This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Messages - AngelFish
Pages: 1 ... 11 12 [13] 14 15 ... 215
181
« on: February 04, 2012, 08:46:49 pm »
Does SmartMoving really add anything worthwhile to an SMP series? It introduces a lot of setup difficulties and prevents people from immediately updating Minecraft without returning a whole lot additional benefit (aside from being really cool).
182
« on: February 04, 2012, 06:43:53 pm »
Hello.
As you can guess my the title, I am starting a project to port a Java Virtual Machine to the Nspire.
So far I have found an open sourced JMV here
http://jamvm.sourceforge.net/
That I believe can be ported to the Nspire. It is also written almost entirely in C so I think that'll help.
What I want to do is basically be able to take any Java byte code, and be able to run it on the Nspire. (Possible Minecraft, anyone?) 
However, I don't know where to start with this project. I downloaded the source for the JVM and found the main file, however I do not know what I need to do to port it to the Nspire.
I hope that this can become a community project where anyone can contribute, because if it were only myself, it might never come to fruition, which would be a shame.
So, first question, where do I start? ExtendeD suggested to me earlier to try to compile the project as is using the Ndless SDK to see what dependencies aren't supported, although I don't know what I should make for a makefile to do that.
First, understand precisely what a JVM is and how it works. That means you need to read the Sun Spec for the Java VM. It will be invaluable for understanding the logic behind some of the superficially "WTF?" decisions that appear in the VM. Also, try to get your hands on the book "Inside the Java Virtual Machine." It's not quite as useful as the spec itself, but the depth it goes into can occasionally be helpful and it explains some of the algorithms used in the sun implementation, something the spec deliberately avoids doing. Also, get comfortable with optimization and low level programming. They're the heart of a good VM. Perhaps most importantly, understand the code you're trying to use as if you had written it yourself. If you're going to be maintaining it, then you'll quickly see why that's such a good idea. So, long story short: Writing/porting a JVM is a very good way to learn precisely how much you don't know. You'll come out of it a better programmer either way and I highly recommend attempting it for the learning experience, even if you never manage to fully port it. If you do manage to fully port it, then I love you
183
« on: February 04, 2012, 01:41:30 am »
I'd be happy to play/build if you need someone else. I tend to be pretty good at pure survival, although I can't record anything.
As for the server, any SMP server with local-only chat would probably work.
184
« on: February 03, 2012, 02:31:31 pm »
Yep, Magnus was pretty important, although I'm not sure what the extent of Bill Nagel's contributions were. But, a quick list of other notable things should include anyone who was in DetachedSolutions, the histories of the major calc sites (Omni, cemetech, revsoft, ticalc, UTI and the sites that formed it, TIBD, probably a bit about some of events around Detached Solution's site and the discussions that took place there), Benjamin Moody/FloppusMaximus, etc... As for politics, the community has never been short on them. The people who have been around awhile like DJ, Kerm, and BrandonW can talk about them more than I can, but there's definitely some stuff there.
185
« on: February 02, 2012, 02:26:14 pm »
If you read the newspaper you know that at this time, many schools have issued iPads loaded with textbooks to whole classes, and the trend is going to continue because the schools save a ton of money by not buying printed text books as a result. So the question is, will these schools also spend money on calculators when a five dollar iPad calculator app can be used? We are talking about a lot of money and it doesn't matter what the teachers want. They will be told what they will use and if they don't like it they can find a new job. No doubt the testing authorities will be required to adapt or find a new job also. Switching to digital books on iPads is a huge revolution in education. It is occurring at this very moment. It is occurring more quickly than anyone ever imagined and no one doubts that for economic reasons it is going to obsolete the use of calculators in math classes.
It won't be cheaper to use iPads for long. Give it few years and the publishers will figure out this little thing called "DRM" to make sure those schools are forced to keep buying new copies of the books each year. As for the claim that iPads are cheaper than calculators, um, what? A calculator costs around $130 to buy individually. If bought in bulk, that price goes down significantly. A bottom of the barrel iPad costs around $500. You say that the schools will save money on the textbooks? No, not a chance. As someone who is forced to buy my own textbooks, I can honestly tell you that publishers have no problem charging the same price for an electronic copy as a physical copy. And the disadvantage of electronics is the aforementioned DRM. Currently, most schools will buy a lot of books at once, use those books for a few years (sometimes a few decades...), then go buy more. With electronic books, suddenly the publishers can force schools to buy books every year or two if they want. You're crazy if you think they won't do that as much as they can. Basically, iPads are *not* cheaper than calculators in any sense I can imagine. Similarly, I find your argument that "...it doesn't matter what the teachers want" to be ridiculous. Yes, it matters. Teachers aren't nearly as replaceable as you appear to think. They're difficult to hire and even more difficult to fire. Any school that annoys enough teachers may face some less than desirable warnings from one of the teacher's unions. There are some other false claims in your quote, but I think this gets my point across.
186
« on: January 29, 2012, 06:12:42 pm »
Just checked with Christopher Mitchell (A.K.A KermMartian). This was apparently posted by the company that will be publishing his TI-BASIC book. In other words, it's legitimate.
EDIT: heh, he beat me to the reply.
187
« on: January 28, 2012, 11:50:39 pm »
DJ, I've tried refreshing the test image bunch of times. I'm pretty sure it's not in my cache.
188
« on: January 28, 2012, 11:48:05 pm »
The images are still up.
