B ackground Last month I had asked a Java related question to all my students on a facebook post . Why is it that in Java, Objects are always to be allocated on heap? Why is dynamic allocation the only option in the toolbox of a Java developer while creating objects? It was a very interesting discussion on facebook. Many participants, my students and otherwise gave good arguments in defense of the Java Language Design. One of the arguments that came out shining, was that of the possibility of unsafe allocations on Stack Frame. Special thanks to Ted Lum, Chetan Parmar, Nishant Verma, Vaibhav Desai, Tusharkumar Thomar, Vimal Sakhiya, Clair Roma Henry, Subham Gadi, Makarand Bhosle, Prasad Kowli and Nirav Kothari for their participation and valuable arguments. Let me now, put forward my perception on why Java Language Designers would have taken such a decision. The following content in this article assumes that the reader is aware of memory models and lif...
If I ask Chotu how much time he will take to eat ten grapes, he will typically say a few minutes. If I ask the same question to his digestive system, then the answer maybe a few hours. The answer depends on who is answering and what eating means. For Chotu, it is chewing, gulping, and relishing their taste. Chotu also rejects peduncles, cap stems that come with grapes. For his digestive system, chewing would mean breaking down and converting grapes into its ingredients, and gulping would mean incorporating them in blood, and rejection means excretion of the non-essential. As I see it, eating is of two types Deep and Shallow. Usually, what we call eating is in this context, Shallow Eating, and digestion is Deep Eating. Both are essential for survival. When we intake Knowledge, we go through a similar process. The Shallow Eating part is akin to reading books, watching videos, attending seminars, among other things. The metaphorical grapes have gone inside our...
New to Harikavach >> Harikavach Introduction The Challange The challange in Harikavach is that it is a HandCryption technique. This implies that it must be humanly possible to encode/encrypt the message and decode/decrypt the message, without using a computer and in a reasonable time with minimal effort. Computers can be used to compromise the message. Computers can use Brute force technique to break the code. In Brute force technique the computer can try all the possible keys ( or a highly probable set ) on the message to compromise it. With increasing computing power, it is easy for a computer to try millions of key combinations within a reasonable period of time. This is the problem with level 4 . There are fixed number of keys that can be generated using Scramble Clock . Let us consider that we place all the possible keys in a Set. Then this set is the Key Set ( Key Space ). The Key Set is finite for Scramble Clock and also finite for Harikavac...
Comments