I think they missed out a crucial coma.
Like the one you were in when writing your post?
(McKean's Law and all that)
1362 posts • joined 8 Nov 2007
Like the one you were in when writing your post?
(McKean's Law and all that)
No. That's my baby.
re: This looks like just the tip of the iceberg.....
Yes, next step is to calculate cos to 3 decimal places. It's not very bright, though---you can only use it for dim sums.
Great for active-high circuits
Maybe active low. Lettuce contains narcotics/soporifics. (fun fact: that's why lettuce wine is not advised)
Step 1: pick a tune that you can play on a piano keyboard
Step 2a: assign one key to each piano key /or/
Step 2b: count whole notes/semitones from some starting position
Step 3: hum the tune or come up with some mnemonic to remind yourself of the association
Step 4: wait until someone makes a dictionary with common melodies
To be honest, this is probably just as bad as something like picking/encoding sections from $INSERT_ONE_AND_ONLY_HOLY_BOOK_HERE.
You said when we embarked on this great adventure together, that lots of laughter was essential in a relationship.
You also made the point that a great deal of sex was of equal importance.
Again, I agreed. Wholeheartedly.
In fact I remember your exact words: laughter and sex are the barometers of a relationship. This was the statement you made, if I remember correctly.
Don't get me wrong. I couldn't agree more. But no at the same time, ya fuckin cow.
... apparently not much intelligence here in the forums, either. Stick that in your equation!
Q: How do they tell the difference between encrypted data, and a capture of a few seconds pink noise from a quiet part of the FM spectrum?
I think you just answered your own question there. An encrypted file will sound like white noise, whereas pink is 1/f.
All in-range humans would be good. Plus an auto-freeze when they come into range, to give me time to formulate my evil plan...
Might I suggest some sort of remotely-controlled device that emits a waft of bacon to entice people into range? In fact, it could probably dispense actual, real bacon. Much easier, technologically-speaking, than a freeze ray, and almost as good at preventing humans from escaping---kind of like the olfactory equivalent of a monkey trap.
(sadly, those glyphs on hand driers don't actually mean "receive bacon", which is why humans eventually give up and leave the bathroom)
I wonder whether one could get away with "Dark Cashian"? Or would we be subject to the lawyers' malaprops?
Damn. I can remember a time when rap music was all about the cash.
but I immediately thought of the Magnet Fields song "Fido, your leash is too long".
By which I mean sticking with the one-dimensional layout. As you up the number of cores and (as they're doing here) introducing more speculative pre-fetching on either side of a branch you're putting more and more strain on the memory bandwidth. It's all well and good scaling your compute cores up to 12, but the memory bandwidth just isn't keeping pace. Wouldn't it make more sense to look at going to 2-d or some other architecture (maybe even use a projective plane like the Fano plane and let apps build custom topologies on top of it)? Even the PS3 had two ring-shaped memory buses (though main memory itself wasn't laid out like that), so it's not beyond the realm of possibility to get novel memory buses in consumer/general purpose machines.
Maybe this is something we can expect to come along eventually thanks to the SeaMicro purchase? Or is that purely for inter-system connections?
Once you've learned to recognize your birch from quite a long way away
Don't you mean "the larch"?
Hmm... there seems to be quite a few commenters here today who thought this was a pretty lousy article. And yes, I also used the "send corrections" link...
will make more people more punctilious about making, securing, and testing their backups
I think you mean something more like "diligent" or "meticulous". "Punctilious" conjures up the same sort of negative connotations as "officious" does for me...
Just make sure your backup machine isn't infected! Oh, and a database of hashes for integrity-checking is a pretty good idea, too.
The ISS is a useless PR stunt.
If that's all it is, they're doing a piss-poor job at it. Like, why don't they have some cute animals up there with 24/7 space-kitty cams? Maybe you have something with your post's title there, though... having cat piss and shit flying around everywhere would be kind of disgusting.
X11 only has any use if you're using a unix system as a workstation, which is actually pretty rare... Most unix systems are used as embedded devices or servers, and are unlikely to be running X11.
Also, how would an unprivileged user introduce an arbitrary BDF font to the X11 server?
This isn't quite true. Don't forget that one aspect of the X Window system is that it provides a networked client/server architecture. You talk about embedded systems. I have several Pis and other similar systems that I don't run an X display on, yet I still run X applications on the embedded device (eg, AVR programmer) by using 'ssh -X' and have the apps displayed on my workstation.
