Topic: computing (Page 24)

You are looking at all articles with the topic "computing". We found 484 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— Wikipedia list of algorithms

πŸ”— Computing πŸ”— Statistics πŸ”— Computational Biology

The following is a list of algorithms along with one-line descriptions for each.

Discussed on

πŸ”— Sixel: A terminal bitmap graphics format from the 80s

πŸ”— Computing πŸ”— Computing/Software

Sixel, short for "six pixels", is a bitmap graphics format supported by terminals and printers from DEC. It consists of a pattern six pixels high and one wide, resulting in 64 possible patterns. Each possible pattern is assigned an ASCII character, making the sixels easy to transmit on 7-bit serial links.

Sixel was first introduced as a way of sending bitmap graphics to DEC dot matrix printers like the LA50. After being put into "sixel mode" the following data was interpreted to directly control six of the pins in the nine-pin print head. A string of sixel characters encodes a single 6-pixel high row of the image.

The system was later re-used as a way to send bitmap data to the VT200 series and VT320 terminals when defining custom character sets. A series of sixels are used to transfer the bitmap for each character. This feature is known as soft character sets or dynamically redefinable character sets (DRCS). With the VT240, VT241, VT330, and VT340, the terminals could decode a complete sixel image to the screen, like those previously sent to printers.

Discussed on

πŸ”— Kwangmyong, the North-Korea-Wide-Web

πŸ”— Mass surveillance πŸ”— Computing πŸ”— Korea πŸ”— Korea/North Korea

Kwangmyong (literally β€œBright Light”) is a North Korean "walled garden" national intranet service opened in 2000.

The network uses domain names under the .kp top level domain that are not accessible from the global Internet. As of 2016 the network uses IPv4 addresses reserved for private networks in the 10.0.0.0/8 range. North Koreans often find it more convenient to access sites by their IP address rather than by URL using Latin characters. Like the global Internet, the network hosts content accessible with web browsers, and provides an internal web search engine. It also provides email services and news groups.

Only foreigners and a small number of government officials/scholars/elites are allowed to use the global Internet in North Korea, making Kwangmyong the only computer network available to most North Korean citizens. It is a free service for public use.

Discussed on

πŸ”— Plan 9 from Bell Labs

πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Free and open-source software πŸ”— Plan 9

Plan 9 from Bell Labs is a distributed operating system, originating in the Computing Science Research Center (CSRC) at Bell Labs in the mid-1980s, and building on UNIX concepts first developed there in the late 1960s. The final official release was in early 2015.

Under Plan 9, UNIX's everything is a file metaphor is extended via a pervasive network-centric filesystem, and graphical user interface is assumed as a basis for almost all functionality, though it retains a heavily text-centric ideology.

The name Plan 9 from Bell Labs is a reference to the Ed Wood 1959 cult science fiction Z-movie Plan 9 from Outer Space. The name of the project's mascot is "Glenda, the Plan 9 Bunny". The system continues to be used and developed by operating system researchers and hobbyists.

Discussed on

πŸ”— .an, the TLD that ceased to exist

πŸ”— Computing πŸ”— Caribbean πŸ”— Caribbean/Aruba πŸ”— Caribbean/CuraΓ§ao πŸ”— Caribbean/Caribbean Netherlands

.an was the Internet country code top-level domain (ccTLD) for the former Netherlands Antilles. It was administered by the University of the Netherlands Antilles. The domain was phased out after the Netherlands Antilles were dissolved in 2010. As of November 2010 the .an domain remained live with over 800 domains registered under .an, including secondary levels. On 31 July 2015, use of the domain was discontinued.

Discussed on

πŸ”— Program Synthesis

πŸ”— Computing πŸ”— Computer science

In computer science, program synthesis is the task to construct a program that provably satisfies a given high-level formal specification. In contrast to program verification, the program is to be constructed rather than given; however, both fields make use of formal proof techniques, and both comprise approaches of different degrees of automation. In contrast to automatic programming techniques, specifications in program synthesis are usually non-algorithmic statements in an appropriate logical calculus.

The primary application of program synthesis is to relieve the programmer of the burden of writing correct, efficient code that satisfies a specification. However, program synthesis also has applications to superoptimization and inference of loop invariants.

Discussed on

πŸ”— LOLCODE

πŸ”— Computing πŸ”— Internet culture

LOLCODE is an esoteric programming language inspired by lolspeak, the language expressed in examples of the lolcat Internet meme. The language was created in 2007 by Adam Lindsay, researcher at the Computing Department of Lancaster University.

The language is not clearly defined in terms of operator priorities and correct syntax, but several functioning interpreters and compilers exist. One interpretation of the language has been proven Turing-complete.

Discussed on

πŸ”— Occam programming language

πŸ”— Computing πŸ”— Computing/Software πŸ”— Computing/Computer science

occam is a programming language which is concurrent and builds on the communicating sequential processes (CSP) process algebra, and shares many of its features. It is named after philosopher William of Ockham after whom Occam's razor is named.

occam is an imperative procedural language (such as Pascal). It was developed by David May and others at Inmos (trademark INMOS), advised by Tony Hoare, as the native programming language for their transputer microprocessors, but implementations for other platforms are available. The most widely known version is occam 2; its programming manual was written by Steven Ericsson-Zenith and others at Inmos.

Discussed on

πŸ”— Rule of Three (Computer Programming)

πŸ”— Computing πŸ”— Computing/Software

Rule of three ("Three strikes and you refactor") is a code refactoring rule of thumb to decide when similar pieces of code should be refactored to avoid duplication. It states that two instances of similar code don't require refactoring, but when similar code is used three times, it should be extracted into a new procedure. The rule was popularised by Martin Fowler in Refactoring and attributed to Don Roberts.

Duplication is considered a bad practice in programming because it makes the code harder to maintain. When the rule encoded in a replicated piece of code changes, whoever maintains the code will have to change it in all places correctly.

However, choosing an appropriate design to avoid duplication might benefit from more examples to see patterns in. Attempting premature refactoring risks selecting a wrong abstraction, which can result in worse code as new requirements emerge and will eventually need to be refactored again.

The rule implies that the cost of maintenance certainly outweighs the cost of refactoring and potential bad design when there are three copies, and may or may not if there are only two copies.

Discussed on

πŸ”— Host Protected Area

πŸ”— Computing πŸ”— Computer Security πŸ”— Computer Security/Computing

The host protected area (HPA) is an area of a hard drive or solid-state drive that is not normally visible to an operating system. It was first introduced in the ATA-4 standard CXV (T13) in 2001.

Discussed on