Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Java

Submission + - Quantifying Recursion In Java 6

aahmad writes: "If you are like most developers, you believe that although recursive solutions to problems are elegant, they neither perform nor scale as well as their iterative cousins. In the expose, "Quantifying Recursion on the Java Platform", Amin Ahmad blows the pants off this fallacy: all other things being equal, recursive solutions run a factor of 2x-3x faster than iterative ones on Java 6.

That said, the article acknowledges that recursive solutions do not scale well which greatly limits their applicability. I'm curious to hear about other slashdotters experiences with recursion, in particular on the Java platform."
Intel

Submission + - Intel confirms new details on Intel's "Penryn&

Marcus Yam writes: "DailyTech had the opportunity to chat with a couple of Intel execs about the upcoming CPU design codenamed "Penryn," which include new features SSE4, high-k dielectrics and metal gate transistors. Intel claims the upcoming Penryn will fit 410 million transistors for the dual-core model, and 820 million transistors for the quad-core variants — dual-core Conroe utilizes just 298 million transistors. When asked about the effects of SSE4 on Penryn, Smith responded to DailyTech claiming "We're seeing excellent double digit performance [percentage] gains on multimedia applications.""
PlayStation (Games)

Submission + - Sony PSP DRM cracked for all firmwares

hughperkins writes: "Sony PSP DRM cracked for all firmwares
Fanjita: "You remember that the only thing holding us back from a downgrader for v3.03 was the lack of a user-mode exploit?
"Well, we don't like to be held back from anything, so we went back to basics and looked over some of the old exploits. And what do you know? We found one!
"We did a little digging into the old GTA exploit, and discovered that it hadn't been properly patched after all. We'll leave it as an exercise for the interested reader to figure out exactly how we got past the patch (and to give Sony a little while longer before the head-slapping "Doh!" moment Tongue out).
"But the short version is that we can now run code again via Grand Theft Auto : Liberty City Stories. You want some proof? Check out the Goofy Hello World""
XBox (Games)

Submission + - XNA SharpNES: Homebrew NES Emulator for Xbox 360

MoonStar writes: Lone Coder released the first 'indie' emulator for the Xbox360. 'XNA SharpNES' is made with 'XNA Game Studio Express', the Microsoft dev tool released last month aimed at helping students and hobbyists build games for Windows and the Xbox 360. There's no sound or 2nd controller support yet, but it shows more than just games can be developed with XNA Game Studio Express. To run it on an Xbox360 you need a 'Creators Club' subscription ($99/year).
OS X

Submission + - Court Documents Show Microsoft's Tiger Envy

phillymjs writes: "PC Pro is reporting on another juicy e-mail nugget from the Sent Items of Jim Allchin, (nyud link, PDF) courtesy of Iowa's Comes v. Microsoft trial. It's a lengthy e-mail conversation from late June, 2004 — in which several Microsofties ooh and ahh over features of the yet-unreleased Mac OS X 10.4. IMHO the award for best quote goes to Lenn Pryor, who said, 'It is like I just got a free pass to Longhorn land today.'"

Comment Re:Neither Proved Nor Disproved (Score 1) 397

Actually, that is wrong.

First, some perspective.

Quantum mechanics is not a theory, it is a set of construction rules for theories that reflect reality. Whatever quantum field theory you construct of whatever operators you care to name (the rules of QM/QFD being most easily phrased in terms of operators), some of those operators do not commute [A,B] != 0, and some of those operators do not anti-commute {A,B} != 0.

We happen to call those bosons and fermions respectively.

String theory, being a quantum field theory including gravity (hence, a superset of general relativity), is also a set of construction rules for theories of reality.

As it so happens, some of those theories produce large extra dimensions of > than the millimeter scale. In general, we characterize those theories by a parameter space, and theories with a parameter space producing large extra dimensions of a particular type *are* disallowed by observation.

If observation disallowed the entire parameter space of string theory, it would be entirely falsified.

Instead, it is something dubbed "The Landscape".

Secondly, it is interesting, but not informative, to listen to opinions of people who have never studied string theory remark on its structure/usefulness.

In fact, string theories do provide some elegant solutions to things like supersymmetric (quantum) gravity (SUGRA), supersymmetry (SUSY), and a good number of other subtle points that are only understood with sufficient background in QFT, GR, etc.

Everyone laughs at "the internet is a series of tubes", but then we get long expostulations about string theory from people that haven't studied it.

Third, remember that the authors of the article (e.g. Lee Smolin) have a somewhat vested interest in denying the usefulness of String Theory, as it allows their own theories (i.e. Loop Quantum Gravity) to be more prominent.

As a matter of my own opinion, LQG has even more difficulties than String Theory, for example, it assumes the spacetime metric is smooth even at quantum scales, and that a classical theory (GR) can be "quantized". As GR is not renormalizable, this is violently at odds with known, tested QFT, which is accurate to 11 decimal places.

Comment Re:"Secret" data? (Score 1) 102

On sites with this level of security, thumbdrives, floppies etc are prohibited items. All staff that access SECRET material will be DV cleared and acutely aware that breaching Operating Procedures will result in instant dismisal and possible prosecution under the OSA.

Seriously, in normal business having lapse security is usual. In facilities that contain SECRET or greater material, the IT & business staff are generally anal about securing data and IT systems. USB ports disabled or removed, all hard drives locked in aproved cabinets over night, edge based routing and network authentication etc etc suplemented by random searches etc.

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...