Advertisement

Ads

Monday, August 12, 2019

Data Types in C Programming Language

In the C programming, data types specify an extensive system used for declaring variables or functions of different types. The C data type of a variables determines how much space it occupies in memory and how the bit pattern stored in memory will be understand by processor.
Various arithmetic datatypes and functional datatypes available in C programming language are enlist below


Data Types in C and Description


datatypes in c language



Basic data types Of C language:

integer type
This type is used to define integer numbers. It is denoted as "int" in the C programs in this c programming tutorial
{
int number;
number = 5;
}
Floating-point types.
This type is used to define decimal numbers. It will be denoted as "float" in the c language
{
float Miles;
Miles = 5.6;
}
Boolean type
The Boolean type is used to define a variable that consists of only two values true or false
{
bool b = getc(stdin) == 't' ? true : false;
}

double - data type
Double in c language is used to define BIG decimal point numbers. The memory reserved for this datatype is twice as compared to int datatype. Likely to be 8 bytes.
{
double Atoms;
Atoms = 2500000;
}

char - data type
char data type defines characters in a c program.

{
char alphabet;
alphabet = 'x';
}
Enumerated types in C language:
They are also arithmetic types and they are used to define variables that can only be assigned certain discrete integer values throughout the c program.
The type void:
The type specified void returns no value, meaning no value is available. It is used mainly in functions which returning null or no value.

Derived types in C programming:
They include (a) Pointer types, (b) Array types, (c) Structure types, (d) Union types and (e) Function types. Which will be detailed in the next chapters

Characteristics and Features C Programming Language

Features of C programming Language

Features of C Programming Language


1. Modularity.
2. Portability.
3. Extendability.
4. Speed.
5. Flexibility.
6. Compactness.
7. Case Sensitive

Modularity: Ability to breakdown a large module into manageable sub modules called as modularity, that is an important feature of structured programming languages.
Advantages:
1. Projects can be completed in time.
2. Debugging will be easier and faster.

Portability: The ability to port i.e. to install the software in different platform is called portability.
Highest degree of portability:

‘C’ language offers highest degree of portability i.e., percentage of changes to be made to the sources code are at minimum when the software is to be loaded in another platform. Percentage of changes to the source code is minimum. The software that is 100% portable is also called as platform independent software or architecture neutral software. Eg: Java.

Extendability: Ability to extend the existing software by adding new features is called as extendability.

SPEED: ‘C’ is also called as middle level language because programs written in ‘c’ language run at the speeds matching to that of the same programs written in assembly language so ‘c’ language has both the merits of high level and middle level language and because if this feature it is mainly used in developing system software.

Flexibility: Key words or reverse words
ANSIC has 32 reverse words
‘C’ language has right number of reverse words which allows the programmers to have complete control on the language.
‘C’ is also called as programmer’s language since it allows programmers to induce creativeness into the programmers.

ComPactness: C language is Containing only Handful reserve words which help to increase the functionality factor of language depends on the of precise reserve word not on the usage of more reserve words. so compactnes feature refer to the precise use of reserve words in C Language.

Case Sensitive: C / C++ Language is a case ssetive Language. That is can differentiate the charcter is either upper case or lower case. All types of words either reserve words or user defined words are case sensitive.   

History of C Programming Language

The C programming language was devised in the early 1970s by Dennis M. Ritchiean employee from Bell Labs (AT&T).
founder of c programming language- dennis ritchie

In the 1960s Ritchie worked, with several other employees of Bell Labs (AT&T), on a project called Multics. The goal of the project was to develop an operating system for a large computer that could be used by a thousand users. In 1969 AT&T (Bell Labs) withdrew from the project, because the project could not produce an economically useful system. So the employees of Bell Labs (AT&T) had to search for another project to work on (mainly Dennis M. Ritchie and Ken Thompson).
Besides assembler and Fortran, UNIX also had an interpreter for the programming language B. ( The B language is derived directly from Martin Richards BCPL). The language B was developed in 1969-70 by Ken Thompson. In the early days computer code was written in assembly code. To perform a specific task, you had to write many pages of code. A high-level language like B made it possible to write the same task in just a few lines of code. The language B was used for further development of the UNIX system. Because of the high-level of the B language, code could be produced much faster, then in assembly.
History of c programming language

drawback of the B language was that it did not know data-types. (Everything was expressed in machine words). Another functionality that the B language did not provide was the use of “structures”. The lag of these things formed the reason for Dennis M. Ritchie to develop the programming language C. So in 1971-73 Dennis M. Ritchie turned the B language into the C language, keeping most of the language B syntax while adding data-types and many other changes. The C language had a powerful mix of high-level functionality and the detailed features required to program an operating system. Therefore many of the UNIX components were eventually rewritten in C (the Unix kernel itself was rewritten in 1973 on a DEC PDP-11).
For years the book “The C Programming Language, 1st edition” was the standard on the language C. In 1983 a committee was formed by the American National Standards Institute (ANSI)
to develop a modern definition for the programming language C (ANSI X3J11). In 1988 they delivered the final standard definition ANSI C. (The standard was based on the book from K&R 1st ed.).

The standard ANSI C made little changes on the original design of the C language. (They had to make sure that old programs still worked with the new standard). Later on, the ANSI C standard was adopted by the International Standards Organization (ISO). The correct term should there fore be ISO C, but everybody still calls it ANSI C.

Learn Progrmming in C Language

C is a computer programming language. That means that you can use C to create lists of instructions for a computer to follow. C is one of thousands of programming languages currently in use. C has been around for several decades and has won widespread acceptance because it gives programmers maximum control and efficiency. C is an easy language to learn. It is a bit more cryptic in its style than some other languages, but you get beyond that fairly quickly.
c programming language tutorial
C is what is called a compiled language. This means that once you write your C program, you must run it through a C compilerto turn your program into anexecutable that the computer can run (execute). The C program is the human-readable form, while the executable that comes out of the compiler is the machine-readable and executable form. What this means is that to write and run a C program, you must have access to a C compiler. If you are using a UNIX machine (for example, if you are writing CGI scripts in C on your host's UNIX computer, or if you are a student working on a lab's UNIX machine), the C compiler is available for free. 
It is called either "cc" or "gcc" and is available on the command line. If you are a student, then the school will likely provide you with a compiler -- find out what the school is using and learn about it. If you are working at home on a Windows machine, you are going to need to download a free C compiler or purchase a commercial compiler. 
A widely used commercial compiler is Microsoft's Visual C++ environment (it compiles both C and C++ programs). Unfortunately, this program costs several hundred dollars. If you do not have hundreds of dollars to spend on a commercial compiler, then you can use one of the free compilers available on the Web. See http://www.javatpoint.com/c-programming-language-tutorial as a starting point in your search.
We will start at the beginning with an extremely simple C program and build up from there. I will assume that you are using the UNIX command line and gcc as your environment for these examples; if you are not, all of the code will still work fine -- you will simply need to understand and use whatever compiler you have available.

