Topic: Computing (Page 24)
You are looking at all articles with the topic "Computing". We found 481 matches.
Hint:
To view all topics, click here. Too see the most popular topics, click here instead.
π Wikipedia list of algorithms
The following is a list of algorithms along with one-line descriptions for each.
Discussed on
- "Wikipedia list of algorithms" | 2009-01-30 | 62 Upvotes 12 Comments
π Sixel: A terminal bitmap graphics format from the 80s
Sixel, short for "six pixels", is a bitmap graphics format supported by terminals and printers from DEC. It consists of a pattern six pixels high and one wide, resulting in 64 possible patterns. Each possible pattern is assigned an ASCII character, making the sixels easy to transmit on 7-bit serial links.
Sixel was first introduced as a way of sending bitmap graphics to DEC dot matrix printers like the LA50. After being put into "sixel mode" the following data was interpreted to directly control six of the pins in the nine-pin print head. A string of sixel characters encodes a single 6-pixel high row of the image.
The system was later re-used as a way to send bitmap data to the VT200 series and VT320 terminals when defining custom character sets. A series of sixels are used to transfer the bitmap for each character. This feature is known as soft character sets or dynamically redefinable character sets (DRCS). With the VT240, VT241, VT330, and VT340, the terminals could decode a complete sixel image to the screen, like those previously sent to printers.
Discussed on
- "Sixel: A terminal bitmap graphics format from the 80s" | 2023-03-13 | 54 Upvotes 20 Comments
π Kwangmyong, the North-Korea-Wide-Web
Kwangmyong (literally βBright Lightβ) is a North Korean "walled garden" national intranet service opened in 2000.
The network uses domain names under the .kp top level domain that are not accessible from the global Internet. As of 2016 the network uses IPv4 addresses reserved for private networks in the 10.0.0.0/8 range. North Koreans often find it more convenient to access sites by their IP address rather than by URL using Latin characters. Like the global Internet, the network hosts content accessible with web browsers, and provides an internal web search engine. It also provides email services and news groups.
Only foreigners and a small number of government officials/scholars/elites are allowed to use the global Internet in North Korea, making Kwangmyong the only computer network available to most North Korean citizens. It is a free service for public use.
Discussed on
- "Kwangmyong, the North-Korea-Wide-Web" | 2010-06-13 | 45 Upvotes 14 Comments
π Plan 9 from Bell Labs
Plan 9 from Bell Labs is a distributed operating system, originating in the Computing Science Research Center (CSRC) at Bell Labs in the mid-1980s, and building on UNIX concepts first developed there in the late 1960s. The final official release was in early 2015.
Under Plan 9, UNIX's everything is a file metaphor is extended via a pervasive network-centric filesystem, and graphical user interface is assumed as a basis for almost all functionality, though it retains a heavily text-centric ideology.
The name Plan 9 from Bell Labs is a reference to the Ed Wood 1959 cult science fiction Z-movie Plan 9 from Outer Space. The name of the project's mascot is "Glenda, the Plan 9 Bunny". The system continues to be used and developed by operating system researchers and hobbyists.
Discussed on
- "Plan9 β A Distributed Operating System" | 2020-04-26 | 35 Upvotes 17 Comments
- "Plan 9 from Bell Labs" | 2013-03-26 | 13 Upvotes 8 Comments
π Program Synthesis
In computer science, program synthesis is the task to construct a program that provably satisfies a given high-level formal specification. In contrast to program verification, the program is to be constructed rather than given; however, both fields make use of formal proof techniques, and both comprise approaches of different degrees of automation. In contrast to automatic programming techniques, specifications in program synthesis are usually non-algorithmic statements in an appropriate logical calculus.
The primary application of program synthesis is to relieve the programmer of the burden of writing correct, efficient code that satisfies a specification. However, program synthesis also has applications to superoptimization and inference of loop invariants.
Discussed on
- "Program Synthesis" | 2024-04-13 | 54 Upvotes 19 Comments
π LOLCODE
LOLCODE is an esoteric programming language inspired by lolspeak, the language expressed in examples of the lolcat Internet meme. The language was created in 2007 by Adam Lindsay, researcher at the Computing Department of Lancaster University.
