The obvious choice
Prikazyvat, like in Larry Niven's "The Integral Trees". Uncommon enough.
1099 posts • joined 18 May 2007
Prikazyvat, like in Larry Niven's "The Integral Trees". Uncommon enough.
That looks like any number of old GUI and touch screen user interfaces. From the very short patent, it is hard to even see what novelty is claimed. But remember this is a design patent, where the bar is lower than in "real" patents. And judging by this example, they have no screening at all. Or maybe they only checked their database did not contain any identical entry.
Would rocket fuel do ? [as shielding]
There is the little problem that your rocket uses it up to get going. So it is not there when coasting to Mars and you need the shielding.
Scarcity of resources is not an issue if your colonists won't likely to survive a trip or arrive with brain cancer
Obviously no-one is going until there is a solution to that. A hard problem, but not impossible. Elon's big booster rocket probably needs to make a few more trips to lift enough shielding material like water, or some hydrogen-rich plastic.
The various flybys that have occurred since Clarke wrote 2001 (in the 1960s)
The speculations about the ocean on Europa do not appear in "2001", but only in the sequel "2010", written in 1982. At that time Voyager images of the Jovian moons were already available. (The "2010" was the first place I read about the ocean).
Movies are one thing, but if an alien species that has mastered interstellar travel but would otherwise not be much more advanced (the usual film scenario, to give humans some changes), I'm afraid it would be always go very badly for us. Never mind having ugly aliens shooting about in flying saucers like in ID4, or in long-legged walking tanks like in War or the Worlds. They would just abduct a few humans, study our biology carefully, then engineer a virus that would wipe us out. A virus that would spread for a few years without symptoms, then suddenly activate when everyone has it. That way they would get the planet intact, and with no risk to themselves.
Maybe that has already started. You know the alien abduction stories...
"Apple have moved from pbkdf2 (sha1) with 10,000 iterations to a plain sha256 hash with a single iteration only,"
I wonder why. A friendly suggestion from FBI?
I'm sure not many people actually care about Yahoo email, but Yahoo also owns the popular Flickr photo-sharing site, and it is accessed with the same account! Hmm. Got to change my password there ASAP...
Aha, the Flicr sign in now even warns about it like this: Make sure your account is secure!
To secure your account, change your password and update your mobile number.
> I am confident that Hillary will not be responsible for instigating nuclear war. I cannot say that about Trump.
My thoughts also. Forget about moving to Canada, If it were possible to move off-planet, there would be a queue after Trump got elected.
Even without nukes, the planet would be in peril. Both he and his vice-presidential candidate are rabid climate change deniers.
So a workaround would be to set your printer's clock to an earlier date?
Probably impossible/difficult now. Most modern printers connect to the network, and get their jobs from there (at least my HP does). I assume they also get time via NTP, I never had to set the clock. One would have to set up an isolated network living in a time warp.
I don't think that applies to all BBC content. For example Dr Who credits say "BBC Cymru" (or is it a separate company?). A more relevant reason could be that BBC licenses the programs it owns to foreign broadcasters and video-on-demand providers, who don't want BBC competing with them directly on their home turf.
> Google "Ted Cruz coloring book".
Now that left me speechless!
> you got robbed constantly when gangs decided it was easier to wait until you'd done the hard work killing, an animal and dragging it back and cooking it and then just robbing you.
Much the same happened in early agricultural societies. Stationary farmers made easy targets for robbers. The solution to this, organized defense, eventually caused other problems: feudal lords, serfdom.
Of course, things have improved now, at least here in the comfy first world.
> We would be limited to hunting and trapping and picking berries, warming ourselves over open fires, the lucky ones having caves. Disease would be so rampant that life expectancy would be about 25.
Modern research indicates the life expectancy went down quite a bit after agriculture was introduced. Hunting and picking berries really was healthier! Among other things, agriculture meant living in close proximity to animals, which caused infectious diseases (such as smallpox) to jump to humans. Agriculture also made the diet less varied. Altogether a bad idea.
