there is this kind of snobbery about wikipedia, this sense of "well if any old riff raff can just edit it what good is it" maybe that riff raff has something good to add. yes its possible for someone to make an edit to say whatever they want, but its also possible for someone to remove it, and the history allows someone to roll back an edit which is wrong. the fact that fixing something is easier than breaking it (in many cases) makes fraudulent edits not worth it. and to address something someone above said about a genius inventing a box that spits out carbon nanotubes: if that genius invented such a device he should submit it to a peer-reviewed journal(such as science or nature) and then cite that journal. wikipedia is not a scientific journal...its an encyclopedia. you shouldn't just check the sources of wikipedia, you should check the sources of EVERYTHING. the difference wikipedia has is that if you find the sources are wrong you can update the wikipedia page, if you just found it in a blog it will remain wrong for as long as the writer wants.
austin hamman
Posts
-
Wikipedia as a source -
Should one give up his Copyrights?an explanation for those not up on their german slang? from your context i get that the meaning is something similar to wank but im more curious what the word IS (since my dictionary, which usually has slang, does not have anything for wix or wichs)
-
networking humorif you need it explained you arent the target audience.
-
networking humorthe best part about UDP jokes is i dont care if you get it.
-
Super pi days07/20/2069 19:37:33 will be unix timestamp 3141592653 other notable timestamps: time of the beast (unix timestamp 666) was 12/31/1969 19:11:06 Euler time (unix timestamp 2718281828) will be 02/20/2056 09:17:08 AM avagadro's time overflows a 64 bit int... so don't hold your breath and PHI time (unix timestamp 1618033988) is 04/10/2021 01:53:08 AM
-
Finally! Fast internet access at work!can we please stop abbreviating code project to CP. maybe copro or something because it kinda changed the meaning of the post.
-
Should Hackers Get Jail Time?radar hacks are defeatable, only send player locations important to the player, limit mentioning player locations to players within the field of view of the player, trajectories coming from outside the players view can still come from outside the players view (a bullet for instance can spawn absent a player or gun being rendered on the client side and have its trajectory come from the server) i dont need to know the location of all players in a map, thats the lazy way of doing it. only knowing the location of players visible to the user also reduces bandwidth usage (since you dont need to be getting information about players you cannot interact with.) if i throw a grenade to a person who's position i do not know and my client does not know, the grenade explosion is sent to the server, the server checks if a player is in the radius, if so the server updates his health and tells the other player's client about this. the server also tells the first player about the kill and optionally spawns his body if it should go flying into range. now for this to work you have to make spawning items CHEAP. expensive spawns will cause players to materialize right in your face, in the case of lag, when your client gets told about his position ultimately its the job of the game developer to balance security and gameplay and many are just ignoring security and THAT is the problem.
-
Should Hackers Get Jail Time?you develop big money on a game and dont include provisions against hacks, or provide poor provisions you deserve what you got. and spending time developing against this is time well spent, it is knowledge you can use next time you make a game so you know what is and isnt exploitable. in the end its a game, that's it. if you are so passionate about it that you wish the cheaters to be thrown in jail you really need to get out more. its ultimately the job of the developers to make ways to counter cheating, prevent cheating from being possible at all, and/or detect cheating when it happens. if they can't detect the cheaters the law wont be able to do anything either. just let it go, complain to the company if you must, and if its rendered unplayable...play something else.
-
China's new one Petaflop water-cooled computer with Chinese designed cpu'si dont know how this is done on windows, but in linux(and probably most unix bases systems) if you get the PID of the process(ps -aef | grep -i works well), go to /proc//stat the 4th parameter is the parent process that spawned that process...kill that and and it wont get spawned back (something i learned when trying to figure out what the hell was spawning java every time i killed it) (edit: ok i found out how to do it in windows: get process monitor[^] from microsoft, find the process you want, (make sure you have the column for "parent PID" in the grid view), copy the parentPID and go to filter,then go to filter, then select "pid is " it seems procmon can't kill so you have to bring up task manager and find the executable listed under "Process Name" in procmon and then kill it.)
-
Hacker Fakes Windows Updatetheorized? at least one anti-malware company(HB gary) was recently proved to do just that.