Types of Computer Memory (RAM and ROM)

Memory is the most fundamental component of a processing framework in light of the fact that without it computer can't perform basic undertakings. Computer memory is of two fundamental sort – Primary memory/Volatile memory and Secondary memory/non-unpredictable memory. Arbitrary Access Memory (RAM) is unstable memory and Read Only Memory (ROM) is non-unpredictable memory.
Types of Computer Memory (RAM and ROM)

1. Random Access Memory (RAM) – 


  • It is additionally called as perused compose memory or the principle memory or the essential memory. 
  • The programs and information that the CPU requires during execution of a program are put away in this memory. 
  • It is an unstable memory as the information loses when the power is killed. 
  • RAM is additionally grouped into two sorts SRAM (Static Random Access Memory) and DRAM (Dynamic Random Access Memory). 

2. Read Only Memory (ROM) – 

Stores urgent data fundamental to work the framework, similar to the program basic to boot the computer.

  • It isn't unstable. 
  • Continuously holds its information. 
  • Utilized in implanted frameworks or where the programming needs no change. 
  • Utilized in number crunchers and fringe gadgets. 
  • ROM is additionally ordered into 4 types-ROM, PROM, EPROM, and EEPROM. 

Sorts of Read Only Memory (ROM) – 

PROM (Programmable read-just memory) – It can be programmed by client. Once programmed, the information and directions in it can't be changed.

EPROM (Erasable Programmable read just memory) – It can be reprogrammed. To eradicate information from it, open it to ultra violet light. To reprogram it, eradicate all the past information.

EEPROM (Electrically erasable programmable read just memory) – The information can be eradicated by applying electric field, no need of ultra violet light. We can delete just segments of the chip.

Saturday, August 3, 2019

Advantages and Disadvantages of Bitcoins

What are the advantages of Bitcoin? 

The best thing about Bitcoin is that it is decentralized, which implies that you can settle universal arrangements without messing around with trade rates and additional charges. Bitcoin is free from government impedance and control, so there's no Federal Reserve System‍ to climb loan costs. It is likewise straightforward, so you comprehend what's going on with your cash. You can begin tolerating bitcoins in a flash, without putting cash and vitality into subtleties, for example, setting up a trader record or purchasing charge card preparing equipment. Bitcoins can't be produced, nor can your customer request a discount.
advantages and disadvantages of bitcoin

What are the disadvantages of Bitcoin? 

Bitcoin began immediately off kilter by guaranteeing a spurious individual (or people), Satoshi Nakamoto as its originator. Nakamoto has never been found.

With respect to viable concerns, hacking and tricks are the standards. They occur at any rate once every week and are getting progressively complex. Bitcoin's software multifaceted nature and the unpredictability of its money prevent numerous individuals from utilizing it, while its exchanges are frustratingly moderate. You'll need to trust that your system will support the exchange. As of late, some Reddit clients detailed trusting that their exchanges will be affirmed.

The four most ordinary Bitcoin tricks are Ponzi plans, mining tricks, trick wallets and fake trades.

Ponzi Scams: Ponzi tricks, or high return venture programs, snare you with higher enthusiasm than the overarching business sector rate (for example 1-2% premium every day) while diverting your cash to the criminal's wallet. They likewise will in general duck and develop under various names so as to secure themselves. Avoid organizations that give you Bitcoin addresses for approaching installments as opposed to the regular installment processors, for example, BitPay or Coinbase.

Bitcoin Mining Scams: These organizations will offer to mine silly measures of bitcoin for you. You'll need to pay them. That is the last you'll see of your cash (with no bitcoins to appear for it, either).

Bitcoin Exchange Scams: Bitcoin Exchange Scams offer highlights that the run of the mill bitcoin wallets don't offer, for example, PayPal/Credit Card preparing, or better trade rates. Obviously, these tricks leave you in the hang while they siphon your dollars.

Bitcoin Wallet Scams: Bitcoin trick wallets are like online wallets – with a distinction. They'll approach you for your cash. In the event that burglars like the sum, that is the last you'll see of your store. The location, at the end of the day, prompts them, as opposed to you.

Of these, wallet tricks are the most well known with con artists figuring out how to squeeze millions.


How does Bitcoin work?

Without diving into the specialized subtleties, Bitcoin takes a shot at an immense open record, additionally called a blockchain, where every affirmed exchange are incorporated as purported 'hinders.' As each square enters the framework, it is communicated to the shared PC system of clients for approval.
How does Bitcoin work?

Along these lines, all clients know about every exchange, which counteracts taking and twofold spending, where somebody spends a similar money twice. The procedure likewise helps blockchain clients trust the framework.

"In contrast to customary monetary forms, which are issued by national banks, Bitcoin has no focal fiscal specialist. Rather it is supported by a distributed PC system made up of its clients' machines, likened to the systems that support BitTorrent, a document sharing framework, and Skype, a sound, video and talk administration. Bitcoins are scientifically produced as the PCs in this system execute troublesome calculating undertakings, a strategy known as Bitcoin "mining".
The science of the Bitcoin framework were set up with the goal that it turns out to be dynamically progressively hard to "mine" Bitcoins after some time, and the all out number that can ever be mined is constrained to around 21 million. There is in this way no chance to get for a national bank to issue a surge of new Bitcoins and debase those as of now available for use."

How might I store my bitcoins? 

To perceive how the framework functions, envision somebody considered Alice who's giving a shot Bitcoins. She'd pursue a cryptocurrency wallet to put her bitcoins in.

The Bitcoin Wallets

There are three distinct applications that Alice could utilize.

Full customer – This resembles an independent email server that handles all parts of the procedure without depending on outsider servers. Alice would control her entire exchange from start to finish without anyone else's input. Naturally, this isn't for amateurs.

Lightweight customer – This is an independent email customer that interfaces with a mail server for access to a post box. It would store Alice's bitcoins, however it needs an outsider possessed server to get to the system and make the exchange.

Web customer – This is something contrary to "full customer" and takes after webmail in that it thoroughly depends on an outsider server. The outsider replaces Alice and works her whole exchange.