According to the descriptions I have seen, it is supposed to be so simple you could basically put it together from some sheet metal and parts from an old microwave oven. The fact that there are not dozens of reproduced results by now is a clear indication the idea does not really work.
as seen on the Nokia 808 and Lumia 1020. The former in particular should be hard to beat, some test reports indicate the Lumia 1020 implementation was not quite as good.
Drivers should be shipped as source code and built with a compiler at install time.
Yes, but even this would not work in Linux (given current policies), because the driver API is not so stable even at the source level. This is justified by the need to preserve the freedom to change the kernel implementation.
> So how do you do a JIT compile, where data is necessarily code and code is necessarily data? Harvard architectures can't do a JIT compile, which is a necessary speed boost sometimes.
Compile the code as data to a page (or pages) marked non-executable, then change the protection to execute-only. Arrange things so that the compiler is the only application that can change the page protection bits this way, and that it will compile only data that has been originally loaded from valid bytecode files (use checksums for example). This also requires that the CPU refuses to execute anything from a writable page. Perhaps not foolproof, but should make it much harder for malware to write stuff to a data page at run-time and then execute it.
Can anyone give such an example? Genuine question.
One relevant example (for me and other Finns) is YLE Areena, the streaming site of the Finnish equivalent of BBC. They used to serve Microsoft media streams, so Flash in this case was actually a step forward....
Flash may be bad, but tell it to the web site builders. Until they dump Flash, it is only good that Linux users can view them, too.
No defensive programming can fix that.
No, but that is not what it is about. The application must just be able to decide it cannot handle the situation, give a sensible error message, and exit, instead of mysteriously freezing. This is especially important for software in consumer devices.
Handling error situations well is one of the things that distinguishes quality software from poor hacks.
Sony: “The symptoms being experienced are not a failure of the TV, but are as a result of specification changes made by YouTube that exceed the capability of the TV’s hardware.”
Total BS from Sony. If your system crashes because it gets unexpected input from the network, it is your fault. The Youtube application need not work with the unexpected input, but it must notify the user and shut down gracefully, without taking the system with it.
But the Bravia bug is typical of the software quality of consumer devices. Like the LG DVD player I have that locks up if it is fed a disk in a format it cannot handle, or is too scratched.
LibreOffice is now what OpenOffice should have been. It is already far ahead. Among other things, LibreOffice has cleaned up the code base and build system, making further development much easier.
Problems in the original build system was one reason why the security bug was not fixed in a timely fashion in OpenOffice: they could not even compile the dang thing! OpenOffice really is a dead office suite walking.
Or in my case it was, "I have to upgrade because I keep getting that security message".
The living-room laptop had that disease until I finally got annoyed enough to find and run a "never10" (or some such) free utility on it, which shut it up by patching registry. The other Windows 7 laptop in the house got the Linux treatment.
The first one would have been Linuxified as well, but I need one WIndows machine to run my negative scanner that has no Linux driver.
Sadly, as many recent reports have shown, much of the Rest of the World are busy talking out of a similar orifice to the one Mr Comey appears to favour, and demanding, or moving towards demanding, the same thing.
Yes, and if the FBI gets its way in te U.S, it will accelerate similar backdoor schemes elsewhere. When every major governement wants access to a backdoor, the magic keys will leak even faster, and the security afforded by such encryption will be worse than that of a girl's toy lock on her pink diary.
Given enough time and resources all messages can be broken and read.
Enough time, sure. As in millions of years. And adding bits to the key makes the time go up exponentially. DES with its 56-.bit key is now considered crackable, so it has been replaced by algorithms with a longer key. I expect they too will be replaced as computing power grows. But it does not really matter, as long as the time needed for a brute force attack is longer than the time the message is expected to be relevant.
But it has exposed USB ports. Seriously?
I wonder if the attack could be extended to work with other attached devices, like a mouse: you can send configuration and status request commands to it. Or if the PC or laptop has earphones, you could send very high-pitched modulated sound, which would turn into very low-frequencey radio. Sound cards can often output up to 20khz, it does not matter if the earphone does not reproduce it, and most adults cannot hear it anyway, so the hidden carrier would be undetectable.
