Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:A computer with PARI (Score 1) 238

I was not aware of that program. I would like to offer a python alternative, a set of number theory functions written by Wm Stein. You can find a copy on github:
https://github.com/LizardM4/Py...

I would argue that seeing how these are computed using fairly short python code gives an appreciation for how things happen. For example, you can see that factor can be implemented using a few lines of python:


def factor(n): ... comments were here
        if n in [-1, 0, 1]: return []
        if n < 0: n = -n
        F = []
        while n != 1:
                p = trial_division(n)
                e = 1
                n /= p
                while n%p == 0:
                        e += 1; n /= p
                F.append((p,e))
        F.sort()
        return F

And would also introduce him to the projecteuler.net to practice coding and direct his energy. And the greatest gift is your time and devotion-- can't put a price on that.

Comment Re: Just like deepwater horizon (Score 1) 292

Not an expert in this field, but what you are advocating would almost certainly not work for natural gas. Imagine a propane tank with an access port where you can add or remove gas (don't know if the gas is liquified at storage temperatures and pressures). If the tank springs a leak somewhere else in the tank, you are not going to be able to seal it with a fluid that falls to the bottom when you pump it in-- unless the leak is at the bottom. What you propose works when the stored fluid is about the same density as concrete but in this case, the concrete will immediately separate and fall to the bottom.

Don't get me wrong, I have no sympathy for the petroleum industry but I am sure they are trying to fix this as quickly as possible given the bad PR.

Comment Re:Storage Well (Score 2) 292

Can't tell if intentionally trolling or just slightly misinformed. When people talk about carbon sequestration, no one is considering what you just wrote. There are several different methods of carbon sequestration. See https://en.wikipedia.org/wiki/...

but they involve turning CO2 into solid form, e.g. mineral carbonates (think calcium carbonate, i.e. antacid), that are buried.

Comment Re:TSP (Score -1, Flamebait) 481

Wow. First of all, frack you and the frackers who modded you up as "informative." You are a self-centered misguided narcissist.

Maybe I don't have a second point. Or heres one: imagine if corporations thought the same way about dumping crap into our waterways: inorganic solvents, mercury, hexavalent chromium, CFC? Maybe one factory can't mess things up too bad but imagine if every factory thought they were a snowflake. Thats when lakes catch on fire. You think its OK for you to dump phosphates because its just your little self? How much damage can one little person do? You possibly informed thousands of people how to sidestep an important environmental regulation.

I would be ashamed if I did crap like this and here you are bragging about it, Worse yet, you seem to understand why the regulations are in place. Perhaps you think that if only a few snowflakes did it, no one would know? You shared your secret and now probably more people are going to do it. When do you think they will start regulating the TSP in the paint section? Good job.

And thirdly, don't mod up assholes!

Comment Re:It's been available for a while (Score 3, Interesting) 94

Even without the detour, what are the security ramifications of connecting a foreign device to your network? Its from Amazon, they have an image to protect, but what if they get hacked or the packaged gets switched/tampered with en route? The device can silently start making its way around your network collecting data you didn't want to upload.

I'll take off my aluminum Faraday beanie cap now.

Comment Re:pathfinder probe (Score 5, Funny) 251

Dear Mark,
I enjoyed watching your movie over the weekend. The Pathfinder hack was OK, but quite frankly, I found it rather weak that you had to have the engineers on earth send you the machine code to reprogram the computer. Would have been a much better hack if you coded and hand assembled the program yourself. I guess you can't expect too much from a botanist.
Peter

Comment Re:Break The NDA (Score 1) 366

Problem is that you can reach that content by pointing any browser, including Safari, at ifixit.com and see the forbidden fruit. Should they blacklist Safari because it can be used to get the same tainted information? Taking down iFixit's app was closing the barn door after the horses left-- it did nothing to prevent access to the information.

Not giving pre-production samples to them would be a better way to prevent this. Would have been much better/classier for APPL to take iFixit off their list of developers who receive pre-release models, say lesson learned, and move on.

Comment Re:Break The NDA (Score 1) 366

If you can't blame the kid for eating the marshmallow, then you can't blame Mom for refusing to trust the kid with more marshmallows.

Confusing as it is not a car analogy, but here goes. I think its fine for APPL to stop giving them more developer models of their new products. APPL's dick move was closing iFixit's developer account thereby removing their app from the AppStore. That was just petty and unnecessary.

Comment Re:Break The NDA (Score 4, Insightful) 366

I see your point but at the same time, what was APPL thinking giving a developer unit to iFixit, a website whose sole purpose is to take apart things?

Apple was daring iFixit to break the NDA. Sort of like giving a two year old a marshmallow, telling him not to eat it, and then leaving the room. Who is at fault, the two year old or the person giving the marshmallow?

Comment Re:Start with this Password Verification Function (Score 1) 52

Serious question here. I was wondering whether C lends itself to obfuscation of undesired/malicious behavior or whether it is just the preferred language of people able to dream up such deviousness. Would someone with enough python-fu be able to pull this off or would the deception/error be easier to detect by the average coder? i.e. would an underhanded python contest be feasible or would the deception to readily apparent (or at least more apparent)?

Comment Dual boot linux problems? (Score 1) 203

I had difficulty installing Win10 on two dual boot machines. Both machines would throw up error messages of one kind or anther. Finally on whim, I removed dual boot capability by disconnecting the GRUB2 drive from one machine making the Win 7 drive the boot drive. I was then able to upgrade to Win 10. The other computer had both Debian and Win 7 installed on the same drive. I needed to use a live boot CD to remove GRUB followed by a boot repair procedure to allow the Win 7 partition to boot. This allowed me to update to Win 10. I then had to use a live boot CD to reinstall GRUB. Ugh.

Now both computers are upgraded to Win 10 and are back to dual boot machines.

Anyone else have problems upgrading dual boot machines to Win 10? Microsoft should allow people to trade in Win 7/8 product keys for Win 10 keys, preferably through a website.

Slashdot Top Deals

One man's constant is another man's variable. -- A.J. Perlis

Working...