Topic: Computing (Page 24)

You are looking at all articles with the topic "Computing". We found 481 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— Wikipedia list of algorithms

πŸ”— Computing πŸ”— Statistics πŸ”— Computational Biology

The following is a list of algorithms along with one-line descriptions for each.

Discussed on

πŸ”— Sixel: A terminal bitmap graphics format from the 80s

πŸ”— Computing πŸ”— Computing/Software

Sixel, short for "six pixels", is a bitmap graphics format supported by terminals and printers from DEC. It consists of a pattern six pixels high and one wide, resulting in 64 possible patterns. Each possible pattern is assigned an ASCII character, making the sixels easy to transmit on 7-bit serial links.

Sixel was first introduced as a way of sending bitmap graphics to DEC dot matrix printers like the LA50. After being put into "sixel mode" the following data was interpreted to directly control six of the pins in the nine-pin print head. A string of sixel characters encodes a single 6-pixel high row of the image.

The system was later re-used as a way to send bitmap data to the VT200 series and VT320 terminals when defining custom character sets. A series of sixels are used to transfer the bitmap for each character. This feature is known as soft character sets or dynamically redefinable character sets (DRCS). With the VT240, VT241, VT330, and VT340, the terminals could decode a complete sixel image to the screen, like those previously sent to printers.

Discussed on

πŸ”— Kwangmyong, the North-Korea-Wide-Web

πŸ”— Mass surveillance πŸ”— Computing πŸ”— Korea πŸ”— Korea/North Korea

Kwangmyong (literally β€œBright Light”) is a North Korean "walled garden" national intranet service opened in 2000.

The network uses domain names under the .kp top level domain that are not accessible from the global Internet. As of 2016 the network uses IPv4 addresses reserved for private networks in the 10.0.0.0/8 range. North Koreans often find it more convenient to access sites by their IP address rather than by URL using Latin characters. Like the global Internet, the network hosts content accessible with web browsers, and provides an internal web search engine. It also provides email services and news groups.

Only foreigners and a small number of government officials/scholars/elites are allowed to use the global Internet in North Korea, making Kwangmyong the only computer network available to most North Korean citizens. It is a free service for public use.

Discussed on

πŸ”— Plan 9 from Bell Labs

πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Free and open-source software πŸ”— Plan 9

Plan 9 from Bell Labs is a distributed operating system, originating in the Computing Science Research Center (CSRC) at Bell Labs in the mid-1980s, and building on UNIX concepts first developed there in the late 1960s. The final official release was in early 2015.

Under Plan 9, UNIX's everything is a file metaphor is extended via a pervasive network-centric filesystem, and graphical user interface is assumed as a basis for almost all functionality, though it retains a heavily text-centric ideology.

The name Plan 9 from Bell Labs is a reference to the Ed Wood 1959 cult science fiction Z-movie Plan 9 from Outer Space. The name of the project's mascot is "Glenda, the Plan 9 Bunny". The system continues to be used and developed by operating system researchers and hobbyists.

Discussed on

πŸ”— Program Synthesis

πŸ”— Computing πŸ”— Computer science

In computer science, program synthesis is the task to construct a program that provably satisfies a given high-level formal specification. In contrast to program verification, the program is to be constructed rather than given; however, both fields make use of formal proof techniques, and both comprise approaches of different degrees of automation. In contrast to automatic programming techniques, specifications in program synthesis are usually non-algorithmic statements in an appropriate logical calculus.

The primary application of program synthesis is to relieve the programmer of the burden of writing correct, efficient code that satisfies a specification. However, program synthesis also has applications to superoptimization and inference of loop invariants.

Discussed on

πŸ”— LOLCODE

πŸ”— Computing πŸ”— Internet culture

LOLCODE is an esoteric programming language inspired by lolspeak, the language expressed in examples of the lolcat Internet meme. The language was created in 2007 by Adam Lindsay, researcher at the Computing Department of Lancaster University.