You'll discover wallets that come in five fundamental sorts: Desktop, portable, web, paper and equipment. Each of these has its favorable circumstances and inconveniences.

Reward: The Most Comprehensive Digital Wallet Guide: Step-by-Step Examples

Where would i be able to discover Bitcoins? 

To begin with, we would prescribe you read this inside and out guide for purchasing Bitcoin.

You can get your first bitcoins from any of these four spots.

A cryptocurrency trade where you can trade 'customary' coins for bitcoins, or for satoshis, which resemble the BTC-kind of pennies. Assets: Coinbase and Coinsquare in the US and Canada, and BitBargain UK and Bittylicious in the UK.

A Bitcoin ATM (or cryptocurrency trade) where you can change bitcoins or money for another cryptocurrency. Assets: Your best wagers are BTER and CoinCorner

A grouped administration where you can discover a merchant who will enable you to exchange bitcoins for money. Assets: The conclusive site is LocalBitcoins.

You could sell an item or administration for bitcoins. Assets: Sites like Purse.

Alert! Bitcoin is infamous for tricks, so before utilizing any administration search for surveys from past clients or post your inquiries on the Bitcoin gathering.

How would I purchase and sell stuff with Bitcoins? 

Here's the clever thing with Bitcoins: there are no physical hints of them as of dollars. The sum total of what you have are just records of exchanges between various locations, with equalizations that expansion and reduction in their records that are put away on the blockchain.

To perceive how the procedure functions, how about we come back to Alice.

Case of a Bitcoin exchange 

Alice needs to utilize her Bitcoin to purchase pizza from Bob. She'd send him her private "key," a private succession of letters and numbers, which contains her source exchange of the coins, sum, and Bob's advanced wallet address. That "address" would be another, this time, the open succession of letters and numbers. Sway checks the "key" with his cell phone to disentangle it. Simultaneously, Alice's exchange is communicated to the various system members (called "hubs") on her record, and, around, after ten minutes, is affirmed, through a procedure of certain specialized and business standards called "mining." This "mining" process gives Bob a score to know whether to continue with Alice's exchange.

The exchange among Alice and Bob

What is Bitcoin Mining? 

Mining, or handling, keep the Bitcoin procedure secure by sequentially including new exchanges (or squares) to the chain and keeping them in the line. Squares are cleaved off as every exchange is settled, codes decoded, and bitcoins passed or traded.

Excavators can likewise create new bitcoins by utilizing unique programming to tackle cryptographic issues. This gives a savvy approach to issue the money and furthermore gives an impetus to individuals to mine.

The reward is settled upon by everybody in the system however is commonly 12.5 bitcoins just as the expenses paid by clients sending exchanges. To counteract expansion and to keep the framework reasonable, there can be close to a fixed complete number of 21 million bitcoins (or BTCs) available for use continuously 2040, so the "perplex" gets progressively harder to unravel.

What do I have to know to secure my Bitcoins? 

Here are four recommendations that will help your bitcoins go further.

As you'd do with a normal wallet, just store limited quantities of bitcoins on your PC, portable, or server for regular uses, and keep the rest of the piece of your assets in a more secure condition.

Reinforcement your wallet all the time and scramble your wallet or cell phone with a solid secret key to shield it from criminals (albeit, sadly, not against keylogging equipment or programming).

Store a portion of your bitcoins in a disconnected wallet detached from your system for included security. Think about this as a bank, while you, by and large, keep just a portion of your cash in your wallet.

Update your product. For included insurance, utilize Bitcoins' multi-signature highlight that enables an exchange to require different free endorsements to be spent.

Investing some energy in these means can set aside your cash.

We suggest the Nano Ledger S – Hardware Wallet

Nano Ledger S is similarly as secure as the other two equipment wallets. It is well known as a result of its moderately low cost of $65 contrasted with its rivals. Being littler than KeepKey, it is progressively convenient and simpler to bear. It is an equipment wallet that comes at a focused cost.

Bitcoin Performance throughout the months

The outline above is a candle portrayal of Bitcoin's cost throughout the months. Focus on the last eight candles. From August 2018 to January 2019, Bitcoin has had six continuous red candles. What this shows is that for those a half year, Bitcoin has been in misfortune. Be that as it may, the two most recent months are green, as such, they were beneficial months.

Absolute Transaction expenses gathered in the last ten 10 days

what is btc 

24th April saw the most exchange charges gathered with 131 BTC given away as exchange expenses.

Complete exchanges directed over the most recent 10 days

With regards to the all out number of exchanges sent every day, we can mention some fascinating objective facts:

All out day by day exchanges vacillate between 300,000 – 400,000.

24th April saw the most exchanges in our informational collection with 404,279.

23rd April saw minimal measure of exchanges in our informational collection with 311,753.

In our informational index, 24th April saw the most number of exchanges and most exchange expenses gathered.

Curiously, 23rd April didn't correspond with minimal number of exchange expenses gathered.

The least aggregate sum of exchange charges was gathered on 21st April, which additionally observed the second most noteworthy number of exchanges!

Normal day by day exchange expenses throughout the previous 10 days

Till now we have all out exchange expenses gathered and the absolute number exchanges executed. Presently, we can utilize these two to discover what amount was the normal day by day exchange charges. The equation is basic:

Normal exchange charges = Total exchange expenses gathered/Total number of exchanges.

24th April has the most elevated day by day normal exchange charges with 0.00032 BTC.

21st April has the least every day normal exchange expenses with 0.00012 BTC, in spite of having the second most noteworthy number of exchanges in our dataset.

Upon further figuring, we found that the normal exchange expenses throughout the previous 10 days was 0.00022 BTC or $1.13.

Complete day by day exchange worth sent throughout the most recent 10 days

what is btc 

Immediately, 24th April sticks out once more. On that day, 279,421 BTC was moved.

21st April saw the least number Bitcoins moved with 65,431 BTC.

Just on twentieth and 21st April were under 100,000 BTC moved.

Throughout the most recent 10 days, the normal measure of BTC sent every day was 140,488 BTC.

The normal estimation of every exchange

We can utilize a basic recipe to compute the normal estimation of every exchange: Total BTC sent that day/Total number of exchanges.

what is btc 

On 24th April, the normal estimation of every exchange sent was the most elevated at 0.473 BTC.

21st April had the least with 0.167 BTC.

seventeenth and 23rd April additionally observed high qualities with 0.473 BTC and 0.477 BTC separately.

On the off chance that we take a normal of every one of these qualities, at that point we get, 0.387 BTC or $2002.