I don't know enough about the architecture of X (in terms of whether fonts are local to the client or server side, or whether there's a privileged process at work on the client side when I use 'ssh -X', though probably not) to be able to say, but it looks like the insecurity would also be there if I'm running remote X applications too. As to introducing arbitrary fonts, I'm pretty sure that the font doesn't even have to exist on the system: it seems like all the attacker has to do is to present a specially-crafted filename, and the sscanf will smash the stack before the routine ever gets to checking whether the file actually exists or not...
'break' and 'continue' are both essentially unconditional branches
Actually, your example is wrong, assuming you're telling us to put a break statement somewhere in an if ... else block. They don't break out of if() statements... only loop or switch constructs.
That aside, the point I really wanted to make is that break/continue in C are really limited since they only jump out of the nearest enclosing loop/switch. Unlike Perl (where the next/last keywords can take a label to indicate which loop to jump out of), there's no way to use them to quickly exit several nesting levels. That's one of the reasons why C has goto and, IMO, it's perfectly acceptable at times. The alternative of setting up a temporary "want to exit" variable in each loop level is just too messy, error prone and, at times, inefficient.
given my ubuntu machine has 337 ttf fonts and 0 bdf fonts, I wouldn't worry too much...
Eh, you should worry. Just because you don't have any bdf fonts, it doesn't mean that the buggy interface for loading them isn't there. As the article said, it triggers "when reading a user-provided specially crafted font". Any user program that's talking to the X server can then use it for privilege escalation, and that's a really bad thing.
Besides, just because you didn't find any bdf files, it doesn't mean that your system isn't already rooted. An attacker can delete the temporary bdf file after running an exploit. In fact, the code looks like it doesn't even care whether the supplied filename even exists (and in fact, it won't), so your blithe dismissal is even more stupid.
Unless it is truly "se offendendo"... it cannot be else.
I hardly think so. Look at all the other products that use ARM SoC. Off the top of my head, there are systems like Raspberry Pi, MK808, ODROID, Beaglebone Black and huge numbers of cheap Chinese Android phones and tablets. Many of them have dual core or better. Granted, the engineering work needed to add high-speed networking to the system (and fab the chips) is going to make it more expensive than most of these options, but the basic ARM CPU/SoC certainly doesn't explain the high price. To me it looks like they're charging an enormous premium based solely on the reputation the original 54g line had as being hacker-friendly. This isn't the first time that this has happened: at one point in the evolution of the product, they brought out a new revision that actually had less memory than the existing models. Then they reissued it as WRT54GL, and justified charging the same (or more) for it just because it had an 'L' (for Linux) at the end of the model name.
Out of curiosity, what stops all that new founded dust coalescing into another Star on the same spot?
In a word, fusion. IIRC, the reason the sun went nova in the first place is that it ran out of hydrogen and (?) then helium. Then it reached a point where neutron pressure from the core (a byproduct of fusion) became insufficient to stop the sun from collapsing on itself, which in turn triggered the nova.
So even if you gathered up all the relatively heavy elements that the nova produced, there wouldn't be enough hydrogen left to trigger star formation again.
Also, consider that a lot of the mass that the nova sheds will be traveling at a significant fraction of c and will have been spread over distances measured in light years in short order (in the cosmological time scale) and it should be pretty clear that gravity (the weakest force) will probably not be enough to cause the matter to coalesce again before the death of the universe anyway...
He did know that Bonsai Kitten was a hoax, right?
what can only be described as 'mostly porn'.......
With the remainder being Rick Astley videos. Or cats.
Cool, all we need now is a Linux distro called 'Rockers' and we can have Mods vs Rockers!
But they'd probably get sued by the Rockstar consortium.
although I imagine that this sloppiness was in part due to the rather poor attempt to tie in hot won ton soup and the Korean currency, the "won"??
My guess is that they couldn't come up with a pun involving kimchi (or, like myself) didn't know that gomtang was a traditional Korean soup.
Now factor in the inconvenience of the ones that you think are charged and are in fact dead, and the need to establish whether the appliance is at fault, the battery, or the charger, and you start to see the rationale breaking down even more quickly than the bl00dy batteries themselves.
Harsh. I think you should invest in a multi-meter. Just check the voltage and you're done--no need to have elevated stress levels over dumb electronics.
You could have got some submarine references in there too.
