And swam the Hellespont.
And swam the Hellespont.
Because if I can get away with murder, that necessarily implies that there is "no political community able to enforce [laws against murder]"
There are several cases to distinguish
If it is not known your are the murderer, then you get away with it, but the sovereign will to ban murders remains intact. Just surrender and you will verify it is.
If you manage to flee to a foreign country (without extradition treaties) and get known as the murderer, then you experience the territoriality of sovereignty. A political community can only enforce laws on the territory it controls
If you are a known murderer you can carry on your everyday life in a given society, this indeed means that this society does not seriously care about banning murder. There may be a law, but obviously it got obsoleted by the lack of sovereign will to enforce it. I would not want to live in such a place.
Yes, there is. Even a flawless human eye couldn't resolve better than about 0,4 arcminutes.
You can't have an uber-schpiffy S/W front end with all the proper auditing options, and then just shove the back-end up to a generic public cloud; that would never pass muster; a defense lawyer would have a field day with it, and a judge would toss that evidence out on it's sorry tuchus. Too many people that are not the ones that would be testifying as to the chain-of-custody would have full R/W access to it.
There ARE ways to construct a cloud to have all the proper legal-compliance features, which is EXACTLY what Taser has sold the dept. mentioned in the summary.
There are entire industries built around data storage and administration solutions for regulatory compliance; it's not a trivial matter to create a system that will pass legal muster. This is far more than just a simple file repository; there's some initial software design, and also high ongoing administration costs (lots of paperwork inevitably involved.) Farming out this responsibility to a 3rd-party is a perfectly reasonable decision.
If take into account the "Razors and Razorblades" business model for the storage, the costs don't sound too far out of line. While certainly this is far more expensive than just buying some JBODs of near-line disk, such an installation would not be nearly good enough for legal evidence.
That said, for larger departments, this is just begging for a short-term local disk (with some sort of certified software) along with swift duplication to WORM LTO cartridges.
why would you ever want to actually write a sorting algorithm? After all, somebody out there has already done it better, and that's nothing you would ever need to do as real programmer.
This sounds like the assignments were badly designed. Unless your data has an entirely random distribution, with some knowledge of the data that you're sorting you can do a much better job of sorting than any generic comparison-based algorithm. If you're sorting English words, for example (a very common example data set for this kind of thing), then a radix sort implemented by a student will do a better job than a standard library quicksort that's doing a full string comparison on each pair. If the course also asks them to implement a quicksort, and to evaluate both against libc's qsort(), then they should hopefully learn both when it is and when it isn't appropriate to implement their own.
How do you know he's a desktop user?
Because (in the part of the post that I quoted in my reply), he said:
-Os frankly is of little interest to desktop developers
And I replied that -Os is relevant to desktop users, which you then disputed by saying that it's not relevant to HPC.
Modern desktops are putting a lot of effort into reducing the number of wakeups per second in orer to reduce power draw. This means that on most systems, there are a lot of processes, but very few running at any given time.
Timer coalescing does the exact opposite. It means that you'll have a single wakeup and then a load of processes run, and then sleep. This increases i-cache pressure, it doesn't reduce it.
Second: You misunderstand the grandparent. If you don't understand the basic ideas behind a crypto algorithm (or, more importantly, crypto protocols) then you will pick the wrong one. No matter how good a cypher is, or how verified the implementation is, if used incorrectly it will still be insecure.
"Luke, I'm yer father, eh. Come over to the dark side, you hoser." -- Dave Thomas, "Strange Brew"