Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Questioning the benchmark procedures (Score 2) 235

One element has me curious about how these benchmarks were prepared: Is the benchmark software compiled on the target platform/cpu combination with all available optimisations of that platform?

Many of these benchmarks have a binary/library or set thereof that is written for a single target platform (the platform the original developers of the benchmark were working on), Usually pre-compiled, usually for intel, on an intel system, by an intel compiler, with intel optimisations or at least two of the four. This same binary is then used against whatever systems on compatible architectures, this has the high potential to produce skewed results on non-intel platforms as not all manufacturers use the same optimisations.

While this specific processor may not be as great as it should have been, I feel that benchmarks in themselves are usually flawed and must be taken with a grain of salt until real-world software that isn't in a lab-style environment is attempted on it.

Piracy

Submission + - Australian copyright trolls shut down (delimiter.com.au)

An anonymous reader writes: Remember how a shadowy group arose a few months back with the promise of suing thousands of Australians for allegedly pirating movies? Sure you do. Well, it looks like the effort has bit the dust as quickly as it was kicked off, with the organisation's vice president of sales and marketing leaving and its website shut down. Sounds like that bright future of mega-lawsuits for Internet piracy wasn't so bright after all.
Security

Submission + - The Increasing Scale and Complexity of DDoS Attack (hothardware.com)

MojoKid writes: "Prolexic Technologies released its internet threat report for Q3 2011. There’s a lot to the report, including that Prolexic mitigated what it claims is the largest event in 2011 (in terms of packet-per-second volume). That attack occurred between November 5-12 and marks the increasing scale and complexity of DDoS attacks. DDoS attacks are increasing in terms of bandwidth (up 66% from Q3 2010) and packets-per-second, which is up nearly four-fold from the same time period a year ago. What is perhaps most notable, however, is where the attacks are coming from. The report found that China was the biggest offender, responsible for over half of all DDoS attacks."
Politics

Submission + - The OWS Internet Tower Lives On, For Now (motherboard.tv)

An anonymous reader writes: After turning up empty handed on a first pass through heaps of personal belongings (confiscated last week from OWS headquarters at Zuccotti Park), Isaac Wilder, head of the Free Network Foundation, returned to a reclamation booth at a Department of Sanitation facility on Friday. He wanted his stuff back: Backpack, laptop, FNF Freedom Tower (this beamed out Wi-Fi Internet to Zuccotti occupiers), and cash. new photographic evidence that suggests the NYPD willfully destroyed laptops, Wilder is holding out for legal aid, and says he intends to file a suit against the City over his lost and damaged property.

Slashdot Top Deals

I program, therefore I am.

Working...