Jump to content
Search In
  • More options...
Find results that contain...
Find results in...


  • Content Count

  • Joined

  • Last visited


This user doesn't have any awards


About WanderingFool

  • Title
    Junior Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. The thing to note is moving from the standard 2d gates to a 3D structure requires more initial investment (R&D and building the factories, as they may require new equipment to be built). So while the initial cost of such products might be higher than consumer grade stuff, the fact the density decreases will have benefits to the consume *down the road*. The way to look at it is like, what is the major cost of making flash? It isn't the lithography, but the purified silicon wafers. So the more you can build out of a single wafer the cheaper things become. Although someone can correct
  2. Perhaps it's been too long since my algo classes and graph theory, but is there additional information for the problem? Say each location is a vertex, so you have n vertices. How are they connected? Are the edges (paths/roads) connecting two points a-b defined already/are there one way edges? I could be wrong, but I would imagine there might be a way to set this form of a question up as a flow network. If this could be setup as a flow network (in polynomial time), then it may be a polynomial time (Minimum-cost flow problem). I hope this helps, or at least sparks a bit of insi
  3. I was hoping there would be some method like grub which would work, but I don't think it can. The issue is the 3 computers use different CPU architectures, so it isn't as simple as just installing it 3 times. My problem is one of the PC's doesn't have boot from network (needs to be esata), and the other doesn't have an internet connection.
  4. Hopefully someone can help me figure this out, as this is a bit of a different situation and I have been having troubles finding out if this would be possible. So to make the overall goal as short as possible the following is what I am trying to do: 1 ssd, 3 different computers with 3 different hardware specs (1 without internet access) The goal is to install ubuntu 14.04 onto 3 different partitions, and have it so each machine has a partition that it can boot from (manually selected by the user). Effectively my use case would be, I bring the SSD to the computer, plug it in via a
  5. The way I look at it, copyrights should only really belong to the entirety of the work and no API's. Yes you could make the argument that complex API's should be copyrightable, but my argument is it is about the implementation of the API's. Otherwise things like WINE would not exist (if Microsoft wished it)...or even emulators (they are emulating or reimplementing portions of the game hardware's API)
  6. Well in the case of getting trapped in walls, this actually starts getting into how you decide to implement your physics. You could make it so when you detect a collision when traveling right you only block moving right (and not left). With similar concepts for up and down. This actually means you could travel through walls if you are spawned inside of them (ie you don't get trapped). Another option would be to block the movement before you collide with a wall...ie. instead of using x, and y make a tempx and tempy which has the position if you were to move. tmpX = x + cos (angle) *
  7. So there are a few things regarding collision to be mindful of. The first is the width of the object, and the second is where the origin of the image is. e.g. is the x,y coordinate of the player actually the bottom left, center left, top left, bottom right, bottom center...etc. I will assume for this purpose the bottom left is the (x, y) coordinate of the player (you could adjust accordingly) So now this becomes a simple collision detection of rectangles. The important thing here is there are 4 points on a rectangle, and you currently are only checking a single point. So here
  8. The passwords are actually hashed passwords, so the attacker would also need to brute-force to get the password. To be honest, I agree with Microsoft in that it is a bit overblown. The fact is the attacker would have to have to be inside your network in order to really do anything, and I bet there are countless other vulnerabilities you could exploit to do more damage.
  9. Well as SSL said, flood fill is probably the easiest (assuming you use recursion, personally I dislike using recursion on this type of problem because if you get 1000x1000 with all 0's you actually will end up with a stack overflow...but that is beside the point, since you are learning use recursion...and if you come up with a solution and have free time try implementing flood fill without recursion (using stacks)). To address the "color", "color" is just meant as a way to distinguish that you have already processing a point. So if you know the values inputted are always 0 and 1, then you
  10. It would be very simple to automate the process Yes he only shows deleting his video, but if you notice he shows deleting his video through a browser that isn't logged in as him. He used the identifier from the url as well as the session token from the browser he was not logged into. So it would have been simple to run a script saying delete all videos...or at least automate it so you could delete the videos you want (ie putting the url into a program and having the program delete the video)
  11. ZeferiniX Just a quick note, padX and padY are never used. Why not try (also set padX and padY to equal what the x and y equal at the beginning) int startx = ((int)padX) / 2; int starty = ((int)padY); int endx = ((int)padX) / 2 + 150; int endy = ((int)padY); *Sorry I don't have enough time to figure out if this solution works, just as a note of where to go
  12. The only thing I would add is the work it out by hand method. If your program isn't working find a simple test case where it fails. Then go through each step by hand, and see whether you get the same "wrong" output. If you do, you will learn more about your program, and if you get the right result you can revert to the print statements to figure out where you have gone wrong.
  13. alphabeta Personally I would still try approaching this problem without using regular expressions. The reason I say this by using things like regular expressions to solve these problems is you don't learn necessarily how to program. You can know a language, but to me programming is about how you approach problems and how you build your solutions. While knowing regex is good, and in general this would be an ideal real world solution, you aren't really learning too much by using regex in this case. Here is my ansi c version of a solution (Sorry I am into java right now, so I am not com
  14. I disagree, they do not make money off the video being played. They make money off the ad being played, and that creates a problem when channels start disabling ads while doing their own sponsor spots. Remember even though youtube still had ads when google bought it, the ad revenue wasn't enough to make it profitable. All of that said, I am not sure how I feel about this. What should google do then?
  15. Well that is what you get when you try compiling java code as c. It just won't work (System.out.println is java ) To @airfrog19 Clock is an abstract class, which means you can't just create a clock. Try something like LocalTime clock = LocalTime.now();System.out.println(clock.tostring()); //Might have missed a capital or two