Berkeley CSUA MOTD:Entry 42569
Berkeley CSUA MOTD
2017/09/24 [General] UID:1000 Activity:popular

2006/3/31-4/1 [Computer/SW/Languages, Computer/SW] UID:42569 Activity:nil
3/31    Growing Dragons: (
2017/09/24 [General] UID:1000 Activity:popular

You may also be interested in these entries...
2013/4/9-5/18 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Apps, Computer/SW/Languages/Perl] UID:54650 Activity:nil
4/04    Is there a good way to diff 2 files that consist of columns of
        floating point numbers, such that it only tells me if there's a
        difference if the numbers on a given line differ by at least a given
        ratio?  Say, 1%?
        \_ Use Excel.
           1. Open foo.txt in Excel.  It should convert all numbers to cells in
2012/12/18-2013/1/24 [Computer/SW/Languages/Perl] UID:54561 Activity:nil
12/18   Happy 25th birthday Perl, and FUCK YOU Larry Wall for fucking up
        the computer science formalism that sets back compilers development
        back for at least a decade:
        \_ I tried to learn Perl but was scared away by it.  Maybe scripting
           lanauages have to be like that in order to work well?
2012/11/7-12/18 [Computer/SW/Languages] UID:54526 Activity:nil
11/7    If I don't need to print for a few months, do I need to keep adding
        new ink to inkjet printers to prevent them from drying and clogging
        heads? Or will it just magically work once I add in new ink
        in a few months?
        \_ The nozzles will clog. Print a test sheet every couple weeks.
           Or remove the cartridges and put cellophane tape over the nozzles,
2010/8/29-9/30 [Consumer/Camera, Computer/SW/Languages] UID:53939 Activity:nil
8/28    Hi, anybody printed a photo image to a big plotter?  Something like
        36"x36"?  I'm wondering how many megapixels the image need to
        have in order for the print to "look good".  There is a rule of
        thumb?  Like 6 megapixel is good for X size print.  10 megapixel
        is good for Y size print.  Thanks.
        \_ You don't need that many more megapixels for much bigger prints,
2009/8/8-14 [Computer/SW/WWW/Browsers, Computer/SW/Security] UID:53254 Activity:low
8/6     mrauser, what ddya think of this:
        \_ Sorta tl;dr.  It seems pretty dense, so I'll read it eventually...
           just haven't really had the time. -mrauser
           \_ yep, it's dense but pretty good. - !OP
2009/4/24-28 [Computer/SW/Languages/Functional] UID:52902 Activity:nil
4/23    what book is this?
        "I'm reading this horrible horrible book about a programmer
         from silicon valley that gets magically
         transported into some world where magic is real
         and uses computer programming skillz to become the world's
         greatest sorceror … in book 1 of the series
2013/10/28-2014/2/5 [Computer/SW/Database] UID:54751 Activity:nil
10/28   Oracle software to blame for Obamacare website debacles:
        \_ Larry Ellison is a secret Tea Party supporter.
           Most of this article is bunk, btw. Boy are the Republicans
           getting desperate.
            \_ Umm, no.  Larry Ellison is a not so secret fascist.
2012/11/29-12/18 [Recreation/Computer/Games, Recreation/Sports] UID:54541 Activity:nil
2012/7/2-8/19 [Computer/SW/Unix] UID:54429 Activity:nil
7/2     If I download a software that has GNU GPL and create a search
        engine on top of it and the search engine profits (and I don't
        release the source code nor do I modify or redistribute it), is
        that an acceptable use of GNU GPL?
        \_ Yes.  Even the AGPL allows this if you don't modify the program.
           \_ What if I'm a search engine that uses something that uses
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
2012/1/4-2/6 [Computer/HW/Drives] UID:54281 Activity:nil
1/4     I want to test how my servers behave during a disk failure and
        a RAID reconstruction so I want to simulate a hardware failure.
        How can I do this in Linux without having to physically pull
        a drive? These disks are behind a RAID card and run Linux. -ausman
        \_ According to the Linux RAID wiki, you might be able to use mdadm
           to do this with something like the following:
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
Cache (3279 bytes) ->
About sponsorship Biotechnology Here be dragons Mar 30th 2006 | SAN MELITO From The Economist print edition With luck, you may soon be able to buy a mythological pet PAOLO FRIL, chairman and chief scientific officer of GeneDupe, based in San Melito, California, is a man with a dream. Not for Dr Fril, though, the mundane cloning of dead moggies and pooches. He plans a range of entirely new animals--or, rather, of really quite old animals, with the twist that even when they did exist, it was only in the imagination. But GeneDupe's team of biologists and computer scientists reckon they are equal to the task. Their secret is a new field, which they call "virtual cell biology". Biology and computing have a lot in common, since both are about processing information--in one case electronic; Virtual cell biology aspires to make a software model of a cell that is accurate in every biochemical detail. That is possible because all animal cells use the same parts list--mitochondria for energy processing, the endoplasmic reticulum for making proteins, Golgi body for protein assembly, and so on. Armed with their virtual cell, GeneDupe's scientists can customise the result so that it belongs to a particular species, by loading it with a virtual copy of that animal's genome. Then, if the cell is also loaded with the right virtual molecules, it will behave like a fertilised egg, and start dividing and developing--first into an embryo, and ultimately into an adult. Because this "growth" is going on in a computer, it happens fast. Passing from egg to adult in one of GeneDupe's enormous Mythmaker computers takes less than a minute. With such a short generation time, GeneDupe's scientists can add a little evolution to their products. Allstar Allstar Generation 10 Each computer starts with a search image (dragon, unicorn, gryphon, etc), and the genome of the real animal most closely resembling it (a lizard for the dragon, a horse for the unicorn and, most taxingly, the spliced genomes of a lion and an eagle for the gryphon). The virtual genomes of these real animals are then tweaked by random electronic mutations. When they have matured, the virtual adults most closely resembling the targets are picked and cross-bred, while the others are culled. Using this rapid evolutionary process, GeneDupe's scientists have arrived at genomes for a range of mythological creatures--in a computer, at least. The next stage, on which they are just embarking, is to do it for real. This involves synthesising, with actual DNA, the genetic material that the computer models predict will produce the mythical creatures. The synthetic DNA is then inserted into a cell that has had its natural nucleus removed. The result, Dr Fril and his commercial backers hope, will be a real live dragon, unicorn or what have you. This animal was genetically engineered to deposit gold in its skin cells, for that truly million-dollar look. Unfortunately Dr Fril, a biologist, neglected to think about the physics involved. The fish, weighed down by one of the heaviest metals in existence, sank like a stone, as did the project. Indeed, if he can get the dragons' respiration correct, he thinks they will set the world on fire. Copyright 2006 The Economist Newspaper and The Economist Group.
Cache (537 bytes)
Mobile Phone Accessories Phone Batteries, Chargers, Cases, Sim Cards, Aerials, Handsfrees, Dual Sims, Data Cables, Fast Free UK Delivery Tel 01946-591764 Take your French, German, Italian or Spanish towards fluency by subscribing to C Audiomagazines. UPDATED Sep 10th 2004 EPA A car bomb at the Australian embassy in the Indonesian capital, Jakarta, has killed at least eight people. The attack suggests the Jemaah Islamiah militant group remains a threat--and that it may be trying to influence both countries' forthcoming elections ...