home | diary-books ¦ diary-films ¦ diary-music ¦ diary-todo ¦ diary-walks ¦ diary-trips ¦ diary-web ¦ diary-food |
/* cc equat.c -lm The Knight wrote: > Heres a doozy. > See if you can speed this up, Hmm, yes right, fun! > // find all whole numbers where x2 + x = y4 + y3 + y2 + y > Go as high as you lie. I've gone up to x = 64000 and y = 64000 > Its very slow at the moment so have a think about a good algorithm to > replace this boring code. */ #include#include #include void knight() { FILE *p; double x, y; x = 0; y = 0; p = fopen("result.txt","w+"); for(x = 0; x < 64000;x++) { for(y = 0;y < 64000;y++) { if(( pow(x,2) + x ) == ( pow(y,4) + pow(y,3) + pow(y,2)+ y)) fprintf(p,"x = %-1.0f, y = %-1.0f\n",x,y); /* Why recalc x value every time? .... in fact let's swap x & y loops and just calculate y once for each x loop. */ } } fclose(p); } void james1() { FILE *p; double x, y, ys, y2; p = fopen("result.txt","w+"); assert(p!=NULL); for(y=0;y<64000;y++){ y2=y*y;ys=y2*y2+y2*y+y2+y; for(x=0;x<64000;x++){ if((x*(x+1)) == ys) fprintf(p,"x = %-1.0f, y = %-1.0f\n",x,y); } } fclose(p); } /* now we could also take a look at getting rid of the x loop x^2+x=C (c=ys in the above code right) so x^2+x-C=0 let this be equivalent to (x+a)(x+b)=x^2+(a+b)x+ab=0 => a+b=1 *1* and ab=-C => b=-C/a *2* 1 and 2 => a-C/a=1 => a^2-C=1 => a^2=C+1 => a=(+/-)sqrt(C+1) *3* 1 and 3 => b=1-(+/-)sqrt(C+1) with me? x^2+(a+b)x+ab=0 => x^2+(a+b)x=-ab => 4x^2+4(a+b)x=-4ab => 4x^2+4(a+b)x+(a+b)^2=(a+b)^2-4ab => (2x+(a+b))*(2x+(a+b))=(a+b)^2-4ab => 2x+(a+b)=(+/-)sqrt((a+b)^2-4ab) => x = ((+/-)sqrt((a+b)^2-4ab) -a -b ) /2 Oh doh ... anyone remember (-b (+/-) sqrt(b^2-4ac) )/2a >;) (a=1, b=a+b, c=ab in this case just to confuse) still with me? (I nearly lost myself there!) */ void james2() { double x1, x2, xi1, xi2, y, ys, xs, y2, ysq, ysqr; for(y=0;y<64000;y++){ /* It weould be interesting to start from -64000 ? */ y2=y*y;ys=y2*y2+y2*y+y2+y; /* a+b=1 ab=-C x = ((+/-)sqrt((a+b)^2-4ab) -a -b ) /2 */ ysqr=sqrt(fabs(ysq=(1+4*ys))); /* sqrt would not appreciate us trying to get it to calculate complex numbers */ /* Now sqrt calculations are a bit slow but it saves you a loop and will work however high you go ..... within limits of the compiler & math libraries :) */ if (ysq<0){ /* handling cplx nos is not left as an exercise for the reader :( sqrt(-a)=isqrt(a) okay? */ /* of course this is never entered _here_ ... but it might be sometime */ xi1 = ysqr/2; x1=-1/2; xi2 = -xi1; x2=x1; } else { x1 = (ysqr-1)/2; x2 = (-ysqr-1)/2; } if (ysq<0) printf("x1 = %-1.0f + %-1.0f, x2 = %-1.0f + %-1.0f, y = %-1.0f\n",x1,xi1,x2,xi2,y); else { printf("x1 = %-1.0f, x2 = %-1.0f, y = %-1.0f\n",x1,x2,y); printf("%-1.0f = %-1.0f = %-1.0f\n",x1*x1+x1,x2*x2+x2,ys); /* just checking */ } } } main() { james2(); } /* Now, hmmmm, I wonder now would this work :) Of course if you don't want to work out the algebra ..... :) you need a language or library to do that for you, or of course you need to find a nice general fast equation solving algorithim */
You say, "excellent :) Subjunctive instant replays" You say, "this Hofstadter guy is amusing :)" waider says, "Yes." waider says, "It took me several years to finish GEB." waider says, "I started in 1992 and finished in, oh, 1996, I think." fiocco hadn't encountered him till ... yesterday. waider says, "By which point I'd forgotten most of what I'd read." waider says, "I need to read it again." waider says, "Maybe." waider says to fiocco, "hey, do you know anything about voice pitch/volume analysis in software?" waider hmms. Right now I need a way of channelling between two muds! You say, "gosh, urm, ... so was it just much distractions? (last night I finished Sophie's World .... (STARTED that just after we arrived in Holland .... distracted after a third, started again, distracted by Daire and finallyt found it a few weeks ago )))))" You say, "Hmmmm, pitch/volume analysis, not much, but I could probably make a plausable attempt at blugffing >;)" waider says, "Must borrow sophie's world off you. I started reading someone's copy in Honduras, but they had to take it away with them. John Hume's daughter, as it happens." waider says, "k00l idea." You say, "... in November Fionnuala got a book from a friend ... Primo Levi ... goes through Periodic Table .... and it's been in my "virtual-book-in-0Tray" for ages ... that's next." You say, "hey .. I think we're both out tonight ... meeting Frances & boyfriend." fiocco vehemently agrees and cackles over the didigtal kazoo plans. waider works on email bounce stopping. You say, "use less rubber, ... and put some sand in." fiocco ponders digital kazoo and remembers fondly Commodore64 sound chips POKE&PEEKs galore. You say, "prbly same kindof stuff as the Amiga had." waider says, "Nah, amiga had a custom chip to do the job. C64 just had a generic synth chip IIRC." Mao/[WB]arto[gk] Rules Like Uno, simple start, 5/6/7 cards each player, play clockwise, winner gets rid of all cards (the rest of these rules may vary per game more variable mark *) * jokers wild or eliminated should be named on drop, Each players turn -> drop "eligible" card or pick up, eligible=same suit or the same value pick up for breaking any rule, deemed (by general consensus within reasonable time) players may not ask questions during play, may not make (provably) false statements during play, * timeouts allowed `POINT OF ORDER' to legislate conflicting rules, Qs may be asked * players may not address or refer to any other player by name while the game is in progress. Whenever the number of cards in a player's hand reaches one, they must say *Bartok* each time someone wins they add a rule, new rules over-ride initial rules. New rules may repeal or override older rules. New rules must not be obviously biased towards or against any player. New rules may not directly