Topic Review
List of Numerical Analysis Software
Listed here are end-user computer applications intended for use with numerical or data analysis:
  • 1.5K
  • 17 Oct 2022
Topic Review
Clustal
Clustal is a series of widely used computer programs used in bioinformatics for multiple sequence alignment. There have been many versions of Clustal over the development of the algorithm that are listed below. The analysis of each tool and its algorithm are also detailed in their respective categories. Available operating systems listed in the sidebar are a combination of the software availability and may not be supported for every current version of the Clustal tools. Clustal Omega has the widest variety of operating systems out of all the Clustal tools.
  • 1.5K
  • 06 Oct 2022
Topic Review
Enterprise JavaBeans
Enterprise JavaBeans (EJB) is one of several Java APIs for modular construction of enterprise software. EJB is a server-side software component that encapsulates business logic of an application. An EJB web container provides a runtime environment for web related software components, including computer security, Java servlet lifecycle management, transaction processing, and other web services. The EJB specification is a subset of the Java EE specification.
  • 1.4K
  • 11 Nov 2022
Topic Review
Tracking Methods for Autonomous Driving
Tracking: identifying traffic participants, i.e., cars, pedestrians, and obstacles from sequences of images, sensor data, or observations. It is assumed that some preprocessing of sensor data and/or input images has already been done. Trajectory prediction: anticipating the future trajectories and motion of other vehicles in order to facilitate navigating through various traffic conditions.
  • 1.4K
  • 27 Mar 2021
Topic Review
Windows Defender
Microsoft Defender (known as Windows Defender before Windows 10 November 2019 Update or Windows Defender Antivirus in Windows 10 Creators Update and later) is an anti-malware component of Microsoft Windows. It was first released as a downloadable free anti-spyware program for Windows XP, and was later shipped with Windows Vista and Windows 7. It has evolved into a full antivirus program, replacing Microsoft Security Essentials as part of Windows 8 and later versions.
  • 1.4K
  • 22 Nov 2022
Topic Review
Proprietary Device Driver
A proprietary device driver is a closed-source device driver published only in binary code. In the context of free and open-source software, a closed-source device driver is referred to as a blob or binary blob. The term usually refers to a closed-source kernel module loaded into the kernel of an open-source operating system, and is sometimes also applied to code running outside the kernel, such as system firmware images, microcode updates, or userland programs. The term blob was first used in database management systems to describe a collection of binary data stored as a single entity. When computer hardware vendors provide complete technical documentation for their products, operating system developers are able to write hardware device drivers to be included in the operating system kernels. However, some vendors, such as Nvidia, do not provide complete documentation for some of their products and instead provide binary-only drivers. This practice is most common for accelerated graphics drivers, wireless networking devices, and hardware RAID controllers. Most notably, binary blobs are very uncommon for non-wireless network interface controllers, which can almost always be configured via standard utilities (like ifconfig) out of the box; Theo de Raadt of OpenBSD attributes this to the work done by a single FreeBSD developer.
  • 1.4K
  • 24 Oct 2022
Topic Review
Fourier Lightfield Microscope
Fourier lightfield microscopy (FLMic) is a technique aimed to capture and process 3D information of microscopic samples. Due to its optical design, FLMic has the inherent capacity of capturing a collection of orthographic perspectives of samples in a single shot. Consequently, FLMic is especially suited for capturing and processing 3D images of dynamic processes, being potentially addressed for real-time applications in both life and material sciences.
  • 1.4K
  • 10 Mar 2022
Topic Review
British Computer Society
BCS, The Chartered Institute for IT, formerly known as the British Computer Society until 2009, is a professional body and a learned society that represents those working in information technology (IT) and computer science, both in the United Kingdom and internationally. Founded in 1956, BCS has played an important role in educating and nurturing IT professionals, computer scientists, computer engineers, upholding the profession, accrediting chartered IT professional status, and creating a global community active in promoting and furthering the field and practice of computing.
  • 1.4K
  • 28 Oct 2022
Topic Review
UCSC Genome Browser
The UCSC Genome Browser is an on-line, and downloadable, genome browser hosted by the University of California, Santa Cruz (UCSC). It is an interactive website offering access to genome sequence data from a variety of vertebrate and invertebrate species and major model organisms, integrated with a large collection of aligned annotations. The Browser is a graphical viewer optimized to support fast interactive performance and is an open-source, web-based tool suite built on top of a MySQL database for rapid visualization, examination, and querying of the data at many levels. The Genome Browser Database, browsing tools, downloadable data files, and documentation can all be found on the UCSC Genome Bioinformatics website.
