Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment: Re:Assuming they escaped, the penal system worked! (Score 1) 38

by Penguinisto (#48627119) Attached to: Did Alcatraz Escapees Survive? Computer Program Says They Might Have

You mean, didn't get caught. There's a difference.

They'd have to have kept those crimes to extremely petty ones at the most. Even though the 1960's didn't have facial recognition, the TSA (for what that's worth), instant background checks, widespread Social Security Number checking mechanisms, or any of the stuff we have today? They definitely had fingerprinting, and at least some semblance of a national fingerprint database of sorts to check against (the FBI would have had these guys' fingerprints after the break.)

They could have eventually slipped through the cracks even if they re-offended (e.g. it wasn't uncommon for, say, truck drivers to have multiple drivers' licenses from multiple states), but any crime beyond a misdemeanor would have had the local PD looking at some stranger (stranger in their town that is) and doing at least a cursory check, if only to build a rap sheet for the prosecution.

IMHO, if they made it, they likely hoofed it to Canada or Mexico (or perhaps further South) and built an assumed identity from which to live out the rest of their lives in as obscure a manner as possible. Over time, that new identity would become reinforced.

It wouldn't be the first time either... I recall a few instances in the '80s and even the '90s where some schlub or other escaped prison in that era (or before), got himself a new identity, and decades later did something stupid (IIRC, in one case the dumbass ran for a local public office, and a local reporter researching his background found the inconsistencies).

Comment: Re:Really? The FCC is a "rethuglican" creation? (Score 1) 85

by TubeSteak (#48626891) Attached to: Who's To Blame For Rules That Block Tesla Sales In Most US States?

The FCC was formed by the Communications Act of 1934 to replace the radio regulation functions of the Federal Radio Commission.

The FCC exists because 100+ years ago, assclowns with radios were making false distress calls, cursing at people on the airwaves, and faking naval messages.

You could call it the Greater Radio Fuckwad Theory.
/And yes, 100+ years ago, foul language was a legitimate moral issue that the government felt compelled to regulate and punish on the shared airwaves.

Comment: Re:Land of the free (Score 1) 253

by Jason Levine (#48626831) Attached to: Reaction To the Sony Hack Is 'Beyond the Realm of Stupid'

I don't think of guns as inherently evil, but they are inherently dangerous. I don't have a problem with lawful gun owners who take proper precautions with their firearms. I have a big problem with the people who think that their gun is a cool toy to play with or teach their kids that it's fun to wave a gun around. I'm not willing to say that a majority of gun owners are like this, but there's a vocal group like this and these people scare me (and should scare responsible gun owners as well). People should treat guns with respect and always assume 1) that they are loaded (even if you JUST took all of the bullets out) and 2) that the gun is about to fire at whatever it is pointed at.

Comment: Re:Let me guess (Score 1) 22

by Immerman (#48626767) Attached to: After 40 Years As a Double Amputee, Man Gains Two Bionic Arms

It looked as though those metal braces were suspending the arms several inches further from his body than necessary. I wonder if I'm seeing it wrong, or if they were perhaps trying to prevent him accidentally ripping out his abdomen with the elbows while learning.

I don't know about power though - granted it probably wouldn't run all that long off a laptop battery, but a human arm doesn't normally exert all that much power, and human muscle is *far* less efficient (18%-26%) than modern electric motors. I mean a soda-sized Li-ion battery can power an electric bicycle for an hour or so, and I imagine having a six-pack strapped to your back would be a small price to pay for a half-day of having arms.

Comment: Re:Are You Joking? (Score 1) 141

by s.petry (#48626683) Attached to: US Links North Korea To Sony Hacking

Maybe you are too young to remember the "Mobile Chemical Weapons Labs" that were reportedly driving around mad scientists who were allegedly creating nerve agent while in a moving truck. We had "pickshures" and everything on CNN, though they strangely looked like water tankers and regular old semi tracker/trailers that all military units have.

Comment: I can't belive I have to say this (Score 1) 248

by DarkOx (#48626679) Attached to: Reaction To the Sony Hack Is 'Beyond the Realm of Stupid'

is not the same thing as being able to carry out physical, 9/11-style attacks in 18,000 locations simultaneously.

Who said anything about them having to hit 18,000 locations simultaneously. That isn't how terrorism works. The 911 guys did not have have to hit thousands of targets, they only tried for three, managed only two (counting the WTC complex as a single target) and look at all the trouble they caused!

A coordinated attack on only a handful of movie theaters the same night would be plenty to cause an economically significant portion of this countries population spend the holiday Christmas - New Years stretch cowering in their homes rather than going out and spending money. It would almost certainly lead to all kinds of wild ill considered national security response.

Hell look at the Batman Shooting a few years ago. It takes one suicide attacker to "hit" a theater with essentially no real resources. A few thousand in counterfeit notes (which DPRK has produced in the past) would allow would be assailants to put together the arsenal they need. Its perfectly plausible even DPRK could get three or four people into this country with limited fake credentials and no access to anything privileged enough to do even a basic background check.

