Closed. This question needs details or clarity. It is not currently accepting answers.
Want to improve this question? Add details and clarify the problem by editing this post.
Closed 9 years ago.
Improve this question
Does the current Linux kernels implements some form of page coloring when assigning virtual to physical address mapping?
Arka
No.
Linus said:
there have been at least four different major cache coloring trials
for the kernel over the years. This discussion has been going on since the
early nineties. And none of them have worked well in practice.
Reasons are that it adds too much cost to the page free/page alloc paths, and it's pointless
because caches have become associative so that there is no need.
Related
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 4 years ago.
Improve this question
I would like to plot the CPU and memory usage of an application on linux vs time. What is the best way to do this?
Would greping these values out from top every 0.1s and writing them into some file work - or is there a better and easier way?
There is an easier way. All of the information displayed in top can be found in /proc/<pid>/, most of it in /proc/<pid>/stat. man proc describes the content of these files.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
What are applications where search techniques or more specifically planning techniques are used? I am most interested in examples in use.
I know that A* is used for path planning in Robotics, that planning is used in logistics (details would be great) but what other usages are there?
For Search in general Google, etc come to mind with their inverted indices. Again, where else is it used?
For planning examples, including logistics challenges, take a look at this list. Each use case comes with multiple datasets and a problem definition.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 6 years ago.
Improve this question
i have a problem with my website and that is someone make tremendous amount of fake comments and when i explore the comment details i realize that these comments generated from different locations around the world with different IP addresses . i assume that this cant done by peoples or different computers around the glob , i'm sure it's accomplished with a programming job . my question is not about how to prevent this , i'm asking HOW he/she generates fake IP addresses ?
To distill the answers out of the comments (in order of most likely case):
"Anonymity networks" like Tor etc.
Anonymous proxy
Botnet
Forged/Spoofed IP address
there are some more, usually a bit more "far fetched", options left out in this answer because these aren't likely used to spam comments.
Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 12 years ago.
Improve this question
Conceptual question, just out of curiosity:
What is less taxing on the graphics processor: Anti-aliasing (2x? 4x? Higher?) on a typical desktop machine (around 120-150dpi) or to drive a hi-density (>300dpi) screen without anti-aliasing? This question could pertain to both desktop systems and embedded (smartphones). I'm interested to see the responses!
Neither usually, since font rendering and AA is done by the CPU (though you can use GPU features to blur). And then it depends on the font rasterizer and how good or bad it was implemented. It also depends on how AA was done, whether a matrix blur was applied, an FFT, or a simple render-bigger-and-bicubic-downsampling was used. Only runtime tests can show.
Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 12 years ago.
Improve this question
How would you go about securely destroying several hundred gigabytes of arbitrary data as quickly as possible?
Incinerating hard drives is a slow, manual (and therefore insecure) process.
Physically destroying the drives does not (necessarily) take a significant amount of time. Consider, for example, http://www.redferret.net/?p=14528 .
I know the answer but this seems like one of those questions best left unanswered unless you know why it's being asked.