Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Not sure if that'd work... (Score 4, Interesting) 145

From what I know of flash, the 'bad bits' aren't repeatedly bad. The bad-sector-swap-out-routine in most flash drives and USB sticks will actually swap out a sector after a single read that can't be ECC-corrected, but that doesn't mean all the bits in the sector can't be written correctly ever again.

For example, in this article (IEEExplore, so paywalled for you, sorry) a generic NAND flash chip has been tested for bit-error-rates. In the 5K write cycles after an average bit has failed, it only failed to be written correctly 4 times more. That would mean that a single erase-rewrite cycle would write the complete sector without any bit errors 99% of the time: to find 'most' of the bad bits, the sector would have to be rewritten 1000s of times every time the software would want to check the fingerprint.

Not only would that take a fair amount of time, it would also introduce new failed bits. That would mean the ID of the flash chip can only be checked so many times beffore the complete sector goes bad.

Comment Re:score tables (Score 2, Interesting) 153

It indeed is packed BCD. Some processors of that time have special instructions for that kind of notation, which makes calculating with them not much more difficult than normal binary. (Dunno if the 6502c has these kinds of opcodes, though; the Z80 for example does.) The advantage is that it makes blitting to screen really easy: instead of constantly dividing by 10, which is a processor-intensive task, you could just bitshift the number, which is much easier.

Comment Some fun stuff... (Score 5, Interesting) 153

* From the devkit readmes:

2600/7800 DEVELOPMENT KIT<br>
CARE AND FEEDING INSTRUCTIONS<br>
[...]
Feel free to telephone John Feagans at Atari (U.S.) at area  code
(408)  745-xxxx  any  time you have a question  about  using  the
software.   He  wrote the download program and the  transfer  rom
code.   He's the one who did not write any support  documentation
to go with his software.

* From the base sw:
CPX     #1               ;HACK: WE STOP AT 1
BEQ     SELRTS
INX                     ;BIGGER HACK: PUSH X INTO RANGE.
LDA     ZHACKMOD+2,X     ;BIGGEST HACK: TABLE LOOKUP NEXT MODE.

* Ofcourse, we have explicit words:
CMP     #$FF                   ;SEE IF ANY INPUT
BEQ     FUCKYOU
JMP     GOTOSEL                ;GO TO SELECT MODE
FUCKYOU   BIT     INPT4                  ;LOOK AT FIRE BUTTON INPUT
BMI     ATIT4

LDA     #0                     ;ENOUGH TIME HAS ELAPSED TO ALLOW CAPS
STA     $1                     ;TO DISCHARGE SO CONTINUE FUCKING WITH
LDA     #$14                   ;IO HARDWARE

STA     AUDC0,X         ;GO POUND SAND IN YOUR ASS

* Citizen Kane anyone?
LDA     INPT0,Y                ;THESE FOUR LINES MUST BE INCLUDED IN
                                         ;THE FINAL VERSION
AND     INPT1,Y                ;REMEMBER
BMI     FUCKBAR                ;REMEMBER,. . ., ROSEBUD

* In Galaga, at 'a boss hit':
JSR    ABOSSHIT               ; HOW YOU PRONOUNCE IT IS YOUR OWN
       ;BUSINESS

* Liek wtf?
* GROUND TARGET SECRET CODES (SSHHHH!)
*         0       regular dome           logram
*         1       regular pyramid        barra
*         2       detector dome          zolbak (and your mama, too)

*And finally, an original comment which couldn't be more to the point in 2009:
*PROGRAMMERS BEWARE: THIS CODE IS OLD AND VERY UGLY! TAMPER AT YOUR OWN RISK

It looks like Hattrick is written mostly in Forth btw. I personally didn't know they wrote games in that language!
Cellphones

Mobile Wi-Fi Hot Spot 202

bsharma writes to let us know about a little goodie that we will be able to buy starting May 17: a battery-powered, rechargeable, cellular, Wi-Fi hot spot that you can put in your pocket. "What if you had a personal Wi-Fi bubble, a private hot spot, that followed you everywhere you go? Incredibly, there is such a thing. It's the Novatel MiFi 2200, available from Verizon starting in mid-May ($100 with two-year contract, after rebate). It's a little wisp of a thing, like a triple-thick credit card. It has one power button, one status light and a swappable battery that looks like the one in a cellphone. When you turn on your MiFi and wait 30 seconds, it provides a personal, portable, powerful, password-protected wireless hot spot. ... If you just want to do e-mail and the Web, you pay $40 a month for the service (250 megabytes of data transfer, 10 cents a megabyte above that). If you watch videos and shuttle a lot of big files, opt for the $60 plan (5 gigabytes). And if you don't travel incessantly, the best deal may be the one-day pass: $15 for 24 hours, only when you need it. In that case, the MiFi itself costs $270." The device has its Wi-Fi password printed on the bottom, so you can invite someone to join your network simply by showing it to them.
Space

PG&E Makes Deal For Solar Power From Space 392

N!NJA writes "California's biggest energy utility announced a deal Monday to purchase 200 megawatts of electricity from a startup company that plans to beam the power down to Earth from outer space, beginning in 2016. Solaren would generate the power using solar panels in Earth orbit and convert it to radio-frequency transmissions that would be beamed down to a receiving station in Fresno, PG&E said. From there, the energy would be converted into electricity and fed into PG&E's power grid."
The Media

