Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Why don't apps learn? (Score 1) 363

I have been suspicious of various nav systems for a while since they invariably try to route me over the local toll road instead of the parallel non-toll freeway. But not too suspicious since I benefit by having all the out of town folks routed out of my way. Thanksgiving weekend is fun to observe the massive jam up on the toll road while the parallel freeway runs clear. They are so parallel that there are places where one can see the traffic on the other road.

Comment "Attack"? (Score 3, Insightful) 98

They were reverse engineering software. I didn't see anything in here about cracking AV vendor networks or anything like that. I'm sure there are plenty of other people trying to reverse engineer software. Wouldn't it be reasonable to say this is within the security agency's baliwick? I didn't see anything about misusing whatever they found. Very interesting though that domestic producers were not listed. Maybe because they didn't need a warrant to do the reverse engineering, or as suggested by others they might already be compromised.

Comment Re: Typical (Score 1) 609

Yes, it would have been clearer if I said "..will prevent any single future attack?" I thought my further clarification in the post made this distinction clear though. My point was that blaming the tool is pointless when there are many other tools. Since your examples involve stopping the actor they are all irrelevant.

Comment Typical (Score 4, Insightful) 609

A pretty typical response. Focus on some trivial or unimportant aspect of a bad event, rather than face the fact that little can be done. Does anyone really believe that "doing something" about armored cars is going to prevent future attacks? The attacks will just take a different form. It is like saying "hammers raise eyebrows after person is attacked with a hammer" The least important and and least valuable aspect of that description is the hammer.
AMD

AMD Radeon Fury and Fury X Specs Leaked, HBM-Powered Graphics On the Way 66

MojoKid writes: A fresh alleged leak of next AMD Fiji graphics info has just hit the web and there's an abundance of supposedly confirmed specifications for what will be AMD's most powerful graphics card to date. Fiji will initially be available in both Pro and XT variants with the Fiji Pro dubbed "Fury" and Fiji XT being dubbed "Fury X." The garden variety Fury touts single-precision floating point (SPFP) performance of 7.2 TFLOPS compared to 5.6 TFLOPS for a bone stock Radeon R9 290X. That's a roughly 29-percent performance improvement. The Fury X with its 4096 stream processors, 64 compute units, and 256 texture mapping units manages to deliver 8.6 TFLOPS, or a 54-percent increase over a Radeon R9 290X. The star of the show, however, will be AMD's High Bandwidth Memory (HBM) interface. Unlike traditional GDDR5 memory, HBM is stacked vertically, decreasing the PCB footprint required. It's also integrated directly into the same package as the GPU/SoC, leading to further efficiencies, reduced latency and a blistering 100GB/sec of bandwidth per stack (4 stacks per card). On average HBM is said to deliver three times the performance-per-watt of GDDR5 memory. With that being said, the specs listed are by no means confirmed by AMD, yet. We shall find out soon enough during AMD's E3 press conference scheduled for June 16.

Slashdot Top Deals

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...