What is the difference between procedural programming and functional programming?

I’ve read the Wikipedia articles for both procedural programming and functional programming, but I’m still slightly confused. Could someone boil it down to the core?

via glossary – What is the difference between procedural programming and functional programming? – Stack Overflow.

A functional language (ideally) allows you to write a mathematical function, i.e. a function that takes n arguments and returns a value. If the program is executed, this function is evaluated.

A procedural language, on the other hand, performs a series of sequential steps, where the functional program would be nested. There’s a way of transforming sequential logic into functional logic called continuation passing style.

As a consequence, a purely functional program always yields the same value for an input, and the order of evaluation is not well-defined; which means that uncertain values like user input or random values are hard to model in purely functional languages.

What are colored coins?

What exactly are colored coins? I’ve tried understanding, but I don’t quite get it yet . . . Do any examples exist?

via alternatives – What are colored coins? – Bitcoin Stack Exchange.

Colored coins are a method to track the origin of bitcoins, so that a certain set of coins can be set aside and conserved, allowing a party to acknowledge them in various ways. Such coins can be used to represent arbitrary digital tokens, such as stocks, bonds, smart property and so on.

The colored coins protocol is decentralized just like Bitcoin, but the current effort to develop an implementation is done under the BitcoinX project (tentative name), which also aims to provide some related services.

As this is still under development, you will not find any existing examples.

You can read more about it in Overview of colored coins (work in progress).

What is XaaS (anything as a service)?

XaaS is a collective term said to stand for a number of things including “X as a service,” “anything as a service” or “everything as a service.” The acronym refers to an increasing number of services that are delivered over the Internet rather than provided locally or on-site. XaaS is the essence of cloud computing.

via What is XaaS (anything as a service)? – Definition from WhatIs.com.

Web Proxy Autodiscovery Protocol

The Web Proxy Auto-Discovery Protocol (WPAD) is a method used by clients to locate a URL of a configuration file using DHCP and/or DNS discovery methods. Once detection and download of the configuration file is complete it can be executed to determine the proxy for a specified URL. The WPAD protocol only outlines the mechanism for discovering the location of this file, but the most commonly deployed configuration file format is the Proxy auto-config format originally designed by Netscape in 1996 for Netscape Navigator 2.0.[1] The WPAD protocol was drafted by a consortium of companies including Inktomi Corporation, Microsoft Corporation, RealNetworks, Inc., and Sun Microsystems, Inc.. WPAD is documented in an INTERNET-DRAFT which expired in December 1999.[2] However WPAD is still supported by all major browsers.[3][4] WPAD was first included with Internet Explorer 5.0.

via Web Proxy Autodiscovery Protocol – Wikipedia, the free encyclopedia.

Trusted Platform Module

Software can use a Trusted Platform Module to authenticate hardware devices. Since each TPM chip has a unique and secret RSA key burned in as it is produced, it is capable of performing platform authentication.

Generally, pushing the security down to the hardware level in conjunction with software provides more protection than a software-only solution. However even where a TPM is used, a key is still vulnerable while a software application that has obtained it from the TPM is using it to perform encryption/decryption operations, as has been illustrated in the case of a cold boot attack.

via Trusted Platform Module – Wikipedia, the free encyclopedia.

“Trusted Platform Module (TPM) Specifications”. Trusted Computing Group.

Building Web Services the REST Way

Representational State Transfer is intended to evoke an image of how a well-designed Web application behaves: a network of web pages (a virtual state-machine), where the user progresses through an application by selecting links (state transitions), resulting in the next page (representing the next state of the application) being transferred to the user and rendered for their use

via.  Building Web Services the REST Way

MiFi

MiFi is a line of compact wireless routers produced by Novatel Wireless that act as mobile Wi-Fi hotspots. MiFi stands for ‘My Wi-Fi’. The MiFi can be connected to a mobile phone (cellular) carrier and provide internet access for up to 5 devices. The MiFi works at a distance up to 10 m (30 ft) and will provide internet or network access to any WiFi enabled peripheral device.

via MiFi – Wikipedia, the free encyclopedia.

Network coding

Network coding – Wikipedia, the free encyclopedia.

Network coding is a technique where, instead of simply relaying the packets of information they receive, the nodes of a network will take several packets and combine them together for transmission. This can be used to attain the maximum possible information flow in a network. Network coding is a field of information theory and coding theory.

HTML span tag

The <span> tag is used to group inline-elements in a document.

The <span> tag provides no visual change by itself.

The <span> tag provides a way to add a hook to a part of a text or a part of a document.

When the text is hooked in a <span> element you can add styles to the content, or manipulate the content with for example JavaScript.

via HTML span tag.

From The SPAN Tag

Use span tags when you don’t want any changes to the layout other than exactly what you specify in the styles of the span. For example, if you use a <div> or <p> most browsers will add space around the element, because they are block elements.