SlideShare a Scribd company logo
For Documentation and Downloads Visit
CURRENT TECHNOLOGY ,[object Object],[object Object]
AN INSTANCE
WHERE’S THE PROBLEM ,[object Object]
So it is capable of representing time which can be addressed within total of 231 seconds.
According to this, the latest time that it can store is 03:14:07 UTC, Tuesday, January 19, 2038. After this time, the sign bit of the 32-bit signed integer will be set and it will represent a negative number. ,[object Object]
AN INSTANCE
WHY IS THE PROBLEM ,[object Object]
Unix internal time is commonly stored in a data structure using a long int containing the number of seconds since 1970.
In a 32-bit machine, this value is sufficient to store time up to 18-jan-2038. After this date, 32-bit clocks will overflow and return erroneous values such as 32-dec-1969 or 13-dec-1901. ,[object Object]
An examle C program int main (int argc, char **argv)  {         time_t t;         t = (time_t) 1000000000;        printf ("%d, %s", (int) t, asctime (gmtime (&t)));         t = (time_t) (0x7FFFFFFF);         printf ("%d, %s", (int) t, asctime (gmtime (&t)));         t++;         printf ("%d, %s", (int) t, asctime (gmtime (&t)));  return 0;  }
OUTPUT ,[object Object]
2147483647, Tue  Jan 19  03:14:07    2038
2147483648,  Fri   Dec 13  20:45:52   1901,[object Object],[object Object]
Most programs maybe affected in or very close to 2038.
Hardware, such as clock circuits, which has adopted the Unix time convention, may also be affected if 32-bit registers are used.

More Related Content

Viewers also liked

Genetic Risk assesment
Genetic Risk assesmentGenetic Risk assesment
Genetic Risk assesment
Rafael Trujillo Vílchez
 
Gmails Quota Secrets
Gmails Quota SecretsGmails Quota Secrets
Gmails Quota Secrets
Uri Levanon
 
Google Safe Mode Faster Browsing without Addons
Google Safe Mode Faster Browsing without AddonsGoogle Safe Mode Faster Browsing without Addons
Google Safe Mode Faster Browsing without Addons
SZI Technologies Pvt Ltd
 
Gifi
GifiGifi
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
argoncillo
 
Gifi wireless Technology
Gifi wireless TechnologyGifi wireless Technology
Gifi wireless Technology
Tofik Kaida
 
Iris scanning
Iris scanningIris scanning
Iris scanning
himansupaichha
 
Insects powerpoint
Insects powerpointInsects powerpoint
Insects powerpoint
lgotthar
 
Insects Powerpoint
Insects PowerpointInsects Powerpoint
Insects Powerpoint
hewittw
 
Captcha seminar
Captcha seminar Captcha seminar
Captcha seminar
Aurobindo Nayak
 
Diamond chip
Diamond chipDiamond chip
Diamond chip
PRADEEP Cheekatla
 
captcha.ppt
 captcha.ppt captcha.ppt
captcha.ppt
avinash2008
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
JASON WOODHOUSE
 
Project Oxygen
Project OxygenProject Oxygen
Project Oxygen
shivu1234
 
Pill camera
Pill cameraPill camera
Pill camera
Joyce Thomas
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
Subhash Vadadoriya
 
Rain technology
Rain technologyRain technology
Rain technology
Yamuna Devi
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
Seungyun Lee
 
Mobile commerce ppt
Mobile commerce pptMobile commerce ppt
Mobile commerce ppt
Tapesh Chalisgaonkar
 
M commerce ppt
M commerce pptM commerce ppt
M commerce ppt
Santosh Kumar
 

Viewers also liked (20)

Genetic Risk assesment
Genetic Risk assesmentGenetic Risk assesment
Genetic Risk assesment
 
Gmails Quota Secrets
Gmails Quota SecretsGmails Quota Secrets
Gmails Quota Secrets
 
Google Safe Mode Faster Browsing without Addons
Google Safe Mode Faster Browsing without AddonsGoogle Safe Mode Faster Browsing without Addons
Google Safe Mode Faster Browsing without Addons
 
Gifi
GifiGifi
Gifi
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Gifi wireless Technology
Gifi wireless TechnologyGifi wireless Technology
Gifi wireless Technology
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Insects powerpoint
Insects powerpointInsects powerpoint
Insects powerpoint
 
Insects Powerpoint
Insects PowerpointInsects Powerpoint
Insects Powerpoint
 
Captcha seminar
Captcha seminar Captcha seminar
Captcha seminar
 
Diamond chip
Diamond chipDiamond chip
Diamond chip
 
captcha.ppt
 captcha.ppt captcha.ppt
captcha.ppt
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
 
Project Oxygen
Project OxygenProject Oxygen
Project Oxygen
 
Pill camera
Pill cameraPill camera
Pill camera
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Rain technology
Rain technologyRain technology
Rain technology
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
 
Mobile commerce ppt
Mobile commerce pptMobile commerce ppt
Mobile commerce ppt
 
M commerce ppt
M commerce pptM commerce ppt
M commerce ppt
 

Similar to Y2 k38.

