the R Programming Language
R is a free and open source software programming language and software environment for statistical computing and graphics. Distributed under the GNU General Public License version 2, R is an easy language to learn and commonly used for developing data analysis and statistical software. R compiles and runs on a wide variety of UNIX platforms, Windows and MacOS.
R is designed to allow users to add additional functionality by defining new functions. Much of the system is itself written in the R dialect of the S programming language. For computationally-intensive tasks, C, C++ and Fortran code can be linked and called at run time. Advanced users can write C code to manipulate R objects directly.
R was initially written by Robert Gentleman and Ross Ihaka, also known as “R & R” of the Statistics Department of the University of Auckland. Today, R is the result of a collaborative effort with contributions from all over the world.
The R Environment
The R environment is an integrated suite of software services for data manipulation, calculation and graphical display. R offers effective data handling and storage facility, a suite of operators for calculations on arrays, a collection of intermediate tools for data analysis, graphical facilities for data analysis and display as well as simple and effective programming language (called ‘S’) which includes conditionals, loops, user defined recursive functions and input and output facilities.
Most programs written in the R programming language are essentially ephemeral, written for a single piece of data analysis. (Source: W. N. Venables, D. M. Smith and the R Core Team; An Introduction to R)
Read Also:
- iPhone Mobile Security
Mobile security applications for Apple’s iOS mobile operating system help protect Apple iPhone smartphone and iPad tablet mobile devices from malware threats as well as unauthorized access following accidental loss or theft of the device. Additional security features frequently offered by iPhone mobile security apps include scanning websites for potential phishing schemes or other fraudulent […]
- Android Mobile Security
Mobile security applications for Google’s Android platform help protect Android smartphone and tablet mobile devices from malware threats as well as unauthorized access following accidental loss or theft of the device. Additional security features frequently offered by Android mobile security apps include securing data on the device, VPN connectivity for protecting data in transit, scanning […]
- a Screen Lock
Screen lock is a security feature for computers and mobile devices that helps prevent unauthorized access to the device. Also known as a screenlock or lock screen, a screen lock requires a specific action or sequence of actions to be correctly performed by anyone attempting to use a lockscreen-protected device. Screen locks or lock screens […]
- Enterprise Storage Management (ESM)
ESM is short for enterprise storage management. Enterprise storage management, or ESM for short, is the phrase used to describe the tools, processes, and policies used to manage enterprise storage networks. Benefits of Enterprise Storage Management ESM is used to help organizations meet regulations concerning data retention, privacy and record keeping and assists in managing […]
- Mobile Security
Mobile security involves protecting both personal and business information stored on and transmitted from smartphones, tablets, laptops and other mobile devices. The term mobile security is a broad one that covers everything from protecting mobile devices from malware threats to reducing risks and securing mobile devices and their data in the case of theft, unauthorized […]