• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

Educational program for working with punch cards (or the story of how “big data” was processed from 1890 to 1970)

 3r3182. 3r3-31. 3r33170. In the period 1890-197? all processing of big data was carried out through punch cards. Punch cards, in turn, were processed using so-called. “Recording equipment”, the central element of which was the electromechanical “punch card sorter”. Punch cards and related equipment were used to solve a variety of tasks: population census, accounting, inventory, payroll, etc. 3r3171. 3r3168.  3r3182. 3r33170. How did people work with punch cards? What algorithm did the electromechanical card punch follow? How did you sort by numeric data fields? And on the string? About all this - below. 3r3171. 3r3168.  3r3182. 3r33170. 3r311. 3r3171.
3r314. 3r3168.  3r3182.
 3r3182.
A striking feature of the pre-computer times recording equipment: it was originally completely electromechanical. It even tube electronics was not there. The “intellect” of the recording equipment was built from wire brushes (for recognizing holes in punch cards), an electromechanical relay and mechanical wheels (for summing up values). Despite its technological primitiveness, the “recording equipment” at one time revolutionized the processing of big data. 3r3-3160.  3r3182. 3r3133. 3r3168.  3r3182.
How did people work with punch cards? 3r3138. 3r3168.  3r3182.
 3r3182.
Each punch card stored one data record (up to 80 digits or characters). Each data record consisted of several fields. The punch card sorter arranged the cards in the correct order for the operator (one of the data fields), after which the machine, called the “tabulator”, read the sorted punch cards, extracted the required fields from them (again, set by the operator), and printed a report. 3r3-3160.  3r3182.
For example, consider how punched cards were used in processing invoices. For companies, for each invoice issued for payment, a separate punched card was provided (see the example in the figure below). On the punch card indicated such data fields as the supplier's number, date of payment, amount of payment, etc. 3r3168.  3r3182. Educational program for working with punch cards (or the story of how “big data” was processed from 1890 to 1970) Appropriate automated data processing business process is as follows. The punch card sorter is given the command to order punch cards by supplier number. After the sorting is completed, the punch cards are transmitted to the tabulator, which generates a report, reading the required line from each punch card. A mechanical counter embedded in the tabulator automatically pops up the total amount. 3r3-3160.  3r3182.
Many other business processes, such as payroll, inventory, and billing, were done in pre-computer times in the same way. 3r3-3160.  3r3182. 3r3133. 3r3168.  3r3182.
The principle of operation of the electromechanical punch card sorter
3r3168.  3r3182.
 3r3182.
The sorter takes a stack of punched cards and sorts them according to the data field specified by the operator. For example, the affiliation of employees to a particular department. What for? As an option, having previously grouped employees by department, then generate a report on the implementation of the sales plan by each of the departments of the company. 3r3-3160.  3r3182.
To solve this problem, punch cards are first sorted on the basis of the “department” field, and then transferred to the tabulator, which summarizes the “sales” field, printing in the report intermediate results for each department. 3r3-3160.  3r3182.
The operator places the punch card in need of sorting into a special tray, from which they are driven one by one through the sorter. The sorter reads punched cards and distributes them into 13 pockets: ten digital, two “zonal” (for processing string values); and one for discarded punched cards (on which the value by which sorting was performed) is not specified. 3r3168.  3r3182. The algorithm by which the punch card sorter works is very different from the generally accepted algorithms today. The key difference is that punch cards do not compare with each other. 3r3-3160.  3r3182. 3r3133. 3r3168.  3r3182. 3r373. Algorithm for the bitwise sorting of numbers
3r3168.  3r3182. 3r33170. How, then, does the punch card sorter manage to cope with their work? It implements an elegant “bitwise sorting” algorithm. Essence: punch card sorter processes one digit of data field at a time; to sort by three-digit field, a deck of punched cards must be passed through the sorter three times. So, the algorithm:
3r3168.  3r3182. 3r3145.  3r3182.
By ordering punch cards by a numeric data field specified by the operator, the sorter processes only the low-order bit of this field during the first run. And in accordance with the value of this category, it decides where to drop the current punch card: which of the 10 digital pockets (from zero to ninth). 3r3-3160.  3r3182.
After the sorter has completed the distribution of punch cards in the pockets, the operator takes them out and folds them into a common pack. In order: from the zero pocket to the ninth. 3r3-3160.  3r3182.
The operator again places the assembled punch card into the sorter, and repeats steps 1 and 2 sequentially for each digit. 3r3-3160.  3r3182.
Everything, now punched cards are sorted. 3r3-3160.  3r3182. 3r3162. 3r3168.  3r3182. 3r3398. The advantages of the bitwise sorting algorithm
3r3168.  3r3182.
 3r3182.
The bitwise sorting algorithm is elegant and fast. Its computational complexity is O (n log n). In other words, as the number of cards increases, the duration of the algorithm increases linearly, rather than exponentially. 3r3-3160.  3r3182.
The algorithm of bitwise sorting can technically be implemented in the form of a simple electromechanical design. 3r3-3160.  3r3182.
Despite the fact that no more than 3600 cards are placed in the input tray of the punch card sorter, it can sort and a much larger number of punched cards if the operator performs the following two actions in a timely manner: (1) load new punch cards into the tray in time; (2) to empty digital pockets in a timely manner (so that they do not overflow). 3r3-3160.  3r3182. 3r3133. 3r3168.  3r3182. 3r3116. How the coding of string data is performed
3r3168.  3r3182.
 3r3182.
As noted above, numerical values ​​are encoded on the punched card with holes. One hole in the column. We have already sorted out their sorting. It now remains to understand how the punch cards encode the lines and how the punch card sorter organizes them. 3r3-3160.  3r3182.
To work with lines, two “zonal” pockets are provided in the punch card sorter (the 11th and 12th), in addition to the 10th cipher pockets. The principle of encoding alphabetic characters is as follows (see figure below). Each letter is encoded by two holes on a punched card: a hole in the number (from 1 to 9) and a hole in the "zone" (? 11 or 12). 3r3168.  3r3182. 3r3128. 3r3-3160.  3r3182.
Please note: the string with zeros is digital when processing numerical data fields, and “zonal” when processing string data fields. 3r3-3160.  3r3182. 3r3133. 3r3168.  3r3182.
The algorithm for sorting character strings
3r3168.  3r3182. 3r33170. Thanks to this encoding, the sorter can sort the string data fields alphabetically. For this he needs two runs. The algorithm is as follows:
3r3168.  3r3182. 3r3145.  3r3182.
On the first run, the punch sorter orders the cards in much the same way as when sorting numeric data fields. The difference is that in alphabetical sorting only nine pockets are involved: from 1st to 9th. 3r3-3160.  3r3182.
When the sorting is completed, the operator removes punch cards from digital pockets. Again, in order (as is the case with the ordering by the numeric data field): starting with the first pocket and ending with the ninth. The operator sends the assembled pack of cards for sorting a second time. 3r3-3160.  3r3182.
On the second run, the punch card sorter reads only the lines of the “zones” (? 11 and 12), and ignores the lines with numbers. 3r3-3160.  3r3182.
As a result, the ordered punch cards are distributed by the sorter into three “zonal” pockets: from A to I are placed in the 12th pocket; from J to R - in the 11th; from S to Z - to 0th. 3r3-3160.  3r3182.
If the sorting needs to be performed not by one first character, but for example, by two or three first, then the process described above (steps from first to fourth) is performed sequentially for each character. Those. for each character, two runs are made through the punch card sorter. 3r3-3160.  3r3182. 3r3162. 3r3168.  3r3182. 3r33170. 3r3r1616. 3r3171. 3r3168.  3r3182. 3r33170. So, when there were no computers yet, enterprises were processing big data using punched cards. Despite the fact that punch cards are irretrievably outdated, we still face their influence on the current state of computer technology - whenever we have to put up with text formatting with 80-character strings. Something similar is observed, for example, when working with Far Manager. 3r3171. 3r3178. 3r3182. 3r3182. 3r33175. ! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf (t)) {r = i[o]; break} if (! r) {r = a.createElement ("script"), r.type = "text /jаvascript", r.async =! ? r.defer =! ? r.src = t, r.charset = "UTF-8"; var d = function () {var e = a.getElementsByTagName ("script")[0]; e.parentNode.insertBefore (r, e)}; "[object Opera]" == e.opera? a.addEventListener? a.addEventListener ("DOMContentLoaded", d! ): d ()}}} t ("//mediator.mail.ru/script/2820404/"""_mediator") () (); 3r3176. 3r3182. 3r3178. 3r3182. 3r3182. 3r3182. 3r3182.