effect the creation or content of later rules. Only general basics of the original rules told to new players. If ever the new player receives a penalty for some reason, then a brief (and not necessarily clear) reason for the penalty ought to be given. In Mao new players are not told the initial rule set (which is slightly different from the Bartok one, and varies slightly (radically?) depending on which group is playing it). When someone goes out, they invent a new rule, which they do not tell the other players. Unusually, MAO has no winning condition; a player who gets rid of their cards `wins', but the game continues and that player is allowed to rejoin the game (take 5 cards) and to make up a new rule. At any point after rejoining they may make up a new rule and say `NEW RULE', at which point their rule comes into force. The game will continue until the players are bored and no longer want to continue to play. The exact rules which determine which cards are legal to play and when it is a player's turn are hidden at the start of the game; it is up to new players to guess them by careful observation of play and by experimenting with their own play. New players should not, at least to start with, worry about getting rid of their cards but should instead concentrate on figuring out what is going on. In Eleusis, players try to get rid of their cards by playing them onto a discard pile, however the rule which dictates which cards are legal to play is not known to the players. Instead, it is invented by the dealer before play begins. The other players have to try and guess the rule by observing which plays are legal. bartog bartok mao mao mao New rules Whenever an ace is played, the person playing it may declare it to be any suit. When a 7 is played, the direction of play is reversed (clockwise becomes anticlockwise, and vice versa). Whenever the number of cards in a player's hand reaches two, they must say ``Bartok minus one''. Note that this includes when a player goes up to two cards because of a penalty card drawn for not saying ``Bartok''. When a 2 is played, the next player must forfeit their turn and draw two cards instead. When a black 6 is played, the player two positions to the right of the current player must miss their next turn. Red queens shall be considered 5s for all purposes, black 5s shall be considered queens for all purposes. Any player who plays a jack must immediately quote a line from a Monty Python sketch. Lines previously quoted in the same game do not count. When a red 9 is played, the person whose turn was two players before the current person's turn must moo loudly like a cow. When a card is played which causes the numerical value of the top two cards on the discard pile (counting jack=11, queen=12, king=13) to sum to 14, the player who played the second last discard gets an extra turn between the players who would otherwise have their turns next and next again. All clubs shall be considered as cards of their numerical value plus 5, modulo 13. When a black card of value 3 less than the previous discard is played, all cards which are currently clubs become diamonds, and vice versa. Use your twisted imagination... 1) SKIP X * On card(3), play skips X (= 1,2...) people. 2) REVERSE * On card(3-6), the direction of play changes. 3) SWAP (LOCAL) ** On card(1-3), the current player swaps hands with a certain player. (On eir left/right/opposite/in dirn of play/by choice etc.) 4) SWAP (GLOBAL) ** On card(1-2), all players give their hands to another certain player. (On eir left/right/opposite/in dirn of play etc.) 5) SNAP ** (When more than one pack is being used.) If a player has a card in eir hand, identical (same number AND suit) to the card on the top of the pile then e may immediately play that card (regardless of whether it is eir turn or not), saying "SNAP" when doing so, and play continues as if it had been that player's turn. When only one pack is being used, a card of the same number and colour may be snapped instead. 5a) CRACKLE ** (When rule 5 is in use) If a card has just been snapped, as per rule 5, and a player has a card in eir hand of the same suit and number _one_more_ than the snapped card, e may play it immediately (regardless of turn) and say "CRACKLE" when doing so. Play continues from em. 6) DRAW X (cumulative) ** On card(1), then next player has to pick up X cards. This constitutes that players turn. If the rule is declared to be cumulative then the next player may play another (legal) draw card as eir turn, an the next player has to draw 2X, and so forth, until some player cannot play. 6a) BUCK STOPS HERE ** If a draw rule (6) is in effect, a card(1) may be played (if eligible) as a "stop" card, instead on drawing. When this card is played, the last player to have played a draw card has to draw (unavoidably). 7) CHANGING PLACES * On card(1) player changes position with a certain other player. (as per swapping) Players may have to take their hands with them, or leave them behind. 8) REVERSE #2 ** Play goes cw after a red card and ccw after a black card. 9) TOURNAMENT RULES *** The winner of a round is dealt on fewer cards in future rounds. If ever a player is to be dealt zero cards, then e is declared the winner of the tournament, and the tournament ends. 9a) ANTI-TOURNAMENT RULES *** Player with most cards at the end of round gets an extra card in future rounds. (Difficult to stop players from throwing in their hands) 10) RESET CARD **** On card(1s) the rules are reset to the initial set, or some reduced set, for the duration of the round (or even permanently). For use in _very_ long games only. 11) DANGER CARD *** On card(1c) the player has to draw 2-3 cards from the pack. 12) LAST CARD HAS EFFECT *** The effect of the last card to be played is counted _before_ determining the winner. 