Topic: Computing/Software (Page 7)
You are looking at all articles with the topic "Computing/Software". We found 156 matches.
Hint:
To view all topics, click here. Too see the most popular topics, click here instead.
π Post-quantum cryptography: just in case
Post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. As of 2019, this is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently strong quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several workshops on Quantum Safe Cryptography hosted by the European Telecommunications Standards Institute (ETSI) and the Institute for Quantum Computing.
In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See section on symmetric-key approach below.
Discussed on
- "Post-quantum cryptography" | 2018-11-12 | 20 Upvotes 14 Comments
- "Post-quantum cryptography" | 2015-08-22 | 50 Upvotes 21 Comments
π Expect β automates programs that expose a text terminal interface
Expect is an extension to the TCL scripting language written by Don Libes. The program automates interactions with programs that expose a text terminal interface. Expect, originally written in 1990 for the Unix platform, has since become available for Microsoft Windows and other systems.
Discussed on
- "Expect β automates programs that expose a text terminal interface" | 2013-03-25 | 69 Upvotes 31 Comments
π GObject
The GLib Object System, or GObject, is a free software library providing a portable object system and transparent cross-language interoperability. GObject is designed for use both directly in C programs to provide object-oriented C-based APIs and through bindings to other languages to provide transparent cross-language interoperability, e.g. PyGObject.
Discussed on
- "GObject" | 2017-09-02 | 58 Upvotes 42 Comments
π Phantom OS, a Russian OS where βeverything is an objectβ
Phantom OS is an operating system mostly made by Russian programmers. Phantom OS is based on a concept of persistent virtual memory, and is managed-code oriented. Phantom OS is one of a few OSes that are not based on classical concepts of Unix-like systems. Its primary goal is to achieve simplicity and effectiveness in both the operating system and applications at the same time.
Phantom is based on the principle that "Everything is an object", in contrast to the Unix-like approach of "Everything is a file".
Discussed on
- "Phantom OS, a Russian OS where βeverything is an objectβ" | 2019-04-16 | 72 Upvotes 23 Comments
π Sabre (computer system)
Sabre Global Distribution System, owned by Sabre Corporation, is used by travel agents and companies around the world to search, price, book, and ticket travel services provided by airlines, hotels, car rental companies, rail providers and tour operators. Sabre aggregates airlines, hotels, online and offline travel agents and travel buyers.
Discussed on
- "Sabre (computer system)" | 2018-07-30 | 65 Upvotes 30 Comments
π Node.js wikipedia entry marked for deletion for not being notable
Node.js is an open-source, cross-platform, JavaScript runtime environment that executes JavaScript code outside of a web browser. Node.js lets developers use JavaScript to write command line tools and for server-side scriptingβrunning scripts server-side to produce dynamic web page content before the page is sent to the user's web browser. Consequently, Node.js represents a "JavaScript everywhere" paradigm, unifying web-application development around a single programming language, rather than different languages for server- and client-side scripts.
Though .js
is the standard filename extension for JavaScript code, the name "Node.js" doesn't refer to a particular file in this context and is merely the name of the product. Node.js has an event-driven architecture capable of asynchronous I/O. These design choices aim to optimize throughput and scalability in web applications with many input/output operations, as well as for real-time Web applications (e.g., real-time communication programs and browser games).
The Node.js distributed development project was previously governed by the Node.js Foundation, and has now merged with the JS Foundation to form the OpenJS Foundation, which is facilitated by the Linux Foundation's Collaborative Projects program.
Corporate users of Node.js software include GoDaddy, Groupon, IBM, LinkedIn, Microsoft, Netflix, PayPal, Rakuten, SAP, Voxer, Walmart, and Yahoo!.
Discussed on
- "Node.js wikipedia entry marked for deletion for not being notable" | 2011-04-12 | 67 Upvotes 27 Comments
π Evercookie
Evercookie is a JavaScript-based application created by Samy Kamkar that produces zombie cookies in a web browser that are intentionally difficult to delete. In 2013, a top-secret NSA document was leaked by Edward Snowden, citing Evercookie as a method of tracking Tor users.
Discussed on
- "Evercookie" | 2011-04-05 | 75 Upvotes 17 Comments
π Hacker Koan
The Jargon File is a glossary and usage dictionary of slang used by computer programmers. The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET AI/LISP/PDP-10 communities, including Bolt, Beranek and Newman, Carnegie Mellon University, and Worcester Polytechnic Institute. It was published in paperback form in 1983 as The Hacker's Dictionary (edited by Guy Steele), revised in 1991 as The New Hacker's Dictionary (ed. Eric S. Raymond; third edition published 1996).
The concept of the file began with the Tech Model Railroad Club (TMRC) that came out of early PDP-1 and TX-0 hackers in the 1950s, where the term hacker emerged and the ethic, philosophies and some of the nomenclature emerged.
Discussed on
- "Hacker Koan" | 2014-03-23 | 15 Upvotes 15 Comments
- "Hacker Koan" | 2010-07-31 | 50 Upvotes 7 Comments
π Fabrice Bellard
Fabrice Bellard (French pronunciation:Β β[fa.bΚis bΙ.laΚ]) is a computer programmer who created the FFmpeg and QEMU software projects. He has also developed a number of other programs, including the Tiny C Compiler.
Discussed on
- "Fabrice Bellard" | 2010-09-12 | 73 Upvotes 13 Comments
π Norton Commander
Norton Commander (NC) is a discontinued prototypical orthodox file manager (OFM), written by John Socha and released by Peter Norton Computing (later acquired in 1990 by the Symantec corporation). NC provides a text-based user interface for managing files on top of MS-DOS. It was officially produced between 1986 and 1998. The last MS-DOS version of Norton Commander, 5.51, was released on July 1, 1998.
A related product, Norton Desktop, a graphical shell for MS-DOS and Windows, succeeded Norton Commander. It came in two variants, Norton Desktop for DOS and Norton Desktop for Windows.
Discussed on
- "Norton Commander" | 2020-05-22 | 35 Upvotes 51 Comments