Sunday, October 31, 2010

Logic Screening Test

  1. Overconfidence undermines me, I thought the Procter and Gamble test would be fairly easy, the matter of fact is that it wasn't, I reckon I had at least half of the 15 questions presented but I'm not sure about the rest. Gosh , luck for the next time pal. Tough they were interesting puzzles, I'll spend time once in a while to become more proficient at them.

  2. I can survive without eating for several days, but my stomach seems to resent that lack of food producing so much acid, got to find a way to reduce that acid production. The issue is that acid plays an important role in keeping infections at bay, so maybe I must eat something that stays in my stomach for a long time before being digested or protects my stomach interior walls.I'm doing this out of discipline, nothing else is involved.

  3. Got my micro-processor to produce less heat by disabling the compiz window decorator in ubuntu. At last I can set the cpu governor to on-demand and get more cpu cycles to make things more efficient in my system.

  4. The Bluetooth technology makes an economic use of power by putting on standby the connections that are not being actively used. When a bluetooth enabled device seeks communication with a neighbor it does so by sending a train of packets and an association can take up to 10 seconds - that's an eternity -. A connection established this way is called a Piconet and the device that seeks the communication in the first place takes the role of the master. This master can have an active communication with up to 7 slaves at the same time. Nevertheless slave devices that are put in stand by mode can make up to 255 which are controlled by a single master. A node can be part of more than one piconet and can serve as a bridge between the two piconets in order for the master to communicated with the other piconet. The bluetooth protocol header is more simple that the one used for wifi, the important thing is that it holds an identifier for the device sending the packet. Authentication of devices is left to the programmer.

  5. Propaganda ain't such a bad term, it's basically the diffusion of an idea which is deemed to be true. Eduard Bernays is on the way to become my hero for discerning all this stuff. I wish I had such amazing insights.

Words of the day:
triffling -> not worth considering
contrive -> make or work out a plan for; device
Rückgängig -> to undo, to cancel

Saturday, October 30, 2010

Kerberos Dialogue

  1. I found a splendid dialogue "theater style" to explain how the Kerberos authentication protocol works, it was written in the 80's but the foundations haven't changed that much. I'm doing some translation work along with the google translation service and the open office syntactic and grammar tools, I pretend to give a presentation at school based in this script, it will be different but If my classmates get to understand the intricacies of the protocol it will be mission accomplished.

  2. Physical exercise combined with healthy food helps you keep a sharp mind.

  3. You can create a virtual network out of blue-tooth devices.

  4. The Procter and gamble reasoning screening test looks easier than I thought, I'll do it tomorrow.

  5. Heartless is a decent horror flick.

  6. Multidimensional databases help you keep track of the history of the database changes so you can examine trends and apply data-mining more effectively.

Word of the day: zurücksetzen -> restart

Thursday, October 28, 2010

On helping others

  1. I though that helping others would help me increase my self esteem and it worked. But I can't help but feeling guilty, if I always try to help someone at the slightest sign of trouble, aren't I taking something from them? I mean, if I let them alone, maybe they'll come up with a solution themselves and they'll grow and won't need me at all , I think that's a greater sign of love, but the price is too great to pay : loneliness, isolation. Maybe there's a point in between, just need to find it. How do parents raise children?, mine just let grow alone like a plant, and I think I'm not that spoiled...mmm not quite, I'm so confused and tired.

Wednesday, October 27, 2010

Classifier Systems

  1. We're having a first approach to data mining, I deem it a very interesting area . I thought databases weren't my thing at all, but I'm starting to regain some of the enthusiasm I lost along the way. Classifier systems with help of some really neat artificial intelligence tricks can identify among a huge collection of data, subsets that share common characteristics in such a way that we can draw a vast variety of conclusions and take the respective decisions if they're in order.

  2. We had a review of the Huffman compression algorithm. Marco showed us his advances regarding his implementation of the algorithm within the FPGA, it seems that the biggest challenge was to fit the required tree needed to do the codification inside the tiny FPGA memory module. He's dedicated about a year on his project and he's about to present it at a congress.

It was a slow day, nevertheless I'm feeling tired, something's wrong with me.

Tuesday, October 26, 2010

DNS server

  1. It wasn't that trivial configuring a DNS server, we used bind9 and gave our virtual machines one name within our own domain. The fine part is assigning each host it's respective name inside the domain's database.

