background preloader

Parallel Programming & Parallel Computing Information and Resources

How to Hunt Elephants MATHEMATICIANS hunt elephants by going to Africa, throwing out everything that is not an elephant, and catching one of whatever is left. EXPERIENCED MATHEMATICIANS will attempt to prove the existence of at least one unique elephant before proceeding to step 1 as a subordinate exercise. PROFESSORS OF MATHEMATICS will prove the existence of at least one unique elephant and then leave the detection and capture of an actual elephant as an exercise for their graduate students. COMPUTER SCIENTISTS hunt elephants by exercising Algorithm A: Go to Africa. Start at the Cape of Good hope. EXPERIENCED COMPUTER PROGRAMMERS modify Algorithm A by placing a known elephant in Cairo to ensure that the algorithm will terminate. ASSEMBLY LANGUAGE PROGRAMMERS prefer to execute Algorithm A on their hands and knees. DATABASE ADMINISTRATORS do not need to go out and capture elephants when they can retrieve them simply with an ad hoc query: STATISTICIANS hunt the first animal they see N times and call it an elephant.

Spacewalk - the blue sky below us Blue BathSTS-116 Mission Specialists Robert L. Curbeam, Jr. (left) and Christer Fuglesang participate in the first of the mission’s three planned sessions of extravehicular activity as construction resumes on the International Space Station. Breathtaking views of Spacewalks with our blue planet below. Facts: Extra-vehicular activity (EVA) is work done by an astronaut away from the Earth, and outside of a spacecraft. Hint: Use “J” and “K” keys to navigate from picture to picture. Hello! Space, Horizon, Endeavour Backdropped by the blackness of space and Earth’s horizon, Space Shuttle Endeavour, docked to the Pressurized Mating Adapter on the International Space Station, is featured in this photograph taken during the mission’s first planned spacewalk. Blue Aurora Borealis Spacewalks – Blue Sky: credit: Unkown Our Blue PlanetSpacewalks – Blue Sky: credit: NASA Astronauts Steve Bowen and Al Drew working outside the ISSIt’s a hard job, but somebody has to do it! Astronaut Robert L.

NIST Expands Database of Common Coding Errors to Detect Software Bugs - Security The National Institute of Standards and Technology expanded its database of software flaws to help developers avoid introducing bugs into their code right from the start. The Software Assurance Metrics and Tool Evaluation (SAMATE) Reference Dataset contains examples of software issues that could leave applications vulnerable to attackers. Version 4.0 of SAMATE, released Nov. 22, contains 175 broad categories of weaknesses with over 60,000 specific cases, more than doubling the number of categories that were included in the previous release. SAMATE was launched in 2004 to improve software assurance by making it easier to identify and exclude known issues.

The Worlds of David Darling Hacking the Xbox Best of VIM Tips, gVIM's Key Features zzapper Tips Home Vim Tips Blog (NEW) Cygwin VimTools Buy Vim Book Support VIM Submit to Social Websites Operating Systems Tech Support: "May I ask what operating system you are running today?"Customer: "A computer." A girl walked into the computer center where I work. She said she was having problems with her Mac. Tech Support: "What operating system are you running? After conferring with her husband, it turned out she owned a Macintosh with System 8.1. Tech Support: "What version of Windows are you running?" A kid in my class joined a conversation I was having about older computers. Him: "I have the oldest Windows ever at my house. Tech Support: "What operating system do you run?" Tech Support: "Do you know what operating system you're on?" Customer: "I don't use DOS. One time I had to walk a Windows 95 user through a particular procedure. Me: "First you need to open DOS-prompt. My Friend: "I just installed Windows 98." My Friend: "What's your operating system?" Friend: "I heard about this thing called 'Linux'." Friend: "Does Windows 98 support Linux?" Customer: "Do you sell Mac OS X for Windows?" I went pale.

The Fabric of the Cosmos with Brian Greene: Watch the Complete NOVA Series Online Forget about inclined planes and pulleys. In this series from the PBS program NOVA, physics is presented as an exotic, mind-bending realm. The Fabric of the Cosmos, first broadcast in November, follows up on the 2003 Peabody Award-winning The Elegant Universe. Both series are adapted from the best-selling books of host Brian Greene, a mathematician and physicist at Columbia University. Like the earlier series, which was centered around String Theory, The Fabric of the Cosmos deals with ideas that are on the cutting edge of scientific theory. “This is a report from the frontier of cosmic thought,” wrote Dennis Overbye last November in The New York Times, “as fresh as last month’s Nobel Prizes, uncompromising in its intellectual ambitions and discerning in its choice of compelling scientific issues. The series is arranged in four parts of approximately 50 minutes each.

Bleeding At the Keyboard---character study It's hard to think of actors William Shatner and Patrick Stewart as anything other than captains of the starship Enterprise. On the Enterprise we know exactly what they're likely to say and do. Even when they're not in Star Trek movies we keep expecting them to talk about engaging their warp drive, setting their phasers on stun, firing their photon torpedoes, and worrying about the Klingons or the Borg. As actors, they are thoroughly typecast in those roles. Similarly, all Java entities are typed. Type double variables can hold a decimal number in the range from about minus 10308 to plus 10308. Besides being able to hold a certain set of decimal values, double variables also have a set of operators to apply to those values: addition (+), subtraction (-), multiplication (*), and division (/). Type int variables can hold a whole number but only within the range from about minus two billion to about plus two billion. Type boolean variables can hold only one of two values: true or false.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2.

Sony Nextep Computer Concept for 2020 by Hiromi Kiriki In 2020 We Can Wear Sony Computers On Our Wrist Our present need for internet connectivity is so profound that secondary devices like the Nextep Computer are bound to happen. Developed to be worn as a bracelet, this computer concept is constructed out of a flexible OLED touchscreen. Earmarked for the year 2020, features like a holographic projector (for screen), pull-out extra keyboard panels and social networking compatibility, make the concept plausible. Ten years from now is not too far away, so how many of you think we’d be buying such gadgets? How Secure Is My Password?

Related: