An exploration into the connection between technologies

Image for post
Image for post

All throughout the expanding age of technology, a network has been quietly branching out to every corner of the market, every inch of the globe; that is the Internet of Things. Simply put, the IoT is the connection between any piece of technology that can be connected to the Internet itself. From smartphones, to lightbulbs, the Internet of Things has and will continue to encompass much of our daily lives.


In a world of similar packaging, enjoy organization in a blink

Image for post
Image for post

With the ever expanding capabilities being established within technology, cubbi aims at bridging just one of the gaps in accessibility. Designed with VoiceOver and other accessibility settings in mind, cubbi utilizes a user’s camera to recognize a barcode, scan it, retrieve the product information and display it in a clean, concise format. Users can then save the item into a “cubbi” of their choosing and update information however they see fit. For instance, if a user only uses a particular item for a certain recipe, they can save that recipe in the notes section of that item. This same thought process can be applied to a myriad of scenarios. Users looking to get more organized can utilize the expiration date feature to keep track of their various items. Other users who care for people in their household could utilize several features to help keep track of details about items. …


A look into a tech postmortem write-up

Image for post
Image for post

In an infamous Reddit post from r/talesfromtechsupport, a unique tech issue plagued the email servers of an unidentified academic institution in 2004.

Issue Summary

With the intention of needing an email address created for the purpose of updating all affiliated emails on the goings on of an institution, an email address was created (ex. all-employees@org.edu). During daily operations, a user became aware of the address and used it to send a message inquiring about a local apartment rental to all 30,000 user emails. This immediately triggered a mass influx of messages from a myriad of sources, the first being individuals replying to the message asking why this message was being sent their way. Once this proceeded, this prompted its own wave of messages replying all to the responses, confused as to what the origin of the messages even were. Lastly, users found the largest wave of messages in the form of auto-replies. In an organization with tens of thousands of people, it just so happened about 20 or so people were on vacation and set an away message to auto-reply to incoming messages. This prompted an away response to be sent for every single message received within the mailbox, including responding to the other away messages received. …


A two-way approach to creating your own remake of the hit 70’s game

Image for post
Image for post

Gameplay

Mastermind is a two-sided code solving game played by a codemaker and a codebreaker. Using a series of pegs separated out into 8 colors, the codemaker chooses a pattern and conceals it in their gameplay area. The codebreaker then begins trying to break the code by inserting various pegs for each turn, hoping to break it within 10 chances. In turn, the codemaker responds with an output of smaller white or red pegs telling the codebreaker how close they are to winning. This is done like so: On the side of each turn, there’s space for 4 of these smaller pegs. In a basic ascending order, the red pegs confirm the correct placement of the larger pegs and the white ones confirm the right color, but in the wrong placement. …


A look at what happens when you type a URL and press Enter

Image for post
Image for post

From the keystrokes of typing a URL, to seeing the page flash across your screen, the flow of information is expansive and swift.


A look into artificial intelligence and the machine learning models that encompass the foundation of much of our user generated content

Image for post
Image for post

When most people think of machine learning in relation to themselves, something like the auto-correct peppered throughout their texts might come to mind. But these technologies are integrated into so many industries that touch us daily. In my previous article linked below, I talk about the broad strokes of machine learning by looking into the technologies of self driving cars, healthcare, and briefly touched on the YouTube algorithm. …


A comprehensive expansion on Static and Dynamic Libraries

In the world of coding, libraries are vital. Initially built-in libraries can seem like the only thing one could need, but as functions are built and projects are worked on, a self made library could prove more effective. To truly make the most of the capabilities surrounding coding, one can implement static or dynamic libraries. In my previous article, I addressed the initial differences in the two libraries. In this article, I aim to broaden the understanding on what these applications actually look like. …


Image for post
Image for post

Machine Learning is all around us, from the touch of our fingers through auto-correct, to the integral technologies that build our world. Machines are being built smarter, and more adaptable as the years go on, and mechanical intelligence has reached an all time high. But what exactly does this all mean? What are our machines truly learning? Well, to put it simply, they’re learning about us. They are trying to align themselves with a world they only know about through our input.


A look into what they are, how they work & how to make and use them.

Image for post
Image for post

What are they?

Programming libraries are a collection of implementations of behavior. Whether it be small or large, libraries help contribute to a program’s efficiency through a set of well-defined interfaces to invoke the desired output. Some libraries are provided (see stdlib, stdio, etc), but anyone can make and implement a library however they see fit. This can come in handy when building out similar programs. If most of the functionality overlaps, that library can be implemented on another program.


Let’s try to break this down, step by step. 👩‍💻

Image for post
Image for post

When the input of ‘ls’ is typed, a great deal happens beneath the fingers of our laptops. First on a small scale, the computer has to register the fact that these keystrokes are even valid, printable characters. A series of checking and reading in the scancode interrupts the signal within the ‘l’ and the ’s’ and the characters are validated through a keymap. This is sent to the STDIN and ready to print.

About

Kathleen McKiernan

Cosmetologist to Coder — Holberton School New Haven

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store