@{AP}, as far as I can tell, the group uses automated tools to do whatever they do. There's no real connection between any of the defaced sites, except that the sites are immediately reported as defaced by them. Might just be a "prize" kind of thing?
189
« on: January 28, 2012, 07:42:48 pm »
Tommorow morning, i am taking the sat test. I need cas for my nspire, or else I will not be able to solve all of the problems in the time frame set!
When I took the SAT, all I had was a TI-84+ SE. I used it on precisely 3 problems: One, because I was too lazy to divide two decimals by hand, another because it was faster to add two integers with a calc, and the third because I needed to calculate the numerical sine of an angle. TL;DR: You don't need a CAS for the SAT. That's just TI's marketing.
190
« on: January 26, 2012, 05:17:38 pm »
191
« on: January 15, 2012, 10:05:02 pm »
C
Specifying a protocol by implementation in any computer language is generally a bad idea. There are reasons every major specification is in a human language, the primary ones being that it makes differing implementations of the spec possible. EDIT: @Qwerty.55
Of course, I am not proposing that we go and invert the ciphers and systems needed, but rather to combine existing ones.
On the topic of secure networking, I too am also interested, perhaps we may discuss about this topic in the future?
Ah, that's much more reasonable. It's still massive project though. I'd be happy to discuss with you
192
« on: January 15, 2012, 09:59:09 pm »
i wonder what the best language would be to use
English.
193
« on: January 15, 2012, 09:51:24 pm »
I do agree with this what you say, but I'm just giving some advice. HTTPS is a recommended way to do things, and it has a large community supporting it, but if our community wishes to create another protocol, I'm all for it.
On your first point, we could make it better by not showing where the traffic is going and where it is from. See "The Onion Router" (TOR) for a similar system. It works but it is very slow. Improvements can always be made
On your point about individuals, yes the FBI will not go looking for one person, but what if this person was the creator and distributor of the software to make things secure?
On the third point: Uh, that is what I said...
Addressing your fourth point, HTTPS is a very expensive (CPU-wise) way of encrypting. That is one of the major reasons that not many people use it. Also it is expensive in the financial sense as you do need to buy a certificate. I don't think that all the webmasters can pay for it every year. Yes, you can make your own but users get a suspicious "This certificate is not valid and can be a malicious phishing site" warning, which will deter many users.
Again, I'm not trying to oppose you or the community, just trying to give a few points (also I like to debate too)
Heh, I like debates too. I just want to help you think through this idea as much as possible. It is an "absolutely f***ing massive" undertaking that you're proposing, to put it mildly. The protocols that form the internet are designed to scale to monumental systems and solve some of the most difficult problems in networking. However, even ignoring all of those, you still have a problem of getting the security right, which is far from easy. History is littered with the corpses of cryptosystems that the inventors though were secure and actually weren't. Even Bruce Schneier gets it wrong sometimes and quite frankly, most people aren't going to trust a system made by a community relatively inexperienced in the field without a very strong proof of security. Security is *very* easy to mess up. As for the claim that HTTPS is expensive CPU-wise, well, that's perfectly accurate. Here's the problem: Any encryption system worth its salt is. The fact that HTTP itself is expensive doesn't help much though. On your point about individuals, yes the FBI will not go looking for one person, but what if this person was the creator and distributor of the software to make things secure?
You mean like the creators of the hundreds of other cryptosystems the NSA can't crack who are out there? There are a lot of ways to hide your data from just about anyone on the planet that you care to. TL;DR There are an absolutely massive number of problems with this to be sorted out before anyone does any coding. The current system is probably best described as "ugly" or "painful," but it works. That's an amazing accomplishment in and of itself. I'd be happy to contribute help to this, but the problem really needs to be a lot more specific. All of this is of course to say nothing about user adoption, which is its own thorny problem. PS: I've spent some time thinking/learning about secure networking lately for a project, if that isn't clear
194
« on: January 15, 2012, 09:08:20 pm »
So, to apply it to this new protocol thing I can give a few tips: 1. If you invent something to keep the government out, you are inviting pirates and similar folk in. 2. From point 1, the FBI, NSA and other alphabet agencies are going to invest more to crack it. If you do manage to keep them out, then they may appear at your doorstep (if they haven't done so already) 3. You could still be shut from the internet with a couple of letters to your ISP (unless you are doing this over a really big WiFi network or equivalent) 4. The content that would appear there would be limited.
It's already been invented and it's called the http secure protocol. The entire point of encryption is to prevent third parties from being able to read your data and https is a well known, well supported, and well tested way of doing that. Those third parties can still most likely see where the traffic is coming and going from, but they can't tell what the actual data being transmitted is. Also, the FBI/NSA could really care less about most individuals. Any reasonably knowledgeable person can already prevent them from reading their data. Thirdly, your ISP can shut you down no matter what. There are very few large router stations in the US (or even abroad). Two or three requests at most could ban a location from connecting to the internet. As for the fourth thing, every site that has the proper certification can use the https protocol. Not many sites invest in it, but enough do.
195
« on: January 15, 2012, 08:56:46 pm »
You would use either floating point numbers (recommended) and regular gaussian elimination algorithms or you could use the division-free variants if you had arbitrary precision integer operations available. I'd recommend obtaining a copy of "Algorithms for Computer Algebra" by Geddes et al. if you want an in depth explanation.
Pages: 1 ... 11 12 [13] 14 15 ... 215
|