"Social media bubble" redirects here. For the technology boom and bust phenomenon, see Social media stock bubble. The term filter bubble was coined by internet activist Eli Pariser, circa 2010. A filter bubble or ideological frame is a state of intellectual isolation[1] that can result from personalized searches, recommendation systems, and algorithmic curation. The search results are based on inf
Robotic process automation (RPA) is a form of business process automation that is based on software robots (bots) or artificial intelligence (AI) agents.[1] RPA should not be confused with artificial intelligence as it is based on automotive technology following a predefined workflow.[2] It is sometimes referred to as software robotics (not to be confused with robot software). In traditional workf
Christopher Arthur Lattner (born 1978) is an American computer scientist and creator of LLVM, the Clang compiler, the Swift programming language and the MLIR compiler infrastructure.[1] After his PhD in computer science, Lattner worked at Apple for 12 years, eventually leading the Developer Tools team. Between 2017 and 2022, Lattner worked in various positions for Tesla, Google[2] and SiFive.[3] H
Stephen C. Johnson, a computer scientist at Bell Labs, came up with the term "lint" in 1978 while debugging the yacc grammar he was writing for C and dealing with portability issues stemming from porting Unix to a 32-bit machine.[5][2] The term was borrowed from the word lint, the tiny bits of fiber and fluff shed by clothing, as the command he wrote would act like a lint trap in a clothes dryer,
Hypermedia as the engine of application state (HATEOAS) is a constraint of the REST software architectural style that distinguishes it from other network architectural styles. With HATEOAS, a client interacts with a network application whose application servers provide information dynamically through hypermedia. A REST client needs little to no prior knowledge about how to interact with an applica
"Low battery anxiety" redirects here. For the related fear associated with electric vehicles, see Range anxiety. This article needs more reliable medical references for verification or relies too heavily on primary sources. Please review the contents of the article and add the appropriate references if you can. Unsourced or poorly sourced material may be challenged and removed. Find sources: "Nomo
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Cel shading" – news · newspapers · books · scholar · JSTOR (March 2009) (Learn how and when to remove this message) A representation of a spacesuit from The Adventures of Tintin comic Explorers on the Mo
A simple sign of the KISS principle (excluding the last word) KISS, an acronym for "Keep it simple, stupid!", is a design principle first noted by the U.S. Navy in 1960.[1][2] First seen partly in American English by at least 1938, the KISS principle states that most systems work best if they are kept simple rather than made complicated; therefore, simplicity should be a key goal in design, and un
This article needs additional citations for verification. Relevant discussion may be found on the talk page. Please help improve this article by adding citations to reliable sources in this article. Unsourced material may be challenged and removed. Find sources: "Polygon mesh" – news · newspapers · books · scholar · JSTOR (June 2009) (Learn how and when to remove this message) Example of a low pol
5.5 Graphic representation of the flow of messages in the basic Paxos
Raft is a consensus algorithm designed as an alternative to the Paxos family of algorithms. It was meant to be more understandable than Paxos by means of separation of logic, but it is also formally proven safe and offers some additional features.[1] Raft offers a generic way to distribute a state machine across a cluster of computing systems, ensuring that each node in the cluster agrees upon the
This article includes a list of references, related reading, or external links, but its sources remain unclear because it lacks inline citations. Please help improve this article by introducing more precise citations. (March 2016) (Learn how and when to remove this message) In databases, change data capture (CDC) is a set of software design patterns used to determine and track the data that has ch
In computer science, message passing is a technique for invoking behavior (i.e., running a program) on a computer. The invoking program sends a message to a process (which may be an actor or object) and relies on that process and its supporting infrastructure to then select and run some appropriate code. Message passing differs from conventional programming where a process, subroutine, or function
A 2011 attack breaks preimage resistance for 57 out of 80 rounds of SHA-512, and 52 out of 64 rounds for SHA-256.[1] Pseudo-collision attack against up to 46 rounds of SHA-256.[2] SHA-256 and SHA-512 are prone to length extension attacks. By guessing the hidden part of the state, length extension attacks on SHA-224 and SHA-384 succeed with probability 2−(256−224) = 2−32 > 2−224 and 2−(512−384) = 2
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く