Predator-prey reversal: Rock lobsters vs whelks on Malgas Island and Marcus...
Multiple stable configurations. The post Predator-prey reversal: Rock lobsters vs whelks on Malgas Island and Marcus Island appeared first on The Old New Thing.
View ArticleHow do I destruct an object that keeps a reference to itself, because that...
Keep a reference to the right thing. The post How do I destruct an object that keeps a reference to itself, because that reference prevents the object from being destructed appeared first on The Old...
View ArticleWhat order are pages in a memory-mapped file flushed out to disk?
There isn't one. The post What order are pages in a memory-mapped file flushed out to disk? appeared first on The Old New Thing.
View ArticleEven if your assembly language code doesn’t call any Windows APIs, you still...
You're not off by yourself; you're part of a society. The post Even if your assembly language code doesn’t call any Windows APIs, you still have to follow the ABI appeared first on The Old New Thing.
View ArticlePrecision questioning: The cynical description
Just keep digging. The post Precision questioning: The cynical description appeared first on The Old New Thing.
View ArticleAsking for clear written documentation that Require trusted path for...
It was never recommended in the first place. The post Asking for clear written documentation that <I>Require trusted path for credential entry</I> is no longer recommended appeared first on...
View ArticleWhy is there a limit of 15 shell icon overlays?
Ran out of bits. The post Why is there a limit of 15 shell icon overlays? appeared first on The Old New Thing.
View ArticleWelcome to my new home on the Microsoft Developer Tools and Services blog site
Pardon the dust. The post Welcome to my new home on the Microsoft Developer Tools and Services blog site appeared first on The Old New Thing.
View ArticleHow to compare two packed bitfields without having to unpack each field
Suppose you are packing multiple bitfields into a single integer. Let's say you have a 16-bit integer that you have packed three bitfields into: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 r g b Suppose you...
View ArticleMy initial frustration trying to configure our internal VoIP phones that were...
I remember when Microsoft made their initial internal roll-out of its VoIP phones. The VoIP phones were integrated with a desktop app which let you configure the phone, managed your telepresence, as...
View ArticleAlternate definitions for English words, as inferred from bug reports
Here are some terms that appear in bug reports. "Empty" means "There are a bunch of things here, but not the ones I wanted." "Blank" means "There are things, maybe." "The picture is wrong" can mean...
View ArticlePredator-prey reversal: Rock lobsters vs whelks on Malgas Island and Marcus...
Malgas Island is dominated by rock lobsters, who happily feast upon whelks. Just 4km away, Marcus Island is dominated by whelks, not a rock lobster to be found. Researcher Amos Barkai couldn't figure...
View ArticleHow do I destruct an object that keeps a reference to itself, because that...
Consider the case of an ordered work queue. Components can queue work to the worker thread, with the expectation that the work will run sequentially. class OrderedWorkQueue { public:...
View ArticleWhat order are pages in a memory-mapped file flushed out to disk?
Say you create a memory-mapped file mapping and write data to it. In which order will the pages be flushed out to disk? Is it in the order the pages were written? Or are pages closer to the beginning...
View ArticleEven if your assembly language code doesn’t call any Windows APIs, you still...
Writing in assembly language doesn't absolve you from adhering to the software conventions. Certainly you have more flexibility in assembly language, but that doesn't give you freedom to do anything...
View ArticlePrecision questioning: The cynical description
Precision questioning is a technique used by some senior executives at Microsoft. Although precision questioning positions itself as a toolkit for critical thinking and problem solving, its use in...
View ArticleAsking for clear written documentation that Require trusted path for...
A customer had turned on the Require trusted path for credential entry policy (under Computer Configuration, Administrative Templates, Windows Components, Credential User Interface). They demanded...
View ArticleWhy is there a limit of 15 shell icon overlays?
There is a limit of fifteen shell icon overlays. Why fifteen? The value 15 came from the corresponding limit for image lists. The ImageList_SetOverlayImage function supports up to 15 image list...
View ArticlePredator-prey reversal: Rock lobsters vs whelks on Malgas Island and Marcus...
Malgas Island is dominated by rock lobsters, who happily feast upon whelks. Just 4km away, Marcus Island is dominated by whelks, not a rock lobster to be found. Researcher Amos Barkai couldn’t figure...
View ArticleHow do I destruct an object that keeps a reference to itself, because that...
Consider the case of an ordered work queue. Components can queue work to the worker thread, with the expectation that the work will run sequentially. class OrderedWorkQueue { public: OrderedWorkQueue()...
View Article