1285 posts • joined 8 Nov 2007
Re: to IPO
(Is there no grammar Nazi icon?)
I nominate a screen grab of the Roman centurion giving Brian a good telling off for his "Romanus aeunt domus" graffiti in TLoB.
Re: I don't get the use of this.
What use is a curved wall of graphics output linked to a supercomputer?
Why, a brainwashing room, of course. Like in The Ipcress File (with Michael Caine) and lots of other films from around the same time.
Re: Badly misread headline...
Sony in the sex-change market?
I read it as XXY, so I can totally see the confusion.
Re: COD - killing
Go play Dishono(u)red with a no kill run.
Now that is an achievement
Pah. Go play Nethack as a Samurai, wear a blindfold right from the start and ascend without eating any food for the entire game. Now that's an achievement :)
Re: Unified Memory
If anything this could make the situation worse for NVidia. Before this, when the programmer had to do their own data transfers, the latency was explicitly there in the source code
I got the same feeling on reading the article. The latencies are still there, but now they're just hidden behind a software translation layer. I'll agree that doing explicit DMA or other main memory <-> device memory transfers is annoying, but we already have a technique for hiding DMA latencies(*), namely double (multi) buffering.
Multi-buffering can, for many problems, not only "hide" the latencies, but effectively eliminate them for all but the first block to be transferred. If this new feature does automatic loop unrolling and transparently adds multi-buffering (or even just double-buffering) when it detects it should be used, then that would be pretty nifty. Unfortunately, judging by the description in the article, this isn't what it's doing, and all we get is blocking, full-latency access to the "shared" memory, with "shared" in quotes because it's only a software abstraction, not a hardware feature. I could be pleasantly surprised, but from the article, it seems like it's only a sop to lazy programmers, and not real shared memory at all.
(*) I'm not actually up to speed on CUDA, so I'm assuming it uses DMA to do data transfers?
Re: Factor installed software
The newer versions are still Java on top of Linux. Trying to keep that secure is like trying to secure water with a sieve and a cheese grater....
So, you're saying it's easy, then? (hint: freeze the water first)
Re: Watch out there's a lawyer about
prosecute someone with solar panels on their roof
Just goes to show what a scam electricity generation is. You know those electrons the electric companies supply on one wire? They suck them back to their plant on the other wire! (then sell them back to you again--the cheek!)
Re: Don't cancel that new nuclear power station just yet.
You'd be better off with a coil of wire around your hat generating power as you move through earth's magnetic field.
Yoink. I'm off to the patent office to register my new "power-generating cycle helmet". Ta muchly.
"they've got their digital fingers in the till"
Whaddya mean, "digital" fingers? Fingers are digits, you numpty :)
saw a "burst of flames" shoot out of the iPad's charging port
Thunderbolt and lightning---very, very frightening!
An oldie, but a goodie
Re: Image hash database
Is this publicly available so that sysadmins can run preventative measures?
You don't need it. Just put a few junk bytes at the end of your files. Should work. Unless they do block-level hashing, of course.
Re: "NSA's influence waxes"
Or is that what THEY want us to think?
Wanes? Glad to hear someone's thinking of them.
Re: trouser pockets
Is it time for the thigh pocket ('sadlebag') to escape
I think they're called "cargo pants".
I'll chip in with a previous poster and mention that my Nexus 7 fits in my front jeans pocket just fine.
Re: Not prime, but...
Since we seem to have a lot of number-loving commentards (numeritards?) today
Or, as Moss from the IT crowd put it in the Countdown episode: "overnumerousness".
Has prime number dates all the time: Since π(x) ~= x / ln x, just plug in Unix time (seconds since 1 Jan 1970) for midnight today and midnight tomorrow and subtract the two π(x) values. There are thousands of prime times each day.
What integer is it divisible by, other than one, and itself?
To use the lingo, being divisible by no other number except 1 and itself is necessary but not sufficient to describe what a prime number is.
I can haz golem now?
the police's failed kettling attempt
maybe anyone with tea leaves
why not extrapoloate?
If it's so efficient to upload by physically shifting disks around from place to place, why not go the whole hog and implement this "cloud" thing like a mobile library? I'm sure customers would appreciate the extra bandwidth, and if the disks are large enough, any latency issues (waiting for the van to arrive) can be ignored because it'll still get to you before a full download would finish.
I think these tech companies are doing things wrong.
Re: Platypi eat crustaceans and shellfish...
re:... a proto-platypus with a Koala in its mouth!
Or perhaps a drop bear?
Martian Robot Wars
It should be fun when it arrives on Mars and finds out where the US bots are located. I'm sure that a 1-tonne, six-armed golden giant of a bot will make quick work of the pathetically puny, trowel-wielding US bots. Any news on whether Craig Charles will be commentating? If he's not available, David Lamb would do in a pinch.
Re: Billions and billions
Hmm... now that you mention it, I've got Orbital's "Are We Here?" in my head(*). Not that that's a bad thing :)
(*includes Carl Sagan samples, I think)
I was once told
That the Spanish for "I see the sea" sounds like a pretty bad curse in Finnish. Maybe I misremembered cos the Internet tells me that the Finnish "Katso merta" means something disgusting in Italian.
Re: 'Twas ever thus
Yep, 'smoking a fag' is apparently also a euphemism for performing oral sex on a homosexual man's phallus. Cue red faces all round.
And yet talk about people's fannies is totally socially acceptable over there...
Re: 'Nuff Said
So (IIUC) with this system in place we could prove that all messages supposedly coming from "Frumious Bandersnatch" do come from you, but not who you are?
In a nutshell, yes. The big difference in the paper is that the network provides a decentralised identity system, unlike here, where the "Frumious Bandersnatch" nym is controlled totally by the Register (well, and me).
