Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Intel

Intel's 14nm Broadwell Delayed Because of Low Yield 96

judgecorp writes "Intel has put back the delivery of its 14nm Broadwell desktop chip by a quarter because of a manufacturing issue that leaves it with too high a density of defects. The problem has been fixed, says CEO Brian Krzanich, who says, 'This happens sometimes in development phases.'" The good news is that it is just a defect density issue. A first round of tweaks failed to increase yield, but Intel seems to think a few more improvements to the 14nm process will result in acceptable yield.
Intel

Intel Shows 14nm Broadwell Consuming 30% Less Power Than 22nm Haswell 88

MojoKid writes "Kirk Skaugen, Senior Vice President and General Manager of the PC Client Group at Intel, while on stage, at IDF this week snuck in some additional information about Broadwell, the 14nm follow up to Haswell that was mentioned during Brian Krzanich's opening day keynote. In a quick demo, Kirk showed a couple of systems running the Cinebench multi-threaded benchmark side-by-side. One of the systems featured a Haswell-Y processor, the other a Broadwell-Y. The benchmark results weren't revealed, but during the Cinebench run, power was being monitored on both systems and it showed the Broadwell-Y rig consuming roughly 30% less power than Haswell-Y and running fully loaded at under 5 watts. Without knowing clocks and performance levels, we can't draw many conclusion from the power numbers shown, but they do hint at Broadwell-Y's relative health, even at this early stage of the game."
The Almighty Buck

The Cognitive Cost of Poverty 459

An anonymous reader writes "It's a common trope that most poor people are poor because they're lazy or just inherently bad with money. But a new study (abstract) makes a fascinating find: being poor actually reduces your cognitive capabilities when thinking about money. 'In a series of experiments run by researchers at Princeton, Harvard, and the University of Warwick, low-income people who were primed to think about financial problems performed poorly on a series of cognition tests, saddled with a mental load that was the equivalent of losing an entire night's sleep. Put another way, the condition of poverty imposed a mental burden akin to losing 13 IQ points, or comparable to the cognitive difference that's been observed between chronic alcoholics and normal adults.' This makes the difficulty in climbing out of poverty much easier to understand. The researchers also demonstrated causality by showing that thinking about a very small expense led to no impairment, while thinking about a very large expense did. They confirmed this by looking at a group of farmers in India who tend to receive most of their income at one time — immediately following their harvest. Shortly before that payment, when the farmers had very little money, their scores dropped as well."

Comment Re:Troll much? (Score 1) 555

Actually you are paying for the right to do it 24/7. If not, then the contract should state what part of 24/7 you are paying for and the user might have the option of choosing the provider that fits him best. How much? Again most of the times it states UNLIMITED. If it's not UNLIMITED then it should say you have xxGB at this speed then it degrades to xxMbps. Just don't sell UNLIMITED 24/7 xxGbps connections and expect the user to know that you really meant LIMITED xx/x less-than-xxGbps because you're too cheap to provide everyone the service you're advertising.
IT

NSA Can't Search Its Own Email 165

cycoj writes "The NSA says that there is no central method to search its own email. When asked in a Freedom of Information Act request for emails with the National Geographic Channel over a specific time period, the agency, which has been collecting and analyzing the data of hundreds of millions of Internet users, says it can only perform person-per-person searches on its own email."
United States

Number of Federal Wiretaps Rose 71 Percent In 2012 84

cold fjord writes "Looks like last year was pretty busy. I wonder how many were leaks and media? From the Washington Post: 'The number of wiretaps secured in federal criminal investigations jumped 71 percent in 2012 over the previous year, according to newly released figures. Federal courts authorized 1,354 interception orders for wire, oral and electronic communications, up from 792 the previous year, ... There was a 5 percent increase in state and local use of wiretaps in the same period. ... There is no explanation of why the federal figures increased so much, and it is generally out of line with the number of wiretaps between 1997 and 2009, which averaged about 550 annually. There was also a large number of wiretaps in 2010, when 1,207 were secured. A single wiretap can sweep up thousands of communications. One 30-day local wiretap in California, for instance, generated 185,268 cellular telephone interceptions, of which 12 percent were incriminating, according to the report. The vast majority of the wiretaps in both federal and state cases were obtained as part of drug investigations, and they overwhelmingly were directed at cellphones ... Only 14 court orders were for personal residences. Most jurisdictions limit the period of surveillance to 30 days, but extensions can be obtained.'"
Databases