I think they did, only they ... er ... went under your head.
yet another boring sequel/spinoff
Racing game ... spin-off ... I see what you did there. Nice :)
Eh, what model of Honda? I wouldn't be surprised if any of the type R family waltzed to a win in the early races.
Then again I must say, how long can tulips stay in shape until they rot and become worthless?
Notwithstanding the post above casting doubt on whether "tulip mania" was a real thing or not, apparently it wasn't about speculating on the value of particular tulips (which will rot, as you say) but a bet on the futures market-how much a particular genetic line might be worth... though again with the caveat that predicting whether a particular line will produce interesting (read "valuable") blooms is notoriously difficult.
As for Bitcoin, it does seem to have all the classic hallmarks of a bubble, but a halving of value does, paradoxically, make it more attractive right now...
An up vote from me, since the Samsung Xerox fanbois have down voted you a couple of times.
Eh, you do realise that it was Apple that copied their UI from Xerox Parc, don't you? If not, you picked exactly the wrong choice of words for your put-down.
So to clear this up... people can eat dog food?
Gertz wrote. "In fact, the daily builds of VS are now compiled using Roslyn, all as part of a process that we refer to in the biz as 'dogfooding.'"
My immediate reaction was to search the web to discover if humans can actually eat dog food. Probably not the kind of interest the comment was meant to inspire. Oh yes, I'll also throw him some demerits for verbing an arbitrary noun.
Why didn't I get breakfast delivered this morning?
Why didn't I get any soup?
That is all. :-)
Or maybe 'dd | ar win | sudo tee /boot/kernel.img'? Too subtle/meta?
is for queers. Seriously, is any still using this?
Yes it is. The thing you forget is that it's also for straight people. It doesn't discriminate. Isn't the GPL fabulous?
No, it doesn't. No more than using paper/plastic money, at any rate. (Value-Added/Sales) Tax laws work because the seller acts as the tax collector. They have to keep records of what they buy, what they sell and the prices they sell the items at. They're then liable for collecting the sales tax or VAT from the customer and paying it back to the taxman (or offsetting it against their tax deductibles to get a balance that they must pay). Bitcoin has absolutely nothing to do with this. Dishonest traders will fiddle the books (putting in false sale value, for example, or just writing off stock) regardless of whether customers are paying in cash or for barter value (like Bitcoin is).
As for following the money: that's what a business's set of accounts are for. Again, it has nothing to do with Bitcoin. Paper money is just as "untraceable", yet you never hear people complaining that it allows for anonymous transactions!
Paraphrasing from Evita here.
I would have started with Monty Python:
It's fun to charter an accountant
And sail the wide accountan-sea
To hide, obscure the funds offshore
And skirt the shoals of bankruptcy...
It's all tax-decuctible
(we're fairly incorruptible)
We're sailing on the wide accountan-sea
But will it overheat and/or catch fire at inopportune times? If there's one thing that The IT Crowd taught me it's that geeks and bras don't mix.
because, ummm, they weren't smart enough to spot the benefits and they're all just living in the past and one day they'll realise that they were wrong and, anyway, it's not Microsoft's fault if the public is so backwards.
You make a very cogent case. I can see why you think people are idiots. Giving up your privacy for all those XB1 features is totally worth it.
The first gen device was the Atari 2600... Did Atari over promise and under deliver?
Absolutely. It was crap for phone phreaking. Very misleading product name.
It would have been nice if the 802.5.14 folks had engaged a few years ago when the IETF and IEEE were standardizing all of this stuff. From the Wikipedia article:
The requirements for membership in the ZigBee Alliance causes problems for Free Software developers because the annual fee conflicts with the GNU General Public Licence. The requirement for the developer to join the ZigBee Alliance similarly conflicts with most other free software licenses.
The ZigBee Alliance board has been asked to make their license compatible with GPL, but the ZigBee board refused. The refusal came, even though Bluetooth had already changed their license to make it compatible with GPL. Linux developers seem ready to abandon ZigBee, and use TCP/IP instead
By Oracle's logic, wouldn't Java's "interface" keyword be illegal, since it can allow objects to masquerade as someone else's proprietary interface? The language allows what it allows.
What the hell is a DEW? As Stanley Kubrick might have said when shooting 2001, "throw us a bone here."
How far will they go with this liberty stripping?
We wish to inform you that your post has been deleted due to offensive content (pornographic language or imagery damaging to minors). If you believe this to be an error, please contact your local police station. To facilitate speedy resolution, please bring with you a list of all potentially illegal sites which you may have accessed in the previous month.