Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Rosalind Franklin (Score 1) 112

While it was clearly her data that they used, I've never heard any source state that she had already solved the problem of the exact structure of DNA. She probably realized that the crystal indicated a helical structure, but I don't think she knew exactly what it looked like or how it worked. So yeah, she deserved more credit then she received at the time, but I think it's possible to swing too far in the other direction, taking credit away from the guys who worked out much of the annoying details of the problem.

Comment Re:Please forgive my likely stupidity (Score 1) 108

Unfortunately, however, I dislike the idea that a newly deployed feature might be flagged as suspicious by an intermediary and disabled. This seems like it would create some very hard to diagnose problems - particularly if it rejects some statements from a transaction and not others. Now you may end up in an inconsistent state, and so your security tool might be what actually breaks you.

Just make sure you have the same system running in QA, and your QA people can log a defect against the developer from dirtcheapistan.

In certain environments it is useful having a tool like this, just so you have a contractual means of penalising the outsourced development house.

Comment Re:Awesome.. but some perspective (Score 1) 227

But does anyone here think Bill Gates or Microsoft stays awake worried about RH? They pulled in 72x more revenue, 159x more profits, and have 63x more cash on hand (50.69b vs 808m) than Red Hat. Microsoft even has a better profit margin than RH (32.5% vs 13.3%).

http://finance.yahoo.com/q/ks?s=msft
http://finance.yahoo.com/q/ks?s=RHT+Key+Statistics

But, if RH takes all of MSs market share in areas they compete in, RH will still have lower revenues/profit in that area than MS.

Because the customer is saving.

Revenue comparison is irrelevant here, revenue loss (including potential) by MS and market share are more relevant.

By their actions (adopting open source, when 5 years ago they were attacking it) shows they are worried enough to try and fight it now.

Comment What am I missing? (Score 5, Insightful) 279

My understanding is that the best known general cryptanalytic attacks on AES are only marginally better than brute-force. Even AES-128 is essentially unbreakable under any known attacks then, since brute forcing a single AES-128 password is so far beyond feasibility, it's absurd. My understanding is that the best known attacks on AES are side-channel attacks, which require only modest computational resources, but need access to the encrypting machine, and related-key attacks that are only effective for certain small classes of keys.

So we can then assume that NSA has a general attack on AES that makes it many, many orders of magnitude easier to break than the best known published attacks? Or is this more likely to be disinformation spread to make people *think* that AES is broken by NSA? My understanding was that NSA is generally somewhat but not extremely far beyond the academic state of the art these days.

And there have been several reports of FBI and other federal agencies being unable to recover AES-256 encrypted hard drives. So if NSA has the capability to do so even for small numbers of keys using existing computing power, they obviously keep it incredibly restricted and under wraps.

So... this is BS by somebody, right? Either congress is getting BSed into funding stuff that won't do what they're being told it will do, or the public is getting BSed into believing that using encryption is pointless because NSA can real-time decrypt anything, so just don't bother, mmm'kay?

Comment Won't people eventually start noticing? (Score 1) 236

If increasingly the currency of the digital world is information aggregation, collection, and targeting, won't people eventually start to realize that *this* is their valuable asset and they should be compensated for giving it up, assume control in some meaningful way of their online persona?

I know there are several startups trying to move in this direction, and I don't know if any of them have it figured out yet, but it seems that Facebook's blunt approach and Google's ham-handed attempts should eventually be beaten out by a more crafty, nuanced approach, assuming the market mechanism still works in this realm and the network effects aren't as strong as many people assume they are (and the history of the online world, and of social networking, tells us they aren't).

Comment Re:Cool, but... (Score 1) 218

Not even remotely close. They seem to do quite well with things like schools, churches, public buildings, but not at all so well with restaurants, shops, and commercial places. In the immediate vicinity of my office just adjacent to New York City, geonames has perhaps 1/10th of the number of places that Factual has.

