Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Who says computers will take over.... (Score 5, Insightful) 275

This is not a case of misspelling (think Notingham) or variant spelling (think Britney vs. Brittany). There's simply no standard way of transliterating Russian names. Cyrillic "e" may be pronounced "eh", "yeh", "yo", "o" or "ih" and some people will use some kind of phonetic approximation so they don't have their names too badly garbled.

I would have expected them to include the original cyrillic name and all the /obvious/ transliterations in their database, but that's apparently way beyond their capabilities.

Comment Re:Similar language, describing different things (Score 1) 240

Explaining quicksort to the layman.

[...]

Sort the names into three piles

That is dumb.

The big advantage of quicksort is that is able to quickly sort in place.

Now try to convey that with your piss-poor piles and cards examples.

Anything but mergesort (including bubbesort) looks contrived with physical objects.

Comment Re:Egocentrism (Score 1) 517

A "central tenant of morality" is just as needed as hair in the soup.

I find the idea that a "Central Lie" is necessary for people to act morally highly offensive, and impossible to prove in practice; but if that is really the case, then better let the whole world go to hell than having to play with and smugly pretend to believe some random bullshit.

And if we're into real Scotsmans, for a "real" Christian, the thing is about sin and salvation, not pretending to be an idiot in the hope that the others will do the same, and so be able to go along nicely instead of killing and maiming each other.

Comment Re:Very different code (Score 1) 225

So the solution is either to turn off that specific warning (usually means it's off in all files)

why?

It's very easy to tailor compiler options for each source file in the Makefile.

There's also 'pragma GCC diagnostic push/pop', even if it doesn't work for some cases (like -Wunused-function).

For unused functions/variables/parameters it's best to conditionally define 'UNUSED__' to '__attribute__((unused))' for gcc and use that; creating dummy use cases is stupid.

Comment Re:Nice (Score 1) 182

Yes, there will still be problems, yes, there will ALWAYS be people who are willing to cause physical violence to get their way, but building interpersonal relationships is always the best way to work towards reducing problems.

No. Many people are just rabidly, abjectly bigoted, reactionary fucks. And access to information tools only tends to exacerbate it.

If you ever lived in one of those third-world countries, you would know that the middle-class, relatively affluent (ie exactly the people a westerner can relate to) are the ones that are falling for all that conservative or revolutionary trash. In Afghanistan, that's probably the 1.5 million with access to the internet.

You need solid bourgeois values (foremost hypocrisy and intelectual dishonesty) and LOTS of free time to ingurgitate the amount of bullshit needed to be able to embrace any ideology.

Comment Re:Need Clarity (Score 1) 264

Come on.

Poking the wrong bits into hardware (as in your experimental driver) will lock hard your entire system -- you won't even have the chance of a kernel panic, micro-kernel or not.

Then, how about those video cards that have hard access to the whole memory, bypassing whatever restrictions the kernel may put in place?

If a driver wants to 'drive' anything, he needs access to the system's interrupts, busses, locks, whatever. At that point, all bets are off.

Comment Re:Romney Kills Baby Seals (Score 1) 555

Most of this is from "Genghis Khan and the Making of the Modern World" (a great read): http://www.amazon.com/Genghis-Khan-Making-Modern-World/dp /0609809644 Other pieces

Attila and Genghis Khan were completely different historical figures -- there was like a MILLENIUM or such between them.

And anyway, trying to interpret old history through modern prejudices and stereotypes is, to put it mildly, cringeworthy.

Comment Re:Linux virus (Score 1) 298

Come on, it would be much easier on Linux to exploit bugs in the filesystem code - I now from experience that the code is not that hardened on that side: even accidental corruption of the fs may easily crash the system.

Why bother with executable files and such?

I don't know of any Unix that regards file system metadata as an attack vector -- it's assumed that the hardware (including the physical support of any non-network fs) is under the complete control of the user ;-)

Comment Re:Doesn't sound like a flaw to me (Score 1) 184

What system do you use which trashes all its buffer cache from time to time, just for fun?

Usually, a filesystem is fully synced only when it is unmounted, and that cannot happen while a process still holds a reference to a file on it.

Instead of "sync" or "echo 3 > /proc/sys/vm/drop_caches" you can start some memory-hungry program, which will quickly eat up all your memory and force all buffers to disk (either in swap or in the filesystem). Problem solved ;-)

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...