13) DOUBLE HANDS *** All players are dealt two hands called "top" and "bottom". Players may only ever look at their current "top" hand. On card(1) all players swap their top and bottom hands. The winner is now the first player to have zero cards in eir TOP hand. 13a) BOTTOM HAND SWAP ** Assorted swap rules (global/local) may be applied to players' bottom hands, top hands, or both. 14) BEEP/QUACK * On card(1-6) player must say "BEEP" or "QUACK" etc... (Multiples of these rules can be fun) 15) ON YER BIKE * On card(1) player must run to a certain landmark and back. If it becomes eir turn again and e is not back yet, e can be given a card for taking too long. 16) TABOO *** Certain words, eg "Yes","No","I", may not be spoken. 17) THREE WORD RULE *** On card(1) player may only speak in sets of three words at a time (no more, no fewer) with reasonable pauses in between, until such time as another player players that card. 18) UNDER THE INFLUENCE **** On card(1) player is "under the influence" and may only speak in false-hoods. The player is exempt from any penalties for saying false statements, but can be penalised for saying (provably) true statements. A player stays "under the influence" until another player plays that card. 19) STICKY HANDS/PLACES *** The effect of rules such as 17 and 18 may be transferred when the player swaps hands or places with another player. 20) SNAP TO WIN *** If a player can snap on the (otherwise) winning card, then e is the winner instead. If three or more packs are used, then the last player to snap (before throwing in their hand) wins. 21) PARALLEL GAMES **** If numbers permit, two or more separate games may be run, each with its own set of players and rules. Each game acts as per usual for a single game, with one extra rule: On card(1c) player must swap places with a player of choice, in another game. 22) NAME THAT TUNE * On card(1-2) player must name a movie/song/commercial etc which has not yet been mentioned. 23) REVALUATION *** Card(1) henceforth is considered to be have some other value with respect to eligibility, effect and future play. 23a) MASS REVALUATION ***** All cards henceforth have value one more than their face. (Very Nasty, esp. with many rules in place!) 24) DOUBLE PLAY ** On card(1) the current player has another turn. 25) BILL (Ghost hand) **** An extra hand is dealt, face up, to a ghost player called "Bill", who sits opposite the winner of the previous round, who is to be Bill's "caller". Bill has turns like any other player, but Bill's plays are decided by the caller. If Bill has only one card left, then he automatically draws another card (for failing to say Bartog), but the caller must make sure that Bill follows all the other rules (including Beeps, Quacks, et al.). If Bill breaks a rule, then the caller has to draw the penalty card. 26) NAME OF THE GAME * Change the name of the game (and hence, what players must say when they have only one card in their hand) to something other than "Bartog". Can cause much confusion (and fun) when played by experienced players. Suggested names are "Vickie makes up silly rules" and "Snap!". 27) WRONG HAND ONLY * Players must play cards using their non-writing hand. 28) TAKE THAT When card(1) is played, the next player in dirn of play must pick up that card. @emit cat fanfare.au |kazoo >/dev/audio Polyglot Principia Cybernetica What is Nomic? faq & Peter Suber
The LINUX FUD factor FAQ wobble Security Portal: Who Needs Virus Protection on Linux? wobble ... felt that it was prudent to speak up." 06/11/1999 11:00:57am More @ Linux Today LinuxPR: New anti-virus product for Linux released "Kaspersky Lab expands its range of anti-virus products for Linux" 06 ... wobble wobble wobble Kaspersky Lab announces AVP for Linux wobble beta-version memory resident anti-virus filter (AVP Daemon) for Linux operating system. wobble ... PC should always look like if it were just installed. * Every computer has to be protected from virus attacks. These constraints lead us to base our configuration on bootprom tools. We first developped ... wobble ... Ottawa." 06/16/1999 10:36:07am More @ Linux Today InfoWorld: Java maven says Windows is uniquely virus susceptible "Unix, Linux, and Java environments are almost entirely immune." 06/16/1999 10:12:23am ... wobble ... ." 06/13/1999 08:57:42pm More @ Linux Today Wired: Worm Zeroes In On Microsoft "The latest Internet virus to cause turmoil on desktops around the world highlights a unique security problem: users' dependence ... wobble ... : A natural source of vitamin L "Most Linux users watch the unfolding horror of widespread Windows virus attacks with amusement, or at most detachment." 05/04/1999 02:16:49pm More @ Linux Today ICS' BX ...
Well, this is the first time I've come across the following information.
Interesting in view of the "Is Linux really less vunerable to viruses?"
discussions.
Hillis' virus solution: Limit OS Usage by Hemos
Read up a bit on existing unix and Linux viruses and comfort yourself with the knowledge that the
good ole Data Fellows are potentially there to
protect the Linux community from infection (should you want to submit yourself further to non-OS non-free
software that will probably annoy you by frequently telling you it's GUARDing and CHECKing your
system for intruders while gently REMINDing you to upgrade frequently.
I guess you could figure out that I'm not in any way very much tempted to buy Linux anti-virus software. :)
Data Fellows Announces Broader Support for Linux (summary, Espoo, Finland, June 9 1999)
F-Secure Anti-Virus
Two Linux viruses so far? Only two!?!? (known to these Data Fellows guys I presume)
More information on Unix/Linux Viruses, stumbled across in various newsgroups. Some are not all that friendly to UNIX, :(. These first three are all 1996ish timeline by Peter V. Radatti, CyberSoft.
