enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Unix time - Wikipedia

    en.wikipedia.org/wiki/Unix_time

    The C standard library uses Unix time for all date and time functions, and Unix time is sometimes referred to as time_t, the name of the data type used for timestamps in C and C++. C's Unix time functions are defined as the system time API in the POSIX specification. [15]

  3. Year 2038 problem - Wikipedia

    en.wikipedia.org/wiki/Year_2038_problem

    As of MySQL 8.0.28, released in January 2022, the functions FROM_UNIXTIME(), UNIX_TIMESTAMP(), and CONVERT_TZ() handle 64-bit values on platforms that support them. This includes 64-bit versions of Linux, macOS, and Windows. [32] [33] In older versions, built-in functions like UNIX_TIMESTAMP() will return 0 after 03:14:07 UTC on 19 January 2038 ...

  4. Lamport timestamp - Wikipedia

    en.wikipedia.org/wiki/Lamport_timestamp

    The Lamport timestamp algorithm is a simple logical clock algorithm used to determine the order of events in a distributed computer system.As different nodes or processes will typically not be perfectly synchronized, this algorithm is used to provide a partial ordering of events with minimal overhead, and conceptually provide a starting point for the more advanced vector clock method.

  5. Timestamp - Wikipedia

    en.wikipedia.org/wiki/Timestamp

    A distinction is sometimes made between the terms datestamp, timestamp and date-timestamp: Datestamp or DS: A date, for example 2025-01-10 according to ISO 8601; Timestamp or TS: A time of day, for example 08:01:38 using 24-hour clock; Date-timestamp or DTS: Date and time, for example 2025-01-10, 08:01:38

  6. Logical clock - Wikipedia

    en.wikipedia.org/wiki/Logical_clock

    Logical local time is used by the process to mark its own events, and logical global time is the local information about global time. A special protocol is used to update logical local time after each local event, and logical global time when processes exchange data. [2]

  7. Timestamp-based concurrency control - Wikipedia

    en.wikipedia.org/wiki/Timestamp-based...

    In this case, if the transaction's timestamp is after the object's read timestamp, the read timestamp is set to the transaction's timestamp. If a transaction wants to write to an object, but the transaction started before the object's read timestamp it means that something has had a look at the object, and we assume it took a copy of the object ...

  8. Timestamping (computing) - Wikipedia

    en.wikipedia.org/wiki/Timestamping_(computing)

    In computing, timestamping refers to the use of an electronic timestamp to provide a temporal order among a set of events. Timestamping techniques are used in a variety of computing fields, from network management and computer security to concurrency control .

  9. Linked timestamping - Wikipedia

    en.wikipedia.org/wiki/Linked_timestamping

    Linked timestamping is inherently more secure than the usual, public-key signature based time-stamping. All consequential time-stamps "seal" previously issued ones - hash chain (or other authenticated dictionary in use) could be built only in one way; modifying issued time-stamps is nearly as hard as finding a preimage for the used cryptographic hash function.