Forgot your password?
typodupeerror

Comment: Re:perspective (Score 1) 509

Valid use of volatile is indeed for a memory location updated by a signal handler in a single-threaded program, or DMA, or as you say, a hardware interrupt. It's been quite a few years since I did any of that. In a threaded program any volatile usage is highly suspect without at least a comment to justify and indicate the source of the idiom (e.g. double checked locking which is now the standard idiom to initialize an instance variable since Java 1.5 fixed the flaw). Situations where synchronization is clearly overkill and volatile is obviously strong enough are actually quite rare. It's just an odd little habit of mine to exploit that suspicion and misuse the underused and frequently misused volatile keyword to highlight an unfixed concurrency problem when reviewing code. It looks so blatantly wrong that I find it much harder to ignore than a mere FIXME comment, and it precisely identifies the broken variable.

Comment: Re:Not current... (Score 1) 509

Most revision control systems are broken, in that they only give you one chance to commit both the content and the accompanying message right first time at the same time. Even if he is capable enough to be the first person to realize that he made a mess, he cannot clean it up himself because ordinary developers don't generally have permission to suppress broken intermediate revisions and modify ill-considered log messages from previous check-ins, even if they haven't been seen let alone used by anyone else yet. If a little mess really bothers you, then how about doing something constructive to keep the system cleaner? Do people check in at the start of the day, or under pressure at the end of the day? How about upgrading the revision control workflow to include a template, checklist, "are you sure" confirmations, reviewing, and even some automated formatting and validation for the message and content?

+ - SPAM: Voip Phone Review

Submitted by azaz24
azaz24 (1357505) writes "Top rated web hosting and VoIP phones. Voice over Internet Protocol (VoIP), is a way of making regular phone calls over a broadband high speed internet connection instead of a regular telephone line."
Link to Original Source
Education

+ - How hackers adopt technology->

Submitted by
dzhiurgis
dzhiurgis writes "Hello,
I am currently conducting rather interesting research on how different types of hackers (programmers, makers, crackers) are adopting different technology products and services. I think you should find it interesting and useful for the body of knowledge related to this important subculture.
Sincerely,
Jurgis Salna."

Link to Original Source

+ - SmartThings home monitoring and automation on Kickstarter->

Submitted by zormal
zormal (2715515) writes "Monitor, control, have fun — SmartThings makes it easy to connect the things in your physical world to the Internet. You can monitor, control, automate, and have fun with them from anywhere — at home, office, or on the go. SmartApps give you control through your phone and connect your sensors to online services. SmartThings is looking for $250,000 to get production started, and give considerable discounts to early adopters."
Link to Original Source
Music

+ - Man With World's Deepest Voice Hits Notes That Only Elephants Can Hear

Submitted by Anonymous Coward
An anonymous reader writes "The man who holds the Guinness record for the world's lowest voice can hit notes so low that only animals as big as elephants are able to hear them. American singer Tim Storms who also has the world's widest vocal range can reach notes as low as G-7 (0.189Hz),an incredible eight octaves below the lowest G on the piano."

If Machiavelli were a hacker, he'd have worked for the CSSG. -- Phil Lapsley

Working...