SlideShare a Scribd company logo
1 of 46
esolang Esoterische Programmiersprachen Thomas Zimmermann [email_address] http://www.2000i.de/
Esoterik Eine Definition Exklusiver Kreis Eingeweihter Heiliges Wissen und Kultpraktiken Begriffsgrundlage fĂŒr wissenschaftliche Studien Spirituelle AufbrĂŒche in der Gegenwart Urwissen der Menschheit Okkulte Praktiken SpiritualitĂ€t und Mystik Esoterik als ReligiösitĂ€t
Esoterische  Programm Formen ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Einschub Quines ,[object Object],[object Object],[object Object],[object Object]
Quines Eine Analogie Quines Compiler AusfĂŒhrung foo.xx foo foo.xx Interpreter/ AusfĂŒhrung foo.xx foo.xx Analogie AusfĂŒhrung Compiler AusfĂŒhrung foo.xx Box mit Knopf Quines als Kopierer bzw. Replikator
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Quines Ein Beispiel $ touch foo.pl $ ll foo.pl -rw-------  1 zimmerth general  0 Nov 10 16:01 foo.pl $ perl foo.pl > foo.out $ diff foo.pl foo.out $ ll foo.out -rw-------  1 zimmerth general  0 Nov 10 16:01 foo.out
Noch ein Einschub Foo ,[object Object],[object Object],[object Object],The word `foo' had an immediate prewar history in comic strips and cartoons. The earliest documented uses were in the surrealist "Smokey Stover“ comic strip by Bill Holman about a fireman.
Esoterische Programmiermethoden ,[object Object],[object Object],[object Object],[object Object],[object Object]
Esoterische Programmiersprachen Brainfuck Shakespeare Piet Chef ?
brainfuck Brain: an apparatus with which we think we think. -- Ambrose Bierce
Brainfuck Urban MĂŒller Brainfuck >+++++++++[<++++++++>-]<.>+++++++ [<++++>-]<+.+++++++..+++.[-]>++++++++ [<++++>-]<.#>+++++++++++[<+++++>-] <.>++++++++[<+++>-]<.+++.------.--------.[-]> ++++++++[<++++>-]<+.[-]++++++++++.
Brainfuck Language Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],p a: ...
Brainfuck  Anweisungen ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Brainfuck Hello World ,[object Object],a[0] a[1] 0 0 72 0  p ... a: 0 0 9  72  0 H 101  0 e 108  0 ll 111  0 o 0  0 111  0 87  0 114  0 108  0 100  0 33  0 10  0 32  0 W o r l d  !
Brainfuck Ein Quine ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Portable Brainfuck Interpreter in C ,[object Object],[object Object]
Compressed Brainfuck www.catseye.mb.ca/esoteric/bf/compressed.html ,[object Object],Compressed Brainfuck Format 00xxxyyy: single: only instruction  xxx  (xxx==yyy) 00xxxyyy: pair: instruction  xxx  then  yyy  (xxx!=yyy) 01xxxyyy: repeat: instruction  yyy ,  xxx  (2-9) times  10xxyyzz: triplet: instruction  xx  then  yy  then  zz  11xxxxyy: repeat: instruction  yy ,  xxxx  (2-17) times
Brainfuck Audio www.2000i.de/brainfuck-audio/ (2bf) ParallelitÀt -3 -4 +2 +2 +1 -1 -2 +2 1 Viertel =  2 Brainfuck-Anweisungen Schleifen
chef I don‘t even butter my bread.  I consider that cooking. -- Katherine Cebrian
Chef Anwendungsgebiet
Chef Language Concepts ,[object Object],[object Object],[object Object],[object Object]
Chef Syntax Elements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chef Hello World Souffle (1) ,[object Object]
Chef Hello World Souffle (2) ,[object Object],33 potatoes 100 dijon mustard 72 haricot beans 108 lard 108 lard 101 eggs 111 oil 111 oil 119 water 32 zucchinis 114 red salmon 108 lard ! d H l l e o o w r l
piet The Art of Computer Programming. -- Donald E. Knuth
Einschub Piet Mondrian
Google und Piet Mondrian
Einschub Googol und Googolplex ,[object Object],[object Object]