Monty Suggests a Business-Friendly License That Trends Open 43

An anonymous reader writes "Want to gain some of the benefits of open source software development but not sure how to finance it? According to Monty Widenius, creator of MySQL and MariaDB, one solution could be the 'business source' license. While 'open source friendly' rather than open source, Monty blogged, it is intended to offer a viable alternative for companies that want to 'do development and compete with closed source companies on similar economic terms.' Business source starts out with similar benefits as an OSD-compliant license: the source code is visible and can be used freely by all but a small segment that has to pay (the developing company chooses the segment). Then, after a few years, the license automatically changes to an open source license. Monty recently explained the details of business source, and gave a sample license. (Oh, and not to worry, he notes – MariaDB is and will remain GPL.)"

Comment Re:Won't use SVN. (Score 2) 378

Exactly. I don't understand however why CVS is so easily forgotten. I still use it on a daily basis.

Sure, I've switched to git for my projects, but CVS is so easy to set up, centralized (it's a plus, when you need that), text files in repository and each file is versioned on it's own (it's a plus, when you need that). One great use I've found is put some software into git, manage patches with stgit, while having each individual patch in a CVS repository for patch history. I wouldn't change that for svn.
Privacy

Snowden NSA Claims Partially Confirmed, Says Rep. Jerrold Nadler 337

bill_mcgonigle writes with this news from from CNET: "Rep. Jerrold Nadler (D NY) disclosed that NSA analysts eavesdrop on Americans' domestic telephone calls without court orders during a House Judiciary hearing. After clearing with FBI director Robert Mueller that the information was not classified, Nadler revealed that during a closed-door briefing to Congress, the Legislature was informed that the spying organization had implemented and uses this capability. This appears to confirm Edward Snowden's claim that he could, in his position at the NSA, 'wiretap anyone from you or your accountant to a federal judge to even the president.' Declan McCullagh writes, 'Because the same legal standards that apply to phone calls also apply to e-mail messages, text messages, and instant messages, Nadler's disclosure indicates the NSA analysts could also access the contents of Internet communications without going before a court and seeking approval.' The executive branch has defended its general warrants, claiming that 'the president had the constitutional authority, no matter what the law actually says, to order domestic spying without [constitutional] warrants,' while Kurt Opsahl, senior staff attorney at EFF claims such government activity 'epitomizes the problem of secret laws.'" Note that "listening in" versus "collecting metadata" is a distinction that defenders of government phone spying have been emphasizing. Tracking whom you called and when, goes the story, doesn't impinge on expectations of privacy. Speaking of the metadata collection, though, reader Bruce66423 writes "According to the Washington Post, the Bush administration took 'bulk metadata' from the phone companies under voluntary agreements for more than four years after 9/11 until a court agreed they could have it compulsorily." Related: First time accepted submitter fsagx writes that Brewster Kahle of the Internet Archive has calculated the cost to store every phone call made in the U.S. over the course of a year: "It's surprisingly inexpensive. It puts the recent NSA stories (and reports from the Boston bombings about the FBI's ability to listen to past phone conversions) into perspective."
Privacy

Keeping Your Data Private From the NSA (And Everyone Else) 622

Nerval's Lobster writes "If those newspaper reports are accurate, the NSA's surveillance programs are enormous and sophisticated, and rely on the latest in analytics software. In the face of that, is there any way to keep your communications truly private? Or should you resign yourself to saying or typing, 'Hi, NSA!' every time you make a phone call or send an email? Fortunately there are ways to gain a measure of security: HTTPS, Tor, SCP, SFTP, and the vendors who build software on top of those protocols. But those host-proof solutions offer security in exchange for some measure of inconvenience. If you lose your access credentials, you're likely toast: few highly secure services include a 'Forgot Your Password?' link, which can be easily engineered to reset a password and username without the account owner's knowledge. And while 'big' providers like Google provide some degree of encryption, they may give up user data in response to a court order. Also, all the privacy software in the world also can't prevent the NSA (or other entities) from capturing metadata and other information. What do you think is the best way to keep your data locked down? Or do you think it's all a lost cause?"

