Floating point | Computer arithmetic

IEEE 854-1987

The IEEE Standard for Radix-Independent Floating-Point Arithmetic (IEEE 854), was the first Institute of Electrical and Electronics Engineers (IEEE) international standard for floating-point arithmetic with radices other than 2, including radix 10. IEEE 854 did not specify any data formats, whereas IEEE 754-1985 did specify formats for binary (radix 2) floating point. IEEE 754-1985 and IEEE 854-1987 were both superseded in 2008 by IEEE 754-2008, which specifies floating-point arithmetic for both radix 2 (binary) and radix 10 (decimal), and specifies two alternative formats for radix 10 floating-point values, and even more so with IEEE 754-2019. IEEE 754-2008 also had many other updates to the IEEE floating-point standardisation. IEEE 854 arithmetic was first commercially implemented in the HP-71B handheld computer, which used decimal floating point with 12 digits of significand, and an exponent range of ±499, with a 15 digit significand used for intermediate results. (Wikipedia).

Video thumbnail

EEVblog #1194 - 1985 Electronics

Dave uncovered the first edition of Australian Electronics Monthly magazine from July 1985, by Roger Harrison, and featuring a classic David Tilbrook MOSFET amplifier design, vintage computer, vintage analog scopes and more. Forum: http://www.eevblog.com/forum/blog/eevblog-1194-1985-elec

From playlist Vintage Computers

Video thumbnail

14. SSL and HTTPS

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich discusses how to cryptographically protect network communications, as well as how to integrate cryptographic protection

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

212336448592654

From playlist everything

Video thumbnail

12. Network Security

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich discusses network security, and how TCP/IP has evolved. License: Creative Commons BY-NC-SA More information at http://o

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

13. Network Protocols

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich discusses the Kerberos authentication service. License: Creative Commons BY-NC-SA More information at http://ocw.mit.ed

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

17. User Authentication

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens discusses authentication schemes and their implementations. License: Creative Commons BY-NC-SA More information at http://ocw.

From playlist MIT 6.858 Computer Systems Security, Fall 2014

Video thumbnail

RI Seminar: Yann LeCun : The Next Frontier in AI: Unsupervised Learning

Yann LeCun Director of AI Research at Facebook, Professor of Computer Science, New York University November 18, 2016 Abstract The rapid progress of AI in the last few years are largely the result of advances in deep learning and neural nets, combined with the availability of large datase

From playlist AI talks

Video thumbnail

Why There Is No Alternative to Publicly Funded Science Research | Avideh Zakhor | Big Think

Why There Is No Alternative to Publicly Funded Science Research Watch the newest video from Big Think: https://bigth.ink/NewVideo Join Big Think Edge for exclusive videos: https://bigth.ink/Edge ---------------------------------------------------------------------------------- For our f

From playlist Best Videos | Big Think

Video thumbnail

CSDM - Noga Alon - October 13, 2015

http://www.math.ias.edu/calendar/event/83634/1444746600/1444753800

From playlist Computer Science/Discrete Mathematics

Video thumbnail

[Rust Programming] Advent of Code Episode 27 - 2015 Day 22 [4/4] - Both Solutions

Day 22 took a bit longer than the average, so this is split up into 4 sections. This is the final one! Once I was able to model (and debug) the input properly, the solutions to both parts was straightforward #aoc #adventofcode #rust #rustlang #aoc2015

From playlist Advent of Code

Video thumbnail

MrExcel's Learn Excel #854 - VLOOKUP Below

Can the VLOOKUP return a value one row below the matched value? Episode 854 shows you how to achieve this result using two other functions. This blog is the video podcast companion to the book, Learn Excel 97-2007 from MrExcel. Download a new two minute video every workday to learn one of

From playlist VLOOKUP

Video thumbnail

MySQL Database with Python Tutorial Part 3 - UPDATE, DELETE, AND SELECT

Python + MySQL in playlist: http://www.youtube.com/watch?v=lhU2OZCKXhQ&feature=share&list=PLQVvvaa0QuDfhTF3Zfyzc_yD-Mq9iTp4G&index=26 Here, you are shown how to update, delete, and select data from a database. The UPDATE command allows you to modify pre-existing data. This can be useful i

From playlist MySQL with Python and MySQLdb

Video thumbnail

Lec 6 | MIT RES.6-008 Digital Signal Processing, 1975

Lecture 6: The inverse z-transform Instructor: Alan V. Oppenheim View the complete course: http://ocw.mit.edu/RES.6-008 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT RES.6-008 Digital Signal Processing, 1975

Video thumbnail

GRCon20 - Security Analysis of Zigbee Networks with Zigator and GNU Radio

Presented by Dimitrios-Georgios Akestoridis, Madhumitha Harishankar, Michael Weber and Patrick Tague at GNU Radio Conference 2020 https://gnuradio.org/grcon20 Zigbee is a wireless communication protocol that is based on the IEEE 802.15.4 standard and is commonly used in smart homes. Numer

From playlist GRCon 2020

Video thumbnail

25c3: FAIFA: A first open source PLC tool

Speakers: Florian, Xavier Carcelle PowerLineCommunications has now their open source tool PLC (PowerLineCommunications) had been widely used currently for the in-home LANs and for Internet access over PowerLineCommunications based on the market standard called HomePlug. Electricity is a

From playlist 25C3: Nothing to hide

Video thumbnail

Wireless Network Security: Part 2

Fundamental concepts of IEEE 802.11 WLAN are discussed. IEEE 802.11i WLAN security is Reviewed. WAP is presented. Wireless transport layer security is analyzed. IEEE 802.11 Wireless LAN Overview Legacy 802.11 Security: WEP IEEE 802.11i Wireless LAN Security: WPA, WPA2 Wireless Application

From playlist Network Security

Video thumbnail

Lec 7 | MIT RES.6-008 Digital Signal Processing, 1975

Lecture 7: z-Transform properties Instructor: Alan V. Oppenheim View the complete course: http://ocw.mit.edu/RES6-008S11 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT RES.6-008 Digital Signal Processing, 1975

Related pages

Radix | Decimal | IEEE 754-2008 | IEEE 754-2019 | Floating-point arithmetic