Re: 'Nuff Said
Is that enough for you?
Let's not confuse anonymity with pseudonimity. The paper describes a method for building the latter upon a network that assume the former as a building block.
There are two routes to proving "identity" (ie, ownership of a particular pseudonym) as outlined/mentioned in the paper. The first is through ZK proofs. Using this, you come up with a secret and then convince some other party (the ZK proof part) that you know the secret or some property of it. When the paper talks about "identity", it's talking about a pseudonym, and when it talks about an "authority" it's talking about something that's acting as your delegate in proving that you own that nym (via a credential that you issue). ZK proofs mean that you can prove that you know the secret key, but never reveal any knowledge that could be used to reconstruct it.
The second kind of identity is group identity. You can prove that you're a member of a group by using one-way accumulators. A CA will generate an accumulator (like a hash table, but more compact and opaque) for each member of the group. Then each member can use that to identify themselves as being part of the group without revealing the other group members. This preserves the essential anonymity of the group (even to other members, though the CA knows the signing keys), while still allowing nym-to-nym self-recognition (and even proving membership to non-members).
It's pretty amazing the things that can be done these days with the crypto primitives we have. It's totally possible to set up an identity (read: pseudonym) system that is totally (well, computationally, to any degree you want) anonymous. That's why I called you out on your initial comment.
Re: analogy fail? (@ Frumious Bandersnatch)
But that's just chicken and egg reasoning. It doesn't demonstrate any intrinsic value proposition for non-members. It's like saying, "if you have a fax machine, you can fax other people who have fax machines". If the network isn't there (or is shrinking, as I assume is the case for fax users) then there's no point in joining it. At least Bitcoin does have a clear value proposition (you might convert electricity into cash).
The sole reason that Bitcoin works is that peers have a vested interest (money) in doing one of two things: minting new coins, and proving that the ledger is correct. There's a delicate balance struck between regular users and those with vastly more computational power available to them. Bitcoin is structured in such a way that it's more likely that the latter can gain more virtual currency by playing by the same rules as the regular users rather than trying to subvert the system. This leads to the question of how a distributed identity system like this one is going to convince users that it's in their own interest to be "provers" in this system. For Bitcoin (and similar) the answer is obviously monetary, but the paper makes no mention of compensating peers at all.
The paper describes all the machinery, but completely misses out on the reason why anyone would want to devote their resources (CPU, network, electricity) to implementing it.
Re: 'Nuff Said
"to make assertions about identity in a fully anonymous fashion"
No, please do say more. You do realise how zero-knowledge proofs work? Or algorithms like Dining Cryptographers? Just because people hide behind masks it doesn't mean they can't make true statements (statements about identity included).
Time delays are the major difficulty
Perhaps instead of linear video logs, they could use "choose your own adventure" style updates? The sender would try to anticipate the kinds of questions and scenarios that the nauts might have, then package up all the data into something like an Infocom or SCUMM format for playback in a non-linear way up on the ship. They could also have Max Headroom-style virtual actor software (complete with tunable voice synthesis a la Hatsune Miku) sent up with them, so that the nauts could interact with something that looks and sounds something like the people back home (all without wasting valuable transmission bandwidth).
The CYOA games that they send up might have a bit of replay value, too, and would give people a bit of entertainment value (both watching/playing and crafting their own modules to be sent back) for the long journey.
Re: Ohhhh, The Irony... (x2)
Not only that, but they don't even know where their gravity experiment will land... would have thought the equations were well known at this point.
like a dead mule?
"Beaten(*) like a borrowed donkey" was the phrase that sprang into my mind.
netbooks tablets, obviously, though that sense of "beaten" kind of ruins the analogy.
SHA-2... So which is it? Stick with it or sutible only for legacy applications?
SHA-2 is a family of hash functions. See Michael's post above.
Re: Blue Sky of Death?
No Cloud for You!
So how many people
are going to get the Bob Dylan reference?
I'll stick with the Russkis. Not all of their urns are spies... only samovar.
Re: In The Spirit Of European Education
Fwiw, Wirth's Algorithms + Data Structures is now legitimately available for free download
Coincidentally enough, I was thinking of this very book the other day when I made a post here. Then again, I suppose that the classics (esp. Knuth's TAoCP) are never too far from many programmers' minds.
Now if I could only find my copy of Jon Bentley's "More Programming Pearls" ...
Re: In The Spirit Of European Education
Prolog would be much better. Better than that Yankee Lisp thing, anyway.
Re: HDMI not compulsory
Want a switch instead of pulling the micro plug out of the RPi? Easy
Use a paperclip or other bit of wire to short the holes at P6. This reset mechanism was added in rev 2 boards, so it can be used to avoid some wear and tear on the USB power socket.
Seems a bit thirsty
The ODROID-XU has a very similar setup (also a 1.8GHz A7/A15 combo, though running in big.LITTLE mode), but it seems to only draw about 4 to 5 watts when fully loaded. I guess that the 100Gb network, extra RAM (assuming Calxeda's boards have more than 2Gb) and other peripheral devices (versus XU's USB3 + fan) could account for some of that, but 4x power consumption seems a lot.
Still, 20W is still most excellent for servers, and by the looks of it, they've still got room to bring that down either in the forthcoming board or the next one after that...
- DINO-SLAYER asteroid strike was a stroke of bad luck, say boffins
- BEST BATTERY EVER: All lithium, all the time, plus a dash of carbon nano-stuff
- Stick a 4K in them: Super high-res TVs are DONE
- Review You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
- Russia: There is a SPACECRAFT full of LIZARDS in orbit above Earth and WE control it