  2. We discussed in HCI topics related with culture, internationalization and even ecology, damn it's not enough being functional, if your application requires high amounts of power isn't worth a thing.

  3. Mounting shared folders inside a linux guest machine within virtualbox just requires adding a line to /etc/fstab, in my case xilinx /home/jocker/shared vboxfs rw, uid=500, gid=500 0 0

  4. CentOs seems to be more stable than Fedora, nevertheless uses a lot more resources.

Gosh, I'm so tired.

Monday, October 25, 2010


  1. Today we were introduced to the concept of co-processor. They come in two flavors: strongly coupled and not coupled, being the former the one that implements a subset of the Instruction Set Architecture and cooperates with the main processor to alleviate loads. The later refers to those that implement their own set of instruction and fulfill an specific purpose, the most common example being graphic cards.

  2. RPC. Another more advanced way of communication between clients and servers, the socket part is hidden from the user. There is an utility in linux called "rpcgen" that takes an interface file and creates the server and client proxies and more files needed to establish the communication. It's better to use structs to pass several parameters to a remote procedure.  It works with C, I wonder how are they implemented in java.

  3. LTSP is a technology that enables you to create an application server and several thin clients with constrained hardware that act as terminals and are served applications hosted in the named server, and yeah , the most beautiful things in life come free.

  4. Procrastination is one of the most regretful things, from now on I will do the stuff I need/want to do --today! - The position for teacher assistant is already occupied.

  5. There's something called Red-Hat-Cluster-Stack, I'll try it later on my attempts to create a mini-cluster.

  6. The Java technology for making mobile - hand held device application is called Java ME (from micro edition) and sounds very good and I'm no longer stuck with the symbian o.s.

Saturday, October 23, 2010

My first encounter with real life applied combinatorics

  1. When I went through my Discrete Mathematics course I didn't realize how important were the topics discussed, now in trying to implement my PT, I regret not to have put more attention, I'm not at a total loss, I know the concepts, just need a refresh. C(52,5) is a hellishly big number, Cactus Kev has done a really good job in analyzing the intricacies of ranking all those combinations, it turns out that many of them are repeated, nevertheless it doesn't make it that easier.

  2. I never used bitwise operations in my programming before, now I can't help thinking about all the useful applications I can use them on.

  3. Finally I got my network bridged connection to work through my wireless nic in virtualbox, I haven't tested but my guess is that the bridge-utils was missing in my ubuntu installation.

  4. Packaged applications high usage are the source of success to Enterprise Application Integration, they're just natural "stovepipe systems" that need to be connected together. And how do you connect them : MIDDLEWARE. I'm just waiting to figure out how this middleware is implemented so that multipoint-multipoint connections are successfully handled.

Friday, October 22, 2010

IP configuration in Xilinx

  1. We learned to setup xilinx ISE in conjunction with EDK for our "minimal system" (we're slowly realizing it ain't that minimal anymore). The issue is that it implies a lot of steps, I bet most of the class is completely lost on this matter. Recapitulating some theoretical related concepts: In our design we have to use static libraries (i.e. with suffix .a -> the a standing for "archive") so the linkage of this libraries is not dependent on a underlying operating system. For completeness I must say that dynamic libraries are those that are linked as they're needed in contrast with static ones that are linked all at once. Another topic is that we need to specify the library containing the related pin specification so no manual wiring is required for connecting our design with the fpga. Another thing to remember is that we specify the memory sections we want to utilize and the size of each, as we know memory is divided into three basic sections: the program itself, the data area, and the heap/stack, the former concerns us depending on whether our program involves the usage of a considerable number of functions (stack -> parameter passing) or employ dynamic memory allocation (heap -> malloc, new, etc)

  2. E-Business (EB) detach a whole chain of intermediaries from the buying/selling process. It comes in four flavors: Business to Business, Business to Customer, IntraBusiness, damn I forgot the fourth, they're self explanatory. The application of the EB approach has obvious advantages such as: a good cost/revenue ratio, a reduction in the process time; though it has its downsides too for example security related issues, privacy etc. Another topic was the information classification systems, it was a really swift presentation but I could grasp that they classify (of course) a big set of data according to the parameters we give it in order to analyze the resulting subsets.