Piet Language Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Piet Colours white black Cycles Other Colors light red yellow green cyan blue magenta dark
Piet Colour Cycles red yellow green cyan blue magenta Hue Cycle Lightness Cycle light normal dark
Piet Kontrollfluss 1 2 0 0: CC 3 CC CC 1: CC 2: CC 3: CC CC CC CC
Piet Syntax Elements ,[object Object],[object Object],[object Object],[object Object]
Piet  Hello World OriginalgrĂ¶ĂŸe (30x29) Commands Cycles VergrĂ¶ĂŸerung (1400%) 72 101 108 111 119 32 114 33 (90)
Piet  Fibonacci-Zahlen VergrĂ¶ĂŸerung (4400%) Commands Cycles OriginalgrĂ¶ĂŸe (10x11)
shakespeare Trying to pop when the stack is empty is a sure sign that the author has not yet perfected her storytelling skills, and will severly disappoint the runtime system.
Shakespeare Hello World ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Shakespeare Hello World (2) ,[object Object],[object Object],[object Object],[object Object]
Shakespeare Zuweisungen ,[object Object],[object Object],[object Object],Romeo = 2 6  ·(–1) = –64 Romeo = 2 3  ·(1) – Romeo = 8 – (–64) = 72 Romeo gibt dich aus!
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Shakespeare Hello World (3) H [Enter Hamlet and Romeo]   Hamlet: You lying stupid fatherless big smelly half-witted coward! You are as stupid as the difference between a handsome rich brave hero and thyself! Speak your mind! You are as brave as the sum of your fat little stuffed misused dusty old rotten codpiece and a beautiful fair warm peaceful sunny summer's day. You are as healthy as the difference between the sum of the sweetest reddest rose and my father and yourself! Speak your mind! [Enter Hamlet and Romeo]   Hamlet: You lying stupid fatherless big smelly half-witted coward! You are as stupid as the difference between a handsome rich brave hero and thyself! Speak your mind! – 128+32= –96 (4+1)–   (–96)=101 e 101+(8   –1)=108 l ... l
Shakespeare Reverse ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Shakespeare Reverse (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Scene II: Pushing to the very end. Lady Macbeth: Open your mind! Remember yourself. Othello: You are as hard as the sum of yourself and a stone wall. Am I as horrid as a flirt-gill? Lady Macbeth: If not, let us return to scene II. Recall your imminent death! Scene II: Pushing to the very end. Lady Macbeth: Open your mind! Remember yourself. Othello: You are as hard as the sum of yourself and a stone wall. Am I as horrid as a flirt-gill? Scene II: Pushing to the very end. Lady Macbeth: Open your mind! Remember yourself. push Lady Macbeth++ Lady Macbeth-- pop If not EOI goto scene 2
Shakespeare Reverse (3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Scene III: Once you pop, you can't stop! Lady Macbeth: Recall your unhappy childhood. Speak your mind! Othello: You are as vile as the sum of yourself and a toad! Are you better than nothing? Scene III: Once you pop, you can't stop! Lady Macbeth: Recall your unhappy childhood. Speak your mind! Lady Macbeth-- if Lady Macbeth>0 goto scene 3 pop print
conclusion A conclusion is the place where you got tired of thinking -- Martin H. Fischer
That‘s All? No, Don®t Miss... Befunge 4-dimensional control flow Intercal   Be part of the madness Unlambda Extreme functional programming Java2K Unleashing the power of rand() Malbolge Programming from hell
the end www.2000i.de/esolang2002/ user: pinky password: brain Vielen Dank fĂŒr die Aufmerksamkeit!

