Thursday, December 31, 2009
Writing Debug and Trace Messages :: BlackWasp Software Development
Trace messages are written using the Trace class in the same namespace. They are different to Debug messages because they are included in the code when the TRACE symbol is defined, as it is by default for Visual Studio users. Trace messages can exist in code that has been compiled in either debug or release mode. They are useful when you do wish to log information from the software that you distribute to end-users."
Friday, December 25, 2009
Jeffrey Richter's Blog : Receiving notifications when garbage collections occur
How the brain encodes memories at a cellular level
Thursday, December 24, 2009
Restaurants Use Menu Psychology to Entice Diners - NYTimes.com
Git: The Lean, Mean, Distributed Machine
Good overview presentation -- nice form, nice data.
Wednesday, December 16, 2009
Atheist Ethicist: Climate Change: The Need for Proof Argument
You are the first mate on an ocean liner, when the Captain gives the following order. "You are to proceed at full speed without any deviation in course and speed unless and until you have absolute proof that there is an iceberg straight ahead. Then and only then are you permitted to take preventative action."
Or, you are an adult supervisor on a bus trip with a bunch of school children. The bus is approaching a train crossing. Yet, the driver says, "I am not slowing down unless and until I have absolute proof that the bus will not be across the tracks before the train gets here."
We know these people to be guilty of the moral crime of reckless endangerment.
If these types of people wish to take actions that risk their own lives, we may leave that up to them. They pay the costs for their own mistakes. However, when they put the lives of others at risk, then they are guilty of a moral crime.
We have good reason to condemn people like this and to condemn them in very harsh terms. They are responsible for the deaths and suffering of a great many people every year.
Now, we have a whole slew of these types of people engaging in reckless endangerment of whole cities and whole populations. They have already maimed and killed a great many people and destroyed a great deal of property, and they seem to have no qualms about continuing along the same course of action. In all cases, they behave as people who are almost if not entirely indifferent to the death and suffering of others - because they are not motivated to take any action that would avoid potential death and suffering.
The morally responsible person would not demand proof that there is an iceberg straight ahead before slowing down and taking precautions. The mere possibility of an iceberg is good enough. His responsibilities to his passengers demands that he take precautions to reduce the possibility of catastrophe - not that he act as if there is no risk until catastrophe is certain.
The responsible bus driver will not risk racing the train at the crossing. She will take precautions to protect the well-being of the children trusted to her, which means slowing down and avoiding the possibility of harm coming to them.
These same principles of moral responsibility demands that, in the face of risk of massive destruction due to climate change, that people slow down and reduce the risk. It does not require absolute proof.
Principles of rationality give us a simple formula for determining how much caution to use in the face of risk. The basic form states that the amount that it is rational to spend avoiding risk is equal to the cost times the probability.
It is worth spending up to $250 billion to avoid a 1% chance of suffering $25 trillion in harm.
It is worth spending up to $2.5 trillion in avoiding a 10% chance of suffering $25 trillion in harm.
It is worth spending $12.5 trillion to avoid a 50% chance of suffering $25 trillion in harm.
It is worth $22.5 trillion to avoid a 90% chance of suffering $25 trillion in harm.
Tuesday, December 15, 2009
EETimes.com - How much of a lead does Intel have at 32nm?
We plotted (Figure 1 online) the minimum interconnect line pitch for all three manufacturers as a function of the technology node. All three players had comparable critical dimensions, illustrating that Moore's law is alive and well with no sign of slowing.
Interestingly, TSMC has slightly smaller dimensions than the two other manufacturers, probably because TSMC's customers are mainly SoC manufacturers, such as graphics processor and FPGA makers. With the latest graphics processors having more than a billion transistors, any reduction in chip size is highly beneficial to foundry clients, even though the individual transistors may not be as fast as Intel's or AMD's.
Every new technology node both reduces critical dimensions and improves process. Two fundamental process innovations being adopted by the main semiconductor companies are embedded silicon-germanium source/drain regions (eSiGe) and high-k metal gate technology (HKMG). eSiGe increases the performance of the slower type of transistors (PMOS), while HKMG helps the transistors switch faster and reduces the gate leakage.
Thursday, December 10, 2009
Red Hat Open Sources Desktop Application Protocol - PC World Business Center
SPICE can be used to deploy virtual desktops from a server out to remote computers, such as desktop PCs and thin-client devices.
It resembles other rendering protocols used for remote desktop management and deployment, such as Microsoft's Remote Desktop Protocol (RDP) or Citrix's Independent Computing Architecture (ICA). Brennan said SPICE has advantages over those other protocols, in that SPICE can dynamically customize desktop instances to fit specific operating environments.
Tuesday, December 01, 2009
Crossbow Virtual Wire: Network in a Box
and so on. These components can
be combined to build an arbitrarily complex virtual network
called virtual wire (vWire) which can span one or
more physical machines. vWires on the same physical
network can be VLAN-separated and support dynamic
migration of virtual machines, which is an essential feature
for hosting and cloud operators.
vWires can be reduced to a set of rules and objects
Natural selection 150 years on : Article : Nature
But can speciation be observed? Yes. Field biologists have witnessed speciation in action among several plant, amphibian, bird and fish species18. What matters for Darwin's theory is that the process by which populations of interbreeding individuals split into two non-interbreeding populations follows straightforward routes of natural selection. One good example is that females of a cichlid fish species vary genetically in their preferences for males of red and blue colours. Biologists are witnessing red males occupying the lower depths of Lake Victoria, in Africa, and females with matching preferences are following them. These mating preferences are causing this single species to split into two19.