  • 1.4K
  • 09 Oct 2022
Topic Review
Free Software License
A free-software license is a notice that grants the recipient of a piece of software extensive rights to modify and redistribute that software. These actions are usually prohibited by copyright law, but the rights-holder (usually the author) of a piece of software can remove these restrictions by accompanying the software with a software license which grants the recipient these rights. Software using such a license is free software (or free and open-source software) as conferred by the copyright holder. Free-software licenses are applied to software in source code and also binary object-code form, as the copyright law recognizes both forms.
  • 1.4K
  • 21 Nov 2022
Topic Review
Twister
Twister is an experimental peer-to-peer microblogging program. It is decentralized, meaning that no one is able to shut it down as there is no single point to attack. The system uses end-to-end encryption to safeguard communications. It is based on both BitTorrent and Bitcoin-like protocols and has been likened to a distributed version of Twitter.
  • 1.4K
  • 13 Oct 2022
Topic Review
Rpm
RPM Package Manager (RPM) (originally Red Hat Package Manager; now a recursive acronym) is a package management system. The name RPM refers to the following: the .rpm file format, files in the .rpm file format, software packaged in such files, and the package manager program itself. RPM was intended primarily for Linux distributions; the file format is the baseline package format of the Linux Standard Base. Even though it was created for use in Red Hat Linux, RPM is now used in many Linux distributions. It has also been ported to some other operating systems, such as Novell NetWare (as of version 6.5 SP3), IBM's AIX (as of version 4), CentOS, Fedora (operating system) created jointly between Red Hat and the Fedora community, and Oracle Linux. All versions or variants of the these Linux operating systems use the RPM Package Manager. An RPM package can contain an arbitrary set of files. The larger part of RPM files encountered are “binary RPMs” (or BRPMs) containing the compiled version of some software. There are also “source RPMs” (or SRPMs) files containing the source code used to produce a package. These have an appropriate tag in the file header that distinguishes them from normal (B)RPMs, causing them to be extracted to /usr/src on installation. SRPMs customarily carry the file extension “.src.rpm” (.spm on file systems limited to 3 extension characters, e.g. old DOS FAT).
  • 1.4K
  • 28 Nov 2022
Topic Review
Zoom
Zoom Meetings (commonly shortened to Zoom, and stylized as zoom) is a proprietary videotelephony software program developed by Zoom Video Communications. The free plan allows up to 100 concurrent participants, with a 40-minute time restriction. Users have the option to upgrade by subscribing to a paid plan. The highest plan supports up to 1,000 concurrent participants for meetings lasting up to 30 hours. During the COVID-19 pandemic, there was a major increase in the use of Zoom for remote work, distance education, and online social relations. The increase led to Zoom being one of the most downloaded mobile app worldwide in 2020 with over 500 million downloads. In 2020 Zoom had over 300 million daily meeting participants.
  • 1.4K
  • 18 Oct 2022
Topic Review
Ethereum Classic
Ethereum Classic is an open source, blockchain-based distributed computing platform featuring smart contract (scripting) functionality. It supports a modified version of Nakamoto consensus via transaction-based state transitions executed on a public Ethereum Virtual Machine (EVM). Ethereum Classic maintains the original, unaltered history of the Ethereum network. The Ethereum project's mainnet initially released via Frontier on 30 July 2015. However, due to a hack of a third-party project, the Ethereum Foundation created a new version of the Ethereum mainnet on 20 July 2016 with an irregular state change implemented that erased The DAO theft from the Ethereum blockchain history. The Ethereum Foundation applied their trademark to the new, altered version of the Ethereum blockchain; Ethereum (code: ETH). The older, unaltered version of Ethereum was renamed and continued on as Ethereum Classic (code: ETC). Ethereum Classic's native Ether token is a cryptocurrency traded on digital currency exchanges under the currency code ETC. Ether is created as a reward to network nodes for a process known as "mining", which validates computations performed on Ethereum Classic's EVM. Implemented on 11 December 2017, the current ETC monetary policy seeks the same goals as bitcoin of being mechanical, algorithmic, and capped. ETC can be exchanged for network transaction fees or other assets, commodities, currencies, products, and services. Ethereum Classic provides a decentralized Turing-complete virtual machine, the Ethereum Virtual Machine (EVM), which can execute scripts using an international network of public nodes. The virtual machine's instruction set is Turing-complete in contrast to others like bitcoin script. Gas, an internal transaction pricing mechanism, is used to mitigate spam and allocate resources on the network.
