Comment submit a bug report (Score 1) 229
I have heard that facebook developers are generally responsive to bug reports, so just file one.
I have heard that facebook developers are generally responsive to bug reports, so just file one.
Though I do think it would be more interesting if we could perceive polarized light naturally like locusts (which they need to avoid flying into water).
Some people can: http://en.wikipedia.org/wiki/Haidinger's_brush
As far as I can tell, the whole poll is off by an order of magnitude
I'd have to have some kind of plugin to tell me how many tabs I have open.
I had a similar issue. I saved all tabs as a bookmarks folder, then opened the folder and saw the number of items.
I generally open tabs until Firefox crashes, then restore with one or two closed.
I do not know what is the limit of the "wireless spectrum" if there is any. Before this limit is reached, I guess just updating all hardware gears that transmit/route more efficiently is all that is needed.
The limit is given precisely by Shannon's Law, which gives a mathematical limit on the amount of data that can be sent over a given amount of bandwidth. Spectral Efficiency is the amount of bandwidth available in a given wireless spectrum.
1) Give intern new shiny bomb detector
2) Send intern to walk around field for a while
3) Intern blows up
4) Success - bomb detected!
5) Added bonus - bomb removed!
That's the premise of the game Unexploded Cow, only instead of interns, it's cows with Mad Cow Disease.
How would you use broadcast or multicast to distribute an OS? Call me ignorant, but how would you do that in practice?
I used to work in a computer lab at the university I went to. We used Ghost to do exactly that. All the computers in the lab (a few hundred PCs) were booted up off a special floppy (or later, cd) that started up Ghost in listen mode. Then, the central server used multicast to send the OS image to all the clients at once. It took less than an hour, and that was with 100Mb/s Ethernet.
Here's a question:
To know which bits have changed, doesn't it need to compare the two files. How does this result in bandwidth savings?
No, because it only sends a hash of the data. The other side computes a hash of it's data, and if the hashes match, the transfer is complete. If The hashes don't match, there is a rolling hash that can verify a partial match, and send only the changed data. There's more info here
In addition to the "Retrieve running apps" and "Reorder running apps" permissions, the new version of the facebook app also requests the "Draw over other apps" (aka the "popup" permission). I'm sticking with the old version, which is intrusive enough, thank you very much.
"For example, the latest Intel's microchip, the Ivy Bridge (and soon the Haswell) have circuit-sizes as small as 22nm"
I'll bet on the traces being even smaller than that. You must mean transistor size.
It means feature size. A feature can be part of a transistor, or a circuit trace, or a bunch of other things.
Oh, wait, it's the arcfour key scheduling thing again.
This is an old arcfour weakness, not news. Everybody knows about it (and how to avoid it). The SSL people just never bothered to do it.
According to the slides, this attack works by exploiting a bias in the output of RC4, not the key schedule at all...
Always draw your curves, then plot your reading.