Epoch Time
Epoch TimeEpoch Time
Epoch Time
Gurudutt07
 
Bringing GOES Transmitters Back to the Future | YSI Webinar
Bringing GOES Transmitters Back to the Future | YSI WebinarBringing GOES Transmitters Back to the Future | YSI Webinar
Bringing GOES Transmitters Back to the Future | YSI Webinar
Xylem Inc.
 
Php date & time functions
Php date & time functionsPhp date & time functions
Php date & time functions
Programmer Blog
 
Who's Afraid Of 2038?
Who's Afraid Of 2038?Who's Afraid Of 2038?
Who's Afraid Of 2038?
Michael Schwern
 
M|18 Analytics in the Real World, Case Studies and Use Cases
M|18 Analytics in the Real World, Case Studies and Use CasesM|18 Analytics in the Real World, Case Studies and Use Cases
M|18 Analytics in the Real World, Case Studies and Use Cases
MariaDB plc
 
Final Report
Final ReportFinal Report
Final Report
Tilak Maharana
 
Python time
Python timePython time
Python time
Janu Jahnavi
 
Python datetime
Python datetimePython datetime
Python datetime
sureshraj43
 
doc
docdoc
jkfdlsajfklafj
jkfdlsajfklafjjkfdlsajfklafj
jkfdlsajfklafj
PlanetExpressATX
 
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .pptembedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
Tusharchauhan939328
 
How to Create a Countdown Timer in Python.pdf
How to Create a Countdown Timer in Python.pdfHow to Create a Countdown Timer in Python.pdf
How to Create a Countdown Timer in Python.pdf
abhishekdf3
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
Praveen M Jigajinni
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
Middle East International School
 
Design of Temperature Data Logger Using Thermocouple
Design of Temperature Data Logger Using ThermocoupleDesign of Temperature Data Logger Using Thermocouple
Design of Temperature Data Logger Using Thermocouple
IRJET Journal
 
Chapter 1 Computer Fundamentals (XI) (1).pptx
Chapter 1 Computer  Fundamentals (XI) (1).pptxChapter 1 Computer  Fundamentals (XI) (1).pptx
Chapter 1 Computer Fundamentals (XI) (1).pptx
mehrajdin18
 
Report
ReportReport
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTINGINTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
sharock2
 
Report for DIGITAL CLOCK 12011042 Manoj.pdf
Report for DIGITAL  CLOCK 12011042 Manoj.pdfReport for DIGITAL  CLOCK 12011042 Manoj.pdf
Report for DIGITAL CLOCK 12011042 Manoj.pdf
ManojKumar533913
 
Synchronizing Parallel Tasks Using STM
Synchronizing Parallel Tasks Using STMSynchronizing Parallel Tasks Using STM
Synchronizing Parallel Tasks Using STM
IJERA Editor
 

Similar to Y2 k38. (20)

Epoch Time
Epoch TimeEpoch Time
Epoch Time
 
Bringing GOES Transmitters Back to the Future | YSI Webinar
Bringing GOES Transmitters Back to the Future | YSI WebinarBringing GOES Transmitters Back to the Future | YSI Webinar
Bringing GOES Transmitters Back to the Future | YSI Webinar
 
Php date & time functions
Php date & time functionsPhp date & time functions
Php date & time functions
 
Who's Afraid Of 2038?
Who's Afraid Of 2038?Who's Afraid Of 2038?
Who's Afraid Of 2038?
 
M|18 Analytics in the Real World, Case Studies and Use Cases
M|18 Analytics in the Real World, Case Studies and Use CasesM|18 Analytics in the Real World, Case Studies and Use Cases
M|18 Analytics in the Real World, Case Studies and Use Cases
 
Final Report
Final ReportFinal Report
Final Report
 
Python time
Python timePython time
Python time
 
Python datetime
Python datetimePython datetime
Python datetime
 
doc
docdoc
doc
 
jkfdlsajfklafj
jkfdlsajfklafjjkfdlsajfklafj
jkfdlsajfklafj
 
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .pptembedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
embedded system hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh .ppt
 
How to Create a Countdown Timer in Python.pdf
How to Create a Countdown Timer in Python.pdfHow to Create a Countdown Timer in Python.pdf
How to Create a Countdown Timer in Python.pdf
 
Chapter 1 computer fundamentals
Chapter 1 computer  fundamentalsChapter 1 computer  fundamentals
Chapter 1 computer fundamentals
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Design of Temperature Data Logger Using Thermocouple
Design of Temperature Data Logger Using ThermocoupleDesign of Temperature Data Logger Using Thermocouple
Design of Temperature Data Logger Using Thermocouple
 
