Forgot your password?
typodupeerror

Comment: Re:First 64bit (Score 1) 208

by wchin (#47897015) Attached to: Early iPhone 6 Benchmark Results Show Only Modest Gains For A8

Many make the wrong assumption that 64 bit processor means only increasing the memory pointers to 64 bit. This is not the case with the transition from the A6 to the A7. The instruction set changed from ARMv7s to ARMv8 (or ARM64). There are performance gains to be made moving to a new, revised ISA for which 64 bit is but one of the characteristics. Further, Apple has been working on their toolchain and they can leverage certain software compiler improvements especially within the Objective C runtime, like tagged pointers and inline reference counting that are made possible with 64 bit pointers.

See: https://www.mikeash.com/pyblog...

Comment: Coding vs. Degree is not Theory vs. Practice (Score 1) 546

by wchin (#47819497) Attached to: Does Learning To Code Outweigh a Degree In Computer Science?

Absolutely, to be a top notch software developer, learning to code trumps a CS degree. After all, you can get a degree but who knows how much attention you really paid in class. Further, learning to code goes beyond what is taught in a CS degree.

However, this isn't an issue of theory vs. practice. It's like saying, would you rather have a surgeon that learned surgery the traditional route with 4 year degree heavy in science, specifically biology classes and then went to med school, etc, or a self taught surgeon that learned at a field hospital during a war? Obviously, both would have to learn the basics of surgery itself, that is the actual cutting, the sewing, etc. The former is likely to have a far better grounding in a wider range of subjects to treat the patient, even if the a particular of the latter might be better at the actual cutting and sewing.

When one graduates with a CS degree, they might not have yet learned how to code, especially in a professional setting in a group. A coder can learn everything that a person with a CS degree learned, but that is basically going to each of the CS classes. Sometimes the hinderance to getting the degree isn't the CS classes, it's the other classes required for an undergraduate degree. In either case, to be a very good coder, you basically have to master both the theory and the practice.

Comment: Re:Nevada is the only candidate (Score 1) 172

by wchin (#47500319) Attached to: California In the Running For Tesla Gigafactory

Lithium is probably under 4% of the total mass of the battery. Tesla's battery is primarily composed of lithium, nickel, aluminum, cobalt, and graphite. Nickel and aluminum are the big constituents by mass of the battery. Total lithium mass per battery is probably around 20kg. For 1,000,000 cars, that's about 22,000 tons. That might be enough to start production in the U.S., but more likely, Canada will supply most of the initial amounts of raw materials including the nickel and lithium.

Comment: Poor password selection (Score 1) 59

by wchin (#47488571) Attached to: Tesla Model S Hacking Prize Claimed

This "hack" sounds like they brute forced a weak password on the service that that provides access to the Model S mobile apps. That password is shared with the "My Tesla" owner's website. It is possible to set that password to a far longer and complex password, certainly far longer than 6 characters. I suspect this contest was rigged and someone set the password to "111111" or something like that.

The car itself talks to Tesla using an OpenVPN session over 3G or Wifi.

Comment: Re:I've always thought that the best way for Israe (Score 2) 379

by wchin (#47442319) Attached to: A Skeptical View of Israel's Iron Dome Rocket Defense System

This reasoning, on the face of it, is absolutely ridiculous.

Because one side is very advanced militarily and the other side is not, then the side that is very advanced needs to let the other side have a fairer fight? No. Not at all.

A mugger comes at you with a knife. If you have a gun, that's not fair, you need to let the mugger with the knife stab you a few times before you pull the trigger?

Or let's say the other side has a stone, and is perfectly happy to hit you over the head repeatedly with it until you are dead. You have a M240 light machine gun. Very asymmetrical. You can take out the guy with the stone and a few of his buddies with a burst. But no! Unfair! They should be given machine guns too to make this fair. You should wait until they are given machine guns. Matter of fact, you can watch them get machine guns. So you wait to make sure they get all set up with their new donated machine guns, make sure they get the right training so that they know how to kill you with it, since it is only fair, right? No. If this were you, you would kill them if they are trying to kill you, no matter what weapons they possess, no matter how asymmetrical the military technology.

We are in very twisted times, as Hamas knows it can't really hurt Israel militarily with these tactics, but is very willing to provoke the situation such that they get pummeled. Each time Hamas provokes a pummeling, they get more funding and better weaponry from outside sources and more sympathy from both within and around the world. In the short term, Hamas has no hope of winning militarily. However, they hope that in the long term, they can grow strong enough to take on Israel militarily and wipe them out.

Comment: Re:The eventual redefinition of "privacy" and the (Score 1) 89

by Saeed al-Sahaf (#47251525) Attached to: Help Crowd-FOIA Stingray Usage Across America

All of this is boiling over to what exactly is considered "YOUR" information in the digital age? Nobody seems to be asking this question.

As a minimum if you don't encrypt it before tossing it out onto unknown public and private networks you don't control, you've already said you don't care who sees / reads / hears / metabolizes your data.

+ - CIA rendition jet was waiting in Europe to kidnap Snowden 5

Submitted by Frosty Piss
Frosty Piss (770223) writes "As Edward Snowden made his dramatic escape to Russia a year ago, a secret US government jet previously employed in CIA 'rendition' flights on which terror suspects disappeared into 'black' imprisonment flew into Europe in a bid to spirit him back to the United States. On the evening of 24 June 2013, an unmarked Gulfstream V business jet took off from a quiet commercial airport 30 miles from a Washington DC. regional airport discreetly offers its clients 'the personal accommodations and amenities you can't find at commercial airports'. On its best-known mission, the jet flew a U.S. marshals into the UK on to collect radical cleric Abu Hamza after the United States won an extradition order against him. Only Vladimir Putin's intransigence saved Snowden from a similar travel package. The jet's activities can be followed on many flight tracking websites such as FlightAware"

Comment: Re:Missing the point; it's about not enabling (Score 1) 403

I don't know if you can. In the real world, duplicating objects is impossible. However, duplicating information in computers is essentially free. Therefore, I'm not sure that simulating the notion of "property rights" on a computer even makes sense. It certainly doesn't make sense if it costs DRM to achieve it.

Comment: Re:Panasonic (Score 3, Interesting) 151

by wchin (#46688677) Attached to: Tesla: A Carmaker Or Grid-Storage Company?

At the cell level, Tesla is probably already paying under $250/kWh. Maybe even just under $200/kWh. That's below most lithium iron phosphate battery costs which are already competitive with lead acid batteries for total life cycle costs in an off-grid solar battery setup. So this "too expensive" comment is probably not right. Further, if they recycle battery cells from transportation use to grid storage use, then the costs could be far lower.

Possessions increase to fill the space available for their storage. -- Ryan

Working...