Hacker Newsnew | comments | show | ask | jobs | submit | teaspoon's comments login

Are you talking about things like sensor noise and chromatic aberration? It would be interesting to see if downsampling the image beforehand affects the result.

However, it's hard to separate image patterns from camera structure insofar as linear projection is a result of camera structure.

-----


I was thinking about CFA mosaic and JPG compression, I think these may introduce some axis aligned artifacts. But maybe they took it into account (using raw format?) or effect is not relevant in this case.

-----


Even in raw format, all digital cameras apply some amount of sharpening [1] even when the setting is "off" in the camera menu. Also, all raw format conversion software (Lightroom, Capture One, etc.) applies sharpening by default.

I could imagine that a sharpening algorithm could transform a random distribution into something with structure. That the authors appear to not reference camera or image sharpening anywhere in the paper is somewhat worrisome.

[1] http://en.wikipedia.org/wiki/Unsharp_masking

-----


That rule doesn't hold for some languages. For example, a Python lexer needs to remember a stack of indentation levels to know whether a given line's indentation should be tokenized as an INDENT, a DEDENT, or no token at all.

-----


True. Strictly speaking, that means it isn't context-free in the usual sense (right?), but it's a practical extension.

Matt Might uses Python's indentation as a lexing/parsing example in his ongoing "Scripting Language Design and Implementation" course (http://matt.might.net/teaching/scripting-languages/spring-20...), which is worth following if you're reading this thread.

-----


None of these demo binaries will actually run on my OS, so maybe the extra 768 bytes are a fair tradeoff for abstracting away the platform.

-----


These binaries will run on your OS if you install the corresponding runtime (DosBox or similar actually).

Interestingly this runtime happens to be way smaller (2MB) than Firefox, Chrome or even Safari.

-----


now we just need to write google search, google maps, facebook, twitter etc for dosbox, some type of linking mechanism, have it installed on all computer by default and we are sorted!

-----


Most demo competitions do not assume you'll require internet connectivity at all, so that won't be required ;)

I understand your irony and do agree that using standards of today is expected.

This doesn't remove any validity to the OP point that what we use today (apart from WebGL or other hardware accelerated code) is several orders of magnitude behind what was already there 10 to 15 years ago.

I do hope though that we'll see more and more widespread/standard techniques to grab back a bit of speed there without only counting on Moore's law :)

-----


There's DosBox for the iPhone now?

-----


If you're not living in Apple's wallen garden, it seems so:

http://litchie.com/blog/?page_id=123

-----


Stephen Lavelle's Platonic Archetypes of Dice is a Pokemon-style Flash game based on this Rock-Paper-Scissors-like quality of differently distributed dice.

http://www.increpare.com/2009/11/platonic-archetypes-of-dice...

-----


This reminds me of Neil Gaiman's "George R.R. Martin is not your bitch" essay, about reader entitlement:

http://journal.neilgaiman.com/2009/05/entitlement-issues.htm...

-----


I agree, but only up to a point. When a book is advertised as part of a series, that is in effect a promise that there will be a series. Otherwise it's false advertising.

-----


Why should I care that the company is Swiss? The point of client-side encryption is that I don't need to worry about who's hosting my data or what jurisdiction they're under.

-----


See, for example, Hushmail, which has no option but to cooperate with correctly formed legal documents. This means that they use the passphrase (which they can capture within a short time) of the non-java-applet version of their software, or they serve a modified applet.

Being in a different jurisdiction provides a small amount of protection.

-----


I wonder if parent was merely advocating obfuscating sensitive data so that engineers don't accidentally see things like "Downsizing-2012.xls". As long as the obfuscation is reversible, the data is still there for those who need it.

Of course, encryption per se is overkill for that. Something like ROT13 would do the trick.

-----


If you're going to obfuscate reversibly, it is much better practice to use strong obfuscation and log (irreversibly) any time the raw data is accessed so there is an audit trail.

-----


  :w !sudo tee %

-----


And here's the little mode-specific map I use:

cmap w!! w !sudo tee % >/dev/null

-----


The OP says that double-spacing is an obsolete holdover from the typewriter era, where the extra space made monospaced type easier to read. I'll go one further and say that spacing sentences using space characters -- any number of them -- is obsolete.

In the present era, the act of typing is separate from the act of typesetting. The comment I'm typing now may be typeset in Arial in Chrome, typeset in Ubuntu Mono in Emacs, or read aloud by a software program to a blind person. No prescribed number of space characters is going to be appropriate for all cases.

The reading software, not I, should be responsible for locating my sentence breaks and setting appropriate spacing there. Perhaps in the future we'll assist the software by marking up sentence breaks using a special character sequence. Ironically, a double-space would serve that function pretty well.

-----


Because the subject of the sentence is "a startup founder", not "Jason Cohen".

-----


It's always irritated me to see the use of the word "her" because of the blatant political-correctness of it. If you want to be PC, use "their".

-----


So we can only use "his" or "their"?

-----


You don't like implied political correctness. OP doesn't like implied gender bias. I don't like grammatical convolutions like using "their". What's to be done?

How about focusing on the message?

-----


> what's to be done?

use "their"

-----


constantly using "their" when reading anything that remotely resembles a story gets old pretty fast.

-----


Then use 'their'.

-----


This particular (hypothetical) startup founder happens to be singular, and female.

-----


https://secure.wikimedia.org/wikipedia/en/wiki/Singular_they

-----


That's the exact opposite of the situation. I pointed out that the founder is singular and female, but the "singular they" is used for indeterminate number and/or gender.

-----

More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: