Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Nice concept (Score 2, Informative) 262

The main benefit is that it runs faster. 64-bit pointers take up twice the space in caches, and especially L1 cache is very space-limited. Loading and storing them also takes twice the bandwidth to main memory.

So for code with lots of complex data types (as opposed to big arrays of floating point data), that still has to run fast, it makes sense. I imagine the Linux kernel developers No1 benchmark of compiling the kernel would run noticably faster with gcc in x32.

The downside is that you need a proper fully functional multi-arch system like is slowly getting adopted by Debian in order to handle multiple ABIs. And then you get into iffy things on if you want the faster /usr/bin/perl or one that can handle 6-gig lists efficiently...

Comment Re:Whoever extracts elements first wins. (Score 1) 58

Gernalized way? Not likely. But in this particular setting (electronic scrap), there is plenty of activity. I know these because they make the local news: http://www.boliden.com/Operations/Smelters/E-scrap-project/ - but there are several competitors to them too. Lots of copper and gold and other metals in electronics that is commercially recyclable given that someone sorts it out and throws the electronics in containers with just electronics.

China

NSA Says It Foiled Plot To Destroy US Economy Through Malware 698

mrspoonsi writes "Business Insider Reports: The National Security Agency described for the first time a cataclysmic cyber threat it claims to have stopped On Sunday's '60 Minutes.' Called a BIOS attack, the exploit would have ruined, or 'bricked,' computers across the country, causing untold damage to the national and even global economy. Even more shocking, CBS goes as far as to point a finger directly at China for the plot — 'While the NSA would not name the country behind it, cyber security experts briefed on the operation told us it was China.' The NSA says it closed this vulnerability by working with computer manufacturers. Debora Plunkett, director of cyber defense for the NSA: One of our analysts actually saw that the nation state had the intention to develop and to deliver — to actually use this capability — to destroy computers."
Biotech

Programming Molecules To Let Chemicals Make Decisions 28

Nerval's Lobster writes "Computer scientists at Harvard University have come up with a way to convert algorithms that teach machines to learn into a form that would allow artificial intelligence to be programmed into complex chemical reactions. The ultimate result could be smart drugs programmed to react differently depending on which of several probable situations they might encounter – without the need to use nano-scale electronics to carry the instructions. 'This kind of chemical-based AI will be necessary for constructing therapies that sense and adapt to their environment,' according to Ryan P. Adams, assistant professor of computer science at Harvard's School of Engineering and Applied Sciences (SEAS), who co-wrote the paper explaining the technique (PDF). 'The hope is to eventually have drugs that can specialize themselves to your personal chemistry and can diagnose or treat a range of pathologies.' The techniques are part of a larger effort to program the behavior of molecules in manufacturing, decision-making and diagnostics, using both nano-scale electronics and the still-relatively-new study of bionanotechnology."
Privacy

Employee Morale Is Suffering At the NSA 841

Hugh Pickens DOT Com writes "Ellen Nakashima reports at the Washington Post that morale has taken a hit at the National Security Agency in the wake of controversy over the agency's surveillance activities and officials are dismayed that President Obama has not visited the agency to show his support. 'It is not clear whether or when Obama might travel the 23 miles up the Baltimore-Washington Parkway to visit Fort Meade, the NSA's headquarters in Maryland,' writes Nakashima, 'but agency employees are privately voicing frustration at what they perceive as White House ambivalence amid the pounding the agency has taken from critics.' Though Obama has asserted that the NSA's collection of virtually all Americans' phone records is lawful and has saved lives, the administration has not endorsed legislation that would codify it. And his recent statements suggest Obama thinks some of the NSA's activities should be constrained. 'The agency, from top to bottom, leadership to rank and file, feels that it is had no support from the White House even though it's been carrying out publicly approved intelligence missions,' says Joel Brenner, NSA inspector general from 2002 to 2006. 'They feel they've been hung out to dry, and they're right.' Former officials note how President George W. Bush paid a visit to the NSA in January 2006, in the wake of revelations by the New York Times that the agency engaged in a counterterrorism program of warrantless surveillance on U.S. soil beginning after the Sept. 11, 2001, terrorist attacks. 'Bush came out and spoke to the workforce, and the effect on morale was tremendous,' Brenner said. 'There's been nothing like that from this White House.' Morale is 'bad overall' says another former NSA official. 'It's become very public and very personal. Literally, neighbors are asking people, 'Why are you spying on Grandma?'"
Power

Not All USB Power Is Created Equal 240

jfruh writes "We've reached a point in our electronic lives where most of our gadgets draw power from a USB cable, and we have lots of USB ports to choose from — some of which live on other gadgets, some of which live on adapters that plug into your wall or car. But those ports supply wildly varying amounts of power, which can result in hours of difference in how long it takes your phone to charge. The Practical Meter, the product of a successful Kickstarter campaign, can help you figure out which power sources are going to juice up your gadgets the fastest."
Privacy