  3. The mysql user addition not only involves creating a user name, specifying a password and the places he can connect from, we must associate it with an schema, i.e. a database and the type of privileges he will be granted with. A shell script can come very handing in backing up a schema for didactic purposes. The command we need to enter to list the available packages install is "dpkg -l mysql | grep" or something like that. Postgres beats up mysql with high volumes of information and makes a more efficient use of resources specially when dealing with multi-core systems.

Thursday, October 21, 2010

Nokia Qt SDK

  1. I just found the "Nokia QT SDK" it looks like the tool I need to develop a stunning application for my terminal project.

  2. Applicants for a teacher assistant position must gather a bunch of documents: (rfc,grades mean average, recommendation letters,a micro- thesis, etc.) the ref. site is :

  3. My "good disposition to people" is already giving fruits, especially with women.

  4. Setting up a DHCP server for Ubuntu was straight forward, just installing the package and configuring appropriately the /etc/dhcp3/dhcpd.conf file. I wish all subjects were that easy.

  5. Altered states of mind - not a standard topic for a HCI class -, I really enjoy watching Beto's attempts to outsmart the teacher, nevertheless I like the teacher's cathedra the most (he is so funny and transmits us his experiences). Gosh the whole class consider ourselves as being introverted! , that amazed me to a high degree. I finally get to let on that I'm not alone.

  6. The more sleep I have the smartest I become, it's such a shame I just can't nod off.The more I exercise, the hornier I become, damn I wish I had a girlfriend...LOL.

Wednesday, October 20, 2010

Procter & Gamble

  1. P&G has a really good public relations department, they promote a really nice and ethical image but I just can't help being wary when something sounds too good to be true. I was in this meeting yesterday morning where they explained us the P&G philosophy and career opportunities for a few lucky. I don't think I fit in the profile they're requiring, the leadership issue has always been my Achilles heel, how am I supposed to be a leader when I walk on this life always alone? Besides, I love coding and they use third party programmers (i.e. outside the company), that sucks. The HR representative gave us a couple of tips to improve our chances in the interview: using the CAR approach that stands for Context Activities Results. In brief we should provide a fast but sufficient context for the interviewer to grasp the big picture, explain with detail the decisions we made in a particular situation and the results achieved. She highlighted the importance of belonging to a club, association or performing extracurricular activities, that's supposed to make you a better leader, team partner and so on. In a nutshell, once inside they want you to get results no matter how, no matter not so, you must always observe a high standard in ethics, yeah right . Gosh that sounds like a lot of tension, I'm not sure if I'm into something like that, I've always regarded in high esteem living a quiet and simple life.

  2. In AAC more Xilinx stuff, we got a picture of how to configure the ISE with the EDK in order to have what is called a minimum system, which is constructed from a couple of buses and high and the other low speed, we have a couple of power pc microprocessors, a couple of ram modules and a IP, i.e. a proprietary design of programmed hardware that is suppose to receive an input from the RS 232 port, process it and turn the output back to the RS 232. The process is rather obscure I hope I'll get it right tomorrow.

  3. In IIA the teacher remarked the value of having good advisers in areas such as accountancy, laws, business processes experts, etc. And it makes sense, when we are obliged to a contract and are compromised with a delivery in form and in time, being a product so uncertain as the software is, any precaution is in order. We even explored the taxation side of the coding business, well not so "coding business" ... the tendency is to write less code and focus more in processes logic.

  4. Today I exercised my mind by thinking a good thing about every person I walked by, even of those with mean looks. I know I'm the pessimistic kind of guy and I'm always looking for faults in people,expecting them to be evil , so I decided to turn the other way around, and  must say it was so beautiful I felt at ease with myself for the first time in years . Sadly I know that if you go through life thinking the best of everybody they're going to eat you alive if you let them! Nahh, just a joke, I'll keep on this path, I think it will lead me to a better quality of life, of course one thing is having a good disposition for people and other is being naive.

Tuesday, October 19, 2010

Silverlight & XNA

  1. Today I attended a terribly boring "conference" given by Microsoft, oh I hate them so much but I'm attending to every event I am invited to. As usual it was a conference - selling booth - advertising, at least I learned some rather useless (time will say) stuff:

  • XNA and Silverlight are MS technologies for developing video games, targeting the PC, windows phone and the XBox. They work within Visual Studio 2010, and in the express version too. The've also got the MS Blender studio which provides a simple interface for creating neat visual stunts without having to write too much code, well actually we were shown a codeless app.

