Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Secret ARM opcodes can execute JVM bytecode (Score 1) 63

Many ARM-based chips include the "Jazelle DBX" (Direct Bytecode eXecution) hardware CPU extension, which lets "95% of [JVM] bytecode" be executed directly by the CPU -- without need for recompilation to 'native' ARM/Thumb instructions. (See )

However, unlike most of the ARM universe which is fairly open, Jazelle DBX's specs, implementation, and operating details are apparently a closely held secret, shared by ARM only with select JVM implementors. I'll be interesting to see if ARM decides to help out the OpenJDK people. Googling around, it looks like so far the answer has been "No."

Comment Re:I work at Veracode; here's how we test. (Score 4, Informative) 103

That is a GREAT question, and the full answer is complicated and partially proprietary. But basically, you've touched on the problem of indirect control flow, which exists in C (call through a function pointer), C++ (virtual function calls), and in Java, .NET, ObjC, etc. The general approach is that at each indirect call site, you "solve for" what the actual targets of the call could possibly be, and take it from there. The specific example you gave is actually trivially solved, since there's only one possible answer in the program; in large scale applications it is what we call "hard." And yes, in some cases we (necessarily) lose the trail; see "halting problem" as noted. But we do a remarkably good job on most real world application code. I've been working with this team on this static binary analysis business for eight or nine years, and we still haven't run out of interesting problems to work on, and this is definitely one of them.

Comment HTTP-NG Revisited (ten years later!) (Score 4, Informative) 406

HTTP-NG ( ) was researched, designed, and even, yes, implemented to solve the same problems that Google's "new" SPDY is attacking -- in 1999, ten years ago.

The good news is that SPDY seems to build on the SMUX ( ) and MUX protocols that were designed as part of the HTTP-NG effort, so at least we're not reinventing the wheel. Now we have to decide what color to paint it.

Next up: immediate support in FireFox, WebKit, and Apache -- and deafening silence from IE and IIS.

Comment Mac OS X options (also: the freezer trick) (Score 2, Informative) 399

For an Mac OS X volume (HFS, HFS+), I've had lots of luck with Data Rescue II ($99) for recovering from serious drive failures. For drives that are still operational but have become borked at the filesystem level, Disk Warrior does a great job of rebuilding a healthy new directory structure. I make it a point to always have a copy of Disk Warrior within 100 yards of my PowerBook.

Also, a couple of times I've had dying drives that work OK for a few minutes after a cold boot, and then they (heat up and) die. I've had good luck throwing the drive in the freezer (in a ziplock bag) for a day, then powering up it, recovering as much as I can until the drive chokes again, lather, rinse, repeat, until all recoverable data has been copies off to a good drive.

Comment TFA: throttled to 480Kbps(50K/s) NOT 48kbps(5K/s) (Score 1) 207

He WASN'T throttled to 48Kbps -- slower than a 56Kbps dialup modem.
He WAS throttled to 480Kbps, and was getting download speeds of about 50K (that's kiloBYTES) per second (per connection).

TFA:"Bringing up the Status window I noticed my download performance was a far cry from my 7 mbps speed, but rather a measly 0.48 mbps...:"

0.48Mbps = 480Kbps (kiloBITS/sec) = roughly about 48KBps (kiloBYTES/sec)

So the /. story summary makes things sound an order of magnitude worse than they are. But you know, what's just ONE order of magnitude of error between friends, right?

Slashdot Top Deals

Little known fact about Middle Earth: The Hobbits had a very sophisticated computer network! It was a Tolkien Ring...