Forgot your password?
typodupeerror

Comment: Re:Weeding Out (Score 1) 265

by geggo98 (#47927883) Attached to: College Students: Want To Earn More? Take a COBOL Class

I know somebody that tried this. At around 5000 threads he got no real progress whatsoever anymore.That was a while back, but at that time Java was already a few years old.

The thread limitation comes from the operating system, not from the Java virtual machine. Modern operating systems are not designed to handle a huge amount of parallel threads. The handling of the threads and the synchronization between the threads usually eats up most of the system's resources.

The Java VM indeed has some shortcomings regarding mutli processing: when using multiple cores on the same socket, the Java VM sometimes accesses the same cache lines from all cores. This leads to strange patterns with cache invalidation and slows down all the affected cores. Currently there is no way to mitigate this using Java APIs or VM parameters. But this is a very special problem. When this is indeed the bottleneck, the underlying application is very likely already very well optimized and running quite fast.

If you want to process a huge amount of data, currently the best approach is to run exactly as much threads as you have processor cores. Then you feed each thread with working tasks, using non blocking data structures. For the communication, the threads should use non-blocking IO. Java is prepared extremely well for this scenario, perhaps even better than node.js. Examples are Vert.x and Akka. In some older benchmarks, Vert.x had no problem to serve over 300'000 parallel requests per second on a six core machine.

Edited on on 18:05 Wednesday 17 September 2014: fixed some typos.

Comment: Re:Surprise? (Score 2) 579

by geggo98 (#47701533) Attached to: Munich Reverses Course, May Ditch Linux For Microsoft
It is really hard to get usability problems in bug reports. You would get things like:
  • User says the software feels sluggish
  • User is not as productove as before
  • User says that in general buttons and menu items are not where expected

Bug trackers are not the right tool to deal with usability problems. Just imagine how many usability bugs it would need, to get from a Nokia 6070 to the first iPhone.

Comment: Re:Surprise? (Score 2) 579

by geggo98 (#47701491) Attached to: Munich Reverses Course, May Ditch Linux For Microsoft

There is a third (unproven, but likely) option:

3) Bribe the officials to starve to project to dead. Wait until valid complaints from the users come in.

Clues for this (but of course this does not prove anything):

  • According to wikipedia, they use the following quite outdated software:

    version 4 available from August 2011 is based on Ubuntu 10.04 LTS, although using KDE Desktop 3.5 and version 4.1 available from August 2012 is also based on Ubuntu 10.04 LTS

    (Source: wikipedia page about LiMux). Especially the desktop environment is really old, first published around 2002 if I remember correctly.

  • Microsoft moves its German headquarter to munich (source)
  • Munich lord mayor Reiter is a self-confessed Microsoft fan (source)

+ - Microsoft Goes Through Bloggers Hotmail Account

Submitted by fodder69
fodder69 (701416) writes "It's not just the NSA reading your email anymore, Microsoft has decided they are all for it when they want to. Fro The Guardian: "The engineer was caught after the blogger emailed Microsoft to confirm the authenticity of the leaked Windows 8 code. Investigators at the firm then reportedly looked through the blogger’s hotmail account and instant messenger chats to identify the source of the leak, and found an email from Kibaklo." Actually, no it's not "reportedly". From the actual criminal complaint, https://twitter.com/xor/status... : "Microsoft's Office of Legal Compliance (OLC) approved content pulls og the blogger's hotmail account." Aside from the surprising fact that someone still uses hotmail, is anyone else concerned with Microsoft approving itself to look through your emails?"

+ - WPA2 wireless security cracked

Submitted by Anonymous Coward
An anonymous reader writes "Achilleas Tsitroulis of Brunel University, UK, Dimitris Lampoudis of the University of Macedonia, Greece and Emmanuel Tsekleves of Lancaster University, UK, have investigated the vulnerabilities in WPA2 and present its weakness. They say that this wireless security system might now be breached with relative ease by a malicious attack on a network. They suggest that it is now a matter of urgency that security experts and programmers work together to remove the vulnerabilities in WPA2 in order to bolster its security or to develop alternative protocols to keep our wireless networks safe from hackers and malware.

