I would be surprised if the ISP did not count internal network traffic against a customer's data cap. It would be easiest to track the data flow at the customer connection side since full information about the customer is still available in the packets at that point. Also, if they tracked it at the peering nodes like you're suggesting then a large percentage of torrent traffic would be uncounted for large ISPs.
Slashdot videos: Now with more Slashdot!
Humorous but not sarcastic enough to be funny.
I tried filing a complaint via the link in the OP but right after typing in my address I noticed that the form said all contact information entered would be publicly available on the internet, including my address. WTH? How do I complain about the complaint form?
That hardware bug still has a cause and it's not inherent in all hardware designs. Random always means "we don't understand the system well enough to say why it's happening". When they figure out the cause of those "random" cancer causing events they could very well be caused by the environment or unknown genetic defects.
They were hardly cavalier with the information. Our own government allowed a contracted network admin total access to everything... now that's being cavalier.
Well that's valid but clearly you didn't read the book. He provides the code, setup and timing results. He would have had to fabricate the data to make MS look good Java did in fact win a couple categories.
I really do understand your skepticism though because I've seen that as well for more complicated "experiments" where they were dealing with so many variables in the setup that they could get whatever results they wanted.
I'm glad we're finally having an actual conversation than just snarky remarks.
Your claim is that he committed academic fraud, fabricating data from examples that can be easily verified to provide a former employer with a slight publicity spike at great personal cost to himself and his software consulting business. I cannot find the date he left MS but his own company, Construx, was founded by him in 1996 so my guess would be he left MS around that time, well before the 2nd edition of code complete was printed in 2004.
Uh, none. I never claimed that the
Java does inline optimizations. IL is an abbreviation for Intermediate Language, the bread and butter of CLR and JVM.
Cut the sarcasm man. It doesn't suit your extremely weak argument.
Someone who worked at MS over ten years ago is not "a Microsoft employee". Troll someone else.
DuckDodgers didn't know this and that's who I was responding to.
From a quick web search I found patents from HP covering IL optimizations so I'm not convinced that the giant patent infringement settlement between MS and Sun specifically covered the IL optimizations we're talking about.
.Net also does dynamic and re-usable runtime optimizations. You can also instruct it to inline certain methods, load certain resources in the background that you expect to use but the runtime will do the same thing, just maybe not as intelligently. "Code Complete 2" has some code execution speed examples in it and most of them show C# running faster than Java; The author was comparing simple ops like method calls, conditionals, dictionaries, arrays, etc.
I considered posting a link to the wikileaks article specifically about the CIA plan to discredit wikileaks through ad-hominen attacks against the organization and the individuals running it but then I would have been labeled a conspiracy theorist.
How does one vote the OP as flame-bate? Julian isn't raising the money, he isn't even promoting it. He just re-tweeted about it. This has to be the most purposefully misleading post I've ever seen on slash dot.