Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:Buzzword-heavy (Score 1) 54

Your phrasing is kind of hard to parse - I actually can't tell if you are agreeing with what I wrote, or arguing in a passive-aggressive way. This implies that I have had too many arguments with passive aggressive people recently and I need to learn to read things more neutrally again. But yes, that is what I was pointing out: tweaking the frequency in the fast sequential part is still covered by Amdahl's law, contrary to their wild hyperbole.

Comment Re:Buzzword-heavy (Score 2) 54

How dare you criticise the author - he is a physicist and he has stooped to coming and telling us computer science types how to do it properly!

There is a deeply appropriate xkcd but I cannot be bothered to find it. Decoding the garbage in the pcworld story tell us that he is going to break Amdahl's Law by dynamically partitioning the workload between a fast single threaded processor and many slower parallel processors. I would guess that my failing to make a fair comparison they can claim that the portion running under the boosted clock somehow beats the bounds predicted by Amdahl's law. Sadly it does not as the law is worded in the proportion of the code that can be executed on the parallel architecture.

It is quite possible that much of the hyperbole was added as sales pitch, which is a little unfortunate as the dynamic partitioning and the toolchain support are far more interesting anyway.

Comment Re:themes. (Score 2) 262

How? I've got a Mac mini plugged into a 40" TV and changing font sizes doesn't fix the size of non textual buttons, default image sizes, hit-zone size around window borders, scroll bars or any of the other UI elements that are not tied to the font size.

Comment Re:Transactional Memory support (Score 1) 189

Are you assuming that all programmer are working on simple 1:1 transformations of data? It is impossible to encode anything with a summation term without using a gather operation. If there is a projective transformation in the algorithm (i.e. a change of representation onto different axes / number of dimensions) then it is impossible to encode efficiently without a scatter. Perhaps there are more algorithms out there that are suitable for vector architectures that you are familiar with?

Comment Re:Not too long until an iceberg attack is reveale (Score 5, Insightful) 192

The real key here is that there is no advantage to the device at all.

In the cryptographic protocol that the authors (all physicists) believe to be novel, but which every cryptographer is aware of:
1. The authors have a perfectly secure channel (separate from the one established in the protocol).
2. They exchange as much information over that channel as the device stores.
3. The later established channel can only use that number of bits.

For real excitement they xor together their OTPs. Sorry guys but this is called a pre-shared key and the crypto world is quite aware of it. Good luck with the window dressing getting you past the PC of a physics venue.

Comment Re:Saving everyone a few seconds on wiki (Score 1) 209

Do you know anything at all about the Blue Brain project?

Serious question: if you do not then there is a video floating around from ICC'11 with Henry Markram explaining an overview of the project. Given that they are building artificial simulations of biology specifically so that they can explore how they work, build hypotheses and then experimentally validate them it is somewhat hard to see how this approach can be described as cargo-cult AI.

Comment Re:Latency? (Score 1) 114

Do you know why the target bandwidth for USR (15Gb) is lower than the bandwidth for SR (28Gb)?

It seems strange that they would not take advantage of the shorter distance to increase the transfer speed.

Slashdot Top Deals

"Old age and treachery will beat youth and skill every time." -- a coffee cup

Working...