Perl Hacks Tips and Tools for Programming Debugging And

Total Page:16

File Type:pdf, Size:1020Kb

Perl Hacks Tips and Tools for Programming Debugging And Perl Hacks By chromatic , Damian Conway, Curtis "Ovid" Poe ............................................... Publisher: O'Reilly Pub Date: May 2006 Print ISBN-10: 0-596-52674-1 Print ISBN-13: 978-0-59-652674-0 Pages: 296 Table of Contents | Index With more than a million dedicated programmers, Perl has proven to be the best computing language for the latest trends in computing and business. While other languages have stagnated, Perl remains fresh thanks to its community-based development model, which encourages the sharing of information among users. This tradition of knowledge-sharing allows developers to find answers to almost any Perl question they can dream up. And you can find many of those answers right here in Perl Hacks. Like all books in O'Reilly's "Hacks" series, Perl Hacks appeals to a variety of programmers, whether you're a experienced developer or a dabbler who simply enjoys exploring technology. Each hack is a short lesson - some are practical exercises that teach you essential skills, while others merely illustrate some of the fun things that Perl can do. Most hacks have two parts: a direct answer to the immediate problem you need to solve right now and a deeper, subtler technique that you can adapt to other situations. Learn how to add CPAN shortcuts to the Firefox web browser, read files backwards, write graphical games in Perl, and much more. For your convenience, Perl Hacks is divided by topic - not according to any sense of relative difficulty - so you can skip around and stop at any hack you like. Chapters include: Productivity Hacks User Interaction Data Munging Working with Modules Object Hacks Debugging Whether you're a newcomer or an expert, you'll find great value in Perl Hacks, the only Perl guide that offers something useful and fun for everyone. Perl Hacks By chromatic , Damian Conway, Curtis "Ovid" Poe ............................................... Publisher: O'Reilly Pub Date: May 2006 Print ISBN-10: 0-596-52674-1 Print ISBN-13: 978-0-59-652674-0 Pages: 296 Table of Contents | Index Copyright credits Credits Preface Chapter 1. Productivity Hacks Hack 1. Add CPAN Shortcuts to Firefox Hack 2. Put Perldoc to Work Hack 3. Browse Perl Docs Online Hack 4. Make the Most of Shell Aliases Hack 5. Autocomplete Perl Identifiers in Vim Hack 6. Use the Best Emacs Mode for Perl Hack 7. Enforce Local Style Hack 8. Don't Save Bad Perl Hack 9. Automate Checkin Code Reviews Hack 10. Run Tests from Within Vim Hack 11. Run Perl from Emacs Chapter 2. User Interaction Hack 12. Use $EDITOR As Your UI Hack 13. Interact Correctly on the Command Line Hack 14. Simplify Your Terminal Interactions Hack 15. Alert Your Mac Hack 16. Interactive Graphical Apps Hack 17. Collect Configuration Information Hack 18. Rewrite the Web Chapter 3. Data Munging Hack 19. Treat a File As an Array Hack 20. Read Files Backwards Hack 21. Use Any Spreadsheet As a Data Source Hack 22. Factor Out Database Code Hack 23. Build a SQL Library Hack 24. Query Databases Dynamically Without SQL Hack 25. Bind Database Columns Hack 26. Iterate and Generate Expensive Data Hack 27. Pull Multiple Values from an Iterator Chapter 4. Working with Modules Hack 28. Shorten Long Class Names Hack 29. Manage Module Paths Hack 30. Reload Modified Modules Hack 31. Create Personal Module Bundles Hack 32. Manage Module Installations Hack 33. Presolve Module Paths Hack 34. Create a Standard Module Toolkit Hack 35. Write Demos from Tutorials Hack 36. Replace Bad Code from the Outside Hack 37. Drink to the CPAN Hack 38. Improve Exceptional Conditions Hack 39. Search CPAN Modules Locally Hack 40. Package Standalone Perl Applications Hack 41. Create Your Own Lexical Warnings Hack 42. Find and Report Module Bugs Chapter 5. Object Hacks Hack 43. Turn Your Objects Inside Out Hack 44. Serialize Objects (Mostly) for Free Hack 45. Add Information with Attributes Hack 46. Make Methods Really Private Hack 47. Autodeclare Method Arguments Hack 48. Control Access to Remote Objects Hack 49. Make Your Objects Truly Polymorphic Hack 50. Autogenerate Your Accessors Chapter 6. Debugging Hack 51. Find Compilation Errors Fast Hack 52. Make Invisible Characters Apparent Hack 53. Debug with Test Cases Hack 54. Debug with Comments Hack 55. Show Source Code on Errors