We can derive that for an exchange worth $2002 we just need to send $1.13 in exchange expenses. So exchange expenses in our informational collection is 0.56%.

For that equivalent exchange, PayPal would have charged you $58.30 (determined by means of salecalc).

What is Bitcoin and how can it work?

What is Bitcoin? [The Most Comprehensive Step-by-Step Guide] 

Definition: Bitcoin is a cryptocurrency, a type of electronic money. It is a decentralized computerized money without a national bank or single chairman that can be sent from client to client on the distributed bitcoin blockchain organize without the requirement for mediators.
What is Bitcoin and how can it work?


Refreshed April 2019

On the off chance that you need to recognize what is Bitcoin, how you can get it and how it can support you, without fumbling into specialized subtleties, this guide is for you. It will clarify how the framework functions, how you can utilize it for your benefit, which tricks to dodge. It will likewise guide you to assets that will enable you to store and utilize your first bits of computerized money. In the event that you are searching for something much more in detail please look at our blockchain seminars on bitcoin.

What is Bitcoin more or less 

Little marvel that Bitcoin developed in 2008 soon after Occupy Wall Street blamed huge banks for abusing borrowers' cash, tricking customers, fixing the framework, and charging boggling expenses. Bitcoin pioneers needed to put the dealer in control, wipe out the go between, drop intrigue expenses, and make exchanges straightforward, to hack debasement and cut charges. They made a decentralized framework, where you could control your assets and realize what was happening.

Bitcoin has made significant progress in a generally brief time. Everywhere throughout the world, organizations, from REEDS Jewelers, an enormous gems chain in the US, to a private clinic in Warsaw, Poland, acknowledge its money. Billion dollar organizations, for example, Dell, Expedia, PayPal, and Microsoft do, as well. Sites advance it, productions, for example, Bitcoin Magazine distribute its news, gatherings talk about cryptocurrency and exchange its coins. It has its application programming interface (API), value file, and conversion scale.

Issues incorporate criminals hacking accounts, high unpredictability, and exchange delays. Then again, individuals in underdeveloped nations may discover Bitcoin their most solid channel yet for giving or accepting cash.

Purchase Bitcoin

Key Metrics:

Key Highlights | History of Bitcoin

October 31, 2008: Bitcoin whitepaper distributed.

January 3, 2009: The Genesis Block is mined.

January 12, 2009: The first Bitcoin exchange.

December 16, 2009: Version 0.2 is discharged.

November 6, 2010: Market top surpasses $1 million USD.

October 2011: Bitcoin forks just because to make Litecoin.

June 3, 2012: Block 181919 made with 1322 exchanges. It is the biggest square to-date.

June 2012: Coinbase dispatches.

September 27, 2012: Bitcoin Foundation is framed.

February 7, 2014: Mt. Gox hack.

June 2015: BitLicense gets built up. This is one of the most critical cryptocurrency guidelines.

August 1, 2017: Bitcoin forks again to frame Bitcoin Cash.

August 23, 2017: SegWit gets enacted.

September 2017: China bans BTC exchanging.

December 2017: First bitcoin fates contracts were propelled by CBOE Global Markets (CBOE) and the Chicago Mercantile Exchange (CME).

September 2018: Cryptocurrencies crumbled 80% from their top in January 2018, exacerbating the 2018 cryptocurrency crash than the Dot-com air pocket's 78% breakdown.

November 15, 2018: Bitcoin's market top fell underneath $100 billion just because since October 2017.

October 31, 2018: 10-year commemoration of Bitcoin.

Understanding Bitcoin – What is Bitcoin inside and out? 

At its most straightforward, Bitcoin is either virtual money or reference to the innovation. You can make exchanges with a money order, wiring, or money. You can likewise utilize Bitcoin (or BTC), where you allude the buyer to your mark, which is a long queue of security code scrambled with 16 particular images. The buyer interprets the code with his cell phone to get your cryptocurrency. Put another way; cryptocurrency is a trade of advanced data that enables you to purchase or sell merchandise and services.The exchange picks up its security and trust by running on a distributed PC organize that is like Skype, or BitTorrent, a document sharing framework.

Bitcoin Transactional properties: 

1.) Irreversible: After affirmation, an exchange can't be turned around. By no one. What's more, no one methods no one. Not you, not your bank, not the leader of the United States, not Satoshi, not your digger. No one. In the event that you send cash, you send it. Enough said. Nobody can support you, in the event that you sent your assets to a con artist or if a programmer stole them from your PC. There is no security net.

2.) Pseudonymous: Neither exchanges or records are associated with genuine personalities. You get Bitcoins on purported addresses, which are haphazardly appearing chains of around 30 characters. While it is generally conceivable to break down the exchange stream, it isn't really conceivable to interface this present reality personality of clients with those addresses.

BGMEM v1

3.) Fast and worldwide: Transaction is spread about right away in the system and are affirmed in a few minutes. Since they occur in a worldwide system of PCs they are totally detached of your physical area. It doesn't make a difference on the off chance that I send Bitcoin to my neighbor or to somebody on the opposite side of the world.

4.) Secure: Bitcoin assets are secured an open key cryptography framework. Just the proprietor of the private key can send cryptocurrency. Solid cryptography and the enchantment of enormous numbers makes it difficult to break this plan. A Bitcoin address is more secure than Fort Knox.

5.) Permissionless: You don't need to request that anyone use cryptocurrency. It's only a product that everyone can download for nothing. After you introduced it, you can get and send Bitcoins or different digital forms of money. Nobody can counteract you. There is no guardian.

Judd Bagley: What is BlockchainThe maker of bitcoin made sense of an approach to let two elements certainly exchange straightforwardly with each other, without the need to depend on every one of these middle people. The key is science. For whatever length of time that we both trust in math, we can be certain the trade to happen true to form.

Bitcoin utilizes open key cryptography and an imaginative way to deal with accounting to accomplish the approval, balance check, disallowance on twofold spending, conveyance of advantages and record inalterability depicted previously. What's more, it occurs in close continuous at no expense.

Cryptography guarantees approval. You need a private key to execute. What's more, your key is unpredictable enough that it would take the best PC longer than the earth has existed to break it. As it were, it's basically unhackable.

– Director of Communications at Overstock.com and Chief Evangelist at t0.com

Where do I go from here?

Here are different assets that will guide you to best places for discovering wallets, stores that acknowledge bitcoins, trades for exchanging Bitcoin, and Bitcoin news, costs, graphs, aides and examination among other data.

