...making something functional with less than optimum resources (cf MacGyver, bodge-up, gerryrig, uzw). which preceded the notion of "one who gains unauthorized access to computers" by oh... perhaps a whole !@#n seven years.
here's another current worthy tome which supports that earlier notion, and thus causes undue confusion: Hacker's Delight, which gets down to the hardware bits with some amazing cycle optimizations
yep. along with all the rest of the BLAS, EISPACK, CERNLAB, MINPACK, SOFA, ATLAS, EIGEN,
I really don't understand the "scientific computing
this is what it does: It provides the necessary software to support a private, possibly semi-secure, social network. Think: Facebook, but small and secret, presumably to protect your membership from an oppressive large authority.
(this post is a traditional trick to get someone who actually can answer this sensible question to become so enraged by this incorrect reply that their activation energy is achieved and we get a good answer. so take what i've written up there as false bait. (this works particularly well when one wants a clear definition to obscure technical terms. just get yourself on a Haskell board, and write: "monads? simple! they're factory objects that provide closures for a formal lambda expression" then watch the horror and outrage and eventually you get the correct answer from the former lurker class))
Just one catch: he's a lame duck, and will be out of office in January.
i don't understand why that's a "catch". these dark days of oligarchy, this may be the main way we get any honest political effort.
If your boss has any basic science education try to sell them on the "a monoculture is at more risk to attack" approach. that's not entirely false, but mostly it sounds good and pointy-hairs tend to swallow it.
Then choose some version of Ubuntu or Red-Hat, but be ready to suffer all the horrors of dealing with the document, spreadsheet, calendar exchange formats. Those issues, more than any other, will spell failure. (just one middle-level moron who can't open your LibreOffice 'power-point' stack and you're toast) So, far more important than distribution is to be ready (practice!) your corporate compatibility two-step. (once saved my bacon by showing that my 'beamer' stack made everyone's powerpoint stack look like crap)
Beware of the vindictive IT staff who don't want to learn one more thing beyond their 'microsoft certification' merit badge. They will make your life a living hell. good luck!
what it takes to implement business logic using Reactive Programming versus two different conventional procedural Programming models: Java with Hibernate and MySQL triggers,'
Do not underestimate the value of print statements for debugging.