I am not saying "OMG we all going to die here" but you can't completely dismiss the threat either here. Having hit Sony they have already demonstrated some capability.

Comment: Re:Dubious because facts (Score 2) 141

by DarkOx (#48626487) Attached to: US Links North Korea To Sony Hacking

That was my reaction as well a week ago when the new broke. I actually heard on the NBC Nightly news first and the moment Williams said TB of data; the first thought I had was how do you ex-filtrate that much info without it being noticed by the NOC team?

  The only think I can think of is that largish transfers are probably very common for them as they push media assets out to contractors etc. Still you wonder why are they not MTIMing everything in what is essentially an all IP business and why can't their IPS/IDS system tell the difference between a 2TB of raw YUV video and their HR database?

Comment: Re:Some people better be out of a job... (Score 1) 49

by bmo (#48626349) Attached to: Hackers Compromise ICANN, Access Zone File Data System

Peer Name Resolution.

The problem is that it's patent encumbered, by Mickeysoft, so it's useless.

There is also something called Hierarchical DHT-based name resolution.


Information-centric network (ICN) architectures are an increasingly important approach for the future Internet. Several ICN approaches are based on a flat object ID namespace and require some kind of global name resolution service to translate object IDs into network addresses. Building a world-wide NRS for a flat namespace with 10^1^6 expected IDs is challenging because of requirements such as scalability, low latency, efficient network utilization, and anycast routing that selects the most suitable copies. In this paper, we present a general hierarchical NRS framework for flat ID namespaces. The framework meets those requirements by the following properties: The registration and request forwarding matches the underlying network topology, exploits request locality, supports domain-specific copies of binding entries, can offer constant hop resolution (depending on the chosen underlying forwarding scheme), and provides scoping of publications. Our general NRS framework is flexible and supports different instantiations. These instantiations offer an important trade-off between resolution-domain (i.e. subsystem) autonomy (simplifying deployment) and reduced latency, maintenance overhead, and memory requirements. To evaluate this trade-off and explore the design space, we have designed two specific instantiations of our general NRS framework: MDHT and HSkip. We have performed a theoretical analysis and a simulation-based evaluation of both systems. In addition, we have published an implementation of the MDHT system as open source. Results indicate that an average request latency of (well) below 100ms is achievable in both systems for a global system with 12 million NRS nodes while meeting our other specific requirements. These results imply that a flat namespace can be adopted on a global scale, opening up several design alternatives for information-centric network architectures.



Comment: Re:seems a lot like human vision to me (Score 1) 116

I think I understand... vaguely. To simplify, you're saying it's been trained on a specific dataset, and it chooses whichever image in the dataset the input is most like.

A bit.

It's easier to imagine in 2D. Imagine you have a bunch of height/weigt measurements and a lable telling you whether a person is overweight. Plot them on a graph, and you will see that in one corner people are generally overweight and in another corner, they are not.

If you have a new pair of measurements come along with no label, you could just find the closest height/weight pair and use that. That is in fact a nearest neighbour classifier. It works, except that you need to keep all the original data around.

If you imagine taking 1000 points along the two axes (1,000,000 in total) you could classify each of them according to who is nearest. If you do that you can see that there is more or less a line separating the two groups.

Machine learning is generally the process of finding that line, or an approximation to it somehow.

The DNNs don't find the nearest neighbour explicitly: they just tell you which side of the line a given input is on. They also have a bunch of domain specific knowledge buit in because we know something about the shape of the line, which helps find it. For example, image objects may be scaled up or down in size or distorted in a variety of ways.

Is that about the gist? I'm probably not going to understand things about higher dimensions without a lot of additional information.

The answer is in fact tied into dimensionality. In the 2D example, you can cover the whole space with 1,000,000 points. In 3D to do the same, you need 1,000,000,000. Beyond that the numbers rapidly become completely infeasible.

Comment: Re:with what? (Score 1) 141

by DarkOx (#48626183) Attached to: US Links North Korea To Sony Hacking

I don't know given our current antagonistic relations with Russia and the fact we are already imposing sanctions on them I kinda think if it had Russian finger prints they'd name names.

If anything it would make Putin look worse and serve to counter Gorby's argument that Putin isn't a bad actor but Russia is just being bullied by expansionist NATO policy.

I also suspect old Vlad recognizes his current situation is tenuous and complex enough without adding direct aggression against the US homeland to the mix at least not without being prepared to take credit for it. If the Russian state had anything to do with it they'd probably be out claiming it was done to hit back US economy in response to our "unjustified" sanctions or something.

I'll admit I am just arm chairing this thing with no real info but my guess is if it was done from/in Russia its organized crime without direct ties to the Kremlin.

Are you having fun yet?