Chapter 1 Computer Fundamentals (XI) (1).pptx
Chapter 1 Computer  Fundamentals (XI) (1).pptxChapter 1 Computer  Fundamentals (XI) (1).pptx
Chapter 1 Computer Fundamentals (XI) (1).pptx
 
Report
ReportReport
Report
 
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTINGINTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
INTRODUCTION TO COMPUTING OR FUNDAMENTAL COMPUTING
 
Report for DIGITAL CLOCK 12011042 Manoj.pdf
Report for DIGITAL  CLOCK 12011042 Manoj.pdfReport for DIGITAL  CLOCK 12011042 Manoj.pdf
Report for DIGITAL CLOCK 12011042 Manoj.pdf
 
Synchronizing Parallel Tasks Using STM
Synchronizing Parallel Tasks Using STMSynchronizing Parallel Tasks Using STM
Synchronizing Parallel Tasks Using STM
 

More from Presentaionslive.blogspot.com

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
Presentaionslive.blogspot.com
 
Phis
PhisPhis
Network security
Network securityNetwork security
Mobile computing
Mobile computingMobile computing
Honeypots
HoneypotsHoneypots
Grid computing
Grid computingGrid computing
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
Presentaionslive.blogspot.com
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
Presentaionslive.blogspot.com
 
Information Security
Information SecurityInformation Security
Information Security
Presentaionslive.blogspot.com
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
Presentaionslive.blogspot.com
 
Steganography
Steganography Steganography
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
Presentaionslive.blogspot.com
 
Novel architecture
Novel architectureNovel architecture
Novel architecture
Presentaionslive.blogspot.com
 
Neural networks
Neural networksNeural networks
Multimedia and gaming
Multimedia and gamingMultimedia and gaming
Multimedia and gaming
Presentaionslive.blogspot.com
 
Ethical hacking
Ethical hackingEthical hacking
A multimodal interaction framework for pervasive game applications
A   multimodal   interaction   framework   for pervasive   game   applicationsA   multimodal   interaction   framework   for pervasive   game   applications
A multimodal interaction framework for pervasive game applicationsPresentaionslive.blogspot.com
 
1 spattern matching using biometric techniques
1 spattern matching using biometric techniques1 spattern matching using biometric techniques
1 spattern matching using biometric techniques
Presentaionslive.blogspot.com
 
Honeypots
HoneypotsHoneypots
Unique p mail-addressing 97-03
Unique p mail-addressing 97-03Unique p mail-addressing 97-03
Unique p mail-addressing 97-03
Presentaionslive.blogspot.com
 

More from Presentaionslive.blogspot.com (20)

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Phis
PhisPhis
Phis
 
Network security
Network securityNetwork security
Network security
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Grid computing
Grid computingGrid computing
Grid computing
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Information Security
Information SecurityInformation Security
Information Security
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
 
Steganography
Steganography Steganography
Steganography
 
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
 
Novel architecture
Novel architectureNovel architecture
Novel architecture
 
Neural networks
Neural networksNeural networks
Neural networks
 
Multimedia and gaming
Multimedia and gamingMultimedia and gaming
Multimedia and gaming
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A multimodal interaction framework for pervasive game applications
A   multimodal   interaction   framework   for pervasive   game   applicationsA   multimodal   interaction   framework   for pervasive   game   applications
A multimodal interaction framework for pervasive game applications
 
1 spattern matching using biometric techniques
1 spattern matching using biometric techniques1 spattern matching using biometric techniques
1 spattern matching using biometric techniques
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Unique p mail-addressing 97-03
Unique p mail-addressing 97-03Unique p mail-addressing 97-03
Unique p mail-addressing 97-03
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Y2 k38.

  • 1. For Documentation and Downloads Visit
  • 2.
  • 4.
  • 5. So it is capable of representing time which can be addressed within total of 231 seconds.
  • 6.
  • 8.
  • 9. Unix internal time is commonly stored in a data structure using a long int containing the number of seconds since 1970.
  • 10.
  • 11. An examle C program int main (int argc, char **argv) { time_t t; t = (time_t) 1000000000; printf ("%d, %s", (int) t, asctime (gmtime (&t))); t = (time_t) (0x7FFFFFFF); printf ("%d, %s", (int) t, asctime (gmtime (&t))); t++; printf ("%d, %s", (int) t, asctime (gmtime (&t))); return 0; }
  • 12.
  • 13. 2147483647, Tue Jan 19 03:14:07 2038
  • 14.
  • 15. Most programs maybe affected in or very close to 2038.
  • 16. Hardware, such as clock circuits, which has adopted the Unix time convention, may also be affected if 32-bit registers are used.
  • 17.
  • 18.
  • 19. Change time_t from 32-bit signed to 32-bit unsigned.
  • 20.