Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Safe Buffer? (Score 2) 65

Why still program in C? Simple: C is easy to glue to everything, just because it assumes not too much about the data structures. And because you have reinvent data validation ( safe buffers) for every interface again, there is a huge risk there.

The obvious solution is to use proven libraries for these problems (opensll, libzzo ;) . However if one of these libraries has a bug, (or is not obvious to use) the problem is in many programs at once.

Comment Re:"causes fragmented data (Score 2) 68

If data is fragmented over multiple blocks, It requires mulitple reads. But this kind of fragmentation is not as bad as HDD where you had a seek time of 7-8 ms. Matching the block size of the SDD to the block sie of the FS is an effective performance enhancement.

Modern SDD have read limits. Every 10.000 reads or so the data has to be refreshed. The firmware will do this silent.

Comment Re:Autonomous Taxis (Score 2) 301

In some test by the TU delft the autonomous cars test are now foucsing on how the driver takes over from the car. The coming of autonomous cars will come fluent. First there will be advanced lane asist and takeover of tasks that are easy for computers. And of course the driving in a "train" with minimal space between cars. More and more functions will be added.

Fully autonomous will be a long way to go. e.g. to determine the last street where you want to go might be a very hard task. GPS navigations rarely guides you to the exact position, where to park, and the exact house is a complicated task.

Comment Re:Interesting technique and results... (Score 1) 86

Should they flag them? No, flagging too much will cause the users to just ignore the messages. And for most facebook communication http traffic will be just as good as https traffic.

But it should note that the security is as good as http traffic, in other words, do not display a lock.

By the way, think about it, security devices. Security for you? Did you pay those devices? No, it is security for those who pay for the devices.

Comment Re:Lamepocalypse (Score 1) 293

Together with a bunch of XPcaplipse machine the next Sqlslammer work is waiting on the next unpached vlunebility to hit the internet after May 8.

And from the viewpoint of Slashdot the world as Slashdot knows it. will end without internetnet.

Comment Chicken or the egg. (Score 1) 245

What i have actually know of was the chicken or the egg problem. To get access to their bank account (after a robbery) people needed ID. But to get a new (emergency) ID, the town hall needed money to pay for that. Normally you would know someone to lent the money from, but this person did not have a very good reputation with paying people back.

I myself keep a (medium quality) copy of my drivers license in my car. If i ever get pulled over and forgot my paper i might get of with a warning if i can show the copy.

The value of friends and family is important in such cases.

Comment There are more ways to play it. (Score 1) 405

You can practice teeíng, and /or putting. But it frustating if you play the bal clase to the hole, but still need 2-3 strokes just to put it in.

A game with 15 inch holes might be more fun, still get you in the sun, and kick some balls. Just no need to call it golf.

By the way, farmers golf (boerengolf) is becoming popular over here. You take a voleyball, and some buckets, and something resembling golf sticks, and just have a few hours of fun between the cows.

Comment What about copy protection. (Score 4, Interesting) 92

DVD are still mostly copy protected by the highly ineffective CCS copy protection. blue ray are more effectively protected, but the protection still is breakable by a lot of tools.

by european law is decided:
"the following anti-circumventing rules were implemented in European Directive 2001/29/EC of the European Parliament and of the council of May 22, 2001 on the harmonisation of certain aspects of copyright and related rights in the information society.

This directive states in article 6, 'Obligations as to technological measures':

        Member States shall provide adequate legal protection against the circumvention of any effective technological measures, which the person concerned carries out in the knowledge, or with reasonable grounds to know, that he or she is pursuing that objective.
"

So you may copy it, but if you break ANY technlogical measure, you an still be sued by the content mafia fpr breaking copy protection technology. So think twice before you make a guide on your homepage how to copy a dvd.

Slashdot Top Deals

If all else fails, lower your standards.

Working...