Hack 56. Deparse Anonymous Functions Hack 57. Name Your Anonymous Subroutines Hack 58. Find a Subroutine's Source Hack 59. Customize the Debugger Chapter 7. Developer Tricks Hack 60. Rebuild Your Distributions Hack 61. Test with Specifications Hack 62. Segregate Developer and User Tests Hack 63. Run Tests Automatically Hack 64. See Test Failure Diagnostics in Color! Hack 65. Test Live Code Hack 66. Cheat on Benchmarks Hack 67. Build Your Own Perl Hack 68. Run Test Suites Persistently Hack 69. Simulate Hostile Environments in Your Tests Chapter 8. Know Thy Code Hack 70. Understand What Happens When Hack 71. Inspect Your Data Structures Hack 72. Find Functions Safely Hack 73. Know What's Core and When Hack 74. Trace All Used Modules Hack 75. Find All Symbols in a Package Hack 76. Peek Inside Closures Hack 77. Find All Global Variables Hack 78. Introspect Your Subroutines Hack 79. Find Imported Functions Hack 80. Profile Your Program Size Hack 81. Reuse Perl Processes Hack 82. Trace Your Ops Hack 83. Write Your Own Warnings Chapter 9. Expand Your Perl Foo Hack 84. Double Your Data with Dualvars Hack 85. Replace Soft References with Real Ones Hack 86. Optimize Away the Annoying Stuff Hack 87. Lock Down Your Hashes Hack 88. Clean Up at the End of a Scope Hack 89. Invoke Functions in Odd Ways Hack 90. Glob Those Sequences Hack 91. Write Less Error-Checking Code Hack 92. Return Smarter Values Hack 93. Return Active Values Hack 94. Add Your Own Perl Syntax Hack 95. Modify Semantics with a Source Filter Hack 96. Use Shared Libraries Without XS Hack 97. Run Two Services on a Single TCP Port Hack 98. Improve Your Dispatch Tables Hack 99. Track Your Approximations Hack 100. Overload Your Operators Hack 101. Learn from Obfuscations Colophon Index Copyright © 2006 O'Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. The Hacks series designations, Perl Hacks, the image of a pair of work boots, and related trade dress are trademarks of O'Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Small print: The technologies discussed in this publication, the limitations on these technologies that technology and content owners seek to impose, and the laws actually limiting the use of these technologies are constantly changing. Thus, some of the hacks described in this publication may not work, may cause unintended harm to systems on which they are used, or may not be consistent with applicable user agreements. Your use of these hacks is at your own risk, and O'Reilly Media, Inc. disclaims responsibility for any damage or expense resulting from their use. In any event, you should take care that your use of these hacks does not violate any applicable laws, including copyright laws. Credits About the Authors chromatic works for O'Reilly Media, where he edits the free and open source web sites of the O'Reilly Network. In his spare time, he writes books such as this one. In the remaining minutes, he contributes to the CPAN, Perl 5, Perl 6, Parrot, and even Pugs. He lives just west of Portland, Oregon by a park and a creek and would like to finish more projects someday, including writing a novel, a comic book, a television show, and sleeping. Catch up on his hobbies at http://wgz.org/chromatic. Dr. Damian Conway is a professional Perl boffin. As the author of numerous popular CPAN modules (http://search.cpan.org/~dconway) and two highly regarded books on Perl, he is also a widely sought-after conference speaker and runs an international IT training companyThoughtstream (http://damian.conway.org)which provides Perl training from beginner to masterclass level throughout Europe, North America, and Australasia. He spends most of his less-than-copious free time working with Larry Wall on the design of Perl 6. [Hack #5], [Hack #13], [Hack #14], [Hack #34], [Hack #54], [Hack #86], [Hack #90], [Hack #92], [Hack #93], [Hack #94], [Hack #95], [Hack #99], [Hack #100] Earlier this century, displaying his usual stellar sense of timing, Curtis "Ovid" Poe switched from mainframes to web programming in Perl and promptly watched the dot-com industry implode. Despite this minor setback and working for several currently non-existent companies, Ovid stuck with Perl and actually discovered he liked it. A frequent speaker at user groups and author of numerous CPAN modules and a popular Perl CGI course, Ovid is a Perl Foundation Steering Committee member and also heads the TPF grant committee.