  • The Windows Phone was just released and provides some "useful" features such as: gestures and sensors. Sensors are the most fun part, you can program physic behavior inside your videogames to make them more close to reality. The videogames can even handle (in theory, they didn't show us how) voice commands... that's amazing indeed.

  • The hardware requirements are kind of high but being honest, that's expected from a framework oriented to videogame development.

2. We had a review of the samba server which enables linux - windows file sharing, piece of cake. I forgot my lousy ethernet cable in the lab.
3. My HCI class was utterly folkloric, we talked about color theory, cognitive science, natural language processing, wow. If it wasn't so improvised I wouldn't deem it a - so fucking waste of time -, sorry about my english.

Just another slow day, I miss SD and AAC so much these days.

Monday, October 18, 2010

Xilinx ISE

  1. They gave us some tips for using Xilinx ISE, the more useful feature in my view is the graphic simulator.

  2. Got in contact with Beto's FPGA, I'm not sure whether he bought it or was the school who purchased it. Nevermind, his project looks promising, he was able to embed linux inside the FPGA, and install a web server, sqlite etc. David's project seems interesting too complex arithmetic, but I don't envision myself as a hardware designer, I'm more attracted to distributed systems and networking, but only the devil knows where I will end up.

  3. Our city government is investing heavily in "security", we were told they spent about 8,000 million on security cameras and the contract was granted to a French company, that sucks. More than that, it sucks because they're using the TCP/IP protocol so hackers (and apprentice of hackers as I am) will be able to tap into the wires! By the way, what about our privacy, goddamn it?

  4. I learned a couple of linux tips. First: the service xinetd enable us to broadcast messages, it comes disabled by default so we edit /etc/xined.d/xinet.conf or something like that. We looked into the concept of transactions, smooth and clear, I don't know whether c/c++ provide an api for such purposes.

  5. VirtualBox provides an integrated DHCP client so no more excuses for not connecting all our virtual machines together in absence of a modem or alike.

  6. Symbian got open source, they even have a SDK. What's missing for my project is a fast c/c++ flavor bluetooth api.

This was a pretty slow day.

Sunday, October 17, 2010

Violation of expectation

  1. I'm learning some psychology terms. The first: violation of expectation. It means that we usually react abnormally when things deviate from what they're supposed to be. And our state of normality can be measured through our degree of abnormality in such situations. I also learned that psychology aims to it's study subjects in three different ways: at micro, molecular and molar level. Yes, it sounds like chemistry but the first refers to studying per instance small changes in the wave forms while studying someone's brain through the use of electrodes, the second one refers to phenomena such as reaction time to stimuli, perception, etc., and the third one refers to a interpersonal scale, i.e. social behavior, body language. Regarding body language one should be cautious of people who say one thing with his/her mouth but say something different with their body language, that's bound to be a sign of deception.

  2. Mysqlpp doesn't provide a usable interface for multi-thread programming. So I'm stuck using one connection in a per-client basis as it's connection-pooling capabilities are also poor.

  3. With mysqlpp you can use iterators to move around the result set i.e ResultSetSotre, and it comes handy to use a Row object for displaying the result set by means of the Row::size() member function through the use of integer subscripts and even by column name.

  4. Designing user interfaces for children can be a challenging task, for use have to take several issues into account, namely: children's need for interactive and fun environments, they usually tend to have a short attention span so it becomes of utmost importance to keep them involved in any available way. Other factor is the inherent responsibility attached to interfaces that make use of the internet (practically most of them), you have to make them aware of the dangers related to social media: privacy intrusions, pornography, etc. Parental controls play a mayor role in such applications. Last but not least, the capacity of abstraction in children is scarce so complex steps should be avoided while designing interfaces that pretend to attract young consumers.

  5. Enterprise Application Integration relies upon middleware, so it's reasonable to study it and try to implement it as a school project. I'll take care of that in my distributed systems class.

