Topic: Computing (Page 44)
You are looking at all articles with the topic "Computing". We found 481 matches.
Hint:
To view all topics, click here. Too see the most popular topics, click here instead.
๐ Crash-Only Software
Crash-only software refers to computer programs that handle failures by simply restarting, without attempting any sophisticated recovery. Correctly written components of crash-only software can microreboot to a known-good state without the help of a user. Since failure-handling and normal startup use the same methods, this can increase the chance that bugs in failure-handling code will be noticed, except when there are leftover artifacts, such as data corruption from a severe failure, that don't occur during normal startup.
Crash-only software also has benefits for end-users. All too often, applications do not save their data and settings while running, only at the end of their use. For example, word processors usually save settings when they are closed. A crash-only application is designed to save all changed user settings soon after they are changed, so that the persistent state matches that of the running machine. No matter how an application terminates (be it a clean close or the sudden failure of a laptop battery), the state will persist.
Discussed on
- "Crash-Only Software" | 2021-02-08 | 10 Upvotes 4 Comments
๐ XKeyscore
XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst.
In July 2013, Edward Snowden publicly revealed the program's purpose and use by the NSA in The Sydney Morning Herald and O Globo newspapers. The code name was already public knowledge because it was mentioned in earlier articles, and, like many other code names, it appears in job postings and online rรฉsumรฉs of employees.
On July 3, 2014, German public broadcaster Norddeutscher Rundfunk, a member of ARD, published excerpts of XKeyscore's source code. A team of experts analyzed the source code.
๐ SQRL
SQRL (pronounced "squirrel") or Secure, Quick, Reliable Login (formerly Secure QR Login) is a draft open standard for secure website login and authentication. The software typically uses a link of the scheme sqrl:// or optionally a QR code, where a user identifies via a pseudonymous zero-knowledge proof rather than providing a user ID and password. This method is thought to be impervious to a brute force password attack or data breach. It shifts the burden of security away from the party requesting the authentication and closer to the operating system implementation of what is possible on the hardware, as well as to the user. SQRL was proposed by Steve Gibson of Gibson Research Corporation in October 2013 as a way to simplify the process of authentication without the risk of revelation of information about the transaction to a third party.
๐ Anisotropic Filtering
In 3D computer graphics, anisotropic filtering (abbreviated AF) is a method of enhancing the image quality of textures on surfaces of computer graphics that are at oblique viewing angles with respect to the camera where the projection of the texture (not the polygon or other primitive on which it is rendered) appears to be non-orthogonal (thus the origin of the word: "an" for not, "iso" for same, and "tropic" from tropism, relating to direction; anisotropic filtering does not filter the same in every direction).
Like bilinear and trilinear filtering, anisotropic filtering eliminates aliasing effects, but improves on these other techniques by reducing blur and preserving detail at extreme viewing angles.
Anisotropic filtering is relatively intensive (primarily memory bandwidth and to some degree computationally, though the standard spaceโtime tradeoff rules apply) and only became a standard feature of consumer-level graphics cards in the late 1990s. Anisotropic filtering is now common in modern graphics hardware (and video driver software) and is enabled either by users through driver settings or by graphics applications and video games through programming interfaces.
Discussed on
- "Anisotropic Filtering" | 2023-01-09 | 11 Upvotes 3 Comments
๐ Electrochemical RAM
Electrochemical Random-Access Memory (ECRAM) is a type of non-volatile memory (NVM) with multiple levels per cell (MLC) designed for deep learning analog acceleration. An ECRAM cell is a three-terminal device composed of a conductive channel, an insulating electrolyte, an ionic reservoir, and metal contacts. The resistance of the channel is modulated by ionic exchange at the interface between the channel and the electrolyte upon application of an electric field. The charge-transfer process allows both for state retention in the absence of applied power, and for programming of multiple distinct levels, both differentiating ECRAM operation from that of a field-effect transistor (FET). The write operation is deterministic and can result in symmetrical potentiation and depression, making ECRAM arrays attractive for acting as artificial synaptic weights in physical implementations of artificial neural networks (ANN). The technological challenges include open circuit potential (OCP) and semiconductor foundry compatibility associated with energy materials. Universities, government laboratories, and corporate research teams have contributed to the development of ECRAM for analog computing. Notably, Sandia National Laboratories designed a lithium-based cell inspired by solid-state battery materials, Stanford University built an organic proton-based cell, and International Business Machines (IBM) demonstrated in-memory selector-free parallel programming for a logistic regression task in an array of metal-oxide ECRAM designed for insertion in the back end of line (BEOL). In 2022, researchers at Massachusetts Institute of Technology built an inorganic, CMOS-compatible protonic technology that achieved near-ideal modulation characteristics using nanosecond fast pulses
๐ Pizza box form factor
In computing, a pizza box is a style of case design for desktop computers or network switches. Pizza box cases tend to be wide and flat, normally 1.5 to 4 inches or 4 to 10 centimetres in height, resembling pizza delivery boxes and thus the name. This is in contrast to a tower system, whose case height is much greater than the width and has an "upright" appearance. In modern usage, the term "pizza box" is normally reserved for very flat cases with height no more than 2 inches (51ย mm), while those taller than 2 inches are referred to as desktop cases instead.