Cool! Japanese introduce ant-size robot true? vapour? http://www.plumb.org/tekmage/ ATIP97.094 : Recent MITI-Sponsored Research On Micromachines Micromachine Center Flexible Automation. Micromachine magazine In pdf Insects and Micromachine, Research on Group Control and Signal Transmission in Organisms
DatrontechPC components 01 8510050
PiperMP3 player
RF cancer results on /. New Scientist There's still no evidence that mobile phones will mangle your memories or give you cancer. But the microwaves they emit may be up to something.
I can easily imagine that the old hair dryer would win out as being the most lethal of all you mentioned. That is of course disregarding all the fatalities resulting from monitors hurled from high buildings. Hair dryers have quite a nice cord which may be used to trip, tie, strangle and of course they are tragically much fun for young geeks to play with (nice transformers).
Slightly more seriously, as usual I'm about a foot in front of my mongo BIG monitor right now as I usually am for 8+ hours a day. This is definately giving me a bit of a constant cold .... the air is just really dry and I can feel all the electrons being SUCKED from my eyes :) You can get stuff from your doctor for this, take a few drops every day forever, no harm done but a bit of a pain.
Now the thing with mobile phones and monitors is that some of us use either or both ALOT. And while I don't believe the monitor will ever do me serious damage I would be worried if I used a mobile phone a good deal.
However, mmmm, what else do I use alot that could be harmful? Clothes? Hmm, no. Er, ball-point pens? Not really. I have been hit recently by a softball ... but I hardly spend a significant amount of time on that.
Ahhhh, _I_ know.
I _do_ use a car quite a bit.
We can take safety precautions, buckle up, drive safely, ... but most of us accept driving as a reasonable risk for the benefits. It would be nice
to likewise compare benefits and dangers of using your mobile.
I would love to see the comparison of accidents versus usage:
car injuries/usage :: phone injuries/usage
(usage is probably %time * people or something)
Can anyone help?
Taking this car vs mobile thing a bit further .... in the beginning, there were horses and then only steam engines. And the horses pretty much beat those steam engines every time so for years transport saftey guidelines consisted of the unwritten "don't get run over" or "don't run into large/sharp things".
They have since developed from their meagre beginnings worldwide into tomes of law, rules of road saftey, safe-cross codes, etc..... Probably the same applies to using "thingies" outputting microwave/high RF energy.
There is a risk there, as for anything. We need a safety code for mobile phone users, as we do for hair-dryers. For now though I would think it more important for mobile phones.
Tim Gilbert wrote: > >HP-UX 10.20, X/Open stream socket > > > >Is there a problem with attempting to connect to a server multiple times > >using the same socket if the previous attempts have failed? > > > >What I'm trying to do is ensure that the client tries for a user > >specified number of times to connect to a server (which may not be > >running on a different host) with a user specified wait in between each > >attempt before giving up. I'm only creating the socket once. If the > >server is not running I get error 239 on the first connect but when I > >attempt to do a second (or any subsequent attempt after starting the > >server I get EINVAL (22)). If I close and recreate the socket after > >the first failed attempt, the client will connect to the server. > Barry Margolin: > It seems like you've answered your own question. > Hmmm, yes. I have just discovered the same thing. But I have a theory >;) Examine the socket status (netstat -a) I have seen the socket go into CLOSE_WAIT and TIME_WAIT after the failed connection. I guess if you wait TIME_WAIT (60 sec on HPUX) and THEN try to reuse the socket it might work ... but I'm too lazy to test this. I also suspect that if you set the socket SO_REUSEADDR and set SO_LINGER off then you could retry the connection immediately as the TIME_WAIT should exit immediately. Again, I'm too lazy to experiment. useful: sock-faq setting SO_REUSEADDR, SO_REUSEPORT and SO_LINGER James.
Softball maps and playing with map forms and JavaScript. http://multimedia.itronics.ie/ always returns 320*320 image?
Softball match at Anglesea Road, Donnybrook, Dublin 4,Ireland. Zoom in to Belvedere RFC. It's the green diamond right :)
Overview of city centre/harbour mouth, zoom all out for overview of Dublin. Southmost reaches to Clonskeagh, ... Belfield park, Elm pk golf, .. Booterstown.
(- 314903 314153) right,left 314528
(- 234530 233780) top,bottom 234145
say targetting missile on spoon coordinates 314528,234145 sir!
emote hurls Waider's gaff
emote cackles evilly!
This is the main map image link:
The city centre, try tiling this in 4. (could go a little bit south).
Top=235500, Mid=234000, Bottom=232500
Left=314150, Mid=315650, Right=317150
Open mapWindow
e.g.
Creative Labs gets into mp3 and Nomad World. Diamond Rio or Rio se, open source Snowblind Alliance Rio software (Linux, DOS, windoze).