It may be interesting

  • Comments
  • About article
  • Similar news
This publication has no comments.

weber

Author

16-10-2018, 05:25

Publication Date

Mathematics / Big Data

Category
  • Comments: 0
  • Views: 305
mRemoteNG again cake
How to run SQL Profiler Trace at night,
Connect phpStorm tasks to Bitrix24
Close acquaintance with an
The oldest IT manufacturer in Europe
Is it time to upgrade?
Write a comment
Name:*
E-Mail:


Comments
Quickly this site  could indisputably generally always be dominant relating to every one of web  site buyers, as a consequence of fastidious stories plus exams https://www.pizzahutcouponcode.com/pizza-hut-coupons-code/


Helpful information. Fortunate me I discovered your web site accidentally,
and I am stunned why this accident did not happen earlier! I bookmarked it. Thanks, I've recently been looking for information about this topic for [hide]a[https://www.pizzahutcouponcode.com/pizza-hut-coupons-code/
] long time and yours is the greatest I've discovered so far. But, what concerning the conclusion? Are you positive about the source?


Today, 09:15

Alytani

this is really nice to read..informative post is very good to read..thanks a lot! How is the cost of house cleaning calculated?
Yesterday, 17:14

Legend SEO

It’s very informative and you are obviously very knowledgeable in this area. You have opened my eyes to varying views on this topic with interesting and solid content.

entegrasyon programları
Yesterday, 17:09

taxiseo2

I am really enjoying reading your well written articles. It looks like you spend a lot of effort and time on your blog. I have bookmarked it and I am looking forward to reading new articles. Keep up the good work.

entegrasyon programları
Yesterday, 17:02

taxiseo2

I found so many interesting stuff in your blog especially its discussion. From the tons of comments on your articles, I guess I am not the only one having all the enjoyment here! keep up the good work...먹튀

Yesterday, 16:50

raymond weber

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password