Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:So... (Score 1) 306

We had a system that processed files added to a directory, which were simply named 1, 2, 3, etc. It kept getting backed up, slowing to a crawl.

When I looked at it, it read up all the entries into a linked list, then did a quicksort on it - using indexed routines to fetch, insert, and delete. Once it was sorted, it then processed the first four entries in the list. So, fetch (by stepping through the list), fetch again, compare, delete (by stepping through AGAIN), delete again, the insert twice (yet another two iterations through the list). No attempt to even do a simple linked-list swap, or keep current location in the list, just using the linked list structure to avoid pre-allocating a large enough array, or dynamically enlarging the array.

Rather than fix it, I just changed it to scan the directory, return the lowest numeric value found, then process files by incrementing and checking if the next file existed.

While a "better language" would have made the sorting method acceptable (by avoiding the stupidity of an abysmal linked-list sort), it wouldn't have helped find the more effective approach, with no sorting at all, fixed memory and linear time.

Comment Re:This is getting ridiculous (Score 2) 87

It doesn't matter if such a scheme exists. If messages can be decrypted by the government, it will inevitably be abused or exploited, AND it won't be effective, even if all other encryption is outlawed and all traffic is routinely decoded to make sure no one is using a non-sanctioned encryption method.

Sending random numbers would have to be made illegal, so all formats (including compression) used to send data would have to be approved.

And it STILL wouldn't stop properly done steganography.

I do believe you could construct a scheme that would be relatively secure, would not have a single "golden key", would be reasonably resistant to abuse - but it still wouldn't be effective except against careless or stupid criminals, and those can be caught with other methods.

Comment Re: Luddite article (Score 1) 224

"Normal" vision has a resolution of about one minute, or 60 pixels per degree. Very good vision is about twice that.

For a flat 4K screen, horizontal angle edge to edge will be about 58Â where you can start seeing individual pixels with normal vision.

A 65" screen at 50" viewing distance is about that. You'd need very good vision to distinguish pixels on an 8K 65" screen at 50", but it is possible.

Comment Re:Used (Score 1) 220

My 11th grade algebra class, my final was to produce a logarithm table by hand, no method specified (while the rest of the class had their own more conventional final).

I did it by taking square roots in binary, then converting and interpolating to decimal when I was done. Binary square roots are pretty easy to do by hand, and everything else was simple addition and multiplication (all in binary, except the final conversion to decimal). Teacher thought I'd do it by series expansion, so was flabbergasted when I finished much sooner than she expected. I think it was a simple 10x10 table, with results to 3 decimal places.

You don't need calculators to teach math, but some use (including graphing) can help some students learn easier.

Comment Re:Teachers (Score 1) 220

So improve the state tests such that concepts, not calculator skills, are tested?

For teaching concepts, have a standardized program available on a variety of platforms, along with an accurate version of a test-authorized calculator (which will be provided for the test, for those cases where ability to use a calculator is deemed necessary)

Comment Re:Describe it as a recipe (Score 1) 173

However, according to the Sixth Circuit Court of Appeals' decision in Tomaydo-Tomahhdo, LLC v. George Vozary, what you CANNOT do is to copy the instructions for how to combine and process those ingredients - specifically including both the amounts of the individual ingredients, and the mixing, baking, and "drizzling" instructions (such as "fold in the flour" or "whip until the mixture forms stiff peaks" - which, btw, always struck me as highly suggestive) that I describe in my recipe for Lemon Drizzle Cake.

That isn't even close to what the Sixth Circuit said.

The instructions for preparing the ingredients (including specific amounts of ingredients) are not copyrightable, and using straightforward standard language to describe those steps is also not protected. An example of what could be copyrightable in a recipe book would be if "the authors lace their directions for producing dishes with musings about the spiritual nature of cooking or reminiscences they associate with the wafting odors of certain dishes in various stages of preparation".

Comment Re:A better summary/article (Score 1) 40

The restriction to "VoIP" is the problem.

A messaging program, whether voice or text, whether encrypted or not, is a legitimate use of such a capability.

Setting up a framework that specifies a protocol allowing a direct connection that can wake up a process in the background, as well as re-establish the connection securely as network availability come and goes, without going through Apple servers, is the way this should work. It should not depend on any Apple-specific identity or encryption requirements.

It should be relatively easy to ensure that the callbacks for authenticating and encrypting a notification channel like that aren't abusing the process. Such apps should also be user-switchable to enable or disable such background activity.

I understand the desire to prevent apps from snooping, but ultimately it should be the user who gets to enable or disable such activity (and others, e.g. recording location in the background for mapping or geofencing or other legitimate uses). Apple should provide tools to allow the user to detect and block such activity, not just block it outright.

Comment Re:Maxwell's Demon (Score 2) 102

A set of single walled aligned carbon nanotubes is a "configuration of material", with much more complex configuration than a silicon PN junction.

Just because it's all carbon, while silicon needs a small amount of doping to operate as a diode, doesn't mean it is a simple amorphous blob of atoms with no electronic structure.

Comment Re:the definition is still the same as ever: (Score 1) 157

The "new" kilogram is within the margin of error of weighing the physical "old" kilogram.

With this change, Planck's constant is now an exact value instead of a measured value with a margin of error. This is the same thing as how the speed of light is (now, and since Oct 21, 1983) an exact value, or the frequency of a specific transition of a cesium atom at 0 Kelvin is an exact value (since 1967). Measuring those physical constants refines the accuracy of the unit (meter, kilogram, second), not the constant. That means that calculations involving c or h are exact, with all errors being measurement errors (where they belong).

Slashdot Top Deals

When it is incorrect, it is, at least *authoritatively* incorrect. -- Hitchiker's Guide To The Galaxy

Working...