search for: diabolical

Displaying 11 results from an estimated 11 matches for "diabolical".

2014 Jul 04
2
[LLVMdev] MOS6502 target
...nd everything else should be > compiled to some kind of byte code. The 6502 was a very very cheap chip to > build hardware wise, but the code is BULKY. Even when operating on 8 bit > values it's worse than, say, Thumb2, due to the lack of registers. On 16 or > 32 bit values it's diabolical if everything is done inline. > > Wozniak's "Sweet 16" is still not a terrible design for this, but I think > a bit more thought can come up with something better. The Sweet16 > interpreter is pretty small though (under 512 bytes I think?), which is > pretty important....
2014 Jul 04
2
[LLVMdev] MOS6502 target
Well, the stack pointer be a single byte, so pushing things on there doesn't work terribly well. Assuming I pass by reference, that's 128 values absolutely total before it wraps around and silently clobbers itself. It means single byte values will be incredibly inefficient... Tricky stuff. I'm lucky on the C64 since it's rare to exit back to the kernel with machine language apps
1997 May 02
0
R-beta: Re: S Compatibility
...9;s during off-duty periods. (Not so in > > Denmark. University employees here even own what they do in their work > > time. Few people get rich from it, though.) > > This touches a rather sore point with me. The University here has > brought in a new contract which has some diabolical aspects to it. This has been happening in the US too! > Basically they require that you inform them if you develop a piece of > software of "commercial significance". They will then decide if it is > to be commercialized and whether you will receive any of the benefits > w...
2008 Oct 14
5
dtrace_kernel and privilege escalation
hey.. I talked to my sysadmins about getting access to the dtrace_kernel role, and they said they were hesitant to give this out because they thought it was a security risk - ie: that you could use it for privilege escalation. How true is this? Is there a way to make it user safe? If not, why is it offered as an option for regular users? Thanks much, Ed -- This message posted from
2005 Apr 06
8
What is this Very Stupid DOS Attack Script?
...m is hammering other sshd applications on those devices at the same time it is hitting this system so what ever script it is is probably just trolling our network, looking for anything that answers. Thanks for any useful information as to the nature of what appears to be more of a nuisance than a diabolical threat to security. Martin McCormick WB5AGZ Stillwater, OK OSU Information Technology Division Network Operations Group
2007 Dec 17
0
guidelines for consistency of vector functions
Moving on from the discussion of the fact that length(x)==9 for any POSIXlt object x (which seems diabolically confusing, given that 'c' and '[' are defined for POSIXlt and have the vector-like behavior one would expect), what about having some guidelines for coding and documentation of vector-like classes? (1) a vector-like class should implement functions in groups: level 1: '...
2017 Dec 05
3
Dynamic reference, right-hand side of function
Hi again! I know you don't find loops evil (well, at least not diabolic :-) ). (After many hours googling I have realized that thinking about loops rather than lists is a newbie thing we Stata-users do, I just jokingly pointed it out). Anyway, I'm really happy that you try to teach me some R-manners. Since I still get questions about what the h**k I mean by my strange question, I sort it
2017 Dec 05
0
Dynamic reference, right-hand side of function
By the way, R 'vectors' are not the equivalents of mathematical 'vectors'. In R, a vector is something that can have arbitrary length and which has no 'attributes', other than perhaps element names. Vectors can be numeric, character, complex, lists, etc. Functions, names, and NULL are not vectors. In my opinion, the typical data scientist will rarely find the R vector
2009 Sep 22
5
Indexing Ogg files for faster seeking
I've developed an indexer which embeds a keyframe index track in Ogg files. It embeds the index in its own track, so that players that don't understand or don't want to use the index can just ignore it. Ogg needs this to make seeking over networks faster and more efficient. Currently we must do a bisection search when seeking, which usually takes aound 6 HTTP requests, give or
2017 Dec 04
0
Dynamic reference, right-hand side of function
Loops are not evil, and no-one in this thread said they are. But I believe your failure to provide a reproducible example is creating confusion, since you may be using words that mean one thing to you and something else to the readers here. ################################ # A reproducible example includes a tiny set of sample data # Since we cannot reproducibly refer to filenames (your
2017 Dec 04
2
Dynamic reference, right-hand side of function
:-) I don't insist on anything, I'm just struggling to learn a new language and partly a new way of thinking, and I really appreciate the corrections. I hope I someday will be able to handle lists in R as easy as I handle loops in Stata... Thanks again! Love -----Ursprungligt meddelande----- Fr?n: peter dalgaard [mailto:pdalgd at gmail.com] Skickat: den 4 december 2017 23:09 Till: