Encoding: Hello World
Start writing your post here. You can insert images and videos by clicking on the icons above.
Encoding, in one form or another, has been in use for well over a century. This is clearly not a new theory or methodology. With this, a character or set of characters is designed to represent another character or set of characters. This changes the characters from the original A to the adjusted B.
Computers use this, for example, to transmit messages, data, etc. in an efficient manner or for more efficient storage. This appeared in the early days of this country with the telegraph sending messages across the country via the operator sending specific clicks for each letter. Also, this may be used by a ship to send a message with lights being blocked out in specific patters to form letters. This is presently used with Unicode, a method for encoding most of the languages in the world today.
The most current version for this has 136,755 characters for 139 vintage and modern languages. Although this is an older methodology, this is still used with a lower level of technology applied and also with higher levels. Morse code is still used in certain instances, however not in abundance. This is still not defunct.
On the other end of the spectrum, computer systems use this with the ASCII (American Standard Code for Information Interchange). This encodes the alphabet with the upper- and lower-case letters, numbers, punctuation marks, and other symbols into the code to be transmitted to the receiving party. Computers also use in addition to ASCII and Unicode, BinHex, and MIME. This is also used with other industries
(http://searchnetworking.techtarget.com/definition/encoding-and-decoding ). Encoding is also applied in radio communications with various encoding methods.
About the Author - Charles Parker, II has been working in the info sec field for over a decade, performing pen tests, vulnerability assessments, consulting with small- to medium-sized businesses to mitigate and remediate their issues, and preparing IT and info sec policies and procedures. Mr. Parker’s background includes work in the banking, medical, automotive, and staffing industries.