-
Programming isn't hard...i always wondered that myself, its like they shunted warp plasma to run a frikken computer screen, and dont have anything to manage power surges. i think the poor ensigns on the terminals would rather have to switch a breaker than have their console explode in their face and kill them. while on the subject: seatbelts. how many poor ensigns and redshirts have met their fate from being thrown across the bridge and breaking their neck. seatbelts save lives, or at least save you from having to go back to a star base to get more troops. "darmok and jalad at tanagra" "i dont understand" "DARMOK AND JALAD AT TANAGRA!" great episode.
-
Netscape Navigator?well firefox is netscape navigator(the netscape navigator source was released open source and from there it evolved into mozilla firefox) so to a degree i am right now.
-
Will smartphones finally make the mobile wallet a reality?if they do that people who dont want their money tracked will invent a new currency that ISNT tracked. maybe bitcoin or some descendant thereof. maybe people will just trade in poker chips.
-
How much knowing math well helps programmer?!in my experience for most coding you dont need to be good at most math (im actually quite poor at arithmetic but surprisingly good as algebra...some algebra...) you just need to understand basic logic and everything else follows (no pun intended) programming for the most part is more like english(or your native language) or foreign languages, its mostly about syntax and vocabulary. until you get into graphical programming, then its matrix transforms and calculus. all your logic wont help you rotate that image along the x axis or perspective scale it without a library. but aside from that you may occasionally use math concepts without thinking of them AS math (for instance i dont think of modulus as the remainder from a division, i think of it as x%y makes something repeat y times for a steadily increasing x. i dont often think about the underlying bits and the operations they are doing when i make a bitmask, i just know that you make the numbers as significant numbers in base 2 and then you can join em together with | and you can see if they have been joined together with &. ive had a whole one time where i needed to convert to an arbitrary base(converting numbers to base 26 using letters a-z but no numbers for a list (because li didnt make them right and it had to match the book)) and ive never needed to do much more complicated math than that.
-
Just a thought: Is there a limit on url string?im not sure what it STANDS for, but i do know its the processor architecture used in many mobile phones, which stands in opposition to x86/x64. as for the topic, i frikken hate url string limits...namely the limits on data uri that MS imposes. the browser neednt enforce url limits as long as the server enforces limits. the server will only accept x characters so the browser will only send x characters (since the first part is establishing a socket, then client sends a pack, the server accepts, and then the client sends another. it doesnt send the entire url and then the server acks parts of it at a time as far as i know) so there isnt the risk of someone DOSing someone with a long url. IE8's limit on data URI length (from what i understand they have thankfully increased this in 9, but if you are depending on these for a WebBrowser object in .net 4.0 you are SOL) has been a thorn in my side for some time.
-
9 Reasons to Switch from Facebook to Google+you forget though, the mere existence of their parents on the site makes it not cool. even if they are relegated to a special circle they are still there. and kids hate liking things their parents like. i think g+ will follow the same cycle.
-
This code may not quite do what it says it does.also im not sure the lambda notation existed(in c#) when this code was made. i may be wrong.
-
Time for Chrome to goits rare for me to have something which works on FF but not Chrome, but very common to have something which works in firefox and chrome but not IE. usually i find i develop something in FF (mostly because of firebug which is better than ie and chrome's built in debuggers) then i work on making it work in chrome (usually works right out of the box, sometimes i need a few minor tweaks because i used FF specific things) then IE (which is a nightmare that adds another month to any development project)
-
PHP form processing: the easy waycomments is the least of this codes problems.
-
Grotesque C tricksactually thats a perfectly fine method of concurrency (known actually as multi-programming) his only error was using visual basic. multi-programming is a common mechanism for *nix programs (usually with a client/daemon setup, or a small program that runs and then goes away) though on *nix you wouldnt use sockets you might use pipes but more likely you just do your stuff via stdout/stdin or if you used fork() then ipc is done via shared memory. it usually faster to spawn a process in a *nix environment than, say, a windows environment. also by splitting a program into two you can make development easier, more secure (as you can have one program that needs certain permissions running under those permissions with well defined and tested interfaces)