Topic: Computing (Page 17)

You are looking at all articles with the topic "Computing". We found 481 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— The Mother of All Demos

πŸ”— California πŸ”— California/San Francisco Bay Area πŸ”— Computing πŸ”— Stanford University/SRI International πŸ”— Stanford University

"The Mother of All Demos" is a name retroactively applied to a landmark computer demonstration, given at the Association for Computing Machinery / Institute of Electrical and Electronics Engineers (ACM/IEEE)β€”Computer Society's Fall Joint Computer Conference in San Francisco, which was presented by Douglas Engelbart on December 9, 1968.

The live demonstration featured the introduction of a complete computer hardware and software system called the oN-Line System or, more commonly, NLS. The 90-minute presentation essentially demonstrated almost all the fundamental elements of modern personal computing: windows, hypertext, graphics, efficient navigation and command input, video conferencing, the computer mouse, word processing, dynamic file linking, revision control, and a collaborative real-time editor (collaborative work). Engelbart's presentation was the first to publicly demonstrate all of these elements in a single system. The demonstration was highly influential and spawned similar projects at Xerox PARC in the early 1970s. The underlying technologies influenced both the Apple Macintosh and Microsoft Windows graphical user interface operating systems in the 1980s and 1990s.

Discussed on

πŸ”— Norden bombsight

πŸ”— Technology πŸ”— Aviation πŸ”— Computing πŸ”— Military history πŸ”— Military history/Military aviation πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Aviation/aircraft project πŸ”— Military history/World War II

The Norden Mk. XV, known as the Norden M series in U.S. Army service, is a bombsight that was used by the United States Army Air Forces (USAAF) and the United States Navy during World War II, and the United States Air Force in the Korean and the Vietnam Wars. It was an early tachometric design that directly measured the aircraft's ground speed and direction, which older bombsights could only estimate with lengthy manual procedures. The Norden improved on older designs by using an analog computer that continuously recalculated the bomb's impact point based on changing flight conditions, and an autopilot that reacted quickly and accurately to changes in the wind or other effects.

Together, these features promised unprecedented accuracy for daytime bombing from high altitudes. During prewar testing the Norden demonstrated a circular error probable (CEP) of 75 feet (23Β m), an astonishing performance for that period. This accuracy would enable direct attacks on ships, factories, and other point targets. Both the Navy and the USAAF saw it as a means to conduct successful high-altitude bombing. For example, an invasion fleet could be destroyed long before it could reach U.S. shores. To protect these advantages, the Norden was granted the utmost secrecy well into the war, and was part of a production effort on a similar scale as the Manhattan Project. Carl L. Norden, Inc. ranked 46th among United States corporations in the value of World War II military production contracts.

Under combat conditions the Norden did not achieve its expected accuracy, yielding an average CEP in 1943 of 1,200 feet (370Β m), similar to other Allied and German results. Both the Navy and Air Forces had to give up using pinpoint attacks. The Navy turned to dive bombing and skip bombing to attack ships, while the Air Forces developed the lead bomber procedure to improve accuracy, and adopted area bombing techniques for ever larger groups of aircraft. Nevertheless, the Norden's reputation as a pin-point device endured, due in no small part to Norden's own advertising of the device after secrecy was reduced late in the war.

The Norden's secrecy had already been compromised by espionage before the United States entered the war. As early as January 1941, the Germans introduced a lightened derivative of the Norden called the Carl Zeiss Lotfernrohr 7 as the primary bombsight for most Luftwaffe level bombers and the first of its bombsights to have gyroscopic stabilization.

The Norden saw reduced use in the post-World War II period after radar-based targeting was introduced, but the need for accurate daytime attacks kept it in service, especially during the Korean War. The last combat use of the Norden was in the U.S. Navy's VO-67 squadron, which used them to drop sensors onto the Ho Chi Minh Trail as late as 1967. The Norden remains one of the best-known bombsights ever invented.

Discussed on

πŸ”— Andrews and Arnold is xkcd 806-compliant (2010)

πŸ”— Companies πŸ”— Computing πŸ”— United Kingdom

Andrews & Arnold Ltd (also known as AAISP) is an Internet service provider based in Bracknell in the United Kingdom founded in 1997 and launched in 1998, primarily serving businesses and "technical" home users.

In 2009 the company was judged the best niche provider in the Thinkbroadband Customer Service Awards, based on customer ratings and again in 2010.

The company's owner, Adrian Kennard (RevK), stated in a blog post that as of October 2010 the company is "xkcd/806" compliant, referring to xkcd comic number 806. This means that technical support callers who say the code word "shibboleet" will be transferred to a technical support representative who knows at least two programming languages, and presumably can offer more useful advice than a standard tech support script.