Lawsuit Stops Headline Scraping 85

Stephen Larson alerts us to the out-of-court settlement of Gatehouse v NY Times, a lawsuit that attempted to stop the Boston Globe from linking to headlines and excerpting initial sentences from a competitor's Web site. At issue was the Globe's practice — barely distinguishable from those of Google News, Yahoo, and others — of linking to another news source's coverage of local news. The upshot is that the Boston Globe will stop the linking. No judicial precedent was set, because the case was settled before reaching a judge.
AMD

AMD Plans 1,000-GPU Supercomputer For Games, Cloud 148

arcticstoat writes "AMD is planning to use over 1,000 Radeon HD 4870 GPUs to create a supercomputer capable of processing one petaflop, which the company says will make 'cloud' computing a reality. When it's built later this year, the Fusion Render Cloud will be available as an online powerhorse for a variety of people, from gamers to 3D animators. The company claims that it could 'deliver video games, PC applications and other graphically-intensive applications through the Internet "cloud" to virtually any type of mobile device with a web browser.' The idea is that the Fusion Render Cloud will do all the hard work, so all you need is a machine capable of playing back the results, saving battery life and the need for ever greater processing power. AMD also says that the supercomputer will 'enable remote real-time rendering of film and visual effects graphics on an unprecedented scale.' Meanwhile, game developers would be able to use the supercomputer to quickly develop games, and also 'serve up virtual world games with unlimited photo-realistic detail.' The supercomputer will be powered by OTOY software, which allows you to render 3D visuals in your browser via streaming, compressed online data."
Security

How Do You Monitor Documents? 237

JumpDrive writes "I have been presented with a problem recently, which I know others have probably faced. During the last month, one of our customers accused us of providing another customer with their specification. So the question arose: how do we, or can we trace documents and find if they are being opened or used somewhere where they weren't intended. We don't want to be restrictive, because at times, we have people all over the place, but if one of our documents were opened in a foreign country, that would arouse suspicions. Most of our documents are made with MS office suite, and I have been thinking of working on a macro to ping a server, but that would require the user to enable the macros, and it would also require the insertion into about 1000 documents. But it's been difficult for me to find a solution that doesn't prevent someone in Omaha from opening a document for legitimate use and is not a solution that can easily be disabled or hacked around."
United States

Barack Obama Is One Step Closer To Being President 601

At 3:00 Eastern time on Monday Dec. 15, 538 electors in state capitols across the US cast the votes that actually elected Barack Obama the 44th President. Obama received, unofficially, 365 electoral votes (with 270 needed to win). The exact total will not be official — or Obama officially elected — until Congress certifies the count of electoral votes in a joint session on Jan. 6, 2009. The Electoral College was established in its present form in 1804 by the Twelfth Amendment to the US Constitution. Electors are not required to vote for the candidate who won their state — in fact, 24 states make it a criminal offense to vote otherwise, but no "faithless elector" has ever been charged with a crime. "On 158 occasions, electors have cast their votes for President or Vice President in a manner different from that prescribed by the legislature of the state they represented. Of those, 71 votes were changed because the original candidate died before the elector was able to cast a vote. Two votes were not cast at all when electors chose to abstain from casting their electoral vote for any candidate. The remaining 85 were changed by the elector's personal interest, or perhaps by accident. Usually, the faithless electors act alone. An exception was in 1836 when 23 Virginia electors changed their vote together. ... To date, faithless electors have never changed the otherwise expected outcome of the election."
Censorship

Argentine Judges Disappear Celebrities From Internet 81

An anonymous reader writes "Since 2006, Internet users in Argentina have been blocked from searching for information about some of the country's most notable individuals. Over 100 people have successfully secured temporary restraining orders that direct Google and Yahoo! Argentina to scrub the results of search queries. The list of censorship-seeking celebrities includes judges, public officials, models and actors, as well as the world-cup soccer star and national team head coach Diego Maradona. Try it yourself — compare the results for a Yahoo! Argentina search for Diego Maradona (0 results) to a search at Yahoo! Mexico and Google Argentina (both with millions of results)."
Hardware Hacking

Open Source Hardware, For Fun and For Profit 122

ptorrone writes "Lots of open source hardware articles making the rounds this week, first up — Wired has an excellent piece on the Arduino project, an open source electronics prototyping platform, its founders and business model (they have sold over 50,000 units). And next up MIT's Tech Review has a profile on a few open source hardware businesses including NYC based Adafruit Industries best known for projects like the open source synth (x0x0b0x) and 'fun' projects like the Wave Bubble, the open source cell phone/wifi/GPS/RF jammer."
Image

Verizon Tech Accused Of Making $220K In Sex Calls On User Lines Screenshot-sm 218

Joseph Vaccarelli, a former Verizon Technician, has been charged with racking up $220,000 in phone-sex calls by tapping into the land lines of nearly 950 customers. Authorities say that he made approximately 5,000 calls, resulting in 45,000 minutes of call time. Verizon estimated that out of a 40-week period, Vaccarelli spent 15 weeks talking on sex lines. How in the world do you have this much phone sex, period, but especially at work, and not have anyone notice?

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...