(One possible reason why lectures are still so common: It is a cheap teaching method that scales well with class size.)
So to answer your concerns I tracked down the publication in PNAS: http://www.pnas.org/content/ea...
To quote from the article:
The data we analyzed came from two types of studies: (i) randomized trials, where each student was randomly placed in a treatment; and (ii) quasirandom designs where students self-sorted into classes, blind to the treatment at the time of registering for the class
In other words, if I understand the article correctly, the authors only considered studies where active learning was contrasted with traditional lectures in the same course! Therefore it seems likely that active learning is a good idea, regardless of whether the topic is hard or easy. (By the way, active learning doesn't necessarily have to involve fun and games, although if a student, in general, doesn't think that learning is fun, perhaps he or she should consider doing something else...)
Although I'm not volunteering to knock up a new slashdot based on discourse
Also, the exact user id is mostly for bragging rights anyway, but it does give an indication as to whether the user is a long time user of slashdot or not. Although other indications such as the karma of the user might be more useful in most situations...
* The current version has very clear boundaries between stories in the form of the green bar. (Same for (expanded) comments.) With the new design it is simply harder to find these boundaries.
* Why all the wasted space in this new design? If I want a narrow column I'll just resize my web browser. The old layout was good because it allowed me to quickly scan through a lot of stories to select the ones that interested me. Same with comments. With the new design I need to scroll quite a bit more before having seen all the content.
* Speaking of comments, what is going on with the comment system? I hope the limited comment functionality (for example, lack of folding, etc) is just due to the fact that this is a beta.
If you are going to try this out, note that you'll need to do this immediately, before the memory has been overwritten by another process. (And you obviously need to be root to be able to access
- * Specially crafted file on a CD inserted into the CD player
- * Exploit weakness in the car bluetooth interface
- * Exploit weakness in built in GSM modem
For the details, see http://www.autosec.org/pubs/cars-usenixsec2011.pdf. (Pretty scary reading. In this case they are also able to disable the brakes and they are also able to engage the brakes on only one of the front wheels for all sorts of "fun"...)
This seems similar to how a malformed RDS packet sent via FM radio can disable the brakes on a certain car: http://www.autosec.org/pubs/cars-usenixsec2011.pdf (among other things).
Exactly how similar these attacks are are difficult to ascertain as the presentation leaves a lot to be guessed, although the net-security report on his talk gives some more details.
At the time I read the lwn article and the associated papers I thought to myself that the car industry should learn security and stability from the aerospace industry. Unfortunately it now turns out that they seem to have done so
However, there are ways around this. IIRC chrome decodes images inside a seccomp jail, causing an exploit in the image decoder to be very hard to use for anything except showing a a naughty image and eating CPU time. (I don't know if the enlightenment guys are doing this or not, but I hope they are considering it at least.)
"When set to 1, the ALTINST bit in the FCR enables ex ecution of an alternate (not x86) instruction set. While setting this FCR bit is a privileged operation, ex ecuting the alternate instructions can be done from any protection level.
This alternate instruction set includes an extended set of integer, MMX, floating-point, and 3DNow! in- structions along with additional registers and so me more powerful instruction forms over the x86 instruction architecture. For example, in the alternat e instruction set, privileged functions can be used from any protection level, memory descriptor checki ng can be bypassed, and many x86 exceptions such as alignment check can be bypassed.
This alternate instruction set is intended for testing, debug, and special application usage. Accordingly, it is not documented for general usage. If you have a ju stified need for access to these instructions, contact your VIA representative. "
I have tried to find some details about this alternate instruction set but haven't been able to find anything unfortunately. (And I'm not so interested in this any longer as my remaining Via C3 machine is now only used for backups and does not require very high performance...) Anyway, I'm guessing that it didn't become very popular due to the fact that they kept the details secret.