Andrews & Arnold provides IPv6 to all customers, for no additional charge.

Andrews & Arnold provides optional bonded multiple-link internet access. This allows multiple links to be used together to vastly increase speed and reliability. Special routers distribute individual IP packets between the available links in such a way that even one single download or upload operation will benefit fully from multiple speed, and it is not necessary to have several users, several running programs or computers to gain the speed benefit. Links can be of different types, each needs only to be a pipe that can carry IP packets. Multiple links can either be used together all the time, or some can be brought up as a back up if other links fail, so-called 'failover', or a combination of the two approaches can be set up.

Andrews & Arnold are strong advocates of not censoring Internet connections. Adrian Kennard has several blog posts discussing why Internet censorship as discussed in the UK is not workable, providing background for AAISP's decision.

Discussed on

πŸ”— MicroVAX 78032

πŸ”— Computing

The MicroVAX 78032 (otherwise known as the DC333) is a microprocessor developed and fabricated by Digital Equipment Corporation (DEC) that implemented a subset of the VAX instruction set architecture (ISA). The 78032 was used exclusively in DEC's VAX-based systems, starting with the MicroVAX II in 1985. When clocked at a frequency of 5Β MHz, the 78032's integer performance is comparable to the original VAX-11/780 of 1977. The microprocessor could be paired with the MicroVAX 78132 floating point accelerator for improved floating point performance.

The 78032 represented a number of firsts for DEC. It was DEC's first single-chip microprocessor implementation of the VAX ISA and DEC's first self-fabricated microprocessor. The MicroVAX 78032 is also notable as it was the first semiconductor device to be registered for protection under the Semiconductor Chip Protection Act of 1984.

The MicroVAX 78032 contains 125,000 transistors on an 8.7 by 8.6Β mm (74.82Β mm2) die that was fabricated in DEC's ZMOS process, a 3.0Β Β΅m NMOS logic process with two layers of aluminum interconnect. The die is packaged in a 68-pin surface-mounted leaded chip carrier.

Discussed on

πŸ”— Archy

πŸ”— Computing πŸ”— Computing/Software

Archy is a software system whose user interface introduced a different approach for interacting with computers with respect to traditional graphical user interfaces. Designed by human-computer interface expert Jef Raskin, it embodies his ideas and established results about human-centered design described in his book The Humane Interface. These ideas include content persistence, modelessness, a nucleus with commands instead of applications, navigation using incremental text search, and a zooming user interface (ZUI). The system was being implemented at the Raskin Center for Humane Interfaces under Raskin's leadership. Since his death in February 2005 the project was continued by his team, which later shifted focus to the Ubiquity extension for the Firefox browser.

Archy in large part builds on Raskin's earlier work with the Apple Macintosh, Canon Cat, SwyftWare, and Ken Perlin's Pad ZUI system. It can be described as a combination of Canon Cat's text processing functions with a modern ZUI. Archy is more radically different from established systems than are Sun Microsystems' Project Looking Glass and Microsoft Research's "Task Gallery" prototype. While these systems build upon the WIMP desktop paradigm, Archy has been compared as similar to the Emacs text editor, although its design begins from a clean slate.

Archy used to be called The Humane Environment ("THE"). On January 1, 2005, Raskin announced the new name, and that Archy would be further developed by the non-profit Raskin Center for Humane Interfaces. The name "Archy" is a play on the Center's acronym, R-CHI. It is also an allusion to Don Marquis' archy and mehitabel poetry. Jef Raskin jokingly stated: "Yes, we named our software after a bug." (a cockroach), further playing with the meaning of bugs in software.

Discussed on

  • "Archy" | 2013-07-09 | 76 Upvotes 35 Comments

πŸ”— SHA-3 NIST announcement controversy

πŸ”— Internet πŸ”— Computing πŸ”— Cryptography πŸ”— Numismatics πŸ”— Numismatics/Cryptocurrency πŸ”— Computing/Computer Security

SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like structure of SHA-1 and SHA-2.

SHA-3 is a subset of the broader cryptographic primitive family Keccak (), designed by Guido Bertoni, Joan Daemen, MichaΓ«l Peeters, and Gilles Van Assche, building upon RadioGatΓΊn. Keccak's authors have proposed additional uses for the function, not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on certain architectures, and AEAD ciphers Keyak and Ketje.

Keccak is based on a novel approach called sponge construction. Sponge construction is based on a wide random function or random permutation, and allows inputting ("absorbing" in sponge terminology) any amount of data, and outputting ("squeezing") any amount of data, while acting as a pseudorandom function with regard to all previous inputs. This leads to great flexibility.

