Bucket (computing)
Encyclopedia
In computing
, the term bucket can have several meanings. It is used both as a live metaphor
, and as a generally accepted technical term in some specialised areas. A bucket is most commonly a type of data buffer
or a type of document
in which data is divided into regions.
but common phrase. Something goes into the bit bucket
when it is deleted, generally irreversibly and quite often wrongly, such as file
s or email
s that just disappear.
It has been commonly suggested that this usage dates from the days when punched card
s and/or punched tape
were common. Card and paper-tape punches each had a receptacle for the 'chips' punched from the cards or tape to create the holes (rectangular in a card, round in a paper tape), which often looked like a bucket and was known by this name. By analogy
it was jokingly suggested that the CPU
, which in those days was an equipment rack of similar size to a large peripheral
unit, contained a similar receptacle for lost data.
file which is a bucket containing the very latest information. In IBM
culture, such a file is known as a bucket and is opened for critical fixes and fix packages.
Computing
Computing is usually defined as the activity of using and improving computer hardware and software. It is the computer-specific part of information technology...
, the term bucket can have several meanings. It is used both as a live metaphor
Metaphor
A metaphor is a literary figure of speech that uses an image, story or tangible thing to represent a less tangible thing or some intangible quality or idea; e.g., "Her eyes were glistening jewels." Metaphor may also be used for any rhetorical figures of speech that achieve their effects via...
, and as a generally accepted technical term in some specialised areas. A bucket is most commonly a type of data buffer
Buffer (computer science)
In computer science, a buffer is a region of a physical memory storage used to temporarily hold data while it is being moved from one place to another. Typically, the data is stored in a buffer as it is retrieved from an input device or just before it is sent to an output device...
or a type of document
Document
The term document has multiple meanings in ordinary language and in scholarship. WordNet 3.1. lists four meanings :* document, written document, papers...
in which data is divided into regions.
Features of a bucket
Various usages relate to different features. There is no usage that is consistent with every one of these features.- The contents of a bucket are unsorted.
- A bucket has a fixed size, which is determined when it is created.
- A bucket has a limited number of states:
- It may be empty.
- It may be non-empty. Some usages further distinguish:
- It may be partly full.
- It may be full. Some usages further distinguish:
- It may be exactly full.
- It may be overflowing.
- A bucket must exist before anything can be put into it.
Bit bucket
This is a humorousHumour
Humour or humor is the tendency of particular cognitive experiences to provoke laughter and provide amusement...
but common phrase. Something goes into the bit bucket
Bit bucket
In computing, the bit bucket is jargon for where lost computerized data has gone, by any means; any data which does not end up where it is supposed to, being lost in transmission, a computer crash, or the like, is said to have gone to the bit bucket — that mysterious place on a computer where...
when it is deleted, generally irreversibly and quite often wrongly, such as file
Computer file
A computer file is a block of arbitrary information, or resource for storing information, which is available to a computer program and is usually based on some kind of durable storage. A file is durable in the sense that it remains available for programs to use after the current program has finished...
s or email
Email
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the...
s that just disappear.
It has been commonly suggested that this usage dates from the days when punched card
Punched card
A punched card, punch card, IBM card, or Hollerith card is a piece of stiff paper that contains digital information represented by the presence or absence of holes in predefined positions...
s and/or punched tape
Punched tape
Punched tape or paper tape is an obsolete form of data storage, consisting of a long strip of paper in which holes are punched to store data...
were common. Card and paper-tape punches each had a receptacle for the 'chips' punched from the cards or tape to create the holes (rectangular in a card, round in a paper tape), which often looked like a bucket and was known by this name. By analogy
Analogy
Analogy is a cognitive process of transferring information or meaning from a particular subject to another particular subject , and a linguistic expression corresponding to such a process...
it was jokingly suggested that the CPU
Central processing unit
The central processing unit is the portion of a computer system that carries out the instructions of a computer program, to perform the basic arithmetical, logical, and input/output operations of the system. The CPU plays a role somewhat analogous to the brain in the computer. The term has been in...
, which in those days was an equipment rack of similar size to a large peripheral
Peripheral
A peripheral is a device attached to a host computer, but not part of it, and is more or less dependent on the host. It expands the host's capabilities, but does not form part of the core computer architecture....
unit, contained a similar receptacle for lost data.
Documentation bucket
A bucket is a document of no definite size to which information of interest is added with no structure. Many software packages have a READMEREADME
A readme file contains information about other files in a directory or archive and is commonly distributed with computer software. Such a file is usually a text file called README.TXT, README.1ST, READ.ME, or simply README, although some Microsoft Windows software may occasionally include a...
file which is a bucket containing the very latest information. In IBM
IBM
International Business Machines Corporation or IBM is an American multinational technology and consulting corporation headquartered in Armonk, New York, United States. IBM manufactures and sells computer hardware and software, and it offers infrastructure, hosting and consulting services in areas...
culture, such a file is known as a bucket and is opened for critical fixes and fix packages.
Bucket (buffer)
Buffers known as buckets are used:- In the bucket sortBucket sortBucket sort, or bin sort, is a sorting algorithm that works by partitioning an array into a number of buckets. Each bucket is then sorted individually, either using a different sorting algorithm, or by recursively applying the bucket sorting algorithm. It is a distribution sort, and is a cousin of...
algorithmAlgorithmIn mathematics and computer science, an algorithm is an effective method expressed as a finite list of well-defined instructions for calculating a function. Algorithms are used for calculation, data processing, and automated reasoning...
. - In bucket elimination algorithms.
- In the token bucketToken bucketThe token bucket is an algorithm used in packet switched computer networks and telecommunications networks to check that data transmissions conform to defined limits on bandwidth and burstiness ....
(TB) algorithm for network traffic shapingTraffic shapingTraffic shaping is the control of computer network traffic in order to optimize or guarantee performance, improve latency, and/or increase usable bandwidth for some kinds of packets by delaying other kinds of packets that meet certain criteria...
. - In the leaky bucketLeaky bucketThe leaky bucket is an algorithm used in packet switched computer networks and telecommunications networks to check that data transmissions conform to defined limits on bandwidth and burstiness . The leaky bucket algorithm is also used in leaky bucket counters, e.g...
(LB) algorithm for network traffic shapingTraffic shapingTraffic shaping is the control of computer network traffic in order to optimize or guarantee performance, improve latency, and/or increase usable bandwidth for some kinds of packets by delaying other kinds of packets that meet certain criteria...
. - In bucket brigade algorithms.