Now, if some specific company gets a better treatment than others, it can be ruled a "state aid" - the government "pays" the company renouncing to taxes - which is forbidden by EU rules.
Not to mention extremely unfair to other companies, Irish or foreign.
Any true free market enthusiast should actually be cheering the Commission, even if they don't like taxation: if there are taxes, the same rules shall apply to everyone, so as to not distort the market.
NIcely illustrates the dangers of "crowdsourcing". Actually, bots are not even needed, if you can motivate lots of volunteers to carry out the hack. This technique has already been used to smear people in Google searches.
>People still used FTP?
I still often find it to be the only common way to move files between unlike systems. Even if a better alternative is available for some OS; it may not have been installed by whoever is in charge of the system I need to communicate with. Or there is stupidly configured firewall blocking the way for other methods. I don't think FTP is going away any time soon...
It is the same when you run the FTP command on Windows. After all these years, it still does not understand the "passive" command, which makes FTP work better through firewalls.
Why would the use of Android on something else than mobiles change the fair use argument?
The technology, once invented, cannot be uninvented. If you can park something around the moon, you can plow something into the Earth.
The same states that can (perhaps) alter the orbits of rocks in space have also the capability of dropping fusion bombs anywhere on Earth. So this does not give me anything extra to worry about...
Where's that shaking head emoticon when I need it?
It would in fact be a neat extension, if The Register allowed one to insert any emoji character as the forum posting icon, which would then be blown up to the usual icon size.
HMD global Oy, the parent company of Nokia,
Say WHAT? HMD Global just tries to relaunch the "Nokia" phone brand, but it is most certainly not the parent of Nokia the company (which is still going strong in network equipment). Nokia just licenses the brand to HMD, and has a representative in HMD's board.
instead of fixing long standing but difficult issues like FOSS GPU drivers STILL sucking,
Doesn't the blame here belong more to information-hiding hardware vendors?
(If I were the Great Dictator, I would prohibit the sale of any computing-related hardware, unless full programming information is made available for at most nominal cost, and without NDA restrictions.)
Isn't it about time we just assume that the default setting is security = nonexistent?
Looks like it. The problem is, security problems are not visible to most customers, until too late, and the vendors escape any liability. Same thing has happened in comparable situations with other technology. Cars used to be "unsafe at any speed", until increased awareness and regulation improved the situation.
>Honestly, the best protection against macro viruses now is to be running an up to date version of Word. It won't run macros unless you, the user, explicitly enable them.
Not sure if that helps against a good phishing attack. If the attachment comes from a plausible-looking sender, the recipient is likely to enable the macros anyway, especially if it looks like the document cannot be read otherwise.
Really, the only solution is using document formats with no macro feature, or at most macros that are strictly limited to operating on the document contents itself, with no kind of programmable access to the file system or network at all.
"LibreOffice isn't quite as fast as Word, but it's getting there. What is yet to be determined is not only whether or not I can defang all the "smart quote"-like stupidity and either have it preserve my settings through upgrades or make the settings changes something easy that can be injected at boot."
Yes, unfortunately LibreOffice also comes with these "I know better than you do how you want to write" settings enabled by default, but they can be turned off ("Tools->Autocorrect Options" and "Tools->Spelling and Grammar...->Options..."), and so far it has been very good at retaining these settings over upgrades (however, have not yet tried the latest version).
But "Microsoft Love's Linux".....
When they see an advantage in doing so, like in cloudy stuff, where Linux currently rules (the "embrace" phase). So there is no inconsistency.
Anyway, from Microsoft's point of view, this was about fixing a bug. Supporting Linux on these tablets was never promised.
"There's no hardware you can trust."
Actually, there could be: a mechanical switch or jumper that would be connected directly to the write-enable pin of the firmware memory. Low-tech, and would keep the control in the hands of the owner of the machine, instead of Microsoft, which is of course we have the overly complicated UEFI "secure boot" instead. (And when you hand a complex spec to a vendor, it is guaranteed to screw up the implementation).
From article: "and if users desperately need to run 32-bit legacy applications, the'll have to do so in containers or virtual machines."