The language is not clearly defined in terms of operator priorities and correct syntax, but several functioning interpreters and compilers exist. One interpretation of the language has been proven Turing-complete.

Discussed on

πŸ”— Occam programming language

πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Computer science

occam is a programming language which is concurrent and builds on the communicating sequential processes (CSP) process algebra, and shares many of its features. It is named after philosopher William of Ockham after whom Occam's razor is named.

occam is an imperative procedural language (such as Pascal). It was developed by David May and others at Inmos (trademark INMOS), advised by Tony Hoare, as the native programming language for their transputer microprocessors, but implementations for other platforms are available. The most widely known version is occam 2; its programming manual was written by Steven Ericsson-Zenith and others at Inmos.

Discussed on

πŸ”— Rule of Three (Computer Programming)

πŸ”— Computing πŸ”— Computing/Software

Rule of three ("Three strikes and you refactor") is a code refactoring rule of thumb to decide when similar pieces of code should be refactored to avoid duplication. It states that two instances of similar code don't require refactoring, but when similar code is used three times, it should be extracted into a new procedure. The rule was popularised by Martin Fowler in Refactoring and attributed to Don Roberts.

Duplication is considered a bad practice in programming because it makes the code harder to maintain. When the rule encoded in a replicated piece of code changes, whoever maintains the code will have to change it in all places correctly.

However, choosing an appropriate design to avoid duplication might benefit from more examples to see patterns in. Attempting premature refactoring risks selecting a wrong abstraction, which can result in worse code as new requirements emerge and will eventually need to be refactored again.

The rule implies that the cost of maintenance certainly outweighs the cost of refactoring and potential bad design when there are three copies, and may or may not if there are only two copies.

Discussed on

πŸ”— Host Protected Area

πŸ”— Computing πŸ”— Computer Security πŸ”— Computer Security/Computing

The host protected area (HPA) is an area of a hard drive or solid-state drive that is not normally visible to an operating system. It was first introduced in the ATA-4 standard CXV (T13) in 2001.

Discussed on

πŸ”— Delphi

πŸ”— Computing πŸ”— Computing/Software

Delphi is an event-driven programming language based on Object Pascal and an associated integrated development environment (IDE) for rapid application development of desktop, mobile, web, and console software, currently developed and maintained by Embarcadero Technologies.

Delphi's compilers generate native code for Microsoft Windows, macOS, iOS, Android and Linux (x64 only). Since 2016, there have been new releases of Delphi every six months, with new platforms being added approximately every second release.

Delphi includes a code editor, a visual designer, an integrated debugger, a source code control component, and support for third-party plugins. The code editor features Code Insight (code completion), Error Insight (real-time error-checking), and refactoring. The visual forms designer has traditionally used Visual Component Library (VCL) for native Windows development, but the FireMonkey (FMX) platform was later added for cross-platform development. Database support in Delphi is very strong. A Delphi project of a million lines of code can compile in a few seconds – one benchmark compiled 170,000 lines per second.

Delphi was originally developed by Borland as a rapid application development tool for Windows as the successor of Turbo Pascal. Delphi added full object-oriented programming to the existing language, and since then the language has grown to support generics and anonymous methods, and native Component Object Model (COM) support. In 2006, Borland’s developer tools section was transferred from Borland to a wholly owned subsidiary known as CodeGear, which was sold to Embarcadero Technologies in 2008. In 2015, Embarcadero was purchased by Idera Software, but the Embarcadero mark was retained for the developer tools division.

Delphi and its C++ counterpart, C++Builder, are interoperable. They share many core components, notably the IDE, VCL, and much of the runtime library. In addition, they can be used jointly in a project. For example, C++Builder 6 and later can consume Delphi source code and C++ in one project, while packages compiled with C++Builder can be used from within Delphi. In 2007, the products were released jointly as RADΒ Studio, a shared host for Delphi and C++Builder, which can be purchased with either or both.

Discussed on