More Related Content

More from Thomas Zimmermann

Software Analytics = Sharing Information
Software Analytics = Sharing InformationSoftware Analytics = Sharing Information
Software Analytics = Sharing InformationThomas Zimmermann
 
Predicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode OperationsPredicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode OperationsThomas Zimmermann
 
Analytics for smarter software development
Analytics for smarter software development Analytics for smarter software development
Analytics for smarter software development Thomas Zimmermann
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedThomas Zimmermann
 
Klingon Countdown Timer
Klingon Countdown TimerKlingon Countdown Timer
Klingon Countdown TimerThomas Zimmermann
 
Data driven games user research
Data driven games user researchData driven games user research
Data driven games user researchThomas Zimmermann
 
Not my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsNot my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsThomas Zimmermann
 
Empirical Software Engineering at Microsoft Research
Empirical Software Engineering at Microsoft ResearchEmpirical Software Engineering at Microsoft Research
Empirical Software Engineering at Microsoft ResearchThomas Zimmermann
 
Security trend analysis with CVE topic models
Security trend analysis with CVE topic modelsSecurity trend analysis with CVE topic models
Security trend analysis with CVE topic modelsThomas Zimmermann
 
Analytics for software development
Analytics for software developmentAnalytics for software development
Analytics for software developmentThomas Zimmermann
 
Characterizing and predicting which bugs get fixed
Characterizing and predicting which bugs get fixedCharacterizing and predicting which bugs get fixed
Characterizing and predicting which bugs get fixedThomas Zimmermann
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesThomas Zimmermann
 
Cross-project defect prediction
Cross-project defect predictionCross-project defect prediction
Cross-project defect predictionThomas Zimmermann
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesThomas Zimmermann
 
Predicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency GraphsPredicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency GraphsThomas Zimmermann
 
Quality of Bug Reports in Open Source
Quality of Bug Reports in Open SourceQuality of Bug Reports in Open Source
Quality of Bug Reports in Open SourceThomas Zimmermann
 
Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities Thomas Zimmermann
 
Got Myth? Myths in Software Engineering
Got Myth? Myths in Software EngineeringGot Myth? Myths in Software Engineering
Got Myth? Myths in Software EngineeringThomas Zimmermann
 

More from Thomas Zimmermann (20)

Software Analytics = Sharing Information
Software Analytics = Sharing InformationSoftware Analytics = Sharing Information
Software Analytics = Sharing Information
 
MSR 2013 Preview
MSR 2013 PreviewMSR 2013 Preview
MSR 2013 Preview
 
Predicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode OperationsPredicting Method Crashes with Bytecode Operations
Predicting Method Crashes with Bytecode Operations
 
Analytics for smarter software development
Analytics for smarter software development Analytics for smarter software development
Analytics for smarter software development
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
 
Klingon Countdown Timer
Klingon Countdown TimerKlingon Countdown Timer
Klingon Countdown Timer
 
Data driven games user research
Data driven games user researchData driven games user research
Data driven games user research
 
Not my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignmentsNot my bug! Reasons for software bug report reassignments
Not my bug! Reasons for software bug report reassignments
 
Empirical Software Engineering at Microsoft Research
Empirical Software Engineering at Microsoft ResearchEmpirical Software Engineering at Microsoft Research
Empirical Software Engineering at Microsoft Research
 
Security trend analysis with CVE topic models
Security trend analysis with CVE topic modelsSecurity trend analysis with CVE topic models
Security trend analysis with CVE topic models
 
Analytics for software development
Analytics for software developmentAnalytics for software development
Analytics for software development
 
Characterizing and predicting which bugs get fixed
Characterizing and predicting which bugs get fixedCharacterizing and predicting which bugs get fixed
Characterizing and predicting which bugs get fixed
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
 
Cross-project defect prediction
Cross-project defect predictionCross-project defect prediction
Cross-project defect prediction
 
Changes and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development ActivitiesChanges and Bugs: Mining and Predicting Development Activities
Changes and Bugs: Mining and Predicting Development Activities
 
Predicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency GraphsPredicting Defects using Network Analysis on Dependency Graphs
Predicting Defects using Network Analysis on Dependency Graphs
 
Quality of Bug Reports in Open Source
Quality of Bug Reports in Open SourceQuality of Bug Reports in Open Source
Quality of Bug Reports in Open Source
 
Meet Tom and his Fish
Meet Tom and his FishMeet Tom and his Fish
Meet Tom and his Fish
 
Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities Predicting Subsystem Defects using Dependency Graph Complexities
Predicting Subsystem Defects using Dependency Graph Complexities
 
Got Myth? Myths in Software Engineering
Got Myth? Myths in Software EngineeringGot Myth? Myths in Software Engineering
Got Myth? Myths in Software Engineering
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Brainfuck Esoterik

  • 1. esolang Esoterische Programmiersprachen Thomas Zimmermann [email_address] http://www.2000i.de/
  • 2. Esoterik Eine Definition Exklusiver Kreis Eingeweihter Heiliges Wissen und Kultpraktiken Begriffsgrundlage fĂŒr wissenschaftliche Studien Spirituelle AufbrĂŒche in der Gegenwart Urwissen der Menschheit Okkulte Praktiken SpiritualitĂ€t und Mystik Esoterik als ReligiösitĂ€t
  • 3.
  • 4.
  • 5. Quines Eine Analogie Quines Compiler AusfĂŒhrung foo.xx foo foo.xx Interpreter/ AusfĂŒhrung foo.xx foo.xx Analogie AusfĂŒhrung Compiler AusfĂŒhrung foo.xx Box mit Knopf Quines als Kopierer bzw. Replikator
  • 6.
  • 7.
  • 8.
  • 10. brainfuck Brain: an apparatus with which we think we think. -- Ambrose Bierce
  • 11. Brainfuck Urban MĂŒller Brainfuck >+++++++++[<++++++++>-]<.>+++++++ [<++++>-]<+.+++++++..+++.[-]>++++++++ [<++++>-]<.#>+++++++++++[<+++++>-] <.>++++++++[<+++>-]<.+++.------.--------.[-]> ++++++++[<++++>-]<+.[-]++++++++++.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Brainfuck Audio www.2000i.de/brainfuck-audio/ (2bf) ParallelitĂ€t -3 -4 +2 +2 +1 -1 -2 +2 1 Viertel = 2 Brainfuck-Anweisungen Schleifen
  • 19. chef I don‘t even butter my bread. I consider that cooking. -- Katherine Cebrian
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. piet The Art of Computer Programming. -- Donald E. Knuth
  • 27. Google und Piet Mondrian
  • 28.
  • 29.
  • 30. Piet Colours white black Cycles Other Colors light red yellow green cyan blue magenta dark
  • 31. Piet Colour Cycles red yellow green cyan blue magenta Hue Cycle Lightness Cycle light normal dark
  • 32. Piet Kontrollfluss 1 2 0 0: CC 3 CC CC 1: CC 2: CC 3: CC CC CC CC
  • 33.
  • 34. Piet Hello World OriginalgrĂ¶ĂŸe (30x29) Commands Cycles VergrĂ¶ĂŸerung (1400%) 72 101 108 111 119 32 114 33 (90)
  • 35. Piet Fibonacci-Zahlen VergrĂ¶ĂŸerung (4400%) Commands Cycles OriginalgrĂ¶ĂŸe (10x11)
  • 36. shakespeare Trying to pop when the stack is empty is a sure sign that the author has not yet perfected her storytelling skills, and will severly disappoint the runtime system.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. conclusion A conclusion is the place where you got tired of thinking -- Martin H. Fischer
  • 45. That‘s All? No, DonÂŽt Miss... Befunge 4-dimensional control flow Intercal Be part of the madness Unlambda Extreme functional programming Java2K Unleashing the power of rand() Malbolge Programming from hell
  • 46. the end www.2000i.de/esolang2002/ user: pinky password: brain Vielen Dank fĂŒr die Aufmerksamkeit!