Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment My mammoth cloning idea (Score 1) 187

I'm all for it. And since this seems to be the right venue, let me pitch you my mammoth cloning idea.

Not only do I think we should bring back the mammoth, I know where to put them once we do. Yellowstone National Park. Plenty of space. I think the climate would suit the mammoth. And it would be tremendous boost to the tourist attraction of the place.

Also, I would really love to see a mammoth forging through the deep snow, emerging majestically from the icy fog.

Comment Re:Great idea at the concept stage. (Score 1) 254

You're right. From the wikipedia page on this: http://en.wikipedia.org/wiki/N... from the 'How it Works' section, they are planning centralized control of the data (ez wipe) and access restrictions to data built into the networking model.

"In many cases, substantial storage is already available, and could be used more efficiently if it could recognize particular content and only keep one copy of it. Since hierarchical structures can exist within the network graph, this mode of distribution could naturally scale content delivery to the size of the audience, and simultaneously reduce up-stream equipment to just the minimum needed to produce the content."
. . .
"In this model, the logical place to put commercial copy control and security is not in consumer equipment, but in the neighboring commercial network nodes. If the node agrees that the consumer has a distribution agreement, then restricted content can be delivered. Such delivery contracts require relatively few, cheap CPU cycles from devices already present near the edge of an ISP's net. If there are commercial restrictions, those may need to be included in the content names, as well."

Comment Not the only one (Score 1) 522

George RR Martin is not the only writer to select . . . unusual . . . writing tools.

I suspect that for a number of writers, the tools and the process has an influence on the flavor of the finished text.

Neal Stephenson wrote Cryptonomicon entirely in emacs. And he wrote the Baroque Cycle longhand with a fountain pen.

Use the tools that are appropriate to the task.

Comment Re:Not enough, (Score 1) 415

Someone mod parent up please.

I recall there was a push to get Allan Turing pardoned a few years back and it got shot down in the House of Commons. I believe the prime minister said something along the lines of "He was convicted of breaking the law of the land at the time. Laws change but we don't roll back time and reverse earlier convictions. We adhere to the laws that are in force at any given time."

So when this came out from the Queen, it appeared to me that one part of the government (the monarchy) was circumventing another part of government (the democracy). I asked myself "is this an instance where democracy cannot summon the courage to do the moral thing and the aristocracy rises to the challenge? How remarkable."

But I do not know much about the relative roles of the monarchy and elected representatives with regards to the power of the pardon in the UK, so I was about to ask for more information. AC has answered my question before I could ask it.

Comment Re:Python (Score 2) 465

There are a lot of good suggestions in this discussion so far.

I have a few points to add.
1) compiled language vs scripting language
In general, any compiled language is going to run faster than any scripting language. But you will probably spend more time coding and debugging to get your analysis running with a compiled language. It is useful to think about how important performance is to you relative to the value of your own time. Are you going to be doing these data mining runs repeatedly? Is it worth spending ten times as many hours getting this thing up and running if by doing so, you can get it to run really fast? If so, than chose a compiled language. You're already familiar with C so that would be a natural choice. If, after consideration, you value your development time more than processing time, stick with a scripting language. You'll probably be able to stand up a working program much faster & you can look for other ways to squeeze out extra performance

2) Parallelism. Your initial question explicitly said you want to use all 4 cores on a Xeon, but I've only seen 1 response so far that addresses this issue. To get good performance out of multiple cores you may need to re-work your algorithms to split the problem into pieces and crunch them down in parallel. Is your problem one that is easily amenable to parallelization? If yes, then you probably want to start thinking about multi-thread or multi-process programming. If your program will never run on something bigger than 1 server, than you will probably be OK sticking with with single multi-threaded process. I don't have experience in this myself, but I've heard that writing your program in a functional language like Haskell will make it intrinsically easy to parallelize. If you ever think your program is going to run on something bigger than that Xeon server - let's say you're thinking of ramping up to a cluster, than I would suggest building it on top of MPI from the beginning. I've had good results getting something up and running on MPI quickly using a combination of python, NumPy, SciPy and mpi4py.

Good Luck.

Comment Re:With a tear in my eye, I have to concur.. (Score 1) 631

I'll second this.

I was using Debian 6 (squeeze) with gnome 2 on the desktop. I didn't upgrade to Debian 7 (wheezy) because I didn't want to mess around with gnome 3. I thought I'd give Linux Mint Debian Edition a try. The LMDE with MATE gives me a new kernel, better performance, same desktop environment I was used to.

Updates are a bit rougher, but I've been able to handle that. Overall, so far, so good.

Submission + - NSA inserts backdoors into encryption methods (theguardian.com)

columbus writes: The Guardian, New York Times & ProPulbica are set to jointly disclose more information from Edward Snowden about the covert NSA surveillance program. New twist in this disclosure: how high profile tech companies have collaborated with the NSA to insert backdoors into commercial encryption software. Are open-source encryption packages compromised as well?
User Journal

Journal Journal: NSA SSL Backdoors - are they real, how to avoid?

What do people think of this?
http://www.scribd.com/doc/162984271/SSL-Locksmith

this
http://www.zdnet.com/has-the-nsa-broken-ssl-tls-aes-7000020312/

and this sort of thing:
https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html

Slashdot Top Deals

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...