Friday, October 15, 2010


  1. Pipelining es una técnica para hacer más veloces los microprocesadores. Ya se mencionó en otras clases los inconvenientes que presenta el tener que traer instrucciones y datos de la memoria pero ahora analizamos el hecho de que sólo podemos ejecutar una instrucción a la vez con la arquitectura actual de nuestro ARC. El pipeline se asemeja a una linea de ensamblaje en cada etapa del proceso (en este caso las etapas que intervienen en la ejecución de una instrucción : traer la instrucción de la memoria, decodificarla, traer los operandos, ejecutar la operación y hacer el writeback respectivo) se tiene una "entidad independiente" con capacidades de almacenamiento (en este caso un registro) cada una de las cuales recibe el producto de la etapa anterior y le aplica el proceso que le corresponda. Como consecuencia lógica entre más larga es la "línea de montaje" hay un retraso inicial pero una vez que está llena comenzamos a tener una instrucción completa en cada ciclo. Es importante subrayar que para que el pipeline sea eficiente todas las fases deben tener la misma duración aproximadamente o de lo contrario existirá un overhead causado por aquella fase que tenga la duración más larga. Obviamente en esta implementación todavía no involucramos la existencia de saltos dentro de las instrucciones del programa. Si analizamos las fases características en el ciclo de una instrucción, observamos que la ejecución de la operación suele ser la más tardada de todas por lo que existen implementaciones que permiten ejecutar varias operaciones a la vez y recibe esta técnica el nombre de arquitecturas escalables.

  2. Dentro del punto anterior también es digno de mención el señalar que las arquitecturas actuales reducen considerablemente la latencia de la memoria mediante la implementación de caches dentro del micro.

  3. Discutimos el benchmarking y diversas alternativas libres y comerciales para tener un estimado del desempeño de un equipo. Lo más importante en mi opinión es utilizar estas herramientas para hacer troubleshooting; si el benchmark arroja un resultado no esperado de hipo-desempeño (existirá ese término?) bueno , desempeño por debajo del normal, nos puede dar un hint para diagnosticar desviaciones.

  4. La herramienta make es sumamente útil. La estructura es: objetivo: dependencias y abajo ponemos la "receta" para generar dichas dependencias. Es útil también generar una regla "clean" para deshacernos de los archivos intermedios. Lo que falta es encontrar una manera eficiente para que la herramienta detecte los cambios en mi código fuente ya que aparentemente sólo me está monitoreando los archivos intermedios.

  5. Mysql++ es un api para interfaces de bases de datos muy fácil, claro y versatil, sobre todo para los que manejamos c++ como lenguaje favorito.

  6. fork() es una llamada al sistema muy útil para programar servidores concurrentes, por supuesto la técnica preferida es utilizar threads pero aún no me familiarizo del todo con la implementación en unix y stevens le dedica como 100 hojas al asunto por lo que me tendré que tomar un tiempo para utilizarlos en mi aplicación distribuida. Hay una particularidad muy especial dentro del manejo de fork para el tipo de aplicaciones que estamos desarrollando en sd, y esta es que los procesos hijo una vez que terminan no mueren por completo, quedan en modo zombie por si el padre hace un query sobre el estado de los mismos ocasionado un clogging en la tabla de procesos del kernel, por lo que estoy utilizando signal(SIGCHILD, SIG_IGN).

Thursday, October 14, 2010

Lascurain o de la brevedad del poder

  1. !Qué divertido puede llegar a ser el teatro!, Fuí con Lucero a ver la obra "Lascurain o de la brevedad del poder" en el Teatro de la Paz y aprendí que el teatro puede llegar a ser una experiencia muy entrañable.

  2. El montar un servidor es tan fácil como instalar un proceso que haga precisamente eso: proveer de algún servicio a otros procesos. Aprendí que todo servicio requiere ser protegido contra ataques externos puesto que para funcionar necesariamente requieren abrir alguna "puerta". Par reqa observar tráfico http es necesario reconfigurar el wireshark para desencriptar las tramas.

  3. La medida del desempeño de un equipo de cómputo en cuanto a la ejecución de un programa en particular depende del parámetro que se esté evaluando, pero hay conceptos clave que son recurrentes: ciclos por segundo, ciclos por instrucción, número de instrucciones -> en cuanto a los ciclos por segundo interfieren tanto la tecnología empleada como la microarquitectura, siendo está última la responsable por la sincronización en la ejecución de las microinstrucciones , en los ciclos por instrucción están implicados el programador, el compilador y la arquitectura; el programador es responsable de crear sistemas que se ejecuten realizando el menor número de sentencias (aquí hay varias vertientes ya que los objetivos de un programador pueden variar, en mi caso por ejemplo prefiero claridad sobre economía), el compilador a su vez suele realizar optimizaciones adicionales sobre el código y su estructura, por último la arquitectura influye también en el peso del programa ya que no es lo mismo utilizar una arquitectura tipo CISC dónde en promedio las instrucciones requieren de un mayor número de ciclos de reloj, que usar una arquitectura RISC la cual en promedio emplea instrucciones simples pero eficientes.

