Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - MIT Randomizes Tasks To Speed Massive Multicore Processors (itworld.com)

itwbennett writes: Researchers at the Massachusetts Institute of Technology have created a data structure that they claim can help large multicore processors churn through their workloads more effectively. Their trick? Do away with the traditional first-come, first-served work queue and assign tasks more randomly. The SprayList algorithm allows processors with many cores to spread out their work so they don't stumble over one another, creating bottlenecks that hamper performance.

Submission + - DARPA-Funded Robots Learning To Cook By Watching YouTube Videos (itworld.com)

jfruh writes: Once you've built humanoid-shaped robots, how do you get them to move and act like humans? Well, one way to teach them how to do it is to have them watch one of the greatest repository of recorded human experience ever: YouTube. Robots in a Maryland lab have learned how to prepare meals by watching and processing a slew of cooking videos, one of YouTube's most popular genres.

Submission + - How Three Credit Card Transactions Could Reveal Your Identity (itworld.com)

itwbennett writes: Yves-Alexandre de Montjoye, an MIT graduate student, and his colleagues analyzed credit card transactions provided by an unnamed major bank from 1.1 million people over a three-month period in some 10,000 stores to see how much (or little) data they needed to identify an individual’s transactions from a larger set of transaction records. Ninety percent of the time, they could identify an individual using just four pieces of data, such the locations where four purchases were made. Adding price information to the location data — for example, purchase receipts — allowed the researchers to identify a person with just three transactions.

Submission + - Anonymous No More: Your Coding Style Can Give You Away (itworld.com)

itwbennett writes: Researchers from Drexel University, the University of Maryland, the University of Goettingen, and Princeton have developed a 'code stylometry' that uses natural language processing and machine learning to determine the authors of source code based on coding style. To test how well their code stylometry works, the researchers gathered publicly available data from Google’s Code Jam, an annual programming competition that attracts a wide range of programmers, from students to professionals to hobbyists. Looking at data from 250 coders over multiple years, averaging 630 lines of code per author their code stylometry achieved 95% accuracy in identifying the author of anonymous code. Using a dataset with fewer programmers (30) but more lines of code per person (1,900), the identification accuracy rate reached 97%.

Submission + - Taiwanese Chipmaker Mediatek Ready To Take On The World (itworld.com)

jfruh writes: Largely under the radar of most consumers, Qualcomm has emerged with a domination of the mobile market that's almost as strong as Intel's in PCs and laptops. But an unlikely challenger has emerged from Taiwan in the form of Mediatek. Mostly supplying chips to Chinese companies so far, Mediatek is willing to do more handholding for smaller phone manufacturers, providing instructions to an OEM/ODM on how to build a phone and the software architecture to run it and offering dedicated consultants to advise them through the production process.

Submission + - Chinese Regulator Cracking Down On Alibaba Over Counterfeit Sales (itworld.com)

jfruh writes: Alibaba may be the darling of China's Internet industry, but Chinese regulators are beginning to take a hard look at the company's sales practices. It's Tmail.com and Taobao online marketplaces together control three-quarters of the Chinese online retail market — and are rife with counterfeit goods, including fake smartphones and even fake alcohol.

Submission + - Simple Google Search Outed Alleged Silk Road Founder (itworld.com)

itwbennett writes: As the first step in investigating Silk Road, IRS agent Gary Alford, who was part of an agency task force investigating organized crime, simply entered 'Silk Road' into Google and looked for the oldest mention on the site. The details he found would ultimately lead to the arrest of Ross Ulbricht in October 2013, as well as to the forfeiture of all the assets of Silk Road itself.

Submission + - IBM About To Get Hit With a Massive Reorg and Layoffs (itworld.com) 1

itwbennett writes: IBM is expected to go through a massive reorg next month that will see 26% of its 430,000-strong work force let go, or 111,800 people, according to a report by long-time Silicon Valley journalist Robert X. Cringely. If that figure holds true, that would make it far and away the largest corporate layoff event in history, breaking the record previously held by IBM, when it cut 60,000 in 1993.

Submission + - Winklevoss Twins Plan Regulated Bitcoin Exchange (itworld.com)

itwbennett writes: They of the square jaws and famous dispute with Mark Zuckerberg over the origins of Facebook, are also believed to be among the largest holders of Bitcoin in the world. Now they want to launch a regulated Bitcoin exchange—named Gemini, of course. To bolster confidence, they said they have formed a relationship with a chartered bank in the state of New York. 'This means that your money will never leave the country,' the twins wrote in a blog post. 'It also means that U.S. dollars on Gemini will be eligible for FDIC insurance and held by a U.S.-regulated bank.'

Submission + - U.S. Gas Stations Vulnerable To Internet Attacks (itworld.com)

itwbennett writes: Automated tank gauges (ATGs), which are used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated over the Internet by malicious attackers, according to security firm Rapid7. 'An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system,' said HD Moore, the chief research officer at Rapid7.

Submission + - Fujitsu Psychology Tool Profiles Users At Risk Of Cyberattacks (itworld.com)

itwbennett writes: Fujitsu Laboratories is developing an enterprise tool that can identify and advise people who are more vulnerable to cyberattacks, based on certain traits. For example, the researchers found that users who are more comfortable taking risks are also more susceptible to virus infections, while those who are confident of their computer knowledge were at greater risk for data leaks. Rather than being like an antivirus program, the software is more like 'an action log analysis than looks into the potential risks of a user,' said a spokesman for the lab. 'It judges risk based on human behavior and then assigns a security countermeasure for a given user.'

Slashdot Top Deals

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...