Bitcoin has experienced a few impediments as of late with the Bitcoin Cash fork and SegWit usage. Bitcoin, in the course of the most recent 11 years, has really disturbed the world's economy and money related frameworks. Having said that, this is only the start. The Bitcoin transformation still has a long way to go. It is going to too energizing to see where we will go on from here.

99Bitcoins – 99Bitcoins supplies video and content instructional exercise on the best way to purchase Bitcoins with Paypal, Credit Card, check card and that's only the tip of the iceberg.

Bitcoin.org – Choose your Bitcoin wallet from 12 diverse portable, work area and equipment applications.

Coinmap – For bitcoiners who need to spend their BTC at physical areas, Coinmap alludes you to many retailers who acknowledge bitcoin at their physical store areas.

Blockchain.info – Blockchain data is the go-to put for checking exchanges on the record. You can check how a lot of cash your wallet contains, or, so far as that is concerned, the amount BTC is put away at a specific wallet address.

Bitnodes – Run by the Bitcoin Foundation, Bitnodes assesses and envisions the size of the bitcoin arrange.

Wizbit – Wizbit demonstrates all exchanges and recently mined squares progressively on an eye-finding turning globe.

We Use Coins – Weusecoins.com is a rundown of dependable trades for exchanging Bitcoins worldwide or in the U.S.

Purchase Bitcoin Worldwide – Get help finding a Bitcoin trade.

Monday, July 29, 2019

History of C Plus Plus

A Brief History Of C++ Programming Language


In 1979, Bjarne Stroustrup, a Danish computer scientist, started chip away at "C with Classes", the predecessor to C++. The inspiration for creating another dialect started from Stroustrup's experience in programming for his PhD. proposal. Stroustrup found that Simula had highlights that were extremely useful for enormous programming advancement, yet the language was unreasonably moderate for practical use, while BCPL was quick yet too low-level to be appropriate for huge programming improvement. At the point when Stroustrup began working in AT&T Bell Labs, he had the issue of breaking down the UNIX bit with respect to disseminated computing. Recalling his Ph.D. experience, Stroustrup set out to enhance the C language with Simula-like highlights. C was chosen because it was universally useful, quick, versatile and broadly utilized. Just as C and Simula's influences, different dialects likewise influenced C++, including ALGOL 68, Ada, CLU and ML.
A Brief History Of C++ Programming Language


At first, Stroustrup's "C with Classes" added highlights to the C compiler, Cpre, including classes, inferred classes, solid composing, inlining and default contentions.

In 1983, "C with Classes" was renamed to "C++" (++ being the increment administrator in C), including new highlights that included virtual functions, function name and administrator over-burdening, references, constants, type-safe free-store memory allocation (new/erase), improved sort checking, and BCPL style single-line comments with two forward cuts (//). Besides, it included the advancement of an independent compiler for C++, Cfront.

In 1985, the main version of The C++ Programming Language was discharged, which became the authoritative reference for the language, as there was not yet an official standard.[15] The principal commercial execution of C++ was discharged in October of that year.

In 1989, C++ 2.0 was discharged, trailed by the refreshed second version of The C++ Programming Language in 1991.New highlights in 2.0 included different inheritance, abstract classes, static part functions, const part functions, and protected individuals. In 1990, The Annotated C++ Reference Manual was distributed. This work became the reason for the future standard. Later element increments included layouts, exceptions, namespaces, new casts, and a boolean sort.

After the 2.0 update, C++ developed generally gradually until, in 2011, the C++11 standard was discharged, including various new highlights, amplifying the standard library further, and giving more facilities to C++ software engineers. After a minor C++14 update discharged in December 2014, different new augmentations were introduced in C++17, and further changes made arrangements for 2020.

Starting at 2017, C++ remains the third most well known programming language, behind Java and C.

On January 3, 2018, Stroustrup was announced as the 2018 victor of the Charles Stark Draper Prize for Engineering, "for conceptualizing and building up the C++ programming language".

Historical background

According to Stroustrup: "the name means the developmental idea of the changes from C". This name is credited to Rick Mascitti (mid-1983)[14] and was first utilized in December 1983. At the point when Mascitti was examined casually in 1992 concerning the naming, he indicated that it was given in a joking soul. The name comes from C's ++ administrator (which increments the estimation of a variable) and a common naming convention of utilizing "+" to indicate an enhanced computer program.

During C++'s advancement period, the language had been alluded to as "new C" and "C with Classes" before acquiring its last name.

Reasoning

For a mind-blowing duration, its advancement and development has been guided by a lot of principles:

It must be driven by actual issues and its highlights ought to be promptly helpful in true projects.

Each element ought to be implementable (with a sensibly clear approach to do as such).

Software engineers ought to be allowed to pick their very own programming style, and that style ought to be completely bolstered by C++.

Permitting a valuable component could really compare to forestalling each conceivable abuse of C++.

It ought to give facilities to sorting out projects into isolated, well-characterized parts, and give facilities to combining independently created parts.

No implicit infringement of the sort framework (yet permit explicit infringement; that is, those explicitly mentioned by the software engineer).

Client created types need a similar help and performance as inherent kinds.

Unused highlights ought not adversely impact created executables (for example in lower performance).

There ought to be no language underneath C++ (except low level computing construct).

C++ should work close by other existing programming dialects, as opposed to encouraging its own different and incompatible programming condition.

On the off chance that the software engineer's plan is obscure, enable the developer to specify it by giving manual control.

Institutionalization

Year C++ Standard Informal name

1998 ISO/IEC 14882:1998 C++98

2003 ISO/IEC 14882:2003 C++03

2011 ISO/IEC 14882:2011 C++11, C++0x

2014 ISO/IEC 14882:2014 C++14, C++1y

2017 ISO/IEC 14882:2017 C++17, C++1z

2020 to be determined C++20, C++2a

C++ is institutionalized by an ISO working gathering known as JTC1/SC22/WG21. Up until this point, it has distributed five modifications of the C++ standard and is currently taking a shot at the following amendment, C++20.

In 1998, the ISO working gathering institutionalized C++ just because as ISO/IEC 14882:1998, which is casually known as C++98. In 2003, it distributed another variant of the C++ standard called ISO/IEC 14882:2003, which fixed issues distinguished in C++98.

The following significant update of the standard was casually alluded to as "C++0x", yet it was not discharged until 2011. C++11 (14882:2011) included numerous augmentations to both the core language and the standard library.

In 2014, C++14 (otherwise called C++1y) was discharged as a little expansion to C++11, including fundamentally bug fixes and little upgrades. The Draft International Standard ticket procedures completed in mid-August 2014.

