Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Meanwhile, in reality... (Score 2) 201

It's a stock Debian kernel with some minor packaging changes and support for a new game controller. All those realtime patches? Not actually used by default. The full list of exciting changes:
  • Make the binnmu regexp also reconize our build suffixes
  • New XBox controller driver
  • Disable Intel P-State driver as it causes issues with sound being choppy during BigPicture trailer video playback.
  • Hard-code parallel build for now since our OBS infrastructure doesn't know how to set these options yet.
  • Add postinst step to touch /var/run/reboot-required

Comment Re:But can SVN merge a branch yet? (Score 1) 378

Repeated merges have worked well for a while now (maybe since 1.6?). It's not quite as good at merging as git is, but it works well enough. But I have to agree with the general sentiment against merging from release to devel branches. Merging should be considered an expert-only operation (not expert in version control, but in the code base). Cherry-picking/backporting fixes from devel to release is safer because then you know exactly what you're changing.

Comment Re:Online Advertising Response (Score 1) 369

Whenever a web site has a form, some other site can set up another (hidden) form pointing to the same URL and with any values they like. Someone who visits both sites can unintentionally submit that form (together with their cookies from the first site, so it's properly authenticated). This is 'Cross Site Request Forgery' and the usual way to avoid is to check the Referer header.

Comment Who leaked my card details? (Score 1) 163

I personally haven't experienced abuse of my card details - so far as I know. But if I did, how could I tell who was responsible - especially when there are vast leaks like this? It seems like it would be more fair to have an industry-wide fund to compensate victims, which the leaking companies would pay into proportionately to the number of valid details leaked.

Comment Re:Damn you kids, get off my lawn. (Score 1) 207

There's not 64k of assembly pumping bytes into a framebuffer and twiddling the PC speaker port to synthesize digital audio.

Of course. But all the creative work is squeezed into 64K.

One thing I couldn't find in there (and I've been out of the scene for a LONG time, so I don't know how this works on new-fangled fancy computers...) -- do these write directly to the video hardware? Or do they use OS services like DirectX11, etc?

They use DirectX, because that is the only way to support a reasonable range of hardware. (Also, you can't hit the hardware without installing a new driver or exploiting a kernel bug. Neither of which is very friendly.)

But are people still getting down and counting clock cycles?

Cycle counts aren't even documented today. Now it's all about avoiding cache misses and cache invalidation.

Comment Re:Where's the 10GbE? (Score 1) 96

I think you're mistaken about PCIe link speeds, and you're also failing to account for the transaction layer protocol (TLP) overhead which can be quite substantial. PCIe 2.0 link speed is 5 GT/s but that's with 8b10 encoding; the data rate is only 4 Gb/s. PCIe 3.0 doubles the data rate to 8 Gb/s. Two 10G ports require 20 Gb/s plus some overhead, hence 8 lanes on PCIe 2.0 or potentially 4 lanes on PCIe 3.0.

Comment Re:TTL value (Score 1) 58

If browsers don't impose such a minimum, devices with embedded web servers (think printers and home routers) become vulnerable to Cross-Site Request Forgery. They can potentially defend against this by checking the Host header on requests, but since these devices are only manageable through the web there's no good way to establish what the correct value is.

Comment Re:sort of like? (Score 1) 375

Explorer isn't the window manager, although it does have some integration to make minimised windows appear within the task bar. The window manager largely runs as a library within the application (USER32.DLL). Windows 2000 added the feature that lets you force minimisation or kill the window's owner if it doesn't process window management messages quickly. (I don't know what component or process handles this.) More recently DWM.EXE was introduced to handle some window management and particularly compositing.

Comment Re:This is where Intel rules (Score 1) 97

Apple has way too much experience being burned by Motorola and IBM both being unable to supply chips in heavy demand.

As I recall, Motorola and IBM had no problem with regular supply. The problem was that Apple was the only major customer for desktop/laptop-suitable PowerPC processors, and those vendors quite reasonably expected long-term order commitments for these products while Apple wanted more flexibility. With Intel, Apple is just one of many customers and while it has less control over x86 processor development it also doesn't have to make such commitments.

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...