A strange statement. Actually, the x86_64 version of the Linux kernel runs 32-bit applications perfectly transparently, if the distribution provides the 32-bit versions of shared libraries, and they are installed. Or at least that is how it is in Red Hat and OpenSUSE, where 32-bit libs live in /lib and /usr/lib, and 64-bit libs in /lib64 and /usr/lib64, so installing them side by side is no problem.
I'm not that familiar with Ubuntu and other Debian derivatives. Maybe they use /lib and /usr/lib also in 64-bit systems, in which case I can see why they have extra trouble here. Too bad, they could have avoided it.
A Finnish paper noted yesterday that in the U.S, Lauri Love could face 99 years in jail, whereas in Finland he would face 5 years at the worst, but probably less. U.S prison sentences are completely out of proportion.
The rules ask for the source as a zipped text file, but there are two common text file representations: CRLF terminated lines, like on Windows, and LF terminated lines, like on Linux and other Unix-style systems (I am not sure if any Macs still use CR-terminated lines, I believe the older ones did). Can the judges handle all of these, or must the entry be normalized to one specific format?
The rules say each program must be submitted as a single zipped text file. This is a bit unnatural for Java, which requires a 1-1 relationship between public classes and source files, although probably feasible in this case. The problem does not appear to require a complex program. Just use a single public class.
but the war will never end as long as NATO exits.
Sadly, NATO is the only thing preventing Russia from gradually subjugating Western Europe. I wish it weren't so, but with the current Russian regime, I see no other option.
About the dynamically allocate array in C++: I did it that way to keep the versions in different languages closer, and believe it should not have any effect. Firstly, the allocation and deallocation of the array occurs outside the measurement loop, so that overhead is not included. Secondly, any C or C++ compiler worth its salt will keep the base address of the allocated array in a CPU register during a tight loop like this, so there is no difference between accessing it and a stack-allocated array (which would in fact also be accessed indirectly via a register).
I'd be wary of drawing conclusions from implementing half a page of code in various languages and running it.
I fully agree one should not draw too many conclusions from microbenchmarks like this, but it helps get a feel of how various features behave in different languages or compilers.
I also find it hard to believe that you'll outperform C or C++ in an integer focused task, using a JVM language. I'd be very interested to replicate your results, if you provide some details on your methodology.
After thinking about it, I did not find hard to understand. Java is a statically typed language, and modern JVM:s do JIT, where they can apply all the same optimizations as the C++ compiler (at least for algorithms like this that do not require using run-time type information). So it gets down to which compiler has the better code generator. If you want to check for yourself, see macrorodent.blogspot.fi, where I just copied the benchmarks. If you get interesting results, please post comments there.
The overhead is minimal (add a segment to the LDT) and you can trap any overrun from any language. Sure when you DO trap, there is a huge overhead... but you are debugging then!
Actually there is quite a bit of overhead with this method, because access to such far data requires generating a more complex code sequence than for data in the "default data segment". You need to load a segment register (a compiler can sometimes optimize this away, but usually not, and there are not many of these registers, only ES, FS and GS are free for general use). Loading the segment register is expensive in protected mode in the 386 architecture (it loads the descriptor data and checks protections), and the overhead has even got worse in succeeding generations of the Intel architecture, because it is seen by Intel as a legacy feature that almost nobody uses. It is kept around for compatibility, but they don't care about its performance.
Yes, I too have worked with an embedded system that uses the Intel segmentation feature for fine-grained memory protection (still occasionally do), and I can assure you it is a bad idea!
If you must use strncpy, then at least use 'strncpy(bufer, string, maxlen-1)' to make room for the null.
Reasons for that include having to take into account old C libraries. The strl* functions are newfangled inventions. I recall reading somewhere the reason for the dangerous behaviour of strncpy when the target size is exceeded comes from its usage in the original Unix file system, where file name components were limited to 14 characters. They were stored in fixed-size directory entries with 14 bytes reserved for the name, and only names shorter than 14 were nul-terminated. So strncpy with size 14 writing to the file name field did the right thing...