After C++14, a noteworthy update C++17, casually known as C++1z, was completed by the ISO C++ Committee in mid July 2017 and was affirmed and distributed in December 2017.

As a component of the institutionalization process, ISO additionally distributes technical reports and specifications:

ISO/IEC TR 18015:2006 on the utilization of C++ in inserted frameworks and on performance implications of C++ language and library highlights,

ISO/IEC TR 19768:2007 (otherwise called the C++ Technical Report 1) on library expansions generally incorporated into C++11,

ISO/IEC TR 29124:2010 on special mathematical functions,

ISO/IEC TR 24733:2011 on decimal drifting point arithmetic,

ISO/IEC TS 18822:2015 on the standard filesystem library,

ISO/IEC TS 19570:2015 on parallel renditions of the standard library calculations,

ISO/IEC TS 19841:2015 on programming transactional memory,

ISO/IEC TS 19568:2015 on another arrangement of library augmentations, some of which are as of now incorporated into C++17,

ISO/IEC TS 19217:2015 on the C++ concepts, coordinated into C++20

ISO/IEC TS 19571:2016 on the library augmentations for concurrency

ISO/IEC TS 19568:2017 on another arrangement of broadly useful library expansions

ISO/IEC TS 21425:2017 on the library augmentations for extents, incorporated into C++20

ISO/IEC TS 22277:2017 on coroutines

ISO/IEC TS 19216:2018 on the systems administration library

ISO/IEC TS 21544:2018 on modules

ISO/IEC TS 19570:2018 on another arrangement of library augmentations for parallelism

Increasingly technical specifications are being developed and pending endorsement, including static reflection.

C ++ Tutorial for Beginners

Introduction to C Plus Plus

C++ is a broadly useful programming language created by Bjarne Stroustrup as an augmentation of the C programming language, or "C with Classes". The language has extended significantly after some time, and present day C++ has object-situated, generic, and functional highlights notwithstanding facilities for low-level memory control. It is quite often executed as a compiled language, and numerous sellers give C++ compilers, including the Free Software Foundation, LLVM, Microsoft, Intel, and IBM, so it is accessible on numerous stages. 
C ++ Tutorial for Beginners


C++ was structured with a predisposition toward framework programming and inserted, resource-constrained programming and enormous frameworks, with performance, efficiency and adaptability of utilization as its plan highlights.C++ has likewise been discovered valuable in numerous different contexts, with key qualities being programming infrastructure and resource-constrained applications, including work area applications, servers (for example internet business, Web search or SQL servers), and performance-critical applications (for example phone switches or space tests). 

C++ is institutionalized by the International Organization for Standardization (ISO), with the most recent standard adaptation endorsed and distributed by ISO in December 2017 as ISO/IEC 14882:2017 (casually known as C++17).The C++ programming language was at first institutionalized in 1998 as ISO/IEC 14882:1998, which was then changed by the C++03, C++11 and C++14 guidelines. The current C++17 standard supplants these with new highlights and a developed standard library. Prior to the underlying institutionalization in 1998, C++ was created by Danish computer scientist Bjarne Stroustrup at Bell Labs since 1979 as an augmentation of the C language; he needed an efficient and adaptable language like C that likewise given abnormal state highlights to program organization.C++20 is the following arranged standard, keeping with the current pattern of another form at regular intervals.

10 Uses of Computer in Daily Life

Computers are used in so many fields in our daily life. From Engineers to Doctors, Students, Teachers, Government Organization they all use computers to perform specific tasks, for entertainment or just to finish office work. 

1. Training 


The computer is assuming a key job in present day training. In nowadays, Students are wanted to ponder on the web, with the assistance of the web and computer. Getting the correct sort of data is the test in this bustling world. The computer can satisfy this necessity through an expansive system. There are different fields in instruction in which the computer is utilized which are given underneath:

The computer is utilized in separation instruction:

Individuals have their bustling timetable nowadays along these lines, for the most part they favored separation training. The computer gives introduction data to those understudies who are not ready to take the classes consistently. The introduction and movement programming like powerpoint and glimmer are useful to the educators to convey the notes in separation instruction.


The computer is utilized for the capacity of instructive information:

The computer can store the information in the electronic arrangement. The paper sparing level is expanded because of computer memory since we can store a lot of substance in it. The computer framework is useful for both instructor and understudy. Instructors can spare and move the notes and introduction rapidly by means of computer stockpiling gadgets comparably; the understudy can submit schoolwork and assignments as a delicate duplicate.

2. Research 


A computer is an essential apparatus for research. It assumes a fundamental job in each field of logical research. Various kinds of projects and applications make it simple for our method for processing. There are some fundamental applications utilized in logical research that are information stockpiling, information examination, logical reenactments, instrumentation control, learning sharing, and so on. There are five noteworthy stages in research where the computer can utilize:

Calculated Phase.

Structure and arranging stage.

Information Collection stage.

Information examination stage.

Research distribution stage.

There are numerous motivations to utilize the computer in logical research; speed, exactness, consistency, method for arranging the information.

3. Business 


The utilization of computer in business is expanding efficiency and intensity. It is advantageous in circulation, advertising, banking, group the executives, business robotization, less time with high caliber in the business. The computer help in business to oversee, figure, orchestrate, and picture the client information. We can make sites by the computer for business.

4. Safeguard 


The computer assumes a significant job in guard. There are numerous employments of computer in barrier:

The military is utilizing the computers for the correspondence between two warriors and furthermore utilized for Battle the executives frameworks.

The computer can be utilized in tanks, planes, and ships to target adversary powers.

We can follow the Incoming rockets to pulverize them, with the assistance of a computer.

Computers are utilized to hold the archives, upkeep record, and record of occasions.

The computer additionally encourages the military to keep spare their mystery and sort out the records. We can get to each envelope effectively.

In the preparation time frame, the computer speaks with the group in far off spots.

5. Biometric System 


The biometric is the strategy to recognize or confirm dependent on the head of quantifiable. The biometric system can be isolated into two classifications:

Gadget dependent on mental attributes of an individual, (for example, a unique mark).

Gadgets dependent on social attributes, (for example, a mark).

Biometric System

There are a few uses of biometrics, which are given underneath:

Biometric participation framework, which is utilized to control worker time.

Biometric locks frameworks give security to the mortgage holders.

Remote biometrics gives high security and safe exchange from remote gadgets like PDA's and so forth.

The biometric frameworks additionally give secure access to PCs and bolster single login office.

The utilization of biometrics innovation is utilized to distinguish DNA design for recognizing lawbreakers and so on.

