Re: M
Some other things are massive caches (192+128K L1, 12MB L2 per four cores, plus Shared memory cache between processor), shared memory between CPUs and GPUs, massive out of order capacity, up to nine instructions per cycle). Just brute force.
2111 publicly visible posts • joined 13 Oct 2014
Independent of open source or not, it should be easily possible to extract data from these devices. Say some Bluetooth interface that can send the data to my iPhone. Or android phone.
For security, having a gut repository with public read-only access would be a great way if you don’t want to open source it. I mean I’d love to have this software safe, but I really don’t think having different versions would be a good idea.
So she got three million pound as a “performance related bonus”. Of their profits, about 20-30 million were stolen from postmasters. Now I’d expect a few 100 million in compensation payments, plus a few 100 million for the loss of reputation. So whoever is CEO now should reduce these losses a bit by forcing her to pay back the bonus.
I seriously wonder how many convictions of postmasters for theft or fraud there have been from 1980 to 1989 (pre Horizon) and from 2010 until now (post Horizon). Seven hundred supposedly dishonest postmasters, shouldn’t that have been a suspiciously high number?
I remember about tripling the speed of some video encoder by replacing an assembler function that handled one pixel as fast as possible with C code that used compiler intrinsic for vector operations, and then unrolling a loop eight times. So if you want to optimise speed plus programming effort it’s high level language.
Living “in a state of anxiety” is stupid. Especially when you realise that anxiety is what motivates anti-vaxxers and the “it’s just a cold” brigade.
But being aware how much or how little you are at risk lets you make the right decisions in life. For me it’s getting vaccinated regularly, Covid risk is not high enough for me at the moment to make lifestyle changes, but high enough to get vaccinated. Not doing so would be stupid.
“Call by name” is back in Swift as “autoclosure” arguments. Instead of passing a value, the caller passes a closure that the callee can evaluate.
How it is used was probably not what Algol68 expected. It allows to make || and && part of the standard library instead of the language, same with asserts or logging statements.
In Germany, you do that once and then you are ordered to carry a logbook where every journey is recorded with the name of the driver. Not filling it out is an offence itself. And not having filled out the name of a driver who does another offence is serious trouble.
In the UK, it’s the driver and the insurance company that pay fines and damages. In case of a parked car, the “driver” is the one who parked it there. In case of a fully automatic car, the “driver” is the person who sent it on its way.
If I drive to pick up my kids from school, I’m responsible for the driving. If I send my fully automatic car to pick up the kids from school, I should be just as responsible. If a manufacturer tries to sell cars that get tickets all the time, people won’t buy them. Too many tickets, and you lose your driving license, and using your self driving car would be driving without a license. If your car has too many accidents, your insurance premiums go up. Just let capitalism solve the problem.
>If I write a bestselling book, I don't see why my great-great grandchildren should be entitled to royalties from MY work, but that's the current situation
It’s most likely that you didn’t get paid a decent amount per hour of work that you spent on writing. With books, music etc. you don’t get paid on delivery, you get paid a percentage as long as your work sells and makes money. So if I wrote a book, I intend to live another twenty years, and it is so good that it still makes money after 20 years, then I haven’t been paid completely yet. So yes, I want that money to go to my heirs.
If you buy stolen goods you don’t own them. It seems Amazon sold two books without permission of the copyright holder, so you did indeed not own these books. Normally Amazon should as you to delete them and give you a refund. They deleted them instead; the result was still correct.
I think Apple has the ability to stop any app bought from the App Store from working but to my best knowledge this has never happened. Should they detect malware, with a likelihood that it causes me damage, I would expect them to protect me from the malware - and give me a refund. That ability has nothing to do with ownership.
Oh well. I was on a flight from Germany to London (not Concorde). It was the second flight of that airplane and it didn’t take off. Some computer problem. The pilot turned it off and on again. Never before or after have I been in an airplane that was turned off. Completely. No lights, no sound, nothing.
That is a completely wrong description of the bug. A register is speculatively overwritten, and when the speculation is found to be incorrect, it must obviously be restored. It is not restored correctly with the data that was overwritten but with data in a rename register from another application. There are no permissions involved.
No, this one is a genuine processor bug.
An attacker may be able to use to read data in your application. But there is another side to this: _My_ completely harmless application can have data replaced with data from your application, destroying whatever calculation I was doing. While the attacker _wants_ your data to overwrite its memory so it can steal your data, my application doesn’t want your bloody password to override my calculations.
I once went through a huge application that had no warnings enabled at all, with the help of one colleague fortunately. We enabled one warning after the other, some generated hundreds of warnings, I think we fixed a few thousand altogether. Including some that were daft (if x is unsigned then I should still be allowed to write “if (x >= 0 && x < 100)”), but about 20 were genuine bugs.
There are three different languages: C giving no warnings, C with warnings allowed, and C with warnings = errors. The second one is safer than the first, the third is safer than either. Since we are going on about safer languages, using the first or second variant is criminally unsafe.
I would have thought that using Apple’s infrastructure to send messages at Apple’s expense would be anti-competitive. (To a very tiny degree).
Since apple says they cannot read their own users encrypted messages, it seems obvious they cannot read messages from third parties that go through the same system. But I wonder who encrypts these third party messages. Is it the users phone or this company’s servers?And I read they want to know your AppleId? That’s absolutely between me and apple.
I would think that measuring and charging per usage might be costly as well. And you will get complaints from people who think they were charged too much. And I don’t know how much the fact that I have a connection costs my ISP.
It’s quite conceivable that correctly charging for usage would cost more than just delivering what’s needed.