Skip to main content

Featured Post

Resuming Pace: I Shall Not Be Pursuing a Second Bachelor's Degree

On May the 5th, 2021, I used a strong position deciding my pursuit of a second Bachelor’s degree: my choice was the University of Maryland Global Campus (UMGC, link ), but I decided to resume my Master’s program, by itself.  Let me explain with Scripture: the Gospel of Jesus Christ According to Matthew, specifically. In ancient times, records of a man called Jesus the Christ were written. Among these records was a Gospel, According to Matthew, of Jesus Christ. According to legend, Jesus Christ stated, “Blessed are the meek: for they shall inherit the earth (KJV, Matthew 5:5, link ).” Jesus the Christ was saying those who are submissive shall inherit the earth rather than those who are brash.  In my attempt at starting a second Bachelor’s program, I eventually realized I had been too pushy: I wanted the May 19th start date, and I wanted the admission process expedited, I wanted ease of access between majors, I wanted advantages to the application process because of what UMGC (I was gra


Pi Machin

In C, Calculating Pi

In this section I shall share this: against Dik T. Winter's Pi Computing in C, my experience. Regarding this, here is my repository: link. Just click Run. On, you, reader, can compile certain programming languages, and run them, online. With a GitHub account, you can also import your own GitHub repositories. But I do not feel this is an adequeate Pi solution. Against Winter's work is his whole-number-producing app, Pi Computing in C; it does not produce Pi, a decimal. Instead, it produces an 800-digit number that is a number sequence, but no decimal separated the 3 from the following digits, so there is no similitude. If you, reader, want to play with this code, I figure you can get near 80000 digits with it, scaling the array, and 2800 for loop limits by powers of 10, but 800000 might be too much for something built more than 6 years ago. I used my Surface Pro LTE and got a segmentation fault at 2800000 array elements because that requires a huge amount of cache memory. In the future, I shall attempt modifying this code, and run it using MPI or GPGPU.

Pi Machin

From Ken Ward's JavaScript tutorial (link), I got this free app. This is a Machin Pi calculator. My calculating device, a Microsoft Surface Pro 5 LTE, gave 100005 digits: in 135.26 seconds. From years ago, this is a much faster result time than Ken Ward's rig. On Google Chrome, Chrome may display a Page Unresponsive prompt. Press "Wait" or "Exit Page." Google Chrome complained more than twice. For digit confirmations, use Pi Search (link).
Number of Digits (the output is the input plus 5):

Add Count:
Add Spaces:
Answer appears here


Popular posts from this blog

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these t

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

                Considering Holy Security When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” ( New International Version , Eph 6:11-17). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. Cyber Security Hygiene Larry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along with her clients because true security

On Computer Organization and Architecture: the Hierarchy

On, Abirami Thangavel wrote Superscalar & VLIW Architectures: Characteristics, Limitations & Functions. Regarding parallel architectures, superscalar and VLIW, Thangavel wrote: In computer architecture, parallel processing refers to processing of multiple instructions of a program by distributing them among multiple processors. Superscalar and Very Long Instruction Word (VLIW) are parallel architectural models based on Flynn's Taxonomy. Both superscalar and VLIW architectures are capable of executing multiple instructions at one cycle. Each uses a different method for instruction scheduling. While superscalar processors execute instructions dynamically, VLIW uses static scheduling of program instructions.[1] Thangavel was saying this: on Flynn’s Taxonomy, superscalar and VLIW architectures are based, but they have differences. Therefore, on entity priorities, entities have different descriptive capabilities. As follows, a superscalar processor is this: a microproc

Contact Form


Email *

Message *