Topic: Computing (Page 28)
You are looking at all articles with the topic "Computing". We found 481 matches.
Hint:
To view all topics, click here. Too see the most popular topics, click here instead.
π Sorcerer's Apprentice Syndrome
Sorcerer's Apprentice Syndrome (SAS) is a network protocol flaw in the original versions of TFTP. It was named after Goethe's poem "Der Zauberlehrling" (popularized by the "Sorcerer's Apprentice" segment of the animated film Fantasia), because the details of its operation closely resemble the disaster that befalls the sorcerer's apprentice: the problem resulted in an ever-growing replication of every packet in the transfer.
The problem occurred because of a known failure mode of the internetwork which, through a mistake on the part of the TFTP protocol designers, was not taken into account when the protocol was designed; the failure mode interacted with several details of the mechanisms of TFTP to produce SAS.
Discussed on
- "Sorcerer's Apprentice Syndrome" | 2013-09-23 | 51 Upvotes 5 Comments
π TSV β Alternative to CSV
Tab-separated values (TSV) is a simple, text-based file format for storing tabular data. Records are separated by newlines, and values within a record are separated by tab characters. The TSV format is thus a delimiter-separated values format, similar to comma-separated values.
TSV is a simple file format that is widely supported, so it is often used in data exchange to move tabular data between different computer programs that support the format. For example, a TSV file might be used to transfer information from a database to a spreadsheet.
Discussed on
- "TSV β Alternative to CSV" | 2024-06-09 | 22 Upvotes 34 Comments
π CMS Pipelines
CMS Pipelines implements the pipeline concept under the VM/CMS operating system. The programs in a pipeline operate on a sequential stream of records. A program writes records that are read by the next program in the pipeline. Any program can be combined with any other because reading and writing is done through a device independent interface.
Discussed on
- "CMS Pipelines" | 2016-04-27 | 43 Upvotes 12 Comments
π Arachne: a self-contained graphical web browser for DOS and Linux
Arachne is a discontinued Internet suite containing a graphical web browser, email client, and dialer. Originally, Arachne was developed by Michal PolΓ‘k under his xChaos label, a name he later changed into Arachne Labs. It was written in C and compiled using Borland C++ 3.1. Arachne has since been released under the GPL as Arachne GPL.
Arachne primarily runs on DOS-based operating systems, but includes builds for Linux as well. The Linux version relies on SVGALib and therefore does not require a display server.
Discussed on
- "Arachne: a self-contained graphical web browser for DOS and Linux" | 2015-10-20 | 41 Upvotes 13 Comments
π CDC 6600
The CDC 6600 was the flagship of the 6000 series of mainframe computer systems manufactured by Control Data Corporation. Generally considered to be the first successful supercomputer, it outperformed the industry's prior recordholder, the IBM 7030 Stretch, by a factor of three. With performance of up to threeΒ megaFLOPS, the CDC 6600 was the world's fastest computer from 1964 to 1969, when it relinquished that status to its successor, the CDC 7600.
The first CDC 6600s were delivered in 1965 to Livermore and Los Alamos. They quickly became a must-have system in high-end scientific and mathematical computing, with systems being delivered to Courant Institute of Mathematical Sciences, CERN, the Lawrence Radiation Laboratory, and many others. At least 100 were delivered in total.
A CDC 6600 is on display at the Computer History Museum in Mountain View, California. The only running CDC 6000 series machine has been restored by Living Computers: Museum + Labs.
Discussed on
- "CDC 6600" | 2024-01-29 | 35 Upvotes 19 Comments
π IBM Common User Access
Common User Access (CUA) is a standard for user interfaces to operating systems and computer programs. It was developed by IBM and first published in 1987 as part of their Systems Application Architecture. Used originally in the MVS/ESA, VM/CMS, OS/400, OS/2 and Microsoft Windows operating systems, parts of the CUA standard are now implemented in programs for other operating systems, including variants of Unix. It is also used by Java AWT and Swing.
Discussed on
- "IBM Common User Access" | 2021-05-20 | 32 Upvotes 21 Comments
π Netpbm format
Netpbm is an open-source package of graphics programs and a programming library. It is used mainly in the Unix world, where one can find it included in all major open-source operating system distributions, but also works on Microsoft Windows, macOS, and other operating systems.