  4. Una arquitectura RISC cómo la hemos visto hasta el momento en el ARC es bastante ineficiente ya que los ciclos fetch, instruction decodification, operands fetch, execution, etc., se llevan a cabo mientras la memoría está completamente ociosa y por si fuera poco en cada fetching se tiene que esperar a que la memoria le lleve las instruciones o los datos ya que está última es lentísima en comparación con el. Una solución a este problema se encuentra en el prefetching. El prefetching consiste en tener una serie de registros administrados por un controlador independiente de la unidad de control principal del procesador que se encarga de traer nuevas instrucciones de la memoria mientras el ciclo de operaciones trabajan con datos anteriores. Esta es una solución bastante útil hasta que nos encontramos con el dilema de los saltos, el procesador no tiene forma de decir previamente si una instrucción tipo branch se llevara a cabo o no por lo que si resulta afirmativa se tienen que descargar las instrucciones almacenadas en el mecánismo de prefetching. Afortunadamente la creatividad humana es tan grande que se han desarrollado diversos mecanismos de "predicción de saltos" por más esotérico que suene el término no están basados en otra cosa que estadística (por ejemplo si se está llevando a cabo un loop el procesador puede "darse cuenta" y tomar las medidas necesarias).

Tuesday, October 12, 2010

VHDL Nightmare

  1. Al diseñar funciones y procedimientos en VHDL son muchísimas cosas las que hay tomar en cuenta, aún intento superar varios errores de tipo "unconstrained", ya hasta le descubrí algunos bugs a ghdl.

  2. La función accept() para aceptar conexiones entrantes basadas en sockets no me aceptó especificar la dirección (struct * sockaddr) más sin explicación alguno me aceptó NULL en los dos últimos parámetros, tengo que ver eso con el profesor.

  3. Fedora en su versión LiveCD me falló, se presentó un bug al principio del arranque.

  4. En VirtualBox en teoría un sistema guest puede diferir en el tipo de arquitectura que maneja en relación con el host, más en la práctica dependiendo de varios factores, puede o no ser cierto.

  5. Hablando del error "unconstrained" en VHDL resulta que existen tipos a modo de inicialización dinámica que tienen esa característica (no tener límites) hasta el momento en que son utilizados.

  6. La biblioteca TEXTIO en vhdl provee utilerías y definiciones de tipos para trabajar con cadenas de caracteres y archivos.

Monday, October 11, 2010


1. Por principio nuestro microprocesador ARC es una máquina load-store, es decir las operaciones de carga y almacenamiento están optimizadas y son las únicas que tienen acceso a memoria. Estas características colocan al ARC dentro de la categoría de "Reduced Instruction Set Computer". Por otra parte los procesadores CISC (Complex Instruction Set Computer) proveen de más operaciones a nivel instrucción, sin embargo esta funcionalidad extra suele ser subutilizada y a ello deben su fracaso. Además las máquinas RISC vienen más ad-hoc para implementar pipeline y otras técnicas avanzadas de paralelismo.

2. OpenBravo (El ERP libre) deja mucho que desear en cuanto a interacción con fuentes de datos externas.

3. Los sistemas distribuidos tienen entre otras justificaciones: el permitir la tolerancia a fallos, el distribuir cargas, el permitir accesos concurrentes con mayor facilidad. El control que tienen estos sistemas puede ser centralizado o distribuido. En el primero como su nombre lo dice, existe un proceso o entidad que se encarga de administrar cargas y comunicaciones, en el segundo los procesos se retroalimentan entre sí haciendo preguntas del estilo "sigues ahí amigo?" jejeje.

4.Existen muchas arquitecturas de distribución y comunicación de un conjunto de procesadores con un conjunto de memorias: en bus -> no se requieren protocolos especiales ya que el bus es interno, multiplexado, conmutado, con switches, y hay otro en el que la comunicación requiere de un protocolo de red ya cada procesador posee un modulo de memoria y para accesar módulos foráneos se tiene que poner de acuerdo con los demás procesadores.

5. El sistema NFS (Network File System) permite compartir unidades de disco de forma remota (algo que me llamó la atención es poder cargar un sistema operativo que se encuentra en un equipo externo.