NSA Wants To Reveal Its Secrets To Prevent Snowden From Revealing Them First 216

binarstu writes "According to a recent report by Tom Gjelten of NPR, 'NSA officials are bracing for more surveillance disclosures from the documents taken by former contractor Edward Snowden — and they want to get out in front of the story. ... With respect to other information held by Snowden and his allies but not yet publicized, the NSA is now considering a proactive release of some of the less sensitive material, to better manage the debate over its surveillance program.'"
United States

US Intelligence Wants To Radically Advance Facial Recognition Software 178

coondoggie writes "Identifying people from video streams or boatloads of images can be a daunting task for humans and computers. But a 4-year development program set to start in April 2014 known as Janus aims to develop software and algorithms that erase those problems and could radically alter the facial recognition world as we know it. Funded by the Office of the Director of National Intelligence's 'high-risk, high-payoff research' group, Intelligence Advanced Research Projects Activity (IARPA) Janus 'seeks to improve face recognition performance using representations developed from real-world video and images instead of from calibrated and constrained collections.'"
Advertising

The NSA Is Looking For a Few Good Geeks 388

itwbennett writes "Dan Tynan noticed something curious when he was reading a TechCrunch story (about Google's mystery barges, as it happens). There was a banner ad promoting careers at the NSA — and this was no ad-serving network fluke. Tynan visited the TechCrunch site on three different machines, and saw an NSA ad every time. In one version of the ad, a male voice says, 'There are activities that I've worked on that make, you know, front page headlines. And I can say, I know all about that, I had a hand in that. The things that happen here at NSA really have national and world ramifications.'"
Virtualization

Ask Slashdot: Tools For Managing Multiple Serial Console Servers? 104

An anonymous reader writes "I've recently been charged with updating our existing serial console access tools. We have 12 racks of servers each with a console server in it (OpenGear, ACS, and a few others). Several of these systems host virtual machines which are also configured to have 'serial' management (KVM, virt serial). In total it comes to about 600 'systems.' All the systems also have remote power management (various vendors). Right now our team has a set of home grown scripts and a cobbled together database for keeping this all together. Today any admin can simply ssh into the master, run 'manage hostname console' and automatically get a serial console or run 'manage hostname power off' to cut the power to a system. I'd rather use some tools with more of a community than just the 4 of us. What tool(s) should I move my group onto for remote serial/power management?"

Comment Re:Helium Leaks (Score 0) 297

Provided that atmospheric pressure works the fact that helium leaks is irrelevant: helium leaks into the harddrive just as easily as it leaks out of the harddrive. All you have to do is make sure that the harddrive is leak-tight for everything but helium - fortunately this is pretty easy to do as helium is the only gas that leaks as easily as it.

Privacy

Facebook Testing Screen-Tracking Software For Users 115

cagraham writes "Facebook is currently testing software that would track user's cursor movements, as well as monitor how often a user's newsfeed was visible on their mobile phone, according to the Wall Street Journal. The additional data from such tracking would potentially let Facebook raise their ad prices, as they could deliver even more information about user's on-site behavior to advertisers, such as how long users hovered over specific ads. In order to analyze the extra data, Facebook will utilize a custom version of Hadoop."
Cloud

The Cloud: Convenient Until a Stranger Nukes Your Files 262

jfruh writes "Thanks to a plethora of cloud storage accounts, Dan Tynan thought his days of carrying a thumb drive around with him and worrying about email stripping out his attachments were over. But that was before he discovered that his Box.com account and all the files in it had vanished without a trace. With tech support coming up empty, Tynan had to put on his journalist hat to track down the bizarre sequence of events that ended with his account handed over to another user, who didn't ask for it and didn't even know who Tynan was."
Cloud

Will Cloud Services One Day Be Traded Just Like Stocks and Bonds? 168

Brandon Butler writes "Today, cloud computing resources are bought and sold in a fairly straightforward process: A company needs extra compute capacity, for example, so they contract with a provider who spins up virtual machines for a certain amount of time. But what will that process look like in, say, 2020? If efforts by a handful of companies come to fruition, there could be a lot more wheeling and dealing that goes on behind the scenes. An idea is being floated to package cloud computing resources into blocks that can be bought and sold on a commodity futures trading market. It would be similar to how financial instruments like stocks, bonds and agricultural products like corn and wheat are traded on exchanges by investors. Blocks of cloud computing resources — for example a month's worth of virtual machines, or a year's worth of cloud storage — would be packaged by service providers and sold on a market. In the exchange, investors and traders could buy up these blocks and resell them to end users, or other investors, potentially turning a profit if the value of the resource increases."

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...