
My interest in this was twofold. First,
the relatively simple (and, dare I say, elegant) math underlying the algorithm
means I don't need to be an expert in network security to make any progress; my
job is simply to create a framework to be expanded upon by others. Second, the
level of planning, trial, and error inherent to a project this size has
necessarily made me a better programmer (a useful skill in this field). It's
nothing exciting to look at—the hardest part is simply finding the time between
studying and sleeping to sit down with my laptop and program for an hour or
two.
This week, I've been trying to
figure out which parts of the program should store data, and when to add
newly-captured data, which is harder than it seems because different parts of
the program require the data to be in different states (old, new, combined).
The solution? Have each function generate a list of changes and only apply them
once the program no longer needs the unchanged data. Easier said than done, of
course, but it's rewarding little victories like this that remind me why I
enjoy programming. Who knows, with enough little victories I may even be able
to accomplish a few big ones.