Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Same Thing Happened to Me (Score 1) 699

As we become more dependent on these systems, we should make sure they are at least as robust as good old-fashioned know-how.

They already are at least as robust as good old-fashioned know-how, because the system supplies advisory information to a human with a brain.

But the human brain is becoming more dependent on this system to know how to get around. A lot of people these days know one route to get between point a and point b. If humans get used to being able to ask a computer that can't be clever in an emergency, then it will be a problem when we are dependent upon it, not before.

Comment Same Thing Happened to Me (Score 1) 699

The same thing happened to me, but I turned around and found another way without Google's help.

What makes this a problem in my mind is that Google Maps doesn't offer a "detour me" feature that allows you to easily avoid specified nodes in the commute graph. My Garmin GPS had this feature and driving all over the Western half of the US for many months I can tell you it was an indispensable feature.

A good detour feature is a really necessary feature in an emergency situation. As we become more dependent on these systems, we should make sure they are at least as robust as good old-fashioned know-how. Being a firm believe in technology, I'm sure Google Maps could in fact surpass our own robustness and incorporate features to make emergencies even safer for people, but right now Google Maps seems to be focused on telling you how to go some place where you'll spend money.

Comment Re:Out of curiosity... (Score 1) 210

Are there any plans to punish companies that went along with this? Sure, they could argue they were strong-armed into it by Intel but that's no comfort for AMD and the sales they'll have lost.

AMD may even benefit from this. They may have in fact come to an agreement with Intel about how this would be done. AMD may have seen more sales, but then there would have actually been competition, and that means more product for a lower price! Yikes!!!

Space

Scientists Discover Exoplanet Less Than Twice the Mass of Earth 201

Snowblindeye writes with this excerpt from the European Southern Observatory: "Well-known exoplanet researcher Michel Mayor today announced the discovery of the lightest exoplanet found so far. The planet, 'e,' in the famous system Gliese 581, is only about twice the mass of Earth. The team also refined the orbit of the planet Gliese 581 d, first discovered in 2007, placing it well within the habitable zone, where liquid water oceans could exist. Planet Gliese 581 e orbits its host star — located only 20.5 light-years away in the constellation Libra ('the Scales') — in just 3.15 days. 'With only 1.9 Earth-masses, it is the least massive exoplanet ever detected and is, very likely, a rocky planet,' says co-author Xavier Bonfils from Grenoble Observatory. Being so close to its host star, the planet is not in the habitable zone. But another planet in this system appears to be. ... The planet furthest out, Gliese 581 d, orbits its host star in 66.8 days. 'Gliese 581 d is probably too massive to be made only of rocky material, but we can speculate that it is an icy planet that has migrated closer to the star,' says team member Stephane Udry. The new observations have revealed that this planet is in the habitable zone, where liquid water could exist. '"d" could even be covered by a large and deep ocean — it is the first serious "water world" candidate,' continued Udry."

Comment Trojan gets to the root of the problem (Score 1) 372

Um... seriously? If they know the specific customer they wouldn't need to install the trojan.

It's not disclosed how the "trojan" is loaded onto the perpetrator's system, however getting that system to request and execute your code cuts through what is potentially a very hairy situation: who knows how many layers of abstraction the perp is using to hide from traces.

Comment Re:Umm (Score 1) 92

The article is very light on details, but I take it the idea is that more power would translate to higher clock frequencies or higher data throughput and the like.

I think an easier approach is for the scheduler to query the battery power before and after each task gets its shot at CPU time. If an application is using more than its power allocation, simply schedule it shorter and/or fewer turns on the CPU.

The article also fails to mention whether this mobile OS is capable of multitasking. If it is, then presumably the power settings for a given application would apply to the timeslices during which it is running.

There are two pages to the article, and it's quite clear that it supports some form of multitasking.

Comment "Prisoner's Dilemma" != Prison (Score 4, Insightful) 415

..fear of prison..

The Prisoner's Dilemma is a generalized model for decision-making in a non-zero-sum game (net cooperation must yield more than net defection.) A story involving prisoner's and jail time is only the most popular canonical representation for the game. While I've nothing to say in defense of the researchers' intelligence: to levy criticism that the researchers have perhaps overlooked subjects' aversion to actual prison time is to suggest that the researchers are, perhaps, extremely stupid, and have no idea what they are doing at all.