Recommended publications
  • Learning to Program in Perl
    Learning to Program in Perl by Graham J Ellis Languages of the Web Learning to Program in Perl version 1.7 Written by Graham Ellis [email protected] Design by Lisa Ellis Well House Consultants, Ltd. 404, The Spa, Melksham, Wiltshire SN12 6QL England +44 (0) 1225 708 225 (phone) +44 (0) 1225 707 126 (fax) Find us on the World Wide Web at: http://www.wellho.net Or contact us at: [email protected] Copyright © 2003 by Well House Consultants, Ltd. Printed in Great Britain. Printing History May 1999 1.0 First Edition February 2000 1.1 Minor additions June 2000 1.2 Compliation of modules October 2000 1.3 Name change, revisions April 2002 1.4 Added modules September 2002 1.5 Added modules January 2003 1.6 Updated modules February 2003 1.7 Updated modules This manual was printed on 21 May 2003. Notice of Rights All rights reserved. No part of this manual, including interior design, may be reproduced or translated into any language in any form, or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise, without prior written permission of Well House Consultants except in the case of brief quotations embodied in critical articles and reviews. For more information on getting permission for reprints and excerpts, contact Graham Ellis at Well House Consultants. This manual is subject to the condition that it shall not, by way of trade or otherwise, be lent, sold, hired out or otherwise circulated without the publisher's prior consent, incomplete nor in any form of binding or cover other than in which it is published and without a similar condition including this condition being imposed on the subsequent receiver.
    [Show full text]
  • How to Secure Your Web Site Picked up SQL Injection and Cross-Site Scripting As Sample Cases of Failure Because These Two Are the Two Most Reported Vulnerabilities
    How to Secure your Website rd 3 Edition Approaches to Improve Web Application and Web Site Security June 2008 IT SECURITY CENTER (ISEC) INFORMATION-TECHNOLOGY PROMOTION AGENCY, JAPAN This document is a translation of the original Japanese edition. Please be advises that most of the references referred in this book are offered in Japanese only. Both English and Japanese edition are available for download at: http://www.ipa.go.jp/security/english/third.html (English web page) http://www.ipa.go.jp/security/vuln/websecurity.html (Japanese web page) Translated by Hiroko Okashita (IPA), June 11 2008 Contents Contents ......................................................................................................................................... 1 Preface ........................................................................................................................................... 2 Organization of This Book ........................................................................................................... 3 Intended Reader ......................................................................................................................... 3 Fixing Vulnerabilities – Fundamental Solution and Mitigation Measure - .................................... 3 1. Web Application Security Implementation ............................................................................... 5 1.1 SQL Injection .................................................................................................................... 6 1.2
    [Show full text]
  • Red Hat Enterprise Linux 8 Installing, Managing, and Removing User-Space Components
    Red Hat Enterprise Linux 8 Installing, managing, and removing user-space components An introduction to AppStream and BaseOS in Red Hat Enterprise Linux 8 Last Updated: 2021-06-25 Red Hat Enterprise Linux 8 Installing, managing, and removing user-space components An introduction to AppStream and BaseOS in Red Hat Enterprise Linux 8 Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • MANNING Greenwich (74° W
