adsr
|
10 years ago
|
on: Literary Magazines for Socialists Funded by the CIA, Ranked
adsr
|
10 years ago
|
on: 3D Xpoint memory: Faster-than-flash storage unveiled
Fair point, perhaps I should have phrased it more as a technology with similar applications. I find it interesting that there are parts available now, albeit made on a 180nm process apparently.
adsr
|
10 years ago
|
on: 3D Xpoint memory: Faster-than-flash storage unveiled
I hope someone will give a push behind MRAM which seems like a more interesting option imo.
MRAM has similar performance to SRAM, similar density to DRAM but much lower power consumption than DRAM, and is much faster and suffers no degradation over time in comparison to flash memory. It is this combination of features that some suggest makes it the “universal memory”, able to replace SRAM, DRAM, EEPROM, and flash.
https://en.wikipedia.org/wiki/Magnetoresistive_random-access...
adsr
|
10 years ago
|
on: Collateral Damage
Another point is the fact that mobile Safari wont allow the use of plugins. A wild guess is that ad blockers are the most common plugin that people use, so it doesn't seem unreasonable to add this in the browser itself as an opt-in feature.
I don't really see the difference from using an ad blocker in the form of a plugin, and blocking ads by turning on the feature in the browser itself. Ad blocking is also a feaure built into the latest Firefox release.
adsr
|
10 years ago
|
on: Google: 90% of our engineers use the software you wrote (Homebrew), but...
"I never commit to memory anything that can easily be looked up in a book." Albert Einstein
It seems like this tests a) how much you want to work at Google and b) how good you are at memorize things.
adsr
|
10 years ago
|
on: When will we stop using Facebook?
Yes, Gmail is definitely a brand but I don't need to have a Gmail account to send an email to someone who does.
adsr
|
10 years ago
|
on: When will we stop using Facebook?
I don't really get the first point about scale and brand, because the examples you give like email are built on open protocols, so it's the protocol itself that is the brand. I don't need a particular brand of email client to send emails to someone.
adsr
|
11 years ago
|
on: Accidentally Quadratic
You could keep pointers to both the head and tail in the list object though. Then adding and removing stuff would be O(1) for both ends.
adsr
|
11 years ago
|
on: Major security flaw undermines Apple and Google users, researchers discover
adsr
|
11 years ago
|
on: German researchers discover flaw that could let anyone listen to cell calls
I doubt that would work well in practice. The reason is that timing is extremely important for this to work, if you're even one sample off you'll here a faint sound, and more than a few then it's quite obvious. So if the sound is generated by a separate OS process, you'll never know exactly when the sound is generated and you will not even have control over exactly when your own sound is played back in relation to the other process, think sub ms accuracy.
adsr
|
11 years ago
|
on: Fight Over Yahoo’s Use of Flickr Photos
But it's only commercial in the sense that it permits commercial use, but it also explicitly leave the creator out of any compensation beyond attribution.
adsr
|
11 years ago
|
on: All cameras are police cameras
I think it's understood that what is done in public is public, however that is not the same as having the same information recorded, analyzed with facial recognition and machine learning technology and stored for the future.
adsr
|
11 years ago
|
on: Corpus of network communications automatically sent to Apple by Yosemite
Can't this just be turned off with the Spotlight setting in system preferences though? For browsers it seems to be the same for all that uses the unified search field, it was last time a checked Chrome with tcpdump. I personally preferred to have the URL field separate from the search field for that reason.
adsr
|
11 years ago
|
on: BBC to publish 'right to be forgotten' removals list
I don't think it's that clear cut, there are some inherent challenges related to privacy and internet, a persons past that may influence future opportunities in a way that's not really fair. In fact, Eric Schmidt has expressed that same sentiment publicly.
http://www.telegraph.co.uk/technology/google/7951269/Young-w...
adsr
|
11 years ago
|
on: Fixing a 37-year-old bug by merging a 22-year-old fix
It's a bit more, the bool type can only hold two values, 0 and 1. (6.3.1.2 Boolean type #1) "When any scalar value is converted to _Bool, the result is 0 if the value compares equal to 0; otherwise, the result is 1."
adsr
|
11 years ago
|
on: "Open Source is awful in many ways, and people should be aware of this"
> I give Linus a pass. Given the success of the project and the size of the team, I would rather have a foul mouthed Linus than perhaps no kernel and no Linux.
This appears to be a false dilemma. I don't think the success of the kernel and Linux depends on Linus' foul mouth. And I think the point was that he, as a role model may influence and inspire others to adopt the same behavior.
adsr
|
11 years ago
|
on: Why can't Apple decrypt your iPhone?
In Apple's case, they use the ARM ISA but implement their own micro architecture and from vvhn's comment seems to also use a co-processor specifically for the secure enclave. But the link above on TrustZone hardware architecture mentions that this isn't a requirement.
"TrustZone enables a single physical processor core to execute code safely and efficiently from both the Normal world and the Secure world. This removes the need for a dedicated security processor core, saving silicon area and power, and allowing high performance security software to run alongside the Normal world operating environment."
I guess since Apple use the ARM ISA, it's still binary compatible with ARM but with a different implementation. AMD uses an x86/ARM hybrid where the ARM part is an off the shelf Cortex-A5 which already contain TrustZone.
adsr
|
11 years ago
|
on: Why can't Apple decrypt your iPhone?
It sounds more like they are using a Cortex-A5 to gain access to TrustZone with an existing x86 core.
adsr
|
11 years ago
|
on: Apple – Privacy – Government Information Requests
It's a bit less than 4 in 100,000, which I think is an easier number to relate to.
adsr
|
11 years ago
|
on: HipHop: A "Popcorn Time" for music
But enabling private communication is not the same as a public free for all. Some information should use private communication, but not be shared publicly, some examples that comes to mind is credit card numbers or private encryption keys.
https://firstlook.org/theintercept/2014/02/24/jtrig-manipula...
https://firstlook.org/theintercept/2015/06/22/controversial-...