The Dilbert Hole from /.
fiocco hurls nomo zilla new gruntle?
waider says, "Been up since April 1"
waider says, "He quit netscape and is, by some account, joining Be."
account on dspsrv.com? in Esat's web farm in Dundrum. 24x7 34MB connection to the world, UPS, all that fun stuff. Check out www.ssh.fi for details. Or ftp to 193.120.14.241 and go to /pub/crypto/ssh or thereabouts." waider says, "ssh = telnet + ssl." waider says, "Very nifty. Tres easy to set up." You say, "Brian did it apparently (Fionnuala's older brother - of ripping apart radios, washing machines, phones, ... and leaving little sister to develop fine enginertring skills when putting them back together)" waider says, "Dual IDE controller. I guess you tried swapping the disks into the CDROM connector?" You say, "soundcard ---- motherboard (with what looks astoundingly like IDE connectro but I wasn't _THAT_ brave" waider grins You say, "yep -- cdrom + 2*1.2G => 8 possible combinations" You say, "... nope + 2 connectors => 16?" You say, "or something" waider says, "Soundcard will have an IDE connector, yes." fiocco perks up his eyes You say, "interesting ... prbly the same controller that is dead but surte tis worth a go." You say, "... but ... soundcard with IDE ctrl .... Hmmm what's the BIOS bus (or whatever it's called) for?" You say, "Umm... direct CDROM-IDEbus connection?" You say, "Hmmmm ... mystifying yokes." You say, "anyway ... there was an ethernet card in the thing which they've NO use for so I pirated it >;)" You say, "networked CarMADDEGON DOOM, Quake, GTA, .... >;)" You say, "... well, some day maybe :)" waider hee. Where did they get a network card? You say, "with the PC." You say, "Fionnuala & myself bought it for them a bit ago." You say, "check this" waider says, "Soundcard with IDE -> CDROM for older machines. You can maybe use it as a disk i/f. It's entirely separate from the motherboard IDE." waider says, "You'll probably need some drivers to access it, though." waider says, "Hey, is the CDROM showing up on bootup, or is that invisible too?" You say, "PII, 2*1.2G HD, 32M, sndCrd, spkrs, 15" mon, .... for £ 350" waider says, "Wow. Cheap PC." You say, "BIOS can't handle CDROM :(" You say, "got boot floppies w sndcrd drivers so I can check it out" You say, "didn't see point of getting cdrom working w/o hard drives but I'll try that out 2nite hopefully" waider says, "Where buy?" waider says, "And what's the PII speed?" You say, "yeah ... maybe yer man knew something we didn't ......" You say, "but I don't think so" You say, "Everything was beautiful until Brian ....." You say, "Brian ..... couldn't remember passwd" waider says, "It's hard to fry IDE controllers, you know. In fact, it's hard to fry PC components in general." You say, "so ... Brian started reinstalling stuff .... and then he managed to uninstall CDROM drivers" You say, "so Brian reinstalled windoze :-E augh!" You say, "half way through this apparently everything died and now on boot only floppy is found" waider says, "Erk." fiocco screams Augghgghghghh!!!!! waider says, "He's SPECIAL." You say, "commemorated on homepages.iol.ie/~bcallan" You say, "yes ... quite special >:-E" @emit http://geocities.datacellar.net:80/SunsetStrip/Backstage/4183/Guinness.jpg is hurled at joe too. joev says, "bloody BIG jpg... 600K...." waider says, "Groovy." You say, "Bronagh might be off to Poland --- Wrocklaw ... for the next coupla years." You say, "... acksherly" waider heh. "I met her again the night you brought Daire into Bewleys." emote missed that :) fiocco missed that :) ftp and get ssh-2.0.12 CC=CC ./configure --prefix=$HOME
Speech utilities: mbrola Festival, all singing all dancing, big and too many twiddlers? say distributed with gxedit. look on freshmeat.
fiocco wields a daffodil and a scissors. waider brandishes a SWORD! fiocco throws some snarling-mud-spitting-pirahana-consuming moss at waider. waider hee. "in the other mud, I see: "AnotherBug ties off buzzard's braid with a daffodil" waider ducks. You say, "it's the season :)" waider says, "I'm thinking of hacking fighting routines into PerlMud. For amusement value." waider says, "Paper, scissors, stone would be a good one to add, actually." :) You say, "you never leave this pub ... there's prbly buckets of daffodils outside ... or will be? :)" waider buys a round of drinks. Cheers! waider hmms. dspsrv.com isn't online yet. "should be up today, hopefully." You say, "hey - kewl - are there already perlMud fighting er .. libs/source/whatever." You say, "duh - fresume so ..." waider says, "Nope." You say, "uoh - nooo?!!?" waider says, "PerlMud is supposed to be more a conferencing system than a real mud." You say, "oh" You say, "so you're gonna implement n skill levels with char attributes, weapon classes, armour, mmm, magic to complicate everything, and .... AUUghhhh :)" waider says, "I think maybe just weapons and armour class. Or maybe just weapons." fiocco would be happy with the ability to bite people in a specified body part :-E waider hee! You say, "medievia.com had a BIG list of verby things you could do like ... lick, tickle, smooch, bite, ....." say Ummm... can only Godlike persons do ... er whadyamcall them ... room commands? (emote w/o name) You say, "Ummm... can only Godlike persons do ... er whadyamcall them ... room commands? (emote w/o name)" @emit a mass of tiny green frogs start clambering through cracks in the floorboards. waider says, "that would be it." Thousands of tiny green frogs advance on waider, croaking is overpowering, the noise is incredible!! fiocco squishes a tiny green frog with his boot of redemption. tiny green frogs clamber up your leg, crawling into your boots, into your pockets, over your shirt, into your hair. Baker the tiny green frog vapouriser has entered the room. Baker whips out his tiny-green-frog-master-blaster. Baker fires his tiny-green-frog-master-blaster. waider says, "master-blender" The room is covered in a greenish mush of frog parts. Baker has gone home. Suzy the cleaning lady has arrived with her mop. Suzy starts mopping the frog goo from the pub. You say, "gosh - never create millions of green frogs .... tidying up is the hard part!"
