Comment Re:he's talking about tarballs (Score 1) 312
...two months is all you need to cross from one year to the next, which, under the %m-%d-%Y scheme, would still fail to sort in the expected chronological order.
...two months is all you need to cross from one year to the next, which, under the %m-%d-%Y scheme, would still fail to sort in the expected chronological order.
Need I point out that %Y-%m-%d sorts properly, whereas %m-%d-%Y does not? When's the last time you needed releases sorted by month but not year?
I once repaired a computer with no fewer than 250,000 copies of a particular virus (don't recall which) installed. With each virus
The machine was a new laptop with XP SP1 installed (so no firewall). On its first day, it was connected to a university LAN for 8 hours non-stop, while a virus was running around the network. The virus did not have code to detect an existing infection, so it simply reinfected the machine many times.
It ran fine until the owner shut it down. Upon restarting, every virus
The soap box is censored, the ballot box is a sham, and the jury box is rigged. Maybe then you see why some would resort to force?
I didn't realize using a standard audio format, with tons of support from tons of software and hardware, and with better licensing terms than MP3 counted as "lock in".
You are also drawing an unfair comparison between Microsoft's desktop operating environment and Apple's mobile environment. Apple runs iOS like basically any game console; if you think that iOS is evil, then you probably also think Nintendo is evil too for making their platforms locked down.
On the other hand, Apple's Mac OS X operating system is far more open than Microsoft's ever was. On OS X, the kernel (Darwin) is open-source, the browser (WebKit) is open-source, the compiler (LLVM/Clang) is open-source, and the company employs developers who maintain and contribute back to these projects.
Apple also sits on several standards committees, and actively participates in standards development and promulgation.
In many, many ways, Apple is not nearly as "evil" as you seem to think.
Python never had shell backquotes. The code snippet is highlighting one way that shell backquotes from other languages can be handled. (The "backquote" operator in Python 2.x is equivalent to "repr", e.g. `3+4` yields '7'; it is now gone in Py3K for obvious reasons).
In Python 2.7 and 3.1, there's now a convenience function for capturing program output:
subprocess.check_output('ls -l')
I doubt your claim that Py3K has made things more complicated. If anything, it has made things simpler: less language "burrs" (e.g. / now does float division, eliminating the need to stick float() on one argument or use weird constructs like 1./3), a cleaner standard library ("io" is a great idea), and proper Unicode/8-bit distinction.
That works out to an effective resolution of ~16000x9000, which is pretty damn high (it's a 144 megapixel display). I'm sure we'll eventually get to that point, but seriously, a 144 MP display is still a few years off.
Also, at normal viewing distances, I doubt a 360 dpi display has any significant advantage over a 120 dpi display (1080p on a 52" screen is about 42 dpi, so 120 dpi seems like a more reasonable goal).
Most Android phones also have a battery cover, so in these cases you just pull the battery: problem solved.
No, to turn off an iPhone/iPod touch the proper way, you hold down the sleep button for five seconds, and slide to power off. It's really not that hard.
Except DES has a keyspace size of 2^56 (~7x10^16 keys), whereas AES (128) has a keyspace size of 2^128 (~3x10^38). That's a factor of 10^22 times more difficult: AES isn't just a little harder than DES, it's absolutely out of reach for current (or even custom) hardware systems.
Heck, even 2^80 is considered infeasible for present hardware, and that's "only" 16 million times harder than DES (i.e. an organization would need millions of dedicated DES crackers, at a cost of trillions of dollars, to be able to break a theoretical 80-bit version of DES, or find collisions in a perfect 160-bit hash function).
DES was weakened by the NSA specifically because they thought 56-bits would be bruteforceable (the EFF built their machine partly to demonstrate that the NSA wouldn't be the only ones able to do so).
AES was not subjected to such an artificial weakening procedure. Unless it has a heretofore undiscovered weakness that permits a break in substantially less than 2^128 operations, AES is secure against current hardware.
Besides, the totally paranoid people are probably using AES-256, anyway; to brute-force AES 256 would require about 10^77 operations, or about 19 billion AES operations per second, *per atom of matter in the Earth* (estimated at 10^49), for 19 billion years.
Yeah...get back to me when you manage to bruteforce a 128-bit AES key on your GPU farm. Only then can you claim that "Encryption is far behind the current power of hardware these days."
Yesterday I used my iPod touch (3rd gen) for about 10 hours of playing music, during which about 3-4 hours was spent actively using the screen to browse the internet and do other things (e.g. rendering fractals for my amusement, using an SSH+X client, a remote desktop client, viewing course notes, etc.)
It arrived home with about 30% of its battery left. Given the amount of use I got out of it for a day, I am quite impressed.
Initial reviewers have gotten *more* than 10 hours out of the iPad; one reviewer managed to play videos straight for 12 and a half hours on a single charge. I think the battery life on the iPad will be quite good (at least for the majority of devices, barring the occasional defect).
This might be true of WM 6.5, but have you seen the direction Microsoft is moving with Windows Phone 7 Series? They appear dead-set on emulating the iPhone's closed environment: no third-party multitasking, approved apps only (though they claim their definition of "approved" will be more broad...we'll see), and the potential for a device manufacturer to restrict modification to the firmware.
I don't really see much "openness" in that model of things...
I can't speak for the iPad, but I know the iPhone actually allows Safari to run in the background. Practical application: audio streams off the Internet can be played in the background; several Internet radio apps use this trick to "run in the background".
Variables don't; constants aren't.