Skip navigation

Tag Archives: COMPUTERS

A few weeks ago i stumbled upon Scott Aaronson’s post called “The Toaster-enhanced Turing Machine”. As you might guess from my title, i misunderstood what it meant. But, actually, i really liked the thing i understood instead, so i’ll post my own version. Which is:

A Turing-machine enhanced toaster is just a Turing-machine.

Read More »

Besides overusing a certain vowel, there is something in common between the Wii and the iPad which one seldomly sees mentioned: They are both all about an input device. Of course something like that should not be without consequence…—

I know i did just come up with another explanation for it, but consistency is the hallmark of etc. Anyway, i was reading one of those things from hckrnews and this quote:

Software development obeys the laws of entropy, like any other process. Continuous change leads to software rot, which erodes the conceptual integrity of the original design. Software rot is unavoidable, but programmers who fail to take conceptual integrity into consideration create software that rots so so fast that it becomes worthless before it is even completed. Entropic failure of conceptual integrity is probably the most common reason for software project failure. (The second most common reason is delivering something other than what the customer wanted.) Software rot slows down progress exponentially, so many projects face exploding timelines and budgets before they are mercifully killed.

sparked the conjecture:

Worse is better protects from bit-rot/entropy.

As in it avoids uncool complete code, that must be there but no one would really trigger or read. As it tends to keep each piece of code small and hardy.

But maybe not.

Enhanced by Zemanta

A guy from USAF talking about windows (through OSnews):

They’re still in the model that they want to give all the features enabled to clients, but I think we’ve reached a point where that model is one that is no longer effective. I’m of the opinion that all products ought to be configured with these locked-down configurations, and if the customer decides they want to undo them, then they can do that. They cannot continue fielding products where the cost that is being borne by the consumer in terms of having to maintain configurations and deal with attacks is so high.

This underlines a very important issue, to which i still don’t know which words to apply, so let’s begin by that: the act of configuring a computer has a cost. Read More »