Using Bloom Filters (6 tags)
Perl hashes make set membership easy at the cost of memory usage. A lesser-known technique, Bloom filters, trades a tunable false-positive rate for compactness -- and has interesting applications for privacy concerns. Maciej Ceglowski explains the theory and practice of Bloom filters.
Building a Vector Space Search Engine in Perl (6 tags)
Have you ever wondered how search engines work, or how to add one to your program? Maciej Ceglowski walks you through building a simple, fast and effective vector-space search engine.
Top Ten Data Crunching Tips and Tricks (6 tags)
Every day, programmers perform unglamorous but necessary data crunching: recycling legacy data, checking configuration files, yanking data out of web server logs, and more. Knowing how to crunch data with the least amount of effort can make the difference between meeting a deadline and making another pot of coffee. Greg Wilson, author of Pragmatic's Data Crunching, offers ten tips for crunch time.
The Fight Against Spam, Part 2 (6 tags)
In last week's Part 1 of this series, François Joseph de Kermadec showed you how to build the foundation for your spam-fighting strategy. Today, in Part 2, he fine-tunes this approach and digs deeper into Mail.app.
Implementing Flood Control (5 tags)
If the load of application relies on incoming events, you may eventually face the happy curse of popularity: too much work to do with your available resources. If you set a limit on how many events you can process within a time period, you can avoid the flood. Vladi Belperchinov-Shabanski explains the algorithm and demonstrates working code.