Comment Re:Visionaries see into the future, not the presen (Score 2) 232

Sorry, but the numbers back the other guy up.

http://en.wikipedia.org/wiki/File:Ipod_sales_per_quarter.svg

The iPod was averaging about 100,000 units per quarter until mid 2003. That's not so impressive, honestly. It didn't break 1,000,000 units per quarter until late 2004. So yeah, it was really the iTunes music store launch in April 2003 that made people interested in the iPod.

Comment Re:But a plecebo is the most effective drug of all (Score 2) 566

To be an effective placebo, it has to be a believable placebo.

Thus, you have to dress it up with ritual or herbs or pins and needles or lots of water or whatever the method of convincing the patient that they're getting something that will help.

Actually, there was a study comparing a double-blind placebo with "here, take this sugar pill containing no active ingredients", and the placebo was just as effective even when the patient know it was a placebo.

Comment Re:Tegra is a flop. (Score 3, Informative) 207

Ummm Tegra 2 was the fastest platform for Android for quite some time. The G Tablets are still pretty blazingly fast. The issue is just that Tegra 2 was released for such a short time before Tegra 3 came out that it never got much saturation, and then Tegra 3 came out with a bunch of faster options close on its heels.

NVidia has great hardware engineers, but awful software driver people on their mobile platform. They have done a terrible job supporting their chipsets after release with Android, or getting good manufacturers to adopt them.

Comment Re:New classification needed (Score 3, Insightful) 671

I'm fairly certain taking naked video of people in sexual encounters where they have a reasonable expectation of privacy isn't just bad manners, but probably illegal. Especially if you then go and publish said video to the world. I think the only reason this case might be murky is since they were roommates, Ravi had the right to be in the room and didn't have to break and enter to install a camera.

Still, just because you live in a house doesn't, say, give you the right to record people naked in the bathrooms or having sex in bedrooms and pubish that on the internet without their consent. This is illegal by itself. However, I suspect the penalties aren't particularly harsh.

This doesn't address the hate crime angle of things here. Any time you take naked pictures or sexual pictures of people without permission and post them on the internet to mock them, it's awful. If the video showed a naked guy with a small penis, or a girl fucking a horrendously ugly guy, that could be every bit as embarrassing for the small-dicked man or the woman in question as this was for the homosexual man. What makes the crime awful is that the man in question was obviously depressed and emotionally disturbed to begin with, and these actions resulted in so much embarrassment that they led to suicide. So really it's bullying an emotionally fragile person that's awful, not anything specific about the sexual orientations that makes it a "hate crime".

Comment Re:banks make only $40 million? (Score 3, Informative) 110

Still sounds crazy low. Banking fees for IPO deals are generally 7% for "normal" sized deals (a few hundred million), and around 3% for large deals. You'd expect the fees for a $5B IPO to be around $150M. If they are doing it for less, it's because the value of the prestige and marketing value they get from this deal is worth a fortune to them.

Comment Re:For us non-US folk... (Score 1) 272

It doesn't forbid it, as I recall. It makes it optional and virtually every carrier opted not to as it gives them more control over the handsets.

Uh, no, not virtually every carrier, just the two US CDMA carriers. But, they are virtually the entire CDMA smartphone market, and since they don't want phone portability, the rest of the CDMA operators don't get it either.

And, this will be the death of CDMA (where I refer to cdma2000 and cdmaOne as CDMA).

Comment Re:Reboot into single-user mode (Score 1) 176

I think present_arms's point is that local console access involves access to the big red switch

'Local access' typically means that you have means to start processes as non-root, but does not require that you are near the physical hardware. Physical access means you are near enough to access the 'big red switch'. Privilege escalation vulnerabilities typically allow you to get from 'local access' to 'local privileged access'. Combined with a remote vulnerability (which allows you to get from 'can't start and control processes' to 'can start and control processes') you can craft a remote root exploit.

and the bootloader, which on a PC-type system can be used to gain root by booting into single-user mode.

Assuming the administrator did not apply a bootloader password and BIOS passwords (to prevent booting from other media).

However, physical security is not sufficient to prevent 'local exploits', and methods that can be used where there is lack of physical security are a bit off-topic for this story..

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...