    Object Oriented Perl Object Oriented Perl DAMIAN CONWAY MANNING Greenwich (74° w. long.) For electronic browsing and ordering of this and other Manning books, visit http://www.manning.com. The publisher offers discounts on this book when ordered in quantity. For more information, please contact: Special Sales Department Manning Publications Co. 32 Lafayette Place Fax: (203) 661-9018 Greenwich, CT 06830 email: [email protected] ©2000 by Manning Publications Co. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by means electronic, mechanical, photocopying, or otherwise, without prior written permission of the publisher. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps. Recognizing the importance of preserving what has been written, it is Manning’s policy to have the books we publish printed on acid-free paper, and we exert our best efforts to that end. Library of Congress Cataloging-in-Publication Data Conway, Damian, 1964- Object oriented Perl / Damian Conway. p. cm. includes bibliographical references. ISBN 1-884777-79-1 (alk. paper) 1. Object-oriented programming (Computer science) 2. Perl (Computer program language) I. Title. QA76.64.C639 1999 005.13'3--dc21 99-27793 CIP Manning Publications Co. Copyeditor: Adrianne Harun 32 Lafayette
    [Show full text]
  • Perl Baseless Myths & Startling Realities
    http://xkcd.com/224/ 1 Perl Baseless Myths & Startling Realities by Tim Bunce, February 2008 2 Parrot and Perl 6 portion incomplete due to lack of time (not lack of myths!) Realities - I'm positive about Perl Not negative about other languages - Pick any language well suited to the task - Good developers are always most important, whatever language is used 3 DISPEL myths UPDATE about perl Who am I? - Tim Bunce - Author of the Perl DBI module - Using Perl since 1991 - Involved in the development of Perl 5 - “Pumpkin” for 5.4.x maintenance releases - http://blog.timbunce.org 4 Perl 5.4.x 1997-1998 Living on the west coast of Ireland ~ Myths ~ 5 http://www.bleaklow.com/blog/2003/08/new_perl_6_book_announced.html ~ Myths ~ - Perl is dead - Perl is hard to read / test / maintain - Perl 6 is killing Perl 5 6 Another myth: Perl is slow: http://www.tbray.org/ongoing/When/200x/2007/10/30/WF-Results ~ Myths ~ - Perl is dead - Perl is hard to read / test / maintain - Perl 6 is killing Perl 5 7 Perl 5 - Perl 5 isn’t the new kid on the block - Perl is 21 years old - Perl 5 is 14 years old - A mature language with a mature culture 8 How many times Microsoft has changed developer technologies in the last 14 years... 9 10 You can guess where thatʼs leading... From “The State of the Onion 10” by Larry Wall, 2006 http://www.perl.com/pub/a/2006/09/21/onion.html?page=3 Buzz != Jobs - Perl5 hasn’t been generating buzz recently - It’s just getting on with the job - Lots of jobs - just not all in web development 11 Web developers tend to have a narrow focus.
    [Show full text]
  • A Java Virtual Machine Extended to Run Parrot Bytecode
    A JAVA VIRTUAL MACHINE EXTENDED TO RUN PARROT BYTECODE A thesis submitted to the University of Manchester for the degree of Master of Science in the Faculty of Engineering and Physical Sciences 2006 By Martin Dahl School of Computer Science Contents Abstract 8 Declaration 9 Copyright 10 Acknowledgements 11 1 Introduction 12 1.1 Objectives and Motivation . 13 1.2 Related Work . 13 1.2.1 Parrot . 14 1.2.2 Pugs . 14 1.2.3 PearColator . 14 1.3 Organisation of the Thesis . 15 2 The Parrot Project 16 2.1 Perl 6 . 17 2.1.1 Design . 17 2.1.2 Perl 6 Internals . 18 2.1.3 Pugs . 19 2.1.4 Parrot Perl 6 Compiler . 19 2.2 Virtual Machine . 20 2.2.1 Design . 20 2.2.2 Architecture . 21 2.2.3 Registers . 22 2.2.4 Instruction Set . 23 2.2.5 Parrot Assembly Language and Intermediate Representation 24 2 2.3 Parrot Magic Cookies . 24 2.3.1 Core PMCs . 24 2.3.2 Other PMCs . 27 2.4 Compiler suite . 27 2.4.1 Perl 6 . 27 2.4.2 Other languages . 27 2.5 Summary . 28 3 Parrot Bytecode Format 30 3.1 Header . 31 3.2 Bytecode Format 1 . 33 3.2.1 Directory Segment . 34 3.2.2 Constant Table Segment . 35 3.2.3 Bytecode Segment . 38 3.2.4 Debug Segment . 38 3.2.5 Fixup Segment . 39 3.3 Summary . 40 4 Parakeet 41 4.1 Overview . 42 4.2 Jikes RVM . 43 4.3 PearColator .