Dilbert on linux, Melissa author arrested?, Tuxissa :)
To get a file up on iol put it on geocities, then put in a link to it, with lynx on (text.iol.ie hit d on the link - then you get save as. Can't save it if the file is just there, can't download it from ftp.iol.ie, can't log into iol.ie (users.iol.ie) (ftp site that _should_ work). All Brian's Fault!
help @odrop @link me = #97 home (to S3) Canteen, Reception @dig outside @open Outside;o = #117 Outside @desc here = You in the car-park outside the new S3 building. To the south the green windows of the Micro$oft building glare ominously in the sunshine. To the east across some fields you can see Leopardstown racecourse. To the north lies the rest of the Industrial Estate. @dig Microsoft @dig Racecourse @dig Sandyford Industrial Park Sandyford Industrial Park has been created as #121. @open Microsoft;m = #119 @open Racecourse;r = #120 @open North;n = #121 @odrop Microsoft = approches the bastion of $oftware with trepidation. @odrop Racecourse = walks across the grass getting their shoes a bit wet. Microsoft @desc here = You walk up the road on the approach to the Micro$oft building. There is a feature of modern art just by the main door - a few tall gaunt naked metal statuettes standing around a contorted metal table. It seems normal enough, yet somehow, the trickle of young flexitime employees with glazed eyes heading into the building chills your soul. You catch some disjointed phrases of speech as they pass; "We released VB dce 7.0 to devtst", "got a _reply_ from Bill!", "Orson terminated .. mutter .. Linux .. mutter". Do you: a. - flee north in terror, b. - take hold of one of the employees and beg them not to enter, c. - Storm the building. @dig Microsoft Employee #125 @dig Microsoft Building #126 @open North;a = #117 @odrop North = flees north in terror from Micro$oft. @open Employee;b = #125 @odrop Employee = grabs the shoulder of a zombified Micro$oft employee. @open Microsoft;c = #126 @odrop Microsoft = charges through the entrance of the Misco$oft building. Employee @desc here = As you take hold of one of them and halt progress towards Micro$oft the other zombie-like employees suddenly take an interest. They collect around and you are seized by the mob and dragged into the Misco$oft building. @open Microsoft;m;n;s;e;w;u;d;help;home = #126 @odrop Microsoft = is dragged kicking and screaming into the Misco$oft building. help @desc here = The entrance portal has closed behind you. The inside of the building is opened out before you, a mass of metal gantries and walkways can be seen everywhere you look, a mass of cabling and pipes follow all around the walls and gantries. The air is humid and the distant parts of the building are concealed in a strange grey mist. You are shocked to see the newly arrived employees stand against the wall and insert thick black cables into the backs of their necks. The other Micro$oft drones pay no attention to you as they go about their business carrying voluminous printouts and assorted items of cabling/equipment. Surprisingly few workstations can be seen, in fact, you can't see any from where you are now. turn this into a maze where you are attached to a wall by a gang of drones before you exit (to in front of S3)
Netsurf sends on some nice stuff.
See A Tree, See Yourself ¦
A budding DIY site ¦
Kitchen experiments/Teaching Kids to Eat Well for Life ¦
The history of dinosaurs on film ¦
SciTech ¦
Amazing Science Fun ¦
The Museum of Jurassic Technology - No Jurassic, No Technology ¦
Does Hot Water Freeze Faster than Cold? ¦
How Stuff Wks ¦
Itty Bitty Blackboard or Explore Zone ¦
The Catalyst
@dig south south has been created as #97. @link me = #97 @dig S3 @link me = #98 @desc here = You are in the reception of S3. Looking up you can see the higher floors of the building through the tall glass windows. There's a huge hybrid Dutch-Irish ethnic-type carpet hanging down from high above. Bronwyn the receptionist is busily answering phones and dispensing swipe-cards from behind her desk. @create Bronwyn #99 @desc Bronwyn = Bronwyn the receptionist, the ultimate power in S3, master of access to EVERYTHING. @set Bronwyn = female @set Bronwyn = sticky drop Bronwyn @create swipecard @desc swipecard = The card reads Visitor no. 2034, property of Silicon & Software Systems. drop swipecard @dig S3 canteen @link me = #101 home @desc here = There are many tables and chairs here and there is a Kitchen area at the far end of the room. Rosie seems to be doing something with the biggest tin of tomatoes you've ever seen in the Kitchen. There seems to be a meeting of some kind going on quietly in one of the corners but apart from that things are pretty quiet. There's a smell of biriyani and coffee in the air. @create biriyani @create coffee @dig fridge (open fridge?) @open reception;r = #97 r @open Canteen;c = #101 @link me = #0
telnet Baked mud OR more wub wub say Hullo, html iface is a bit clunky. :-7 quit ~fgoggin/bin/ptelnet www.techcentral.ie 4096 connect Fiocco knits @set me = male @describe me = You see a long-haired guy looking a bit distracted. @doing Arguing with lisp, mud.el, a firewall and ptelnet. @doing rummaging through the PerlMud rough guide. @doing Tiptoeing carefully trying not to crash the mud. A few hours? It was less than 1! I'm tellin' ye! @create PalmIII @desc palm = The palm is dull grey but eminates a strange powerful green aura. @osuccess palm = You depress the green power button and the display lights with an eiree green glow. You may enter your address. @ofail palm = Looking closely at the faded display you see: Your batteries are low, replace them immediately or you will lose your data. @set palm = book sign palm = Fiocco's address examine palm @create postcard @desc postcard = The card is green and gold with a celtic wolf pattern. @osuccess postcard = The card reads: Greetings from Sunny Bray. James. @set postcard = book drop