
Recent
 Command Line Fu: surveillance with Raspberry Pi
 Let gooby do teh hoemwerk: Riemann zeta at two
 Mathematical insult gone awry
 How to get a job with 70 lines of code
 Quick tip: Veracrypt on a Raspberry Pi 2 [update: Veracrypt 1.18]
 Java bean differences
 Pade approximants: a case study (iii)
 Pade approximants: a case study (ii)
 Pade approximants: a case study (i)
 Setting up i2p running in a docker container
 Apache commonscollections vulnerability – try it at home
 Movember ’15
 Let gooby do teh hoemwerk: Green function of the twodimensional Laplace operator
 Let gooby do teh hoemwerk: BakerCampbellHausdorff identities
 Mocking Spring Data repositories
 Job application title page
 Let gooby do teh hoemwerk: SokhatskyWeierstrass identity
 Let gooby do teh hoemwerk: Riemann zeta at minus one
 TLS/SSL certificate exchange in Java
 Quick tip: Veracrypt on a Raspberry Pi 2
 Who am I?
 Guess who?
 How to get a job with 250 lines of code
 Joke’s on me I guess
 Random Java objects for testing
 My conky config
 Quick tip: changing the userbase directory in Mathematica (Linux)
 Create your own Sudoku book
 The RC4 stream cipher
 Life hack: attaching a ferro rod to the Mora plastic sheath
 The Fappening
 A hash function primer II: CRC
 A hash function primer I: SHA1
 Creating a password list for WPA/WPA2 dictionary attacks
 Ulam’s spiral in Mathematica
 Block mode of operation: why ECB is bad
 AES in Mathematica
 Strong passwords from /dev/random
Archive
 January 2017
 November 2016
 October 2016
 September 2016
 April 2016
 March 2016
 February 2016
 January 2016
 December 2015
 November 2015
 October 2015
 September 2015
 August 2015
 July 2015
 June 2015
 May 2015
 April 2015
 March 2015
 February 2015
 January 2015
 December 2014
 November 2014
 October 2014
 September 2014
 July 2014
 June 2014
Category Archives: Mathematica
Pade approximants: a case study (iii)
We are now going to explore the analytic structure of the Padé approximants for our example [1], [2]. The study (iii) The limit for the Padé approximants and exist for all . This is much stronger than the Taylor series, … Continue reading
Pade approximants: a case study (ii)
In the previous article we have seen how to calculate Padé approximations on the example of The study (ii) We are now going to see how efficient Padé’s ansatz is and compare it to the well known series representation . … Continue reading
Pade approximants: a case study (i)
This post was inspired by a lecture series of Carl Bender [1]. The case I will consider the function on the complex plane, defined by Have a look at a complex plot of it Some properties: has a a logarithmic … Continue reading
Who am I?
Here is a little snippet on how to make a fun game with the help of Mathematica: “Who am I?” An animated gif which will slowly reveal its contents… A guessing game for the whole family! We start off by … Continue reading
Guess who?
Stare at the formula (Mathematica notation) and take a guess what it represents: {((4 Sin[1/8 – 9 t] – 54/5 Sin[1/5 – 5 t] – 129/4 Sin[1/4 – t] + 76/7 Sin[2 t + 29/10] + 17/8 Sin[3 t + … Continue reading
Quick tip: changing the userbase directory in Mathematica (Linux)
Recently, I came across the problem of readdressing the Mathematica user folder for a sortofportable version of Mathematica. In Linux this folder resides in the user’s home directory as ~/.Mathematica and contains all user defined settings as well as additional … Continue reading
Ulam’s spiral in Mathematica
Today we’re having a little fun with Mathematica. We will generate a visualization of the Ulam spiral. To this end the natural numbers are arranged in a spiral pattern, 37 36 35 34 33 32 31 38 17 16 15 … Continue reading