the authentication data in my code in case someone decompiles my application? I know ...
Motti's user avatar
  • 85
6 votes
3 answers
2k views

I made a patch to a programming language run-time to cache the results of hashing a string in the string object, so that it is just retrieved the next time it is required. However, I'm not convinced ...
Kaz's user avatar
  • 3,702
3 votes
1 answer
1k views

I am trying to read up on System Design, and several articles talk about how a Primary Key for the input data, which is a string, can be passed into a Hash function and we get a number. This can ...
Ufder's user avatar
  • 254
0 votes
1 answer
2k views

I know that the C++ standard library includes the ordered and the unordered map (std::map and std::unordered_map) containers, but why is there no hashmap available on C++? I was asked this questions ...
Swayam Shah's user avatar
3 votes
2 answers
1k views

In a design book I was reading they describe a method to determine a database sharding scheme by taking the hash (MD5, SHA1, whatever) of a userid (integers or uuids) and then (whether encoded or not) ...
s77's user avatar
  • 141
0 votes
0 answers
766 views

I am creating an Android application that sets alarms based on the String date of a list of Objects (PendingIntents, with each taking in an id, that is an integer). In order to cancel the ...
Adam Lee's user avatar
  • 129
2 votes
2 answers
326 views

Background Tertiary to this question, I have been building my own imageboard that prevents [for example] duplicate images from being downloaded again and again on behalf of the client. How I do this, ...
Anon's user avatar
  • 3,649
3 votes
1 answer
1k views

I am reading about scaling of database and came to know about sharding technique. But I also read about consistent hashing technique. So how practically sharding is implemented? Do we arrange nodes in ...
rahul sharma's user avatar
1 vote
1 answer
4k views

In redis docs, it is stated that keys command should not be used in production, since it blocks other processes while executing, it is better to use scan iteration over all keys with some batch size. ...
ogbofjnr's user avatar
  • 121
5 votes
1 answer
2k views

Btrfs supports crc32c, xxhash, sha256 and blake2b as checksums when storing and reading files. crc32c and xxhash are designed to detect random errors while sha256 and blake2 are considered ...
kjdf's user avatar
  • 61

15 30 50 per page
1
2 3 4 5
12