Cracking the code with code

6 Aug 2014 | , , ,
Share on:

Some of the world’s best mathematicians have been cryptologists, a few of whom played a role in geopolitics during the Second World War.

The stakes may be lower today, but the bragging rights are still worth trying for in the third installment of AquaQ’s ongoing q programming challenge:

 In cryptography one of the simplest forms of encryption is the substitution cipher, where you take each letter and pick a replacement for it. Encryption is then as simple as substituting each letter in your message with the replacement letter from the cipher. This type of encryption is usually not difficult to break, since much of the structure in the underlying information remains.

More here.

SUGGESTED ARTICLES

Transitive Comparison

Kdb+ Transitive Comparisons

6 Jun 2018 | , ,

By Hugh Hyndman, Director, Industrial IoT Solutions. A direct comparison of the performance of kdb+ against InfluxData and, by transitivity, against Cassandra, ElasticSearch, MongoDB, and OpenTSDB

Kx provides rapid access to unstructured data

Insights into kdb+ 3.6

5 Jun 2018 | , ,

At Kx25, the international kdb+ user group conference held on May 18th, we released kdb+ version 3.6. With this release, we are opening up new possibilities for kdb+ application developers.
It provides a lot of new capabilities and streamlines previously complex processes so that programmers will be able to take a simpler approach to writing systems compared to what they did in the past.