Comment My Worst IT Experience (Score 1) 1127

Read this post full screen with diagrams and photos

As I tend toward fleeting obsession, and writing up this account of my poor work experience at UnnamedCompanyXXX hits the spot in the exact way that I only wish editing my resumé did (as Joey Cameau puts it, resumé writing seems largely an exercise in "listing the store-bought parts of yourself that you respect the least") what follows is a rather long explanation. For the short answer, just scroll to the image at the bottom. (The forum may crop the image, so use your browser to view the full image if you must.)

I'm hoping some day to find enough interesting artifacts from my work there (like a graph I built of the model schema) to make a really bitchin TDWTF submission, but to directly answer your question: It would seem from my research (which was quite painstaking given that that company's idea of revision control was a stack of CD-R'd ZIP archives of their Java Servlets project directory) that the original hacker to build their web-based business coordination platform understood relational databases and data access abstractions.

He or she wrote Hibernate XML model schema (a technology I thoroughly enjoyed learning to use) with logical relationships between different models, and when I ran the graphing program I wrote (produced a GraphViz DOT graph, which was transformed into SVG and then fed into ZVTM) that model schema formed very cogent, logical constellations showing at most two or three individual constellations -- everything else was well connected and sane.

The later person(s) to work on their platform, however, had no understanding whatsoever of databases, SQL, or Hibernate (I didn't know about Hibernate either, but I learned.) The "holes" I mentioned were in fact new unformalized relationships in the model schema: the programmer(s) had actually added fields like "employeeName" to, say, the Project model, and employeeName was actually a numeric key corresponding to the model called Resource, which due to the lack of documentation, evaded me for some hours as actually meaning freelancers who we may call on or have called upon in the past. Now you might even think that it was a good thing that one of the clueless hackers in between the first hacker and myself thought "employee" was a more intuitive term for this role, but in fact Employee was another model altogether! Extremely confusing!!!

The reason their system was even ailing to begin with was because some hacker(s) had actually written database queries without any SQL -- they simply pulled (often many copies of) every instance of a certain type of model in the database into the servlet task, and then filtered them down to whatever subset it was that they wanted in Java-land. A similar sort of reach-around was employed to bridge relational connections between different models without taking advantage of the programming abstractions for those either.

The first couple of weeks I spent setting up a second server, revision control, bugzilla, documentation wiki, and familiarizing myself with the code (I didn't get any documentation for months.) I spent an entire month mired in a protracted software upgrade side-quest to avoid only a few critical shortcomings in only a few software components: because the system had not been properly maintained in so long, every single software component was out of date by years and had a slew of dependencies that needed upgrading.

The very first change I committed to the new Subversion repository removed 4000 lines of code and replaced it with 14.

One day (long after it was very relevant anymore, unfortunately) they finally got the previous hacker (who was too busy with better paying work to work there anymore) to come in and help answer my questions about the code. I pleaded with him to explain to my boss and his ex-boss that the code was a ridiculous nightmare. I tried explaining to him what was wrong with it, and that he should tell the boss he wasn't really as good a judge as I was. He became extremely offended and stormed out of the office, and I was let go not long afterward (for not getting enough done in the expected time frame -- imagine that.) I suspect he was a friend of the boss's family or someone else's family in the office. I mean no ill will toward the guy, but it's really pretty frustrating that I have such a hard time finding work, but apparently that guy has too many opportunities to work that job anymore.

>:(

It's probably not terribly good for one's health to relive this sort of thing in too much detail, so I'll leave it at that. If I'm lucky, maybe someone will read this and offer me a job! ;) ;) ;) ;) ;) ;)

I just found this photo of our offsite backup system that sat on a desk in the room that adjoined all the other rooms in the office: offsite backup on a budget

I also found this next image, generated from Hibernate model schema XML using a Python script I whipped up in about forty minutes (which I have just annotated in GIMP,) rendered using AT&T GraphViz, and viewed using ZGRViewer. If you ever have to familiarize yourself with new software, this is oftentimes an indispensable approach to learning about it! I believe that a few months after I wrote that script, the Hibernate community built graph generation into their "utils" package. Some day I would like to write my own graph exploration software for a subset (perhaps with some extensions) of the DOT format that makes the graph feel more fluid and less rigid. GraphViz often generates graphs that are too disparate, and I find it difficult to coax them into something more readable. Oh well, thankfully I found ZGRViewer and saved myself a few hours writing my own program.

model schema graph with notes

Comment Mod Parent Up (Score 1) 217

Get with the program people, these machines were built to fail. Don't even question it slightly. Don't say "oh you're being paranoid." Think about it. Is it even slightly possible that what nabsltd has said is off the mark? When is the last time you saw calibration drift at an ATM? Don't dismiss this.

Slashdot Top Deals

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...