Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Oh puh-lease (Score 1) 618

The problem with that point of view is that it's not acceptable if a kilobyte per kilogram is not the same thing as a byte per gram. If ever that situation occurs, something has gone horribly wrong somewhere.

As a more direct example, network transfer speeds are customarily measured in real SI units; your 100 Mbit/s network card can transfer 10^8 bits per second, not 100*2^20 bits. Now how long does it take to transfer a 1GB file over a 100 Mbit/s connection? The answer had better come out as 80 seconds. If it instead comes out as 85.9 seconds because the 100 Mbit/s meant 10^8 bits per second and the 1GB meant 2^30 bytes, I think we can all agree that we're doing SOMETHING terribly wrong.

Comment Re:Details would be nice... (Score 2) 264

The professor gave no instructions on how to properly cite things, gave an assignment, and 'taught everyone a lesson' by failing them all for plagiarism when they didn't follow the exact standards of reference citing.

How does that work, exactly? Not following the citation standards is not plagiarism. As long as a person denotes in any way whatsoever that a given thought / phrasing is not his own, it is not plagiarism, no matter how wrong the form or how limited the information in this declaration. It doesn't matter if the title of the original book, or the publisher, or hell even the author's name is missing -- as long as one writes "this is not mine" it is not plagiarism. It may not meet the requirements set by the course and therefore warrant a failing grade, but academic honesty violations are out of the question.

NASA

Submission + - This Isn't the Petition Response You're Looking For (whitehouse.gov)

Jonah Hex writes: "The White House has Responded to the petition to "Secure resources and funding, and begin construction of a Death Star by 2016."

The Administration shares your desire for job creation and a strong national defense, but a Death Star isn't on the horizon. Here are a few reasons: The construction of the Death Star has been estimated to cost more than $850,000,000,000,000,000. We're working hard to reduce the deficit, not expand it. The Administration does not support blowing up planets. Why would we spend countless taxpayer dollars on a Death Star with a fundamental flaw that can be exploited by a one-man starship?

"

Comment Re:Would stop a lot of development (Score 1) 550

Please explain how. From the undecidability of the halting problem you can derive that there can be no program that reliably decides whether a given program is secure, but this is a very long way from saying that it's impossible to prevent all security holes.

What keeps me from trying to prove a given program's security by hand? Or how about a program that can prove security IF the input program if sufficiently well-written, giving up on secure but unclear programs for which it can't be sure? Turing's argument doesn't disallow that, and in fact it's perfectly possible.

Comment Re:Theoretical performance vs real-world performan (Score 1) 298

For instance, Knuth's analysis that the author of the article here holds to be misleading (not, as the Slashdot title suggests, "wrong") calculates the complexity based on the assumption of ideal random access memory, that is, memory for which all accesses are equal cost.

No, it assumes memory for which all access are *at worst* a certain equal cost - in other words, memory for which accesses have an upper bound. Knuth's analysis still holds if certain pieces of memory are FASTER than the norm. If we take memory access going through swap as the normal, worst case, upper-bound cost of memory access, and RAM and cache hits as special better cases, the analysis still applies to the real world.

This means that algorithms in the real world can scale worse than their theoretical "worst-case", if that theoretical worst-case scaling is based on the assumption of constant memory access cost, since that assumption does not hold in the real world.

Doesn't it? The theoretical worst case corresponds nicely to the real-world worst case of all memory coming from swap. The (typical) case in which there is also a bunch of fast RAM and even faster CPU caches is just not the worst case.

Education

Recommendations For C++/OpenGL Linux Tutorials? 117

QuaveringGrape writes "After a few years of Python I've recently been trying to expand my programming knowledge into the realm of compiled languages. I started with C, then switched over to C++. A friend and longtime OpenGL programmer told me about NeHe's tutorials as a good step after the command-line programs started to get old, but there's a problem: all the tutorials are very Windows-based, and I've been using Linux as my single platform for a while now. I'm looking for suggestions for tutorials that are easy to learn, without being dumbed down or geared towards non-programmers."
Piracy

Ubisoft's Authentication Servers Go Down 634

ZuchinniOne writes "With Ubisoft's fantastically awful new DRM you must be online and logged in to their servers to play the games you buy. Not only was this DRM broken the very first day it was released, but now their authentication servers have failed so absolutely that no-one who legally bought their games can play them. 'At around 8am GMT, people began to complain in the Assassin's Creed 2 forum that they couldn't access the Ubisoft servers and were unable to play their games.' One can only hope that this utter failure will help to stem the tide of bad DRM."

Comment Re:Executable that's not an executable? (Score 1) 453

It is entirely accurate - assuming you have access rights to the target process. To summarize it mostly accurately, you have access rights to the target process if it's yours (started from your account), if you have admin rights, or if you have global debugging rights (which requires admin rights to grant).

In other words, it isn't insecure at all. Of course, this point becomes moot if the malware runs from the same account as the user, or even with admin rights, as is common on Windows. But that's an entirely different problem which is orthogonal to the issue described here.

Slashdot Top Deals

When it is incorrect, it is, at least *authoritatively* incorrect. -- Hitchiker's Guide To The Galaxy

Working...