Please create an account to participate in the Slashdot moderation system


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Facebook Says Thanks! (Score 1) 98

Fine, you think you've got a cozy little electronic commons where everything will be unicorns and rainbows if we are all just willing to show our beautiful selves to one another. In the meantime, Facebook and its partners are making bank data mining your junk and marketing to you. And they say, "Thanks!"

Comment Summary Incorrect (Score 0) 290

The B-52 did not "[drop] the first hydrogen bomb in the Bikini Islands in 1956" as the summary states. The first hydrogen bomb was much too heavy to fly, resembling a locomotive in size and weight. "Ivy Mike" was the first hydrogen bomb tested, detonated by the United States at Enewetak Atoll on November 1, 1952. It weighed 80 tons and yielded about 10 megatons.

Comment Re:Visual Studio RT? No. (Score 1) 182

So more busted old shit is constantly created and ported to the current MS platform to become the new 'busted old shit' that people need to be able to run on new machines.

Interesting. This makes me think that Apple may have discovered the "secret sauce", albeit accidentally. With each processor transition, Apple has provided a compatibility window that slammed shut at a point in time not too far from the transition; but, far enough to satisfy the vast majority of their customers. The Intel transition featured Rosetta, for a while (until 10.6), then dropped it. This effectively flushed the 'busted old shit' straight down the pipes.

Comment Re:Amdahl's Law (Score 1) 281

Gene Amdahl and Fred Brooks were both important players at IBM, each making essential contributions to the System 360. That's an interesting connection between MMM and Amdahl's law, undoubtedly they talked.

As for TFA, misquoting Al Swearengen, "someone open a window, it smell like cat piss in here."

Comment Re:A gap not normally considered (Score 1) 92

Good idea. So good, in fact, you're getting close to how it's actually done: data is moved in parallel in bulk. For example, when your program accesses an 8-bit byte, the 256-bit (or larger) chunk (called a cache line containing it gets read from DRAM into cache. There is no address space sacrifice because once the cache line is read, additional logic selects the desired byte from the cache line using the low-order bits of the address.

Slashdot Top Deals

No hardware designer should be allowed to produce any piece of hardware until three software guys have signed off for it. -- Andy Tanenbaum