Forem

DEV Challenges

This is the official tag for submissions and announcements related to DEV Challenges.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Smart meal tracking on whatsapp [POC]

Smart meal tracking on whatsapp [POC]

14
Comments 3
2 min read
One Byte Explainer : NP-Complete Problems

One Byte Explainer : NP-Complete Problems

11
Comments
1 min read
Debugging explained in 77 characters

Debugging explained in 77 characters

4
Comments
1 min read
Demystifying Recursion: A Brief Explanation

Demystifying Recursion: A Brief Explanation

4
Comments
1 min read
XOR in 256 characters or less

XOR in 256 characters or less

1
Comments
1 min read
Big O Short Explanation

Big O Short Explanation

1
Comments
1 min read
Twilio made for changing

Twilio made for changing

10
Comments
1 min read
Big-O Notation: One Byte Explainer

Big-O Notation: One Byte Explainer

15
Comments
2 min read
Explain a computer science concept in 256 characters or less

Explain a computer science concept in 256 characters or less

8
Comments
1 min read
Deep learning with cats

Deep learning with cats

54
Comments 13
1 min read
Lock / Mutex to a post graduate CS student (Difficulty 4)

Lock / Mutex to a post graduate CS student (Difficulty 4)

Comments
1 min read
Design Patterns

Design Patterns

3
Comments 2
1 min read
Twilio Challenge: SmartyCall - AI Powered Competitive Trivia

Twilio Challenge: SmartyCall - AI Powered Competitive Trivia

18
Comments 1
2 min read
Recursion Lunch Meeting!

Recursion Lunch Meeting!

1
Comments
1 min read
Mastering SEO: A Beginner's Guide to Ethical and Effective Strategies

Mastering SEO: A Beginner's Guide to Ethical and Effective Strategies

Comments
2 min read
Twilio Challenge: AI-Powered Voice Assistant

Twilio Challenge: AI-Powered Voice Assistant

67
Comments 19
1 min read
Python is Harder than Java....

Python is Harder than Java....

2
Comments 2
1 min read
One Byte Explainer: Algorithm

One Byte Explainer: Algorithm

18
Comments 2
1 min read
What is Parallel Computing?

What is Parallel Computing?

1
Comments
1 min read
Neural Network (explained in 1 Byte)

Neural Network (explained in 1 Byte)

3
Comments
2 min read
Application Programming Interface (API's) : One Byte Explainer

Application Programming Interface (API's) : One Byte Explainer

4
Comments 2
1 min read
P vs NP Problem: The Ultimate Computer / Math Puzzle

P vs NP Problem: The Ultimate Computer / Math Puzzle

2
Comments 1
1 min read
Dijkstra's algorithm

Dijkstra's algorithm

4
Comments
1 min read
One Byte Explainer: Recursion

One Byte Explainer: Recursion

Comments
1 min read
Electricity

Electricity

1
Comments 1
1 min read
Lock / Mutex to a software engineer (Difficulty 3)

Lock / Mutex to a software engineer (Difficulty 3)

4
Comments
1 min read
What is a Byte?

What is a Byte?

2
Comments
1 min read
EXCEPTÄ°ON HANDLÄ°NG FOR SHADY PEOPLE WÄ°TH SHADY CODE

EXCEPTÄ°ON HANDLÄ°NG FOR SHADY PEOPLE WÄ°TH SHADY CODE

1
Comments
1 min read
AI Taxi Dispatch Operator

AI Taxi Dispatch Operator

78
Comments 40
2 min read
Encryption - The One Byte Explainer Secret

Encryption - The One Byte Explainer Secret

10
Comments 2
1 min read
The Concept of Abstraction

The Concept of Abstraction

6
Comments
1 min read
Understanding Loops - A Tangible Example

Understanding Loops - A Tangible Example

1
Comments
1 min read
Casting and its types in networking

Casting and its types in networking

1
Comments
1 min read
Lock / Mutex to a CS undergraduate (Difficulty 2)

Lock / Mutex to a CS undergraduate (Difficulty 2)

3
Comments
1 min read
One Byte Explainer Challenge solution(Recursion)

One Byte Explainer Challenge solution(Recursion)

Comments
1 min read
Recursion: magic of programming

Recursion: magic of programming

1
Comments
1 min read
The Impossible Blockchain Equation: A Challenge to Developers

The Impossible Blockchain Equation: A Challenge to Developers

5
Comments
3 min read
One Byte Explainer: Regular Expressions

One Byte Explainer: Regular Expressions

Comments
2 min read
Object Oriented Programming

Object Oriented Programming

61
Comments 18
1 min read
Endless Reflections: Understanding Recursion Through a Cat's Eyes

Endless Reflections: Understanding Recursion Through a Cat's Eyes

18
Comments
1 min read
Quamtum Computing and its importance

Quamtum Computing and its importance

1
Comments
1 min read
Assymetric Encryption in 256 characters or less

Assymetric Encryption in 256 characters or less

Comments 2
1 min read
File locking vs Row Level Locking

File locking vs Row Level Locking

1
Comments
1 min read
Encryption And Decryption - Securing Modern Technology

Encryption And Decryption - Securing Modern Technology

Comments
1 min read
ABSTRACTION

ABSTRACTION

Comments 1
1 min read
Schönhage–Strassen algorithm in 256 chars or less (hopefully)

Schönhage–Strassen algorithm in 256 chars or less (hopefully)

2
Comments
1 min read
Recursion

Recursion

Comments 1
1 min read
Shamir Secret Sharing in 256 characters or less

Shamir Secret Sharing in 256 characters or less

Comments
1 min read
CSS Art: Mondrian Mimic Reflection for June

CSS Art: Mondrian Mimic Reflection for June

4
Comments
2 min read
Hooks - One Byte Explainer

Hooks - One Byte Explainer

1
Comments
1 min read
Hashing

Hashing

10
Comments
1 min read
The Golden Key of Cloud Computing

The Golden Key of Cloud Computing

11
Comments
1 min read
Data Dynamics: Exploring Information Theory Essentials

Data Dynamics: Exploring Information Theory Essentials

8
Comments
1 min read
Backstage for AI's Decision-Making Process

Backstage for AI's Decision-Making Process

Comments
1 min read
Cryptographic Security: Safeguarding Data

Cryptographic Security: Safeguarding Data

Comments
1 min read
AES: The Power of Advanced Encryption Standard for Data Security

AES: The Power of Advanced Encryption Standard for Data Security

Comments
1 min read
Binary Search: Find It in Half the Time

Binary Search: Find It in Half the Time

Comments
1 min read
IPFS: The Decentralized Future of File Storage in 256 Characters

IPFS: The Decentralized Future of File Storage in 256 Characters

Comments
1 min read
SHA-256: The Heartbeat of Cryptographic Security in 256 Characters

SHA-256: The Heartbeat of Cryptographic Security in 256 Characters

Comments
1 min read
Networking to a 5th Grader in 256 words.

Networking to a 5th Grader in 256 words.

12
Comments
2 min read
loading...