Discussed on
- "Netpbm format" | 2015-11-07 | 29 Upvotes 23 Comments
π Artificial Intelligence Act (EU Law)
The Artificial Intelligence Act (AI Act) is a European Union regulation concerning artificial intelligence (AI).
It establishes a common regulatory and legal framework for AI in the European Union (EU). Proposed by the European Commission on 21 April 2021, and then passed in the European Parliament on 13 March 2024, it was unanimously approved by the Council of the European Union on 21 May 2024. The Act creates a European Artificial Intelligence Board to promote national cooperation and ensure compliance with the regulation. Like the EU's General Data Protection Regulation, the Act can apply extraterritorially to providers from outside the EU, if they have users within the EU.
It covers all types of AI in a broad range of sectors; exceptions include AI systems used solely for military, national security, research and non-professional purposes. As a piece of product regulation, it would not confer rights on individuals, but would regulate the providers of AI systems and entities using AI in a professional context. The draft Act was revised following the rise in popularity of generative AI systems, such as ChatGPT, whose general-purpose capabilities did not fit the main framework. More restrictive regulations are planned for powerful generative AI systems with systemic impact.
The Act classifies AI applications by their risk of causing harm. There are four levels β unacceptable, high, limited, minimal β plus an additional category for general-purpose AI. Applications with unacceptable risks are banned. High-risk applications must comply with security, transparency and quality obligations and undergo conformity assessments. Limited-risk applications only have transparency obligations and those representing minimal risks are not regulated. For general-purpose AI, transparency requirements are imposed, with additional evaluations when there are high risks.
La Quadrature du Net (LQDN) stated that the adopted version of the AI Act would be ineffective, arguing that the role of self-regulation and exemptions in the act rendered it "largely incapable of standing in the way of the social, political and environmental damage linked to the proliferation of AI".
Discussed on
- "EU Passes the Artificial Intelligence Act" | 2024-05-29 | 23 Upvotes 17 Comments
π List of fictional computers
Computers have often been used as fictional objects in literature, movies and in other forms of media. Fictional computers tend to be considerably more sophisticated than anything yet devised in the real world.
This is a list of computers that have appeared in notable works of fiction. The work may be about the computer, or the computer may be an important element of the story. Only static computers are included. Robots and other fictional computers that are described as existing in a mobile or humanlike form are discussed in a separate list of fictional robots and androids.
Discussed on
- "List of fictional computers" | 2014-06-01 | 28 Upvotes 22 Comments
π Ousterhout's Dichotomy
Ousterhout's dichotomy is computer scientist John Ousterhout's categorization that high-level programming languages tend to fall into two groups, each with distinct properties and uses: system programming languages and scripting languages β compare programming in the large and programming in the small. This distinction underlies the design of his language Tcl.
System programming languages (or applications languages) usually have the following properties:
- They are typed statically
- They support creating complex data structures
- Programs in them are compiled into machine code
- Programs in them are meant to operate largely independently of other programs
System programming languages tend to be used for components and applications with large amounts of internal functionality such as operating systems, database servers, and Web browsers. These applications typically employ complex algorithms and data structures and require high performance. Prototypical examples of system programming languages include C and Modula-2.
By contrast, scripting languages (or glue languages) tend to have the following properties:
- They are typed dynamically
- They have little or no provision for complex data structures
- Programs in them (scripts) are interpreted
Scripting languages tend to be used for applications where most of the functionality comes from other programs (often implemented in system programming languages); the scripts are used to glue together other programs or add additional layers of functionality on top of existing programs. Ousterhout claims that scripts tend to be short and are often written by less sophisticated programmers, so execution efficiency is less important than simplicity and ease of interaction with other programs. Common applications for scripting include Web page generation, report generation, graphical user interfaces, and system administration. Prototypical examples of scripting languages include AppleScript, C shell, DOS batch files, and Tcl.
Discussed on
- "Ousterhout's Dichotomy" | 2024-11-10 | 12 Upvotes 2 Comments
- "Ousterhout's Dichotomy" | 2015-07-29 | 26 Upvotes 10 Comments