Feeds

What the Hell is… an Endian?

There's big ones and there's little ones, y'know

  • alert
  • submit to reddit

Seven Steps to Software Security

Updated When The Register first started as an email newsletter nearly five years ago, our motto was "The only good Endian is a dead Endian." But readers keep asking us questions such as "What is an Endian"? One of our readers has been good enough to provide us with a clear explanation of the topic. And another reader, has added his comments, which we've now put at the end. Reader Number Three has tipped in too. Thanks David. Er... that's it. Reader One Big Endian and Little Endian refer to how multi-byte operands are laid out in memory. Something like left-to-right versus right-to-left. Either scheme works fine, but any given combination of operating system, application sources, and application data files tend to want only the scheme they were initially programmed for. This is a historical accident of which chip, minicomputer, or mainframe the OS was initially written for. The term comes from Gulliver's Travels, where two warring societies can't stand the fact that their neighbors open up their hard-boiled eggs from the other (wrong) end. Like other recently-designed instruction sets (eg Mips, PowerPC, and recent Alphas), IA-64 supports both big- and little-endian memory conventions so that no OS communities are repelled and locked out by that issue. The hardware is neutral. But the software on top of it, the OS and compilers and utilities and file system and applications and data files, are still all one flavor or the other. PA-RISC's software base is all big-endian, whereas most other announced users of Merced are all little-endian. A side effect of this is that HP won't be sharing any software (even compilers or applications or Unix) with the rest of the Merced-based industry. SGI is now switching from MIPS to IA-64, with IA-32 as a stepping stone, and is consequently forcing its user base to switch from big-endian software conventions to little-endian (or to switch from SGI to HP or Sun). Merced's support for both forms of software endian-ness is important for HP, but this is technically trivial. Reader Two The phrase "endian" comes from a fairly well known (and amazingly short and lucid) paper titled "On Holy Wars and a Plea for Peace" by Danny Cohen of USC. It was published as Internet Engineering Note IEN137 on 1-April-1980, and was in IEEE Computer in October 1981. It was originally written for one of his graduate classes; twenty years old and still relevant. here is the text BTW - you didn't mention that Sun (the great satan of Solaris) is porting to Merced, too, and that Sun is traditionally big endian. Reader Three I can't believe that neither of the readers who sent you big endian/little endian descriptions actually described the difference! It's simply this: If the computer holds a number that's too large to be recorded in one byte, the question is whether the bytes are stored in linear memory with the most significant bits at the beginning and the least significant bits at the end, or vice versa. It's the difference between remembering the number "three hundred twenty-one" as 321 or 123. Each method has certain advantages and disadvantages. Whew! And I thought I'd only use my computer science background on Jeopardy :) ® Other What the Hell is... What the Hell is... Camino and Rambus?

Boost IT visibility and business value

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.