6. Man-made consciousness 


The man-made consciousness is the tremendous field of computer science. The main role of man-made reasoning is to create machines like people. There are different procedures of AI used to take care of complex issues, for example, neural systems, master framework, and so forth. The master framework is a lot of projects. It has clarification module, input/yield interface, editorial manager, derivation motor, learning base, case history record, and so on. Various kinds of master frameworks are accessible:


  • Dendral : The Dendral is the well known master framework which is utilized to think about a lot of information and disclosure in science. 
  • Mycin : The mycin is a regressive tying master framework. It utilizes man-made brainpower to recognize the microbes causing different diseases, for example, bacteremia and meningitis and so forth. 
  • Puff :It is a demonstrative master framework for the translation of aspiratory work information. 


7. Therapeutic 


The computer is utilized in therapeutic science. It causes the specialists to make the activities effectively. Computers are valuable to emergency clinics; they can hold the patient's data in a sorted out manner. The computer enables individuals to store therapeutic history, the present wellbeing status of their families, and more can be effectively gotten to and query inside a couple of moments.

8. Installed framework 


The installed frameworks are utilized to control, screen, or help the activity of gear; it has inserted programming into equipment. These frameworks are utilized for preparing a fixed arrangement of pre-customized guidelines to control the hardware. The inserted frameworks communicate with the outer world through sensors and actuators. These frameworks are likewise found in mobile phones, advanced cameras, convenient computer games, number crunchers, individual computerized associates, microwaves, home security frameworks, clothes washers, and so on.

Installed framework

There are a few qualities of installed frameworks which are given beneath:

These frameworks are application explicit frameworks.

The installed frameworks have negligible or no UI.

These frameworks are proficient, spare our time and cost.

Inserted frameworks perform ongoing tasks, and they are planned in such a way to meet continuous imperatives.

They are otherwise called receptive frameworks, and they have a ceaseless response with the earth.

9. Banks 


The computer is broadly utilized in the financial field, for record keeping and keeping up records of clients. For the most part every bank gives the ATM office; the clients can be credited and charged their record at wherever in 24 hours with the assistance of their ATM card.

10. Utilization of computer in reenactment 


The computer reenactment demonstrates the conduct of the framework. The computer reproduction is utilized in science frameworks. It can serve plan, creation, and assessment of complex frameworks, and so forth. There are different fields in which recreation is utilized:

The computer reproduction is utilized when we give the preparation to pilot competitors.

It is utilized to test the wellbeing component in the new vehicle model.

There are some robot test systems which are utilized to structure different robots and Robot control calculations.

The Dynamic example of urban improvement that is reproduced with the assistance of urban reproduction model.

Saturday, July 20, 2019

Learn Computer Fundamentals Tutorial

What is Computer?

A computer is a machine that can be told to do arrangements of math or consistent activities naturally through computer programming. Current computers can pursue summed up sets of activities, called programs. These projects empower computers to play out an amazingly wide scope of undertakings. A "total" computer including the equipment, the working framework (principle programming), and fringe hardware required and utilized for "full" activity can be alluded to as a computer framework. This term should be utilized for a gathering of computers that are associated and cooperate, specifically a computer system or computer bunch.
Fundamental of Computer- What is Computer?


Computers are utilized as control frameworks for a wide assortment of mechanical and customer gadgets. This incorporates straightforward specific reason gadgets like microwaves and remote controls, processing plant gadgets, for example, modern robots and computer-helped structure, and furthermore broadly useful gadgets like PCs and cell phones, for example, cell phones. The Internet is kept running on computers and it associates a huge number of different computers and their clients.

Early computers were just considered as figuring gadgets. Since antiquated occasions, basic manual gadgets like the math device helped individuals in doing counts. From the get-go in the Industrial Revolution, some mechanical gadgets were worked to robotize long monotonous assignments, for example, managing designs for weavers. Progressively refined electrical machines did specific simple computations in the mid twentieth century. The main advanced electronic figuring machines were created during World War II. The speed, power, and flexibility of computers have been expanding drastically as far back as at that point.

Friday, June 28, 2019

TensorFlow Tutorial for Beginners

Brief Introduction About TensorFlow

Tensor flow is a distributed computing tool, which allows colossus neural networks to train over a distributed server. Tensor flow is a product of the Google brain team, and Google used tensor flow for its internal use. Used in google photos, google search and google cloud speech.

Introduction about Tensorflow

What is Tensor flow?

  • Tensor flow is an open source software library. This library used for data flow programming throughout the scope of tasks.
  • Tensor flow is a symbolic Math library, used for machine learning applications such as Neural Networks.
  • Tensor flow is a machine-learning library, suited for large-scale machine learning.
  • TensorFlow uses computational graphs/ data flow for numerical computations.
  • Google uses TensorFlow for Research and production.

History of TensorFlow

Distbelief is a previous version of tensorflow. Distbelief based on deep learning neural networks. Distbelief released in 2011. After updating the Distbelief, tensorflow come into existence. Tensorflow developed by Google Brain Team for the internal use of Google. TensorFlow released in 2015.

Characteristics of Tensorflow

Following are the characteristics of TensorFlow:
  • Tensor flow has C++ implementations of Machine learning, which is highly efficient. Besides, it has custom C++ operations.
  • Tensor flow runs on primary operating systems like Linux, Windows, and MacOS. Besides, it runs on a mobile operating system like Android, iOS.
  • The TF layers, Pretty tensor and Keras are the high-level API. High-level API’s runs on the top of the tensor flow.
  • For simple training routines, tensor flow provides simple API TF-slim (tensorflow.contrib.slim).
  • For the reduction of a cost function, optimization nodes search for parameters. Tensor flow provides the optimization nodes, which reduces the cost of function.
  • Tensor flow provides AutoDiff (Automatic Differentiating). AutoDiff automatically computes the slopes (gradients) of cost functions.
  • Tensor flow provides the visualization tool, called as TensorBoard. Through TensorBoard, user able to view learning curves and computation graph.
  • For the training of neural networks, tensor flow provides a small Python API called ‘TF.Learn’. It has a few lines of code.

Types of API, which Tensorflow supports

Tensor flow provides two kinds of API such as:
  1. TensorFlow core API
  2. A higher level of API

TensorFlow core API

TensorFlow core API is a low-level of API. This API used in low-level machine learning development. This API gives complete programming control. Besides, it provides a fine level of control. This API is suitable for machine learning Researchers.

A higher level of API

A higher level of API provides tf.layers and tf.contrib.learn API, which is more compact. These API present on the top of the tenser flow. Higher level API is easy to learn and use than TensorFlow core API. It makes the repeated task, smooth and more consistent between different users. The high-level API manages datasets, inference, estimators, and training.