    [Show full text]
  • Easybuild Documentation Release 20210907.0
    EasyBuild Documentation Release 20210907.0 Ghent University Tue, 07 Sep 2021 08:55:41 Contents 1 What is EasyBuild? 3 2 Concepts and terminology 5 2.1 EasyBuild framework..........................................5 2.2 Easyblocks................................................6 2.3 Toolchains................................................7 2.3.1 system toolchain.......................................7 2.3.2 dummy toolchain (DEPRECATED) ..............................7 2.3.3 Common toolchains.......................................7 2.4 Easyconfig files..............................................7 2.5 Extensions................................................8 3 Typical workflow example: building and installing WRF9 3.1 Searching for available easyconfigs files.................................9 3.2 Getting an overview of planned installations.............................. 10 3.3 Installing a software stack........................................ 11 4 Getting started 13 4.1 Installing EasyBuild........................................... 13 4.1.1 Requirements.......................................... 14 4.1.2 Using pip to Install EasyBuild................................. 14 4.1.3 Installing EasyBuild with EasyBuild.............................. 17 4.1.4 Dependencies.......................................... 19 4.1.5 Sources............................................. 21 4.1.6 In case of installation issues. .................................. 22 4.2 Configuring EasyBuild.......................................... 22 4.2.1 Supported configuration
    [Show full text]
  • Java Bytecode Manipulation Framework
    Notice About this document The following copyright statements and licenses apply to software components that are distributed with various versions of the OnCommand Performance Manager products. Your product does not necessarily use all the software components referred to below. Where required, source code is published at the following location: ftp://ftp.netapp.com/frm-ntap/opensource/ 215-09632 _A0_ur001 -Copyright 2014 NetApp, Inc. All rights reserved. 1 Notice Copyrights and licenses The following component is subject to the ANTLR License • ANTLR, ANother Tool for Language Recognition - 2.7.6 © Copyright ANTLR / Terence Parr 2009 ANTLR License SOFTWARE RIGHTS ANTLR 1989-2004 Developed by Terence Parr Partially supported by University of San Francisco & jGuru.com We reserve no legal rights to the ANTLR--it is fully in the public domain. An individual or company may do whatever they wish with source code distributed with ANTLR or the code generated by ANTLR, including the incorporation of ANTLR, or its output, into commerical software. We encourage users to develop software with ANTLR. However, we do ask that credit is given to us for developing ANTLR. By "credit", we mean that if you use ANTLR or incorporate any source code into one of your programs (commercial product, research project, or otherwise) that you acknowledge this fact somewhere in the documentation, research report, etc... If you like ANTLR and have developed a nice tool with the output, please mention that you developed it using ANTLR. In addition, we ask that the headers remain intact in our source code. As long as these guidelines are kept, we expect to continue enhancing this system and expect to make other tools available as they are completed.
    [Show full text]
  • Bioperl What’S Bioperl?
