Forgot your password?

Comment: Did that 23 years ago (Score 2) 57

by hyc (#47311903) Attached to: Programming On a Piano Keyboard

with my Atari ST. It was trivial then since the same chip controlled both the keyboard and MIDI ports, just redirect one of the intercept vectors to catch the incoming MIDI packets and feed the notes to the keyboard buffer.

It's more fun to do this with a Zeta MIDI violin. I programmed it to move the mouse pointer on glissandos too, could do pretty much anything without touching keyboard or mouse.

Comment: Re:Can't say I disagree. (Score 1) 1098

by hyc (#46098861) Attached to: FSF's Richard Stallman Calls LLVM a 'Terrible Setback'

As a related example, I was recently (last summer) confronted by a patchset from [a prominent network router manufacturer] for OpenLDAP, which they wanted to contribute back to the Project. Upon reviewing the patchset, I found they were using an OpenLDAP release from 2001, and this is the code they've been embedding in the firmware of many of their router products from then till now. Many of the patches they sent me were in fact patches I had written for the Project, which they had backported somewhere in the mists of time.

So, thanks to OpenLDAP's permissive license, there's a lot of network hardware out there running ancient, patchwork code that's massively obsolete, along with a crazyquilt of patches of widely varying quality. None of the users of this hardware have any idea of what's inside there, no one can say what security vulnerabilities may or may not exist in any particular model # or serial #, because the code itself is just a frankenstein jumble.

Personally I would have preferred the GPL, because it would have prevented this sort of situation, but it would be quite difficult for the OpenLDAP Foundation to contact all of the copyright holders and ask them to approve a license change, and I suspect a number of them would refuse to change.

Just keep in mind - the freedom that permissive licenses grants to proprietary software companies almost always works to the customers' disadvantage. They will allow their code bases to diverge, they will allow bitrot to set in, they will allow CVEs to go unaddressed, and no one outside will know exactly how bad things are. Until perhaps 10-15 years later, if someone inside the company wakes up and realizes how untenable their situation really is. But the problem is these companies always jump down this path at first; they haven't looked far enough down it to see where it goes.


+ - World's Smallest And Fastest Database->

Submitted by
hyc writes "It was only a couple months ago that MemSQL was claiming to be the world's fastest database. But here we have a new contender; compiling to under 32K of object code it is unquestionably the world's smallest and most lightweight fully transactional database. It is also orders of magnitude faster than everything else for reads, and impressively fast for writes. It is a memory-mapped database (which, unlike an in-memory database, is intrinsically persistent. In-memory databases are ephemeral by design and require a persistence mechanism to be bolted on as an afterthought) which is completely impervious to corruption. It does not use write-ahead transaction logs, and requires zero recovery time when restarting after a crash. It's already shown impressive performance gains when used as a backend for OpenLDAP slapd, as well as for SQLite3. Work is underway to create backends for other projects (e.g. MemcacheDB, Cassandra) but your readers could help that along."
Link to Original Source

Comment: Re:Overblown (Score 1) 184

by hyc (#39310243) Attached to: Data Breach Flaw Found In Gnome-terminal, Xfce Terminal and Terminator

Yes, it's overblown, but tmpfs is not a reliable solution. If the system is under heavy enough load and memory pressure, the tmpfs contents may get swapped out to disk anyway.

And oh yeah, the swap partition on your disk is a liability too. But anytime someone has physical access to your disk, all bets are off anyway...

Comment: Re:Sounds funky but (Score 1) 131

by hyc (#39309365) Attached to: X Server Now Available For Android

I rewrote the pidgin-otr plugin to use plain libpurple a few months ago. It will work on anything that libpurple works on, including finch. You can read about it here

and grab the code here

There's already a package for it in Arch Linux.

Comment: Re:It's open source (Score 1) 325

by hyc (#34734980) Attached to: Android Text Messages Intermittently Going Astray

Google has been grossly negligent from Day 1. I paid ~ $600 for my G1 phone 2 years ago, and got zilch for customer support from Google, and nobody at T-Mobile was smart enough to even know what to do with any Android technical problems. When people are paying this much real money for a product, by god you better offer them real technical support.

You can't find any dedicated email address or phone number to report issues, the best you can do is file a bug report that's unlikely to be acted on, or post on and hope some bored developer with a few cycles to spare reads your post. That's completely inexcusable for the price people pay for these devices.

I've stuck with it because I've been able to download the source and fix issues I've run into, but only after many days of beating my head against the poorly or non-documented interfaces in the system. But again, regular customers paying real money shouldn't have to do that. For this kind of money, there should be dedicated customer support people who are proficient with the OS and the range of devices, and there should be complete documentation on all of the bundled features.

Comment: Re:Definitely need more than one trip... (Score 2) 1270

by hyc (#33970884) Attached to: Given one free trip to the past in a time machine, I would..

10,000 rounds sounds a bit too generous, are you trying to destroy the army or just kill the leader(s)?

That's also got me thinking down the line of Asimov's psychohistorians. I wonder if enough media has already been moved onto the web that we could harvest enough online data from say, the past 10 years, to feed into a computer model of the world that produces identical results to the historical data. Then if the model is working well, you can start playing what-if games to see what changing one or another factor does to modern life. You could go back further, if you wanted to manually enter all the data, but I doubt you could go back more than a decade or two because there just isn't sufficient data. Dunno.

And then, assuming you have this wonderful computer model, does its existence alter the world that it is modeling? Do you have to keep it a secret so that it's able to model and predict without impacting the world? Imagine if it was just a big Distributed Computing project, and it became well known, commonplace even.

I would guess that the NSA or CIA already has something similar crunching in one of their data centers, but it would be cool to have just for its speculative aspects...

If you aren't rich you should always look useful. -- Louis-Ferdinand Celine