Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Make it a statistic and they'll care (Score 4, Informative) 387

by thesnide (#30272196) Attached to: Are Ad Servers Bogging Down the Web?

Second biggest offender is usually Google Analytics.

That's why it's usually interesting to host the JavaScript file, that seldom changes on your webserver, and only have the img that conveys the data retrieved from the foreign host.

JavaScript loading is usually blocking the rendering whereas img loading usually not.

Comment: Re:They're not even keeping the money... (Score 1) 406

by thesnide (#28527841) Attached to: Pirate Bay Announces Sale to Swedish Company For $7.8 Million

An interesting fact is that terrorists are also like that : they adapt faster to security measures than governments. As Bruce Schneier said[1], it's all about defending against what the terrorists did last time. You shall never underestimate creativity for evasive maneuvers.


Comment: Re:Windows does a lot of writes when booting (Score 2, Informative) 975

by thesnide (#17191632) Attached to: Why Do Computers Take So Long to Boot Up?
Usually a read triggers a write since there is the Last Acces Time attribute to update. Under windows it is driven by the NtfsDisableLastAccessUpdate registry parameter, under UNIX it's the noatime mount parameter.

That's perhaps one cause of your filesystem usage increase.

Advanced Data Structures? 118

Posted by Cliff
from the mix-and-match-your-scalars-lists-and-hashes dept.
mdf356 asks: "It's been 5 years since I left graduate school and started designing and writing software for a living. After 5 years of writing operating systems code, I feel like I've forgotten some of the more advanced data structures I used to know. The next time an interesting problem arises, I'd like to have more in my toolbox than hashes, linked lists, heaps and various binary and n-way trees. I'd like something short and sweet, more in the line of the standard C book. Algorithm Design by Kleinberg and Tardos looks likely to be too basic, but I haven't read it (I'd like to avoid paying $90 for something that won't meet my needs). CLR is far too large and almost exclusively covers basic territory. Tarjan's Data Structures book looks like it has potential, but seems focused on network algorithms, which are unlikely to be applicable to the kernel programming I do. What are some good reference books on more advanced data structures and algorithms, particularly ones with potential applicability to an operating systems kernel?"

Industrial Strength Open Source Code? 68

Posted by Cliff
from the extra-strength-code-fu dept.
dnnrly asks: "I work for a company that writes software for the pharmaceutical industry. We have to work in quite a tight regulatory environment because some of our code ends up in the process of drug testing. Seeing as the FDA are quite picky about making sure that there can be no errors in testing new drugs, our clients have strict rules that we must follow for coding. We have to review all of the code that is written, making sure that everything is traceable to a design specification. Where we use 3rd party software/code we have to make sure that it comes from an ISO9000 source. This is a bit of a problem when we would like to use open source stuff in our code. Projects like log4net and NUnit would be tremendously useful in our code but we're not allowed to use them because they don't tick the right boxes. Now, *I* know that these projects (and others) are incredibly stable just because of the volume of use that they have seen but that isn't enough for some people. How can we certify such software?"

Cutting Off an Over-Demanding End-User? 466

Posted by Cliff
from the gently-saying-"no" dept.
SpaceNeeded asks: "Numbers of you will probably recognize the start of the situation. Because I work with systems, I perform occasional builds. This occasionally crosses over to support (especially where it's my kit I'm asked to support). This isn't a problem, nor is it a problem when I get the occasional support query from someone I haven't supplied a system to, but who needs assistance. This is all well and good, but I've had pretty poor year personally. I've lost two relatives and a third is in a pretty bad way in hospital. An eleven year relationship ended a couple of months back, and I'm now having to perform _all_ the domestic tasks that used to be shared. Between these few things and my regular job I'm finding I have a whole lot less time to allow to support calls. What methods do you know of for gently cutting off someone, support-wise?"

There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence. -- Jeremy S. Anderson