Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Mistake (Score 0, Offtopic) 179

My first experience with programming started on this computer. For some reason, knowing that it was possible to create your own stuff (next to running somebody else's stuff) fascinated me. A cousin of mine (who already had some programming experience on the Commodore) showed me the basics. Moreover, I also owned several C= programming books (given to me by some relatives) which I used as a reference, although I was not always able to understand all these concepts as a kid.

The first C128 BASIC program I ever wrote looked basically like this:

10 INPUT "WHAT IS YOUR NAME";A$
20 PRINT "HELLO ";A$;"!"

It was just a very simple program which asked the user to type his name and responded by sending a friendly greeting to the user. Of course, these two lines were a little boring, so usually I added two lines in the beginning which cleared the screen, changed the color of the text and I used some POKE'ing to change to colors of the main screen and screen border to make the program look a little prettier.

Hehehe!
-GiTP =)

Comment Re:Computations (Score 3, Interesting) 40

Lots of 3D (fast) Fourier transforms

Again, interesting, we do a lot of this at work. Complex 3D FFT transforms. I write my plan and processing code using CUFFT. I'm curious as to whether they'd be using fully custom code for such a large computer. We're only using 8x Tesla cards at work.

Comment Re:Only $8 Million ? (Score 1) 157

Ummm...good luck with that. WIFI is notoriously easy to jam. You can barrage jam every frequency in the band with a low-power transmitter, say 10-20dBm, and no one is going to get through. No decision mechanism needed.

If you're paying to develop an ECCM anti-jamming algorithm, you are going to be working with systems that were built with jamproofing in mind in the first place. This is NOT the case with WIFI. With sophisticated modulation schemes, you have spatial and frequency multiplexing. As in, spread spectrum that actually works and may have tens of GHz of bandwidth and with 10 or 20 degrees of beamwidth. It's still jammable despite trying to keep it from being jammed by brute force or intelligence (read--someone gets the PN code), and these guys want to figure out at least how to automatically keep that from happening. This is going to involve a lot of data analysis because there are a lot of ways to jam a "stealthy" signal in the first place.

Comment I wonder... (Score 1) 267

Will this boost their business, or will it hurt it? I wonder what will show up as the top hundred results in a few weeks...

EasyDNS Plugged WikiLeaks
or
EasyDNS falsely accused of unplugging WikiLeaks

Only time can tell, but I would guess the latter. Kind of like when my local paper misprints something and they apologize in a short posting in an unread section between two huge car ads...

Slashdot Top Deals

Luck, that's when preparation and opportunity meet. -- P.E. Trudeau

Working...