Read more at: http://phys.org/news/2014-03-w..."

+ - Bitcoin's Mt. Gox Shuts Down, Loses $409,200,000 Dollars->

Submitted by satuon
satuon (1822492) writes "Mt. Gox’s shutdown is circulating like wildfire. Its repercussions are being felt throughout the world. Mt. Gox was the most public and well-known brand that represented Bitcoin’s exchange market. The company’s shutdown is rumored to be caused by a “hack” or “security breach” that resulted in a loss up to 744,000 BTC or $409,200,000 Dollars. (Based on the approximate value just hours ago from Coindesk.com) This is truly an unfortunate event that has caused the international community to shake its trust in Bitcoin as evidenced by the massive price drop. This is par the course, when a pillar in the community falls in such a funeral pyre. The best parallel would be the Bear Stearns’ failure during the 2008 global financial crisis. Hopefully, Bitcoin won’t follow in the financial system’s footsteps post-Bear Stearns."
Link to Original Source

Comment: Re:hardware backdoor possible? (Score 1) 410

by geggo98 (#44421415) Attached to: Several Western Govts. Ban Lenovo Equipment From Sensitive Networks
Simple. Build a "bug" into the SATA controller. When a block that should be written to disc fulfills certain criteria, simple write it to a different location according to the content of the block. Now you have a way to modify arbitrary content on disc. You can trigger this bug from remote by embedding content to a web page that riggers this "bug". When the browser on a vulnerable system tries to write this content as a file to the cache folder, it will overwrite some other parts on the disc instead (e.g. the boot sector or parts of the operating system). This can be improved on SSDs, which even analyze the fiel systems stored on them for optimization reasons. Similar bugs might be possible using the graphics chip (access to the PCI-X bus and the RAM), the chipset on the mainboard (access to all connected hardware), the USB controller (access to the PCI bus, the RAM and to connected hardware like an USB disc or a camera) and so on.

Comment: Re:However (Score 1) 505

by geggo98 (#44120741) Attached to: Hands-On With Windows 8.1 Preview
Ironically, launching Control Panel on Win8 is actually faster than on Win7 (by default). Right-click the Start button (yes it exists; it was just hidden by default) or hit Win+X, and select "Control Panel" from the menu that appears. Easy and straightforward.

Should't Win+X bring up the mobility center? Or where is the mobility center then on Win 8?

Comment: Re:TeX for Math (Score 1) 300

by geggo98 (#43390627) Attached to: Extended TeX: Past, Present, and Future

I think you mean LaTeXiT.

The trick with the PDF is made using Link Back. This is a framework for OS X, where applications can embed documents from other applications in their own documents. The embedded documents are still editable by the original application. It's similar to OLE on Windows, but much more lightweight. It's mainly based on PDF with some additional metadata. It's easy to implement and very nice for the user. I find it a quite elegant solution.

Comment: Re:Retina Display is good and all, but... (Score 1) 683

by geggo98 (#40292891) Attached to: Apple News From WWDC and iPhone 5 Rumors

I expect the system font will be a bit smaller due to the sharper text.

[...] The number of pixels required to measure a point will change with dpi but the size of the font shouldn't.

I think what he meant was: They might reduce the size of the fonts. On a sharper display, a 10 point font might be as readable as a 12 point font on a not so sharp display.

Comment: Re:Just what market needed... (Score 1) 240

by geggo98 (#38084662) Attached to: Google Music Goes Live With Google+ Integration
You know that the GEMA is also reading Slashdot? So just to clarify: Google Music is NOT working in Germany and there is no way to get it to work. Google has secured it with a GEO-IP filter on the register page. Because you cannot circumvent such an IP filter, there is no way to register for Google music from Germany and hence no way to use it in Germany.

Of course it will work fine for US citicens during their vaccation in Germany, because once you have registered no further filtering will happen (for now).

"Most of us, when all is said and done, like what we like and make up reasons for it afterwards." -- Soren F. Petersen

Working...