    Bioperl What’s Bioperl? Bioperl is not a new language It is a collection of Perl modules that facilitate the development of Perl scripts for bioinformatics applications. Bioperl and perl Bioperl Modules Perl Modules Perls script input Perl Interpreter output Bioperl and Perl Why bioperl for bioinformatics? Perl is good at file manipulation and text processing, which make up a large part of the routine tasks in bioinformatics. Perl language, documentation and many Perl packages are freely available. Perl is easy to get started in, to write small and medium-sized programs. Where to get help Type perldoc <modulename> in terminal Search for particular module in https://metacpan.org Bioperl Document Object-oriented and Process-oriented programming Process-oriented: Yuan Hao eats chicken Name object: $name Action method: eat Food object: $food Object-oriented: $name->eat($food) Modularize the program Platform and Related Software Required Perl 5.6.1 or higher Version 5.8 or higher is highly recommended make for Mac OS X, this requires installing the Xcode Developer Tools Installation On Linux or Max OS X Install from cpanminus: perlbrew install-cpanm cpanm Bio::Perl Install from source code: git clone https://github.com/bioperl/bioperl-live.git cd bioperl-live perl Build.PL ./Build test (optional) ./Build install Installation On Windows Install MinGW (MinGW is incorporated in Strawberry Perl, but must it be installed through PPM for ActivePerl) : ppm install MinGW Install Module::Build, Test::Harness and Test::Most through CPAN: Type cpan to enter the CPAN shell. At the cpan> prompt, type install CPAN Quit (by typing ‘q’) and reload CPAN.
    [Show full text]
  • The Bioperl Toolkit: Perl Modules for the Life Sciences
    Downloaded from genome.cshlp.org on January 25, 2012 - Published by Cold Spring Harbor Laboratory Press The Bioperl Toolkit: Perl Modules for the Life Sciences Jason E. Stajich, David Block, Kris Boulez, et al. Genome Res. 2002 12: 1611-1618 Access the most recent version at doi:10.1101/gr.361602 Supplemental http://genome.cshlp.org/content/suppl/2002/10/20/12.10.1611.DC1.html Material References This article cites 14 articles, 9 of which can be accessed free at: http://genome.cshlp.org/content/12/10/1611.full.html#ref-list-1 Article cited in: http://genome.cshlp.org/content/12/10/1611.full.html#related-urls Email alerting Receive free email alerts when new articles cite this article - sign up in the box at the service top right corner of the article or click here To subscribe to Genome Research go to: http://genome.cshlp.org/subscriptions Cold Spring Harbor Laboratory Press Downloaded from genome.cshlp.org on January 25, 2012 - Published by Cold Spring Harbor Laboratory Press Resource The Bioperl Toolkit: Perl Modules for the Life Sciences Jason E. Stajich,1,18,19 David Block,2,18 Kris Boulez,3 Steven E. Brenner,4 Stephen A. Chervitz,5 Chris Dagdigian,6 Georg Fuellen,7 James G.R. Gilbert,8 Ian Korf,9 Hilmar Lapp,10 Heikki Lehva¨slaiho,11 Chad Matsalla,12 Chris J. Mungall,13 Brian I. Osborne,14 Matthew R. Pocock,8 Peter Schattner,15 Martin Senger,11 Lincoln D. Stein,16 Elia Stupka,17 Mark D. Wilkinson,2 and Ewan Birney11 1University Program in Genetics, Duke University, Durham, North Carolina 27710, USA; 2National Research Council of
    [Show full text]
  • Perl 6 Der Heilige Gral
