https://youtu.be/oCTS_u01Rhs
I loved how this cop explained the incredible difficulty of the analysis.
Given files that are associated with geographic proximity of the cell phone towers.
For each group of files representing a location, cat them into cut to just get the source phone ID, pipe to sort, redirect to a geographic file.
For each geographic file, work through pairs of files and pipe them through comm.
When done, look at the final results to identify the overlaping cell phone IDs.
Criminals captured.
This was first day Unix programming lesson. The simplest and easiest file manipulation possible. And for me that was 1982 or so, but it had been there for many years before me.
Edit: oops, cut not split
I loved how this cop explained the incredible difficulty of the analysis.
Given files that are associated with geographic proximity of the cell phone towers.
For each group of files representing a location, cat them into cut to just get the source phone ID, pipe to sort, redirect to a geographic file.
For each geographic file, work through pairs of files and pipe them through comm.
When done, look at the final results to identify the overlaping cell phone IDs.
Criminals captured.
This was first day Unix programming lesson. The simplest and easiest file manipulation possible. And for me that was 1982 or so, but it had been there for many years before me.
Edit: oops, cut not split