Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Hand-translate your program to assembly

Name: Anonymous 2014-12-03 12:55

Never waste a single cycle

Name: Anonymous 2014-12-03 13:10

what happened was, Microsoft eventually released a platform for mobile devices that was much faster than ours. OK? And I started going in with my debugger, going, what? What is up with this? This rendering is just really slow, it's like sluggish, you know. And I went in and found out that some title bar was getting rendered 140 times every time you refreshed the screen. It wasn't just the title bar. Everything was getting called multiple times.

Because we couldn't see how the system worked anymore!

Small systems are not only easier to optimize, they're possible to optimize. And I mean globally optimize.

So when we talk about performance, it's all crap. The most important thing is that you have a small system. And then the performance will just fall out of it naturally.

Name: Anonymous 2014-12-03 17:46

Name: Anonymous 2014-12-03 19:18

>>3
It's the post all the assembly nuts should read and memorize by heart. Especially the part where he worked in an x8086 shop for five years and it all turned out to be useless because low-level optimizations are shit.

Name: Anonymous 2014-12-03 19:30

>>4
Steve is a shit programmer and x86 is an abomination. There is such thing as good assembly language.

Name: Anonymous 2014-12-03 19:38

But it's already written in assembly!

Name: Anonymous 2014-12-03 19:58

I wish. It's machine code.

Name: Anonymous 2014-12-05 6:07

>>3
There are some advantages to using a higher level language. For instance using a lexer and parser generator is more maintainable (read: easier to modify after it's written) than using a hand written lexer and parser. But if you can write it in C, you can write it in assembly. The only disadvantage is portability, which is enough for me to prefer C over assembly.

Name: Anonymous 2014-12-05 12:15

>>8
disadvantage is portability
you know relevant systems of today all run x86 and other support it through emulation. So you can see, that x86 will always be supported, even 100 years in future.

for example,
http://www.phoronix.com/scan.php?page=news_item&px=MTU5ODU

Name: Anonymous 2014-12-05 12:18

Try to write a generic fold in Assembly.

Name: Cudder !MhMRSATORI 2014-12-05 19:12

>>8
For instance using a lexer and parser generator is more maintainable (read: easier to modify after it's written) than using a hand written lexer and parser.
Bullshit.

Name: Anonymous 2014-12-05 20:18

>>11
Shalom!

Name: Anonymous 2014-12-05 22:31

>>10
Try writing a memory allocator in Haskell.

Name: Anonymous 2014-12-05 23:35

>>13
Try writing something sensible in PASCAL!!!!!!!!!!!

Name: Anonymous 2014-12-06 23:31

I wrote fibs using vacuum tubes when I was 12.

Name: Anonymous 2014-12-07 0:38

http://rt.com/news/211959-france-blocks-pirate-bay/
In addition to the main site address, the court banned around 20 mirror websites and 50 proxy servers that allow users to download content from the Swedish site.

http://rt.com/usa/206371-facebook-google-nsa-surveillance-congress/
However, there has been some criticism of the encryption. The announcement raised the ire of FBI Director James Comey, who complained in late September, saying it would hinder law enforcement operations.
"There will come a day – well it comes every day in this business – when it will matter a great, great deal to the lives of people of all kinds that we be able to with judicial authorization gain access to a kidnapper's or a terrorist or a criminal's device,” he said. “I just want to make sure we have a good conversation in this country before that day comes.”
“I'd hate to have people look at me and say, 'Well how come you can't save this kid,' 'how come you can't do this thing.’”

http://rt.com/usa/202647-fbi-computer-search-warrants/
“Law-enforcement investigators are seeking the additional powers to better track and investigate criminals who use technology to conceal their identity and location, a practice that has become more common and sophisticated in recent years. Intelligence analysts, when given a warrant, can infiltrate computer networks and covertly install malicious software, or malware, that gives them the ability to control the targeted device and download its contents.”

http://rt.com/usa/188760-apple-nsa-police-spying/
“Our ability to act on data that does exist… is critical to our success,” Hosko said.

However, although Apple users will be happy to know their information is better protected than ever, forgetting a password could prove to be an even greater nightmare than any government intrusion of privacy.
lol

http://rt.com/usa/188900-android-device-encryption-nsa/
Niki Christoff, Google’s spokeswoman, said the company has offered encryption on Android devices for over three years, but few users knew how to use the feature.
“As part of our next Android release, encryption will be enabled by default out of the box, so you won’t even have to think about turning it on,” said Christoff, as reported by the Washington Post.

http://rt.com/news/188052-german-spyware-wikileaks-journalists/
The whistleblower has a list of FinFisher surveillance software buyers. Among the German malware developer’s clients are intelligence agencies and police forces from Australia, Bosnia, Estonia, Hungary, Italy, Mongolia, the Netherlands, Pakistan and Qatar.

http://rt.com/usa/168416-scotus-riley-cell-search/
“The police generally may not, without a warrant, search digital information on a cell phone seized from an individual who has been arrested,” the Supreme Court ruled.
wow this is surprising.

“It’s the equivalent of a closet that can’t be opened. A safe that can’t be cracked,” Comey, speaking at the Brookings Institute in Washington DC, referred to the encryption technology calling the new service “a marketing pitch.”
“But it will have very serious consequences for law enforcement and national security agencies at all levels,” he warned.
“Criminals and terrorists would like nothing more than for us to miss out,” Comey said, adding that encrypted information on “a bad guy’s phone has the potential to create a black hole for law enforcement.”
"Justice may be denied because of a locked phone or an encrypted hard drive," he said.
“Some believe that the FBI has these phenomenal capabilities to access any information at any time—that we can get what we want, when we want it, by flipping some sort of switch,” he said. “It may be true in the movies or on TV. It is simply not the case in real life.”
The FBI director would like to see changes made to the Communications Assistance for Law Enforcement Act, or CALEA, “enacted 20 years ago—a lifetime in the internet age.”
Companies like Apple or Google, should be required to build lawful intercept capabilities for law enforcement, Comey says.
“We aren’t seeking to expand our authority to intercept communications,” he said. "We are struggling to keep up with changing technology and to maintain our ability to actually collect the communications we are authorized to intercept.”
CALEA only covers landline and cellphone companies, broadband services or internet phone services, which connect with traditional phones.
“We also need a regulatory or legislative fix,” Comey said, “so that all communication service providers are held to the same standard.”

Name: Anonymous 2014-12-07 0:40

Name: Anonymous 2014-12-07 2:17

Name: Anonymous 2014-12-07 2:27

>>18
Make all kinds of private communication using computers illegal then. Easy enough.

Name: Anonymous 2014-12-07 10:55

>>16
Enjoy your total surveillance and the Big Brother, losers.

Name: Anonymous 2014-12-10 14:52

There's no need to hand-translate to assembly. You can use Haskell in the demoscene:

https://www.youtube.com/watch?v=-qISxjnikJ4

This demo has gotten 3rd place in Experience.

Name: Anonymous 2014-12-10 21:13

CHECKEM

Name: Anonymous 2014-12-11 14:15

>>21
What a piece of shit.

Don't change these.
Name: Email:
Entire Thread Thread List