postcard @create club @desc club = The club is wooden, VERY large and studded with the odd thorn. emote thumps waider with the club DON'T @edit! Access this URL: http://www.techcentral.ie:4196/editcode:70 TOPICS: beginner, clothing, moving, talking, building, locking, rooms, substitutions, flags, admin, rules COMMANDS: say, emote, look, read, examine, inventory, drop, get, take, quit, home, who, sign, write, help, motd, welcome, whisper, page, @wall, @dig, @doing, @create, @stats, @set, @describe, @name, @chown, @pcreate, @password, @teleport, @link, @open, @fail, @ofail, @success, @osuccess, @odrop, @lock, @boot, @clean, @find, @recycle, @toad, @shutdown, @dump, @rows, @gag, @ungag help building To create an object, use the @create command: @create Can of Cheese-B-Gone @desc can = The can is of the usual ozone-destroying aerosol type. look can inventory drop can get can @recycle can help locking @lock can = me @lock can = !*Bob @lock north = key @lock south = !(bluekey | greenkey | redkey | prize) help messages @fail north = You can't unlock the door. Guess you need a key. @ofail north = tries to open the door, but $s doesn't have a key. @success @osuccess $s is a substitution which inserts the correct pronoun. help substitutions %s subjective he, she, it, or name %n name name %p possessive his, her, its, or name's %a absolute possessive his, hers, its, or name's %o objective him, her, it, or name name %r reflexive himself, herself, itself, or name %% Percent sign % help rooms @dig Palace of Wonderful Things @link me = #XXX (Type the number @dig reports to you, not XXX) home, nowhere @desc here = Welcome to the Palace. Try the trapdoor down or press the button. @open down;d = #0 (Or the number of a room set link ok on this MUD) @desc down = A trapdoor in the floor beckons you downwards. @open press button;button = home Note that you can use the @link command to change the destination of the down exit, or any exit, at a later time. @link is also useful to set the home of your objects. help flags @set me = male @set me = !dark dark Contents of room not visible (except to "examine") male Character is male (for pronoun substitutions) female Character is female (for pronoun substitutions) linkok OK for anyone to link exits TO this room jumpok OK for anyone to teleport to this room buildok OK for anyone to link exits FROM this room sticky This object goes home immediately when dropped puzzle If set for room, force drop all on "home" or "@tele" abode OK for anyone to set their home to this room grand This room is huge; entrances, exits are silent book Anyone can "sign" this object, adding text wizard This player is a wizard (#1 is always a wizard) expert If set, you must type a " before things you say spy Tells you who really said something builder The player is permitted to build things and rooms
GPS at brekkie + linux car mp3
vqf mail to soundvq@emi.yamaha.co.jp for linux port of SoundVQ.
Check wired + linux car audio system.
MP3 Rocks the Web ¦
Linux On Board ¦
Empeg ¦
Ryan Veety's homemade MP3 player ¦
Jason's ¦
nipping at heels of mp3
comp.compression faq ¦
mp3 tech ¦
mp3
TwinVQ (Transform-domain Weighted Interleave Vector Quantization) ¦
TwinVQ english ¦
TwinVQ tech? (nihongo) ¦
NTT human iface labs ¦
yamaha XG ¦
vqf audio player Soundvq ¦
Portable TwinVQ player ¦
search on NCC
twinvq compression technology (Nihongo) ¦
Search AltaVista
Car Insurance. Coyle Hamilton will give a quote online.
Fiocco | attributes location family tree obituary Get world stats |
Cool! Create Fiocco creature on the Technosphere. see faq |
Book the screen! Doras Dublin cionema listings The screen La Vita e&thingy Bella
gnu gps? rsynth, gnu speaker too? see comp.sound
Looking for phone dialer on palm ... hacktut grep for Omnibox, Fear's Phreaker Tools, Windows Phreak, etc.
Hey, I should look for origami Tuxes.
2 online penguins ... they're not cute though when made with A4. Now say I make them with a tiny sweet wrapper ... they could manage some cuteness then. We shall continue experimentation. From index at: The Garden of Origami (from Jasper's Guide to Paperfolding Instructions On the Web) Ian Mitchell's penguin Perry Bailey's penguin
VB links VB zone hisssssssssssss M$ VB we seem to have: M$ cce 5.0 (without make)
What the hell are use-cases for anyway was posed last night. UML zone rational UML Behavioral elements package: Use cases Overview
Let me [Ivar Jacobson] give you a concrete pattern of interaction: One morning when I woke up with a terrible
headache after having had a nice evening being at a number of jazz-clubs having had a beer --
or ten. I met Grady [Booch] and we created an interaction instance, where we all FIVE were
participating objects. I said: Let me propose that we get rid of those use cases. I have never
really understood them anyhow. Then Jim [Rumbaugh] rose to his feet. By the way, before starting to work
with Jim people told me that he was a square. But that is not at all true, that is false. He is more of
a --- more of a rectangle.
Jim said: Nonononono, which actually means YES. Let us simplify UML by removing the use
cases. Grady said: "No, if you think of it, the only thing we need to do when developing software
is to give the users the use cases they need." "I will put a stake in the ground. I will go as far as
saying that the only thing we really need are use cases -- even if they are not everything."
Grady now became impassioned. As you all know Grady has always has his head in the
"clouds", no I mean "clouds" in his head, no I mean.... Well, anyway, he went on: "And you
know we have an excellent notation for use cases. As Ivar suggested he has never really
understood use cases, so I suggest that we draw use cases as clouds." This was too much for
Jim so he said: "No way. Remember what happened last year at OOPSLA. I sang a song about
how I got rid of the clouds, and everyone loved it. Don't bring up the clouds again!"