6. Beto mencionó un método para instalar linux de manera automatizada mediante la red: PXE, necesito investigar más al respecto.

7. Los métodos y código externo que se necesitan para compilar un programa en c++ son mayores en varios órdenes de magnitud en comparación con el que se requiere para compilar un programa en c.

8. Las máquinas más poderosas del mundo utilizan linux !!! . -- Como es de esperarse la mayoría de estos mounstros están en Estados Unidos.

9. Existe una condición médica llamada "Intersex" (inglés) y sumamente interesante, quienes la padecen desarrollan desarrollan órganos genitales opuestos a su sexo genético. Por ejemplo el caso de un niño que desarrolló un pequeño pene pero interiormente tenía órganos sexuales femeninos. A estos niños(as) les definen el sexo quirúrjicamente y mediante psicoterapía y con terapía hormonal. Es también sorprendente el hecho de que en psicología hay profesionales que todavía creen que cualquiera puede ser condicionado para ser niño o niña independientemente de su sexo biológico. También existen el cerebro másculino y el femenino en el sentido de que físicamente hay diferencias sútiles en el mismo que hasta hace poco fueron descubiertas. Hay numerosas instancias en las que hombres y mujeres han sentido desde la infancia que están en el cuerpo equivocado -> hay estudios que revelan que la mayoría de estos casos implican un hombre con cerebro de mujer (a nivel físico) y viceversa.

10. La configuración de sistemas paralelos en grid permite hacer un cluster con integrantes heterogéneos.

11. El MPI es un protocolo que permite configurar cómputo paralelo en cluster.

Sunday, October 10, 2010


  1. Siempre había querido probar RedHat pero descubrí CentOs que es esencialmente lo mismo.

  2. El ARC realiza saltos a determinada localidad de memoría basado en el contenido del registro de condición o PSR, pero siempre y cuando setcc esté activada de otra manera dichos valores son ignorados.

  3. Es posible reemplazar las teclas dañadas de una laptop, espero encontrar alguna compatible con la mía.

  4. Existe una característica del protocolo TCP/Ip que le permite a uno generar paquetes con el atributo de "urgentes" -> Comer

  5. Hay muchas otras personas que tampoco pueden dormir en las noches, posiblemente debido una característica genética.

  6. El centro de servicio toshiba más cercano está en Av.IPN 2051 Of. 1

Saturday, October 9, 2010

Linux Live USB Creator (LILI USB Creator)

  1. Excelente herramienta para crear live usb's de nuestras distribuciones favoritas. Lo que me parece más atractivo de esta pieza de software en particular es que el soporte de persistencia (que configuraciones,documentos e instalaciones de programas no se borren) es muy bueno en comparación con otras alternativas y el live usb  corre visiblemente más rápido. Me puse en contacto con el autor y me parece  una persona muy agradable (hasta dónde puede apreciar uno por email)

  2. Hoy me tomé un break y anduve caminando por la cuidad aunque también sigo estudiando qt4 en particular los detalles de implementación del su patrón de diseño modelo-vista-controlador.

  3. La tienda telmex de Bellas Artes abre los sábados.

  4. Otra prueba histórica para la justificación de la teoría de operación de bandera falsa del 11/09/01 .

Curso de Robótica elemental

1. Programar un robot de "FischerTechnik". Fue realmente fácil y me divertí mucho. Junto con mi compañero Alejandro hicimos un robot que se movía sólamente en un cuadro delimitado por una linea negra, esto gracias a un sensor luminoso.

2. Compilar el driver para mysql dentro de qt creator utilizando qmake.

3. Microprogramación alambrada es mucho más rápida pero inmodificable.

4.  Debian esta instalado en el f307 - username:  f307-user, password: user.

5. Programación con hilos. Los hilos pueden compartir recursos pasándose referencias a variables creadas en el heap. Es necesario usar semáforos para controlar el acceso a recursos compartidos cuando usamos hilos. Varios hilos pueden estar contenidos en un sólo proceso.

6. VirtualBox hace un infierno el configurar un nic virtual en puente en base a una conexión wireless.

7. Necesito aplicarme a la programación de sistemas en c/c++ -> Ver libro de Stevens.

8. Mi proyecto terminal será probablemente sobre programación paralela o diseño de algún sistema que aproveche recursos de manera paralela. Si no, trataré de abordar algún tipo de sistema distribuido.