Sunday, January 29, 2006
Where Were Those Pictures Taken?
Maybe I'll go nuts and do that for some future trip, I cant' really say. There are some pretty cool applications that make it easier, and I do have a GPS receiver now. I also have a handy-dandy cheat-sheet that provides a few plausible starting points for the non-code-writers, like me.
Friday, January 27, 2006
Intel Macintosh Fanfare and FUD
Second, the FUD-mongering: This eWeek article is so chock full of FUD, it makes a cynic smile...
Quote:
"Attackers have been focused on the [Intel] x86 for over a decade. Macintosh will have a lot more exposure than when it was on PowerPC," said Oliver Friedrichs, a senior manager at Symantec Corp. Security Response... There are many more malicious hackers who understand the x86 architecture in-depth... And attackers have access to hundreds of documents and examples of how to exploit common vulnerabilities on x86, whereas exploits for PowerPC are far fewer, Friedrichs said.Analysis:
Norton Antivirus for Macintosh version 10.1 (*NEW* *IMPROVED* *Now with Intel-based Mac support*) was released on 25 Jan 2006. The eWeek article with the above choice quotes was published on 26 Jan 2006. Coincidence? Or, should the first page of the article simply state the following: Symantec manager believes that he can increase revenue by scaring folks into NAV/Mac software licenses and subscriptions with every new Intel-based iMac or MacBookPro that is sold. The article tries to recover and/or regain credibility by quoting a couple of "security researchers," including one that is critical of some OS X coding practices. I am not a virus writer (IANAVW?), but it seems to me that the underlying hardware architecture has almost diddly-squat to do with most of the types of exploits that are seen in the wild today. Heck, most of the payloads manipulate files in the file system -- not exactly the type of thing that requires digging out some rainbow-covered books on Intel processor/chipset internals or your trusty old-school 1980s Intel 8086 assembly programming manual. In fact, I'd bet that you probably don't even need to read this Cross Intel Architecture Development Tool write-up.
All your bike are belong to us
For an object lesson in supply-and-demand, note the huge disparities between the prices of road bikes and mountain bikes from your traditional vendors. The technology differences don't justify the prices, so don't even try to convince me that mid-range and high-end MTB parts are any heavier or perform any more poorly than their road counterparts.
Tuesday, January 24, 2006
"Intelligent Design" Dismissed by Vatican
“If the model presented by Darwin is not considered sufficient, one should search for another. But it is not correct from a methodological point of view to stray from the field of science while pretending to do science. It only creates confusion between the scientific plane and those that are philosophical or religious.”*: For you non-Italians, the University is not affiliated with Oscar Mayer.
Now, imagine a collaborative project in Sandwich, IL between the University of Bologna and the University of Texas at Austin's Pickle Research Campus...
Saturday, January 21, 2006
Three and a Half Trillion Sudoku Puzzles
...9 x 9 Latin squares were not enumerated until 1975; the tally is 5,524,751,496,156,892,842,531,225,600... The order-3 Sudoku must be a subset of these squares. They were counted in June 2005... 6,670,903,752,021,072,936,960...
{Skip Ahead a Bit, Brother}
When all these symmetries are taken into account, the number of essentially different Sudoku patterns is reduced substantially. In the case of the order-2 Sudoku, it turns out there are actually only two distinct grids! All the rest of the 288 patterns can all be generated from these two by applying various symmetry operations. In the order-3 case, the reduction is also dramatic, although it still leaves an impressive number of genuinely different solutions: 3,546,146,300,288...
Yellowstone Gallery - Updated
Monday, January 16, 2006
Lawsuit-resistant Table Saw for Schools
Convergence for the sake of convergence?
I think it would be really evil, however, to force a Technical Support center to use these things... "Umm, hang on, I (uhh) need to put you on hold so I can use my (uhh) mouse to look up some information for you..."
Friday, January 06, 2006
National Champions
UT was well represented by fans attending the Rose Bowl; the Longhorn faithful occupied somewhere near 40% of the roughly 95,000 seats. We made enough noise to force USC into two delay of game penalties, and into calling two time-outs during the 3rd quarter.
Hook 'Em Horns!