Forgot your password?

Comment: Active ops (Score 4, Interesting) 503

by eddy (#47481491) Attached to: Russia Prepares For Internet War Over Malaysian Jet

Seeing a lot of pro-russian "psyops" on one local forum attached to a news outlet focused on economics, so much so that it's pretty obvious that it's organized. Massive amounts of downvotes on anything negative to the pro-russian side, and weak conspiracy theories written in broken english moderated up.

Not sure why they're wasting their time, but there you go. I guess the proud Cheka men have nothing better to do than troll forums.

Comment: Re:So glad it's over (Score 1) 151

by eddy (#47209341) Attached to: $3000 GeForce GTX TITAN Z Tested, Less Performance Than $1500 R9 295X2

The Titan-Z was and is a PR product. It was conceived simply to create buzz around nVidia. They had the misfortune that AMD put out a better card before they could get the darn thing to market though. First they delayed it, then as pressure mounted they finally sneaked it out without much of the ado they were hoping for. I doubt there exists or will ever exist more than a couple of hundred Titan-Zs IN THE WORLD.

Anyone who tells you that this card "is for X" where X is something else than PR is wrong and/or lying. It doesn't make sense anywhere.

Comment: Sounds like complete bullshit. (Score 2) 426

by eddy (#46953211) Attached to: Mathematical Model Suggests That Human Consciousness Is Noncomputable

There seems to be a step missing from A (that's not how memory works) to B (therefore uncomputable). The premise that memory isn't lossy sounds like rubbish, even IF it's perhaps not so simply a question of 'read errors'

I recently watched this talk, Modeling Data Streams Using Sparse Distributed Representations, which seems to be able to represent memory in a layered and lossy way perfectly fine in a computer.

Comment: Re:warning about unreachable code (Score 4, Informative) 101

by eddy (#46310443) Attached to: Apple Fixes Dangerous SSL Authentication Flaw In iOS
Sorry, it's not there. It's silently ignored, which is the WORST POSSIBLE SOLUTION to the problem. Ugh.

The -Wunreachable-code has been removed, because it was unstable: it relied on the optimizer, and so different versions of gcc would warn about different code. The compiler still accepts and ignores the command line option so that existing Makefiles are not broken. In some future release the option will be removed entirely.

Comment: Broken premise (Score 1) 361

by eddy (#45140909) Attached to: Is Choice a Problem For Android?

Ignoring the premise that Android is "impossible to navigate" (which is false), as for this specific quote:

That’s fun for them; but they’ve made the mistake of not understanding how their motivation differs from the rest of us

No, I understand perfectly well, it's just that I don't care about your needs. Why should I put your needs first? Are they more important than mine? What's the end game here? If Android copies iOS then it's called out for that by people like you ("no innovation!"). If it doesn't then it's "impossible to navigate because it's not exactly like iOS".

Is there a middle road where tinkerers and "normals" can coexist on one OS? Perhaps. But maybe it's okay that to have the existing distinction between the OSes. Or maybe iOS should be more open to tinkerers? Why don't you head over there and suggest that they simply don't understand that iOS is too hard to tinker with.

(Again, I don't think there's acutally anything major that'd make Android hard to use. In fact, I recommended an Android phone for my mother, knowing full well that I risk being the designated support (which I don't want to be).

Comment: Unmasked (Score 1) 83

by eddy (#44977975) Attached to: Declassified NSA Docs Shed Light On Cold War (And Modern) Operations

The on-site computer (a CP 818) REDACTED and demodulated the signal, then scanned the plaintext transmissions for key words. The system would alarm on . recognition of high-interest text, and the operators would react with special processing and forwarding routines.

So it DECRYPTED and demodulated the signal you say? :-\

(1st para, p.18 / 373).

APL hackers do it in the quad.