-
Influencing By Asking Questions As Taught By Jeff Bezos
I’ve recently attended an exciting webinar about mastering The Art Of Influence By Asking Questions. Check-out this best seller that also covers this subject. Have you ever received feedback that you need to “expand your influence” to grow your career? Have you ever wondered how senior leaders from large organizations influence without burning out? Have […]
-
Known hosts
Mechanism to know what hosts you trust to ssh into. Example: The authenticity of host ‘myhost.example.com (172.23.176.251)’ can’t be established. RSA key fingerprint is SHA256:v5PXX8zCmYY1P01WcEjbEXsj08k4zqPOF3EHqwDwokk. Are you sure you want to continue connecting (yes/no)? If you type yes, then a new entry will be added to your known hosts file (~/.ssh/known_hosts). Warning: Permanently added ‘detiffe.aka.corp.amazon.com,172.23.176.251’ […]
-
Amazon’s 14 Leadership Principles Explained By Jeff Bezos
This is a mix of a set of interviews with JEFF BEZOS, CEO of Amazon. Check-out our free Amazon behavioral interview guide. Customer Obsession What I would hope Amazon’s legacy would be is Earth’s most customer-centric company. Jeff Bezos Jeff continues: What we have always wanted to do is raise the standard for what it […]
-
Auth 101
Work in progress! Auth scheme An authentication scheme is a method or recipe to pass credentials from a user to an authenticating system. Authorization: <authentication type> <credential as base64> Example: Authorization: Basic <name:password> Authorization: Bearer <oauth token> HTTP Basic Authentication More about this flow here: https://en.wikipedia.org/wiki/Basic_access_authentication#Protocol OAuth Access a resource with a token instead of […]
-
Keyed hashing vs salted hashing
Sha256(myText + saltValue) vs HMAC(myText, myPrivateKey) The main difference is that the salt is not assumed unknown to the attacker, but the key is. An additional difference is that salts are supposed to vary; if you hash three passwords within the same system, then you should use three distinct salt values, whereas keys are to […]
-
Hashing function
Hashing is one way, it’s irreversible (you cannot “de-hash” a hash to get back the original text). As opposed to encrypting which is revisable (by decrypting). A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are […]
-
Hashtables
Java: Hashmap (Hashtable class is deprecated). C#: Dictionary (Hashtable class is deprecated too). /!\ A hash table does not guarantee that the order will remain constant over time. Hashmap in Java final Map<String, String> myLookupTable = new HashMap(); myLookupTable.put(“key”, “value”); myLookupTable.get(“key”); myLookupTable.getOrDefault(key, defaultValueIfDoesNotExist); myLookupTable.isEmpty(); One of the efficient ways to iterate over a HashMap object […]
-
Are Strings Anagrams?
Anagram = all letters can be reused to create another word. Approaches Approach 1: sorting (nonintuitive to me) An anagram is produced by rearranging the letters. Sort the letters alphabetically for the two strings. The sorted strings should be equal! public boolean isAnagram(String s, String t) { if (s.length() != t.length()) { return false; } […]
Designed by Mocki.Co in Canada.
We believe you deserve a chance to receive truthful interview feedback and improve yourself. No matter which company you apply to:





❤️ If you are passionate about interviewing, join our team. Reach out to us.