The common setup of a pizza box system is to have the display monitor placed directly on top of the case, which serves as a podium to elevate the monitor more towards the user's eye level, and to have other peripherals placed in front and alongside the case. Occasionally, the pizza box may be laid on its sides in a tower-like orientation.
Data General's Aviion Unix server was the first to coin the expression when it advertised in 1991 with the tagline "Who just fit mainframe power in a pizza box?", but most computers generally referred to as pizza box systems were high-end desktop systems such as Sun Microsystems workstations sold in the 1990s, most notably the SPARCstationย 1 and SPARCstationย 5. Other notable examples have been among the highest-performing desktop computers of their generations, including the SGIย Indy, the NeXTstation, and the Amiga 1000, but the form factor was also seen in budget and lower-end lines such as the Macintosh LC family.
The original SPARCstationย 1 design included an expansion bus technology, SBus, expressly designed for the form factor; expansion cards were small, especially in comparison to other expansion cards in use at the time such as VMEbus, and were mounted horizontally instead of vertically. PC-compatible computers in this type of case typically use the PCI expansion bus and are usually either a)ย limited to one or two horizontally placed expansion cards or b)ย require special low-profile expansion cards, shorter than the PCIย cards regular PCs use.
The density of computing power and stackability of pizza box systems also made them attractive for use in data centers. Systems originally designed for desktop use were placed on shelves inside of 19-inch racks, sometimes requiring that part of their cases be cut off for them to fit. Since the late 1990s, pizza boxes have been a common form factor in office cubicles, data centers or industrial applications, where desktop space, rack room and density are critical. Servers in this form factor, as well as higher-end Ethernet switches, are now designed for rack mounting. Rack mount 1U computers come in all types of configurations and depths.
The pizza box form factor for smaller personal systems and thin clients remains in use well into the 21st century, though it is increasingly being superseded by laptops, nettops or All-in-One PC designs that embed the already size-reduced computer onto the keyboard or display monitor.
๐ Poltergeist Anti Pattern
In computer programming, a poltergeist (or gypsy wagon) is a short-lived, typically stateless object used to perform initialization or to invoke methods in another, more permanent class. It is considered an anti-pattern. The original definition is by Michael Akroyd 1996 - Object World West Conference:
- "As a gypsy wagon or a poltergeist appears and disappears mysteriously, so does this short lived object. As a consequence the code is more difficult to maintain and there is unnecessary resource waste. The typical cause for this anti-pattern is poor object design."
A poltergeist can often be identified by its name; they are often called "manager_", "controller_", "supervisor", "start_process", etc.
Sometimes, poltergeist classes are created because the programmer anticipated the need for a more complex architecture. For example, a poltergeist arises if the same method acts as both the client and invoker in a command pattern, and the programmer anticipates separating the two phases. However, this more complex architecture may actually never materialize.
Poltergeists should not be confused with long-lived, state-bearing objects of a pattern such as modelโviewโcontroller, or tier-separating patterns such as business-delegate.
To remove a poltergeist, delete the class and insert its functionality in the invoked class, possibly by inheritance or as a mixin.
Discussed on
- "Poltergeist Anti Pattern" | 2023-10-30 | 12 Upvotes 2 Comments
๐ Logo of the X Window System ca. 1990?
The X Window System (X11, or simply X) is a windowing system for bitmap displays, common on Unix-like operating systems.
X provides the basic framework for a GUI environment: drawing and moving windows on the display device and interacting with a mouse and keyboard. X does not mandate the user interfaceย โ this is handled by individual programs. As such, the visual styling of X-based environments varies greatly; different programs may present radically different interfaces.
X originated as part of Project Athena at Massachusetts Institute of Technology (MIT) in 1984. The X protocol has been at version 11 (hence "X11") since September 1987. The X.Org Foundation leads the X project, with the current reference implementation, X.Org Server, available as free and open-source software under the MIT License and similar permissive licenses.
Discussed on
- "Logo of the X Window System ca. 1990?" | 2023-07-24 | 12 Upvotes 2 Comments
๐ Extreme Programming
Extreme programming (XP) is a software development methodology intended to improve software quality and responsiveness to changing customer requirements. As a type of agile software development, it advocates frequent releases in short development cycles, intended to improve productivity and introduce checkpoints at which new customer requirements can be adopted.
Other elements of extreme programming include programming in pairs or doing extensive code review, unit testing of all code, not programming features until they are actually needed, a flat management structure, code simplicity and clarity, expecting changes in the customer's requirements as time passes and the problem is better understood, and frequent communication with the customer and among programmers. The methodology takes its name from the idea that the beneficial elements of traditional software engineering practices are taken to "extreme" levels. As an example, code reviews are considered a beneficial practice; taken to the extreme, code can be reviewed continuously (i.e. the practice of pair programming).
๐ .aq
.aq is the Internet country code top-level domain (ccTLD) for Antarctica (itself not a country). It is derived from the French Antarctique and is reserved for organizations that work in Antarctica or promote the Antarctic and Southern Ocean regions. It is administered by Peter Mott of Antarctica Network Information Centre Limited from Christchurch, New Zealand.
.aq domain names are available free of charge, and registration is granted for a period of 24 months. As a general rule, registrants are only allocated a single .aq domain name. The registry does not have a website. Registration is only possible by contacting Antarctica Network Information Centre Limited.
Discussed on
- ".aq" | 2024-05-16 | 12 Upvotes 2 Comments