The overall OMT strategy of system development is as follows: 1.Conceptualization: Conceive a problem to be solved and a system approach that solves it. Make an initial cut at the problem statement by writing use cases or listing requirements. 2 .[CHOP] *** quickly capture system requirements *** Use Cases One way to capture a user's view of a system is to construct use cases of the system. A use case is a category of interactions between the system and an actor (an outside object in a particular role) about a particular way or purpose of using the system from the user's point of view. Each interaction starts with an initial event from the actor to the system and proceeds through a series of events between the actor, the system, and possibly other actors, until the interaction initiated by the original event reaches its logical conclusion (this is a matter of judgment). Some people use the word "story" to emphasize that a use case has a beginning, a middle, and an end. A use case is best specified informally in words. An overly formal approach defeats the purpose, which is to quickly capture system requirements from the user's point of view. State the purpose of a use case, the actors involved, the initial event that starts it, and the termination condition. The sequence of interactions can be specified in words or by one or more prototypical scenarios. Each prototypical scenario represents a separate branch case. It can be described by a series of text phrases, by a scenario diagrams (formerly called an event trace diagram), or by an object interaction diagram. Follow these steps to produce a use case: 1.Determine the boundary of the system. Determine which objects are part of the system, which ones interact with it, and which ones are disconnected from it. Develop the use case by considering the system itself as a single object, that is, a black box. 2.Determine the actors that interact with the system. An actor is one role that outside objects play with respect to the system. Start by examining physical objects that interact with the system, but in many cases each one plays multiple roles. For example, a given person might be a User, an Operator, and an Administrator of a computer operating system. Each role is a different actor. 3.For each actor, determine the fundamentally different ways in which the actor uses the system. Each of these is a use case. You must be able to enumerate the use cases. If you have too many, approach things at a higher level. 4.Identify the initial event that starts each use case. 5.Determine the termination condition that concludes the use case. Often a use case can be approached at several different levels, so pick the level of detail that is compatible with other use cases in the system. 6.List a prototypical scenario that describes the typical transaction. 7.If there are variations, list additional prototypical scenarios or describe the variations in words. Feel free to use ordinary language; a use case is not meant to be highly formal. 8.Identify and describe all the exceptions that are logically associated with a given use case. When you are done, check that the set of use cases encompasses all the functionality of the system. [CHOP] Analysis Macroprocess Analysis is the careful examination of the requirements for a system with the intent of understanding them, exploring their implications, and removing inconsistencies and omissions. The end products of analysis are the true system requirements. [CHOP] 1.First build a domain model that captures real-world classes and relationships in the problem domain. [CHOP] 2.Then build an application model on top of the domain model. The application model is driven by the use cases and problem statement. [CHOP]
Lego
Mindstorms in Education
Lego Mindstorms Internals
Grep for MSC specs, SMS spec, SCP Spec & docs, MsgCats, Volumes, for IFM stuff Hmmm, IN stuff not done by Lucent & not standardised? Hmmmm.
Feb 11
Search Yahoo telecomms Ireland world.
mail/mail/mail/tcl info - damn tcl seems very commercial at scriptics and even freeware?ish tcl consortium. Looking for tcl/tk resources, expect does seem quite good.
Looking for pinouts of suns (serial) found datasheets but not exactly what I want. Peripherals, PC rs232, sun datasheets, rs232, HwB is da biz.
*rummage*
http://music.lsds.com/
http://music.lsds.com/archives.shtml
http://www.olga.net ? broken ? slow anyway
http://www.harmony-central.com/
http://www.harmony-central.com/Guitar/
http://www.harmony-central.com/Guitar/tab.html (search/browse OLGA) +
e.g. http://olga.skynet.be/olga/main/
Young Scientist's patent dilemma
Young Scientist of the Year Sarah Flannery caused quite a stir on tech websites as news of her mathematical encryption code filtered through. Her formula, a public-key algorithm based on 2 X 2 matrix systems, exploits the fact that multiplying matrix A by matrix B usually produces a different result to multiplying matrix B by matrix A. The new system could be as much as 30 times faster than the current RSA data protection algorithm, created by three students at MIT in 1977, and equally secure - although independent tests have yet to be carried out.
She has named her algorithm the Cayley-Purser, after Arthur Cayley, a 19th-century mathematician, and Michael Purser, a cryptographer who inspired her. She remains unsure whether she should patent it or give it away for free: "It's good to share your ideas with the science world. By patenting it I'd be hindering that process," she's quoted as saying on ZDNet, (www.zdnet.com). "God Bless this kid for not patenting her discovery," wrote one contributor to a message board on the topic. The reaction of most people contributing to the forum has been less altruistic however. "If she's reading this then the message is simple - patent the formula. You're a genius and you deserve to be paid for it," summed up the feelings of many.
Student Discovers New Public Crypto Algorithm
What was once buried in obscure corners of mathematical journals is today making international headlines. Sarah Flannery, a 16-year-old Irish student working in a student placement program at Baltimore-Zergo, an information security firm, discovered what looks like a new version of a public key encryption algorithm. The media, as is their habit, are going overboard, calling Sarah a genius and elevating her to international stardom. Somewhat more circumspect crypto professionals note that the algorithm is not yet well tested, though they find it intriguing because it's much more efficient than the current RSA public key standard. Technical details about Sarah's technique, called the Cayley-Purser algorithm, are hard to find at this point. Baltimore-Zergo offers some information in a press release, but the more interesting discussion is going on in the sci.crypt newsgroup - ask there for further references.
Grep sci.crypt in DejaNews for Cayley-Purser
What's that Baltimore-Zergo guff? (links to the same article) Baltimore - Zergo
In fact .... Crypto news?
back to home |
This page hosted by
Get your own Free Home Page |