Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:What if... (Score 1) 136

I was thinking exactly the opposite - It seems to me that certain types of creative tasks simply do not lend themselves to lots of iteration and refinement... Writing, for example, tends to get worse the more people mess with it. I'm guessing that movie scripts are the same. Obviously there's room for improvement on most kinds of projects, but I just don't see how you do iteration on writing a story or building a jet engine... at least not iteration in the sense of progressive refinement and adding features as in the agile software sense.

Comment Analysis... (Score 1) 271

I don't know how LinkedIn's login APIs work, but if they use secure user/pass logins and store authentication tokens on the client side as is good practice then in theory exposing these server side generated hashes wouldn't really compromise the system. The problem is that SHA-1 has been broken :( So in theory someone could reverse these and get plaintext passwords and salts or whatever is in them.

This is one reason you don't send password hashes over the network...

Comment Wrong options... (Score 1) 239

I think you are describing those options incorrectly for his case.

--inplace is the opposite of what he wants. As I understand it --inplace will defeat some of the automatic duplicate range detection and save *space on the server* by not duplicating data during transfer. This does not help with network bandwidth but *hurt*. He probably doesn't care about space on the server, he wants his files mirrored quickly.

--update won't hurt him here, but it's probably not necessary as you seem to be describing it backwards. If he just mods files on his laptop and rsyncs the newer files on the laptop will of course get transferred. The only reason to use --update would be if he modded files on the server at home *and* on the laptop and preferred to keep the ones at home.

Pat

Comment Disneyland already does this (in a small way)... (Score 1) 357

Some of the rides at Disneyland have started taking advantage of this idea by moving the passengers along on a moving beltway (kind of like at the airport) next to the ride... So you board the ride without the ride having to slow down at all... e.g. the Buzz Lightyear ride does this and I recall that it worked pretty well.

Comment Re:Quad Core In a Tablet/Phone? (Score 2) 123

I can think of dozens of things that they are dying to use that power for: Pumping 4x the pixels for a high resolution display, doing processing related to speech recognition (even if the matching is done server side), running spotlight indexing on local content as you download it... (e.g. your email and docs from the cloud), playing HD video while doing all of the above, supporting a "mission control" style app switcher with live previews and spaces style switching, supporting airplay in the background while you are using the iPad for something else (maybe even someone else controlling it), games with really good physics simulations (which are dominating the app store and making apple millions) :), multi-way video chat compositing, and ten things only Steve Jobs has thought of...

Comment Re:dumb question (Score 1) 164

A real engineer can speak to this better, but there is a big difference between the "near field" where you are actually coupling magnetically/capacitatively with the source and radiation which transmits energy over an arbitrary distance. I believe if you are stealing power by putting a big coil next to a power line you are essentially making half of a transformer and directly drawing power through it... whereas if you are at a greater distance all you can do is intercept radiated energy, which is already gone as far as the sender is concerned.

Comment Don't understand how TPB domain survives... (Score 1) 219

With years of fighting around the ISPs, hosting, and blocking of TPB can someone tell me how it is that the domain name has not just been seized? Haven't other names been grabbed / taken down for more specious reasons?

I understand that taking the domain name would not stop any of this, I am just amazed that they haven't tried...

Comment The private key is accessible through software? (Score 1) 306

Does anyone know what was involved in "dumping ROMs"? I would have assumed that the private key was buried in the hardware and not directly accessible via software... From his description it sounds like it was just stored in ROM and software obfuscated. If that was the case it seems odd that it took six years for someone to find it...

Comment Re:Pardon my ignorance(and I don't want a holy war (Score 1) 169

Both Java and C/C++ are strongly typed languages, which give a lot of information to the compiler and (in the case of Java) runtime. The question here is how much optimization people can do on a loosely typed language like JavaScript... Apparently they can do quite a bit because JS today is screaming faster than a few years ago.

You would expect that, all things being equal, the languages with a runtime (including JavaScript) should beat out those without because they can do things that you can't do statically. People who religiously believe that Java couldn't beat C/C++ simply failed to understand what is going on... Both languages have about the same amount of info, both have a compiler, but one has a runtime that is also a compiler that can go on analyzing and optimizing as the program runs... Which one wins in the long run? Duh.

So the question then is whether JS having a runtime can allow it to work around the lack of type information in the code. Runtimes can do things like observe the type usage and "optomistic inlining" that in some cases may compensate for the loose types. But there may always be cases where there is a penalty for loose types.

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...