What is Tensor?

A tensor is a central unit of data in tensorflow. Tensors are a generalization of Matrices, vectors, and scalars to an arbitrary number of indices. Matrices have exactly two indices, and vectors have single indices whereas scalars have no index.
Tensors are the inputs, outputs of tensor flow or multidimensional data array.
Mathematically tensor represents a physical entity that describes features by the magnitude and multiple directions.
Usually, tensors contain float values. Moreover, it carries strings in the form of byte arrays. Tensors travel among the nodes of computation graphs.
NumPy used for numerical computations, NumPy is a Python API.

What is TensorBoard?

For the visualization, Tensorflow provides the TensorBoard. This TensorBoard used to visualize the graph, to plot the quantitative metrics of the graph and pass the images through it.

Computational Graph or Data Flow Graph

In the computational graph, tensor flow operations arranged into graphs. Tensor flow builds a graph of ‘program logic’ in memory, that graph known as a computational graph. Tensor Flow uses the Data flow graph to represents the computations.
Computational graphs allow creating large scale neural networks as computing and distributed among several CPUs or GPUs (Graphical Processing Unit) similarly.
Nodes in the graph represent mathematical operations. A node represents the unit of computation. Operator: ‘+’ addition is the mathematical operation.
Edges in the graph represent a multi-dimensional data array called Tensors. Edges represent data consumed or produced by operation/ computation.
Input Tensor: X, Y
Output Tensor: Z
Example: Following tensor flow graph/ data flow graph/ computational graph represents
  1. Single node corresponding addition operator.
  2. Two incoming edges indicate the input to the operation.
  3. The One outgoing edge indicates the output of the computation.
Tensor Flow Graph Computational Graph Data Flow Graph
Data flow programming model has several advantages like compilation, Portability, Parallelism and Distributed execution.
Tensor flow grasps the advantages of data flow while executing the program. Let us study them in brief:

Parallelism:

Explicit edges used to represent the dependencies between operations. The system can easily find out the operations, which executes in parallel.

Distributed Execution:

Edges used to indicate the values/ data set or tensors travel in a graph. Explicit edges used to show the values that flow between operations. Tensor flow partitions the single program code (data flow graph) among multiple devices such as CPUs, GPUs, and TPUs, attached with different machines. Tensor flow provides necessary communication co-ordinations between devices.

Portability:

Data flow graphs are not language dependent. So that the program code represented using, data flow graphs are language independent.
For example: if you build data flow graph in Python and stored in Saved-Model and restore in C++ program.

Compilation:

Tensor flow has XLA compiler. For the generation of the faster code, XLA compiler uses the information present in the data flow graph.  Example: By using together adjacent operations.

What is the Default Computational Graph?

When we are experimenting something, it is very common to run the same commands repeatedly. That will result in default graphs containing in many duplicates nodes especially when we are working with jupyter or Python shell. Solution to this is to restart the jupyter kernel or reset the default graph.

Tensor Flow Program Elements

Let us see the elements of the Tensorflow program.
  1. Constant: The value, which does not change.
  1. Placeholder: The Placeholder allows the value to assigned later.
  1. Variable: A Variable is the value that can change. It’s value is not fix. it may or may not varry.
  1. Session: A Session is an element of tensor flow and session runs to evaluate the nodes.A session called as Tensor flow Runtime.
  1. feed_dict parameter: A feed_dict parameter instructs to the tensor, to pass the actual value to the placeholder.

Phases of Computational Graph

There are four phases of Computational Graphs.
  1. Construction Phase
  2. Execution Phase
  3. Initialization Phase
  4. Initialization and Execution Phase

Products build using TensorFlow

Following some products make using TensorFlow:

1. Teachable Machine

This teachable machine developed by Google Creative Labs. Teachable Machine build using Tensorflow. It uses tensorflow.js that allows the user to use the computer camera and teach live in the browser.

2. Nsynth Super

Nsynth super developed by Google Creative Labs. Nsynth is one of the best projects. This project allows the user to create new music, by using entirely new sounds. Those unique sounds created using the Nsynth algorithm.

3. Giorgio Camthat

Giorgio Camthat project used tensorflow. This project allows the user to create new music just by clicking on the images.

4. Rank Brain

Rank Brain is developed by Google. For the search ranking on the www.google.com, Rank brain deploys the deep neural nets on large-scale.
The rank brain is a part of the search algorithm. It sorts billions of pages and finds the most relevant one.

5. Deep Speech

Deep speech project developed by Mozilla. This model can learn speech from spectrogram. There is another project, which generates strokes based on the user’s handwriting style — moreover, these strokes by using neural networks.

Advantages of Tensorflow

Following points indicates the advantages of Tensorflow:
  1. Responsive Constructs: Tensorflow has responsive constructs. The user can easily visualize every graph. Moreover user able to visualize each part of the graph.
  2. Platform Flexibility/ Cross Platform: Tensorflow is flexible with any platform. A tensorflow is a modular library. Tensorflow has some standalone parts, and some mingle/ consolidated part.
  3. Easily Trainable: For distributed computing, Tensorflow is easily trainable on CPU and GPU.
  4. Auto Differentiation Capability: Tensorflow has auto differentiation capabilities. Auto differentiation capability helps in gradient-based machine learning algorithms. To obtain the graph extension, the user can compute the derivation of values concerning other value. This process results in a graph extension.
  5. Supports to threads, queue, and asynchronous computation: the Tensorflow supports asynchronous calculations. It supports to the concept of threads and queue.
  6. Open source and Customizable: The Tensorflow is an open source library. Tensorflow is customizable means; it can modify any suite or separate task.

Disadvantages of Tensorflow

TensorFlow has some limitations:
  1. GPU memory conflicts: TensorFlow has some memory conflicts. These conflicts occurred only in GPU (Graphical Processing Unit) memory when Theano imported in the same scope. When imports in other scope conflicts do not occur.
  1. No Support for OpenCL : Tensorflow does not support for OpenCL.
  1. Need to have prior knowledge of Machine Learning, advanced Calculus and linear algebra: For understanding the concepts of tensorflow, the user must have a good understanding of Google Machine Learning. Moreover, the user must be clear with the ideas of advanced calculus and linear algebra.

Applications of TensorFlow

Following are the applications of Tensorflow:
  • Speech Recognition System
  • Image/ Video Recognition
  • Self-Driving Cars
  • Text Summarization
  • Sentiment Analysis
  • Google translate