626
General Software Discussion / Re: How long is 'temporary'?
« Last post by Eóin on March 28, 2010, 01:25 PM »Just run disk clean up. Thats clears temp folder I believe.
I will try to be polite and just say that I do not agree with you on this.-Curt (March 26, 2010, 07:31 AM)
... and ignore the difference between correlation and causation.
When Fragmentation level increases, and you notice it yourself by the change in response time, it is too late and Defrag is not effective any more.
"Chaos" is a term used by mathematicians, while "Entropy" is related to Physics. We hypothesized that there might be an adhesion between the two that could be measured and enable implementation of preventive maintenance procedures adaptable to the storage area.
... the hackers were able to create a website that when visited by the Apple smartphone forced it to spill a copy of its SMS database. The file includes a list of contacts as well as complete copies of messages that have been sent and received. The database also contains deleted messages unless a user has gone through the trouble of manually erasing them.
It's almost non-news, because it’s been obvious for years that this was coming. Malware writers target the common programs and formats. Several years ago, I talked to senior developers from a major software company on multiple occasions about memory safety and secure coding, and at the time they weren’t interested because exploits didn’t affect them (yet). As an example, I pointed out: “Look, do you think software like Acrobat Reader needs to care about secure coding? – But of course it does. Isn’t it obvious that it’ll be targeted sooner rather than later?” Moral: If you write popular software, the need for secure coding affects you and your product; if it doesn’t today, it will tomorrow. (Obligatory note: This isn’t just about C and C++. Every mainstream language lets you write exploitable security flaws.)
The story of how GPU came to be used for high-performance computation is pretty cool. Hardware heavily optimized for graphics turned out to be useful for another use: certain types of high-performance computations. In this article, I will explore how and why this happened, and summarize the state of general computation on GPUs today.
Microsoft Browser Choice Screen Update for EEA Users of Windows 7 for x64-based Systems (KB976002)
Download size: 102 KB
You may need to restart your computer for this update to take effect.
Update type: Important
Install this update to access a Choice Screen which lets you select whether and which Web browser(s) to install in addition to Internet Explorer. After you have installed this software update it cannot be removed.
More information:
http://support.microsoft.com/kb/976002
Help and Support:
http://support.microsoft.com
Could I copy the repository from my linux server and do git-svn locally with a file:// reference?-f0dder (March 08, 2010, 01:20 PM)
In some companies, text editing no longer consists of ten engineers standing in line to use an 029 keypunch. In fact, the building I work in doesn't contain a single keypunch. The Real Programmer in this situation has to do his work with a "text editor" program. Most systems supply several text editors to select from, and the Real Programmer must be careful to pick one that reflects his personal style. Many people believe that the best text editors in the world were written at Xerox Palo Alto Research Center for use on their Alto and Dorado computers[3]. Unfortunately, no Real Programmer would ever use a computer whose operating system is called SmallTalk, and would certainly not talk to the computer with a mouse.