Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Who leaked my card details? (Score 1) 163

I personally haven't experienced abuse of my card details - so far as I know. But if I did, how could I tell who was responsible - especially when there are vast leaks like this? It seems like it would be more fair to have an industry-wide fund to compensate victims, which the leaking companies would pay into proportionately to the number of valid details leaked.

Comment Re:Damn you kids, get off my lawn. (Score 1) 207

There's not 64k of assembly pumping bytes into a framebuffer and twiddling the PC speaker port to synthesize digital audio.

Of course. But all the creative work is squeezed into 64K.

One thing I couldn't find in there (and I've been out of the scene for a LONG time, so I don't know how this works on new-fangled fancy computers...) -- do these write directly to the video hardware? Or do they use OS services like DirectX11, etc?

They use DirectX, because that is the only way to support a reasonable range of hardware. (Also, you can't hit the hardware without installing a new driver or exploiting a kernel bug. Neither of which is very friendly.)

But are people still getting down and counting clock cycles?

Cycle counts aren't even documented today. Now it's all about avoiding cache misses and cache invalidation.

Comment Re:Where's the 10GbE? (Score 1) 96

I think you're mistaken about PCIe link speeds, and you're also failing to account for the transaction layer protocol (TLP) overhead which can be quite substantial. PCIe 2.0 link speed is 5 GT/s but that's with 8b10 encoding; the data rate is only 4 Gb/s. PCIe 3.0 doubles the data rate to 8 Gb/s. Two 10G ports require 20 Gb/s plus some overhead, hence 8 lanes on PCIe 2.0 or potentially 4 lanes on PCIe 3.0.

Comment Re:TTL value (Score 1) 58

If browsers don't impose such a minimum, devices with embedded web servers (think printers and home routers) become vulnerable to Cross-Site Request Forgery. They can potentially defend against this by checking the Host header on requests, but since these devices are only manageable through the web there's no good way to establish what the correct value is.

Comment Re:sort of like? (Score 1) 375

Explorer isn't the window manager, although it does have some integration to make minimised windows appear within the task bar. The window manager largely runs as a library within the application (USER32.DLL). Windows 2000 added the feature that lets you force minimisation or kill the window's owner if it doesn't process window management messages quickly. (I don't know what component or process handles this.) More recently DWM.EXE was introduced to handle some window management and particularly compositing.

Comment Re:This is where Intel rules (Score 1) 97

Apple has way too much experience being burned by Motorola and IBM both being unable to supply chips in heavy demand.

As I recall, Motorola and IBM had no problem with regular supply. The problem was that Apple was the only major customer for desktop/laptop-suitable PowerPC processors, and those vendors quite reasonably expected long-term order commitments for these products while Apple wanted more flexibility. With Intel, Apple is just one of many customers and while it has less control over x86 processor development it also doesn't have to make such commitments.

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...