Comment Re:You can pry XP from my cold, dead hands (Score 5, Insightful) 438

So what? I still have SP2 machines working just fine. It prints receipts to the customers the same as the first day it was installed. Never patched it. The users working on it are limited and IE is prohibited with the GPO (employees have better work than surf on Facebook). LAN obviously is firewalled, not that this machine (and others similar) need to access the 'net. The only problem would be, if there was a domain wide virus that somebody would bring in with a laptop. However, that hasn't happened in the past 10 year. In my experience 95% of the "viruses" are crap people install themselves ("DHL sent me this packet, but I can't open the confirmation on my e-mail" "Are you expecting to receive something?" "No...why?"). No patches help that, unless it would patch the user, but then I'd be out of work... I have Win 98 as a retro machine here...connected to the Internet, running latest w9x supported firefox (3.6 I belive?), no AV (it's just p3-600). It won't get automagically infected as soon as it's turned on...why would it be?
It's funny.  Laugh.

Linus Torvalds Promises Profanity Over Linux 3.10-rc5 334

hypnosec writes "Linus Torvalds has released Linux 3.10-rc5, and he is certainly not happy with the changes merged last week. Rc5 is bigger than rc4 and has code scattered across its entire code base because it addresses many outstanding problems. In the release announcement, Torvalds noted, 'I wish I could say that things are calming down, but I'd be lying. rc5 is noticeably bigger than rc4, both in number of commits and in files changed (although rc4 actually had more lines changed, so there's that).' Torvalds has warned that he is going to start cursing again, and said, 'I'm going to call you guys out on, and try to come up with new ways to insult you, your mother, and your deceased pet hamster.'"
Microsoft

Life After MS-DOS: FreeDOS Keeps On Kicking 255

angry tapir writes "FreeDOS — the drop-in, open source replacement for MS-DOS — was started after Microsoft announced that starting from Windows 95, DOS would play a background role at best for users. Almost two decades later, FreeDOS has survived and, as its creator explains in this interview, is still being actively developed, despite achieving its initial aim of an MS-DOS compatible OS, which quite frankly is somewhat amazing."
Programming

What Early Software Was Influential Enough To Deserve Acclaim? 704

theodp writes "That his 28-year-old whip-smart, well-educated CS grad friend could be unaware of MacWrite and MacPaint took Dave Winer by surprise. 'They don't, for some reason,' notes Winer, 'study these [types of seminal] products in computer science. They fall between the cracks of "serious" study of algorithms and data structures, and user interface and user experience (which still is not much-studied, but at least is starting). This is more the history of software. Much like the history of film, or the history of rock and roll.' So, Dave asks, what early software was influential and worthy of a Software Hall of Fame?"
Star Wars Prequels

Lego Accused of Racism With Star Wars Set 514

Ch_Omega writes "According to this article over at The Telegraph, Lego has been accused of racism by the Turkish community in Austria over a Star Wars model that supposedly resembles one of Istanbul's most revered mosques. The anger was provoked by 'Jabba's Palace,' a model of the home of Jabba the Hutt from Lego's Star Wars product range based on the blockbusting series of science fiction films. 'The terrorist Jabba the Hutt likes to smoke a hookah and have his victims killed,' said the statement posted on the organization's website. 'It is clear that the ugly figure of Jabba and the whole scene smacks of racial prejudice and vulgar insinuations against Asians and Orientals as people with deceitful and criminal personalities.'"

Slashdot Top Deals

What the gods would destroy they first submit to an IEEE standards committee.

Working...