Red Hat has apparently also understood the necessity of real-time in financial trading – FSMLabs main current focus. Unfortunately for them, they are using inappropriate technology as shown by the over 1.2 million lines of code that they boast has
Net neutrality and real-time
British Telecom breaks with the party line. This is the intersection of a business/political dispute about what business telecos should be in and a technical issue of QOS. Traffic shaping is a blunt instrument for QOS and part of the
Security cannot be improved by waving flags
Via Schneier comes a story about the US Navy and a disgruntled contractor who just plead guilty: He confessed to programming malicious software codes into computers that track Navy submarines in May 2006 while in Naples. He told Navy investigators
Enterprise file systems
This discussion on file systems and this one on virtual memory are good starts. See also the extent-like UFS paper and this.
Transaction costs are good: software patent debate continues
Don Marti is asking the wrong question when he writes: The question is where you draw the line of what is or isn’t patent infringement. If Victor invents something, and I describe it in prose, I’m not infringing. If he
Enterprise operating systems
Can anyone name a single feature of “enterprise†operating systems available today that was not already working in VMS or Solaris or SGI’s system 10 or more years ago? Multi-processor support – practically prehistoric. Here’s a wise observation: â€Since the
Software patents are so different from circuit patents (really!)
Updated (and again, and even again – below) It should also be recognized that circuit arrangements are typically designed and fabricated at least in part using one or more computer data files, referred to herein as hardware definition programs, that
Low wage programming
Greenspan did put forward a proposal on how to reduce the growing inequality of incomes in the United States — admit more skilled immigrants into the country. The former Fed chief said that increasing the number of immigrants with sought-after
Watering down computer science, Java, and feminism
This old note by Spolsky explains why the shift to java-only in computer science classes is harmful and reminds me of two events in my old career as an academic. One was when a student came by my office to
Difference between theory and practice in security and reliability.
Theory of how F-22 Fighter software is going to be made bulletproof. Practice. Update: More practice (noted by Ben_k on Bruce Schneier’s weblog). Update2: See this paper and this one.