    Perl 6 Der heilige Gral Suche nach dem ver... 19. Juli 2000 Perl 6 Design ● Apokalypsen ● Exegesen ● Synopsen Perl 6 Design ● Apokalypsen ● Exegesen ● Synopsen Perl 6 Design ● Apokalypsen ● Exegesen ● Synopsen ● wiki.perl-community.de/bin/view/Wissensbasis/PerlTafel ● http://perl-6.de/ Perl 6 Design ● p6l ([email protected]) ● #perl6 (irc.freenode.org/perl6) Perl 6 Design ● p6l ([email protected]) ● #perl6 (irc.freenode.org/perl6) ● Larry Wall, Damian Conway, Patrick R. Michaud, Allison Randal, chromatic Perl 6 Design ● p6l ([email protected]) ● #perl6 (irc.freenode.org/perl6) ● Larry Wall, Damian Conway, Patrick R. Michaud, Allison Randal, chromatic ● Dan Sugalski, Luke Palmer, Audrey Tang Parrot 1. April 2001 Parrot Code #copy stdin to stdout, except for lines starting with # while left_angle_right_angle: if dollar_underscore[0] =eq= "#": continue_next; } print dollar_underscore; } Parrot ● VM (Virtuelle Maschine) Parrot ● VM (Virtuelle Maschine) ● Software - CPU Parrot ● VM (Virtuelle Maschine) ● native/magische Register Parrot ● VM (Virtuelle Maschine) ● native/magische Register ● Continuations Parrot ● VM (Virtuelle Maschine) ● native/magische Register ● Continuations ● Dan Sugalski Parrot ● VM (Virtuelle Maschine) ● native/magische Register ● Continuations ● Dan Sugalski ● Mastermind Parrot ● VM (Virtuelle Maschine) ● native/magische Register ● Continuations ● Dan Sugalski ● Mastermind - Einzelkämpfer Parrot ● VM (Virtuelle Maschine) ● native/magische Register ● Continuations ● Dan Sugalski ● Allison Randal Allison Randal ● Exchefin der Perl Foundation Allison Randal ● Exchefin der Perl Foundation ● Parrot Leiterin Allison Randal ● Exchefin der Perl Foundation ● Parrot Leiterin ● Parrot Hacker Allison Randal ● Exchefin der Perl Foundation ● Parrot Leiterin ● Parrot Hacker ● Specschreiber Allison Randal ● Exchefin der Perl Foundation ● Parrot Leiterin ● Parrot Hacker ● Specschreiber ● TGE / Punie Parrot's Sprachen Parrot's Sprachen ● .pbc Parrot bytecode Parrot's Sprachen ● .pbc Parrot bytecode ● .pasm P.
    [Show full text]
  • Vasco Da Rocha Figueiras Algoritmos Para Genómica Comparativa
    Universidade de Aveiro Departamento Electrónica, Telecomunicações 2010 e Informática Vasco da Rocha Algoritmos para Genómica Comparativa Figueiras Universidade de Aveiro Departamento de Electrónica, Telecomunicações 2010 e Informática Vasco da Rocha Algoritmos para Genómica Comparativa Figueiras Dissertação apresentada à Universidade de Aveiro para cumprimento dos requisitos necessários à obtenção do grau de Mestre em Engenharia Electrónica e Telecomunicações, realizada sob a orientação científica do Doutor José Luís Oliveira, Professor associado da Universidade de Aveiro. o júri presidente Prof. Doutor Armando José Formoso de Pinho Professor Associado do Departamento de Electrónica, Telecomunicações e Informática da Universidade de Aveiro Prof. Doutor Rui Pedro Sanches de Castro Lopes Professor Coodenador do Departamento de Informática e Comunicações do Instituto Politécnico de Bragança orientador Prof. Doutor José Luis Guimarães de Oliveira Professor Associado do Departamento de Electrónica, Telecomunicações e Informática da Universidade de Aveiro agradecimentos Durante o desenvolvimento desta dissertação, recebi muito apoio de colegas e amigos. Agora que termino o trabalho não posso perder a oportunidade de agradecer a todas as pessoas que me ajudaram nesta etapa. Um agradecimento ao meu orientador Professor Doutor José Luís Oliveira e ao Doutor Miguel Monsanto Pinheiro, pela oportunidade de aprendizagem. À minha família pelo apoio incondicional, incentivo e carinho. Aos meus colegas e amigos por toda a ajuda e pelos momentos de convívio e de descontracção, que quebraram tantas dificuldades, ao longo desta etapa. A ti, Rita por todo o carinho, paciência e amor. palavras-chave Bioinformática, sequenciação, BLAST, alinhamento de sequências, genómica comparativa. resumo Com o surgimento da Genómica e da Proteómica, a Bioinformática conduziu a alguns dos avanços científicos mais relevantes do século XX.
    [Show full text]