Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: to be fair..charities not supposed to be political (Score 1) 116

by Chirs (#49091201) Attached to: The Disastrous Privacy Consequences of Canada's Anti-Terrorism Bill

I dislike Harper as much as most of us, but to be fair it has always been the case that charitable organizations were not supposed to engage in significant amounts of political activities.

Yes, many of them (of all political stripes) have been doing just that for quite a while, but the law has been on the books for a long time (just not enforced very strictly).

Comment: tiny bit of inventiveness (Score 1) 128

by Chirs (#49091147) Attached to: Apple Patent Could Have "Broad Ramifications" For VR Headsets

It seems to me that the only real bit of inventiveness is to have a way for the phone to automatically detect that it has been inserted into the holder (and presumably switch to a different operating mode).

I don't think Google Cardboard does this, but it's an obvious incremental step.

Comment: lockless multithreaded not exactly common (Score 1) 85

by Chirs (#48992645) Attached to: ARM's Cortex-A72 and Mali-T880 GPU Announced For 2016 Flagship Smartphones

It should be noted that most programmers will never write or directly use a lockless multithreaded algorithm. The number of things on a phone or tablet that need (or even would benefit significantly from) such an algorithm is relatively small.

Most of the time I suspect that the various cores on a mobile device are doing independent things. The percentage of time that the average phone/tablet is going to be doing massively parallel cpu-bound work is tiny.

Comment: checksummed filesystems (Score 1) 258

The solution for this is checksums and parity on the disk contents at the filesystem level. Read a block off the disk and check the stored checksum against what you read...if it doesn't match then use the parity information to correct the data and store it somewhere else.

Comment: Wrong N (Score 1) 258

They have N parity disks, and then roughly N(N-1)/2 data disks and roughly the same number of spares.

In larger arrays the overall overhead of the parity and spare disks is slightly under 50%, or roughly equivalent to RAID-1, but more reliable since the spares can be reassigned as needed.

Comment: virtual machines (Score 2) 118

I'm writing this on a Dell Latitude with 16GB of RAM. I'd like twice as much. I do OpenStack development and regularly run a couple of controller nodes and a couple of compute nodes. That uses pretty much all of my RAM.

I'd like to be able to simulate a couple of storage nodes as well, and I'd like to be able to have multiple NUMA nodes per compute node to test out the code for simulating NUMA in the OpenStack guest instances.

Comment: harder to read if there is no consistency (Score 1) 220

by Chirs (#48928441) Attached to: Anonymous No More: Your Coding Style Can Give You Away

Generally speaking each project has a coding style that most code in the project adheres to, for the simple reason that it's easier to maintain when the code all looks more-or-less similar.

If one area uses lowercase with underscores, and the other area uses CamelCase, and one area typedefs the heck out of everything while the other is explicit, then for someone coming in and trying to understand the code it makes it harder than necessary to figure out what's going on.

So if you look at the linux kernel, or glibc, or firefox, or Chrome, or any other similarly large project, there will be some sort of coding style that applies. This is not to say that the style applies blindly. For example there are areas in the kernel where they basically imported a driver that is written in a different coding style. Since that driver is maintained out of the linux kernel tree and is largely self-contained, that was deemed to be acceptable. And even in that case, the driver used an internally-consistent coding style for all the files involved.

Comment: disagree (Score 1) 236

by Chirs (#48916433) Attached to: White House Drone Incident Exposes Key Security Gap

The most powerful IED that could be transported by a recreational drone would be one carrying a model rocket engine. These contain PETN solid fuel, which is a high explosive. With clever design, this solid fuel engine could be used to make a small explosion. The problem? This would be at most enough to damage a few windows, and maybe maim somebody at point blank range.

What's "recreational" in this context?

The M18A1Claymore mine weighs under 4lbs and fires roughly seven hundred steel pellets like a shotgun. The proposed Amazon Prime Air drones could carry a bit over 5 lbs, so could easily mount a Claymore.

Comment: movie stars too... (Score 1) 236

by Chirs (#48916371) Attached to: White House Drone Incident Exposes Key Security Gap

Apparently there is a company doing booming business selling drone detection systems to movie stars and other famous people. Gives them enough warning to cover up or go inside.

So anyone with money can get drone detection already. Drone destruction might be another story...though I wouldn't be surprised if that comes eventually too.

Comment: banning is not the answer (Score 1) 236

by Chirs (#48916345) Attached to: White House Drone Incident Exposes Key Security Gap

Nowhere did I call for banning drones, I just pointed out that they're a real issue, not some invented thing.

Personally I think the solution for drones would be a sensor net combined with some kind of EM weapon (laser/maser/EMP/etc.) to shoot down the drone before it gets to the intended target.

"It's when they say 2 + 2 = 5 that I begin to argue." -- Eric Pepke