The language is not clearly defined in terms of operator priorities and correct syntax, but several functioning interpreters and compilers exist. One interpretation of the language has been proven Turing-complete.
Discussed on
- "LOLCODE" | 2014-08-08 | 47 Upvotes 25 Comments
π Occam programming language
occam is a programming language which is concurrent and builds on the communicating sequential processes (CSP) process algebra, and shares many of its features. It is named after philosopher William of Ockham after whom Occam's razor is named.
occam is an imperative procedural language (such as Pascal). It was developed by David May and others at Inmos (trademark INMOS), advised by Tony Hoare, as the native programming language for their transputer microprocessors, but implementations for other platforms are available. The most widely known version is occam 2; its programming manual was written by Steven Ericsson-Zenith and others at Inmos.
Discussed on
- "Occam programming language" | 2020-02-05 | 56 Upvotes 15 Comments
π Rule of Three (Computer Programming)
Rule of three ("Three strikes and you refactor") is a code refactoring rule of thumb to decide when similar pieces of code should be refactored to avoid duplication. It states that two instances of similar code don't require refactoring, but when similar code is used three times, it should be extracted into a new procedure. The rule was popularised by Martin Fowler in Refactoring and attributed to Don Roberts.
Duplication is considered a bad practice in programming because it makes the code harder to maintain. When the rule encoded in a replicated piece of code changes, whoever maintains the code will have to change it in all places correctly.
However, choosing an appropriate design to avoid duplication might benefit from more examples to see patterns in. Attempting premature refactoring risks selecting a wrong abstraction, which can result in worse code as new requirements emerge and will eventually need to be refactored again.
The rule implies that the cost of maintenance certainly outweighs the cost of refactoring and potential bad design when there are three copies, and may or may not if there are only two copies.
Discussed on
- "Rule of Three" | 2023-08-30 | 19 Upvotes 22 Comments
- "Rule of Three (Computer Programming)" | 2020-02-02 | 20 Upvotes 10 Comments
π Host Protected Area
The host protected area (HPA) is an area of a hard drive or solid-state drive that is not normally visible to an operating system. It was first introduced in the ATA-4 standard CXV (T13) in 2001.
Discussed on
- "Host Protected Area" | 2019-08-06 | 56 Upvotes 14 Comments
π Delphi
Delphi is an event-driven programming language based on Object Pascal and an associated integrated development environment (IDE) for rapid application development of desktop, mobile, web, and console software, currently developed and maintained by Embarcadero Technologies.
Delphi's compilers generate native code for Microsoft Windows, macOS, iOS, Android and Linux (x64 only). Since 2016, there have been new releases of Delphi every six months, with new platforms being added approximately every second release.
Delphi includes a code editor, a visual designer, an integrated debugger, a source code control component, and support for third-party plugins. The code editor features Code Insight (code completion), Error Insight (real-time error-checking), and refactoring. The visual forms designer has traditionally used Visual Component Library (VCL) for native Windows development, but the FireMonkey (FMX) platform was later added for cross-platform development. Database support in Delphi is very strong. A Delphi project of a million lines of code can compile in a few seconds β one benchmark compiled 170,000 lines per second.
Delphi was originally developed by Borland as a rapid application development tool for Windows as the successor of Turbo Pascal. Delphi added full object-oriented programming to the existing language, and since then the language has grown to support generics and anonymous methods, and native Component Object Model (COM) support. In 2006, Borlandβs developer tools section was transferred from Borland to a wholly owned subsidiary known as CodeGear, which was sold to Embarcadero Technologies in 2008. In 2015, Embarcadero was purchased by Idera Software, but the Embarcadero mark was retained for the developer tools division.
Delphi and its C++ counterpart, C++Builder, are interoperable. They share many core components, notably the IDE, VCL, and much of the runtime library. In addition, they can be used jointly in a project. For example, C++Builder 6 and later can consume Delphi source code and C++ in one project, while packages compiled with C++Builder can be used from within Delphi. In 2007, the products were released jointly as RADΒ Studio, a shared host for Delphi and C++Builder, which can be purchased with either or both.
Discussed on
- "Delphi" | 2020-02-02 | 45 Upvotes 24 Comments