  • 1.4K
  • 11 Oct 2022
Topic Review
List of Statistical Packages
Statistical software are specialized computer programs for analysis in statistics and econometrics.
  • 1.4K
  • 29 Sep 2022
Topic Review
Simplified BSD License
BSD licenses are a family of permissive free software licenses, imposing minimal restrictions on the use and distribution of covered software. This is in contrast to copyleft licenses, which have share-alike requirements. The original BSD license was used for its namesake, the Berkeley Software Distribution (BSD), a Unix-like operating system. The original version has since been revised, and its descendants are referred to as modified BSD licenses. BSD is both a license and a class of license (generally referred to as BSD-like). The modified BSD license (in wide use today) is very similar to the license originally used for the BSD version of Unix. The BSD license is a simple license that merely requires that all code retain the BSD license notice if redistributed in source code format, or reproduce the notice if redistributed in binary format. The BSD license (unlike some other licenses e.g. GPL) does not require that source code be distributed at all.
  • 1.3K
  • 25 Oct 2022
Topic Review
Snap
Snap is a software packaging and deployment system developed by Canonical for operating systems that use the Linux kernel and the systemd init system. The packages, called snaps, and the tool for using them, snapd, work across a range of Linux distributions and allow upstream software developers to distribute their applications directly to users. Snaps are self-contained applications running in a sandbox with mediated access to the host system. Snap was originally released for cloud applications but was later ported to also work for Internet of Things devices and desktop applications.
  • 1.3K
  • 21 Oct 2022
Topic Review
Shellshock (Software Bug)
Shellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock could enable an attacker to cause Bash to execute arbitrary commands and gain unauthorized access to many Internet-facing services, such as web servers, that use Bash to process requests. On 12 September 2014, Stéphane Chazelas informed Bash's maintainer Chet Ramey of his discovery of the original bug, which he called "Bashdoor". Working with security experts, Mr. Chazelas developed a patch (fix) for the issue, which by then had been assigned the vulnerability identifier CVE-2014-6271. The existence of the bug was announced to the public on 2014-09-24, when Bash updates with the fix were ready for distribution. The bug Chazelas discovered caused Bash to unintentionally execute commands when the commands are concatenated to the end of function definitions stored in the values of environment variables. Within days of its publication, a variety of related vulnerabilities were discovered (CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186 and CVE-2014-7187). Ramey addressed these with a series of further patches. Attackers exploited Shellshock within hours of the initial disclosure by creating botnets of compromised computers to perform distributed denial-of-service attacks and vulnerability scanning. Security companies recorded millions of attacks and probes related to the bug in the days following the disclosure. Because of the potential to compromise millions of unpatched systems, Shellshock was compared to the Heartbleed bug in its severity.
  • 1.3K
  • 18 Nov 2022
Topic Review
Comparison of Numerical Analysis Software
The following tables provide a comparison of numerical analysis software.
  • 1.3K
  • 03 Nov 2022
Topic Review
International Obfuscated C Code Contest
The International Obfuscated C Code Contest (abbreviated IOCCC) is a computer programming contest for the most creatively obfuscated C code. Held annually, it is described as "celebrating [C's] syntactical opaqueness". The winning code for the 27th contest, held in 2020, was released in July 2020. Previous contests were held in the years 1984–1996, 1998, 2000, 2001, 2004–2006, 2011–2015 and 2018–2020. Entries are evaluated anonymously by a panel of judges. The judging process is documented in the competition guidelines and consists of elimination rounds. By tradition, no information is given about the total number of entries for each competition. Winning entries are awarded with a category, such as "Worst Abuse of the C preprocessor" or "Most Erratic Behavior", and then announced on the official IOCCC website. The contest states that being announced on the IOCCC website is the reward for winning.
  • 1.3K
  • 25 Oct 2022
  • Page
  • of
  • 18
ScholarVision Creations