NIST does not currently plan to withdraw SHA-2 or remove it from the revised Secure Hash Standard. The purpose of SHA-3 is that it can be directly substituted for SHA-2 in current applications if necessary, and to significantly improve the robustness of NIST's overall hash algorithm toolkit.

The creators of the Keccak algorithms and the SHA-3 functions suggest using the faster function KangarooTwelve with adjusted parameters and a new tree hashing mode without extra overhead for small message sizes.

Discussed on

πŸ”— IBM System/360 Model 67

πŸ”— Computing πŸ”— Computing/Computer hardware πŸ”— Computing/Early computers

The IBM System/360 Model 67 (S/360-67) was an important IBM mainframe model in the late 1960s. Unlike the rest of the S/360 series, it included features to facilitate time-sharing applications, notably a Dynamic Address Translation unit, the "DAT box", to support virtual memory, 32-bit addressing and the 2846 Channel Controller to allow sharing channels between processors. The S/360-67 was otherwise compatible with the rest of the S/360 series.

Discussed on

πŸ”— Valid Email Addresses

πŸ”— Technology πŸ”— Internet πŸ”— Computing πŸ”— Computing/Networking

An email address identifies an email box to which email messages are delivered. A wide variety of formats were used in early email systems, but only a single format is used today, following the specifications developed for Internet mail systems since the 1980s. This article uses the term email address to refer to the addr-spec defined in RFC 5322, not to the address that is commonly used; the difference is that an address may contain a display name, a comment, or both.

An email address such as John.Smith@example.com is made up of a local-part, an @ symbol, then a case-insensitive domain. Although the standard requires the local part to be case-sensitive, it also urges that receiving hosts deliver messages in a case-independent fashion, e.g., that the mail system at example.com treat John.Smith as equivalent to john.smith; some mail systems even treat them as equivalent to johnsmith. Mail systems often limit their users' choice of name to a subset of the technically valid characters, and in some cases also limit which addresses it is possible to send mail to.

With the introduction of internationalized domain names, efforts are progressing to permit non-ASCII characters in email addresses.

Discussed on

πŸ”— Gray Code

πŸ”— Computing πŸ”— Mathematics

The reflected binary code (RBC), also known just as reflected binary (RB) or Gray code after Frank Gray, is an ordering of the binary numeral system such that two successive values differ in only one bit (binary digit). The reflected binary code was originally designed to prevent spurious output from electromechanical switches. Today, Gray codes are widely used to facilitate error correction in digital communications such as digital terrestrial television and some cable TV systems.

Discussed on

πŸ”— FRACTRAN

πŸ”— Computing

FRACTRAN is a Turing-complete esoteric programming language invented by the mathematician John Conway. A FRACTRAN program is an ordered list of positive fractions together with an initial positive integer input n. The program is run by updating the integer n as follows:

  1. for the first fraction f in the list for which nf is an integer, replace n by nf
  2. repeat this rule until no fraction in the list produces an integer when multiplied by n, then halt.

Conway 1987 gives the following formula for primes in FRACTRAN:

( 17 91 , 78 85 , 19 51 , 23 38 , 29 33 , 77 29 , 95 23 , 77 19 , 1 17 , 11 13 , 13 11 , 15 2 , 1 7 , 55 1 ) {\displaystyle \left({\frac {17}{91}},{\frac {78}{85}},{\frac {19}{51}},{\frac {23}{38}},{\frac {29}{33}},{\frac {77}{29}},{\frac {95}{23}},{\frac {77}{19}},{\frac {1}{17}},{\frac {11}{13}},{\frac {13}{11}},{\frac {15}{2}},{\frac {1}{7}},{\frac {55}{1}}\right)}

Starting with n=2, this FRACTRAN program generates the following sequence of integers:

2, 15, 825, 725, 1925, 2275, 425, 390, 330, 290, 770, ... (sequence A007542 in the OEIS)

After 2, this sequence contains the following powers of 2:

2 2 = 4 , 2 3 = 8 , 2 5 = 32 , 2 7 = 128 , 2 11 = 2048 , 2 13 = 8192 , 2 17 = 131072 , 2 19 = 524288 , … {\displaystyle 2^{2}=4,\,2^{3}=8,\,2^{5}=32,\,2^{7}=128,\,2^{11}=2048,\,2^{13}=8192,\,2^{17}=131072,\,2^{19}=524288,\,\dots } (sequence A034785 in the OEIS)

which are the prime powers of 2.

Discussed on