Forgot your password?
typodupeerror

Comment: Re:The British Way (Score 1) 110

by TheRaven64 (#47513997) Attached to: UK Users Overwhelmingly Spurn Broadband Filters

That's as maybe but we have Healthcare that is FREE at the point of delivery.

That's not quite true for dental work, but the price is capped, so you'll typically pay £18.50 to see a dentist, £50.50 if you need something done, or £219 if you need something serious. It's only free if you qualify for extra assistance, which is automatic if you are under 18, under 19 (25 in Wales) and in full-time education, on income support or similar.

Bug

Researchers Test Developer Biometrics To Predict Buggy Code 87

Posted by Soulskill
from the subject-was-asleep-when-this-code-was-checked-in dept.
rjmarvin writes: Microsoft Research is testing a new method for predicting errors and bugs while developers write code: biometrics. By measuring a developer's eye movements, physical and mental characteristics as they code, the researchers tracked alertness and stress levels to predict the difficulty of a given task with respect to the coder's abilities. In a paper entitled "Using Psycho-Physiological Measures to Assess Task Difficulty in Software Development," the researchers summarized how they strapped an eye tracker, an electrodermal sensor and an EEG sensor to 15 developers as they programmed for various tasks. Biometrics predicted task difficulty for a new developer 64.99% of the time. For a subsequent tasks with the same developer, the researchers found biometrics to be 84.38% accurate. They suggest using the information to mark places in code that developers find particularly difficult, and then reviewing or refactoring those sections later.

Comment: Re:Let us keep our thoughts with our Kremlin frien (Score 1) 664

by TheRaven64 (#47501911) Attached to: Russian Government Edits Wikipedia On Flight MH17
If you think I'm conservative and pro-gun, then you've clearly never read any of my other posts. In fact, if your entire reply is not just an ad hominem, but one attacking views that are diametrically opposed to the ones that I've publicly stated on numerous occasions, I can only assume that you are completely lacking any meaningful responses.

Comment: Re:Let us keep our thoughts with our Kremlin frien (Score 5, Insightful) 664

by TheRaven64 (#47499371) Attached to: Russian Government Edits Wikipedia On Flight MH17

Russia or the separatists in Eastern Ukraine might have done this

That's a distinction without a difference.

although no-one is sure what they would stand to gain from it.

It looks like they thought it was a Ukraine military plane and were a bit too trigger happy, not realising it was a civilian aircraft until too late.

Ukraine's own military might have done it (they've done it before and denied it vehemently until it was proven beyond a shadow of a doubt).

Here's the thing: if the Ukraine were responsible, then Russia would have a vested interest in a visibly transparent investigation and be in a position to ensure that it happened. If they could convincingly portray the Ukraine as having shot down a civilian aircraft then that would significantly alter the political sympathies in the current conflict. Instead, they have done everything in their power to block it.

Comment: Re:This is news? (Score 4, Insightful) 207

The problem is in your phrasing of it as 'government abuses'. In the most part, it's not 'the government', as a monolithic entity acting based on policy that is abusing the power, it's individuals whose abuses are enabled by the government's programs. There's a political split over whether you can trust 'the government', but both sides agree that you probably can't trust an underpaid civil servant with a napoleon complex.

Comment: Re:nice job (Score 2) 102

by TheRaven64 (#47495373) Attached to: "Intelligent" Avatars Poised To Manage Airline Check-In
In general, I'd much rather use the kiosks (or, ideally, check in using the web or a mobile app) than go to a human check-in desk precisely because it presents the information more efficiently and it's a lot faster than a face-to-face interaction would be. The only time I prefer to go to the human-behind-a-desk lines are when I'm doing something unusual (e.g. my flight's delayed enough that I'll miss my connection and I need re-routing[1]) and I need an actual brain on the other side of the conversation (contrary to popular belief, I've found the people at the desks to be very helpful - and quite creative - in this regard). For anything purely routine, don't pretend to be a human, just give me an efficient interface.

[1] Actually, given that this has happened on about 70% of my trips to the USA over the last couple of years, I can't really justify calling it unusual.

Comment: Re:No public drug use (Score 3, Insightful) 472

by TheRaven64 (#47489761) Attached to: World Health Organization Calls For Decriminalization of Drug Use

Yes, I see a problem with pot cafes. Drug use is not OK, just inevitable

What about cafes that serve coffee? You know, the beverage containing a highly addictive drug? Should we ban those too?

The issue with pot cafes is that it's hard for people to work in them without being exposed to passive smoke, but if you can address that then I don't see the difference between them and normal cafes.

Comment: Re:Finally! (Score 4, Interesting) 472

by TheRaven64 (#47489753) Attached to: World Health Organization Calls For Decriminalization of Drug Use

I don't see a contradiction (although I'm not an American). I have no problems with people smoking, snorting, injecting, or otherwise consuming any drugs that they want. I do object if they blow smoke in public areas or leave needles (especially used ones) lying around in public places.

I would be in favour of banning smoking anything in public places (including places of work) and permitting people to take any drugs that they want in their own home. There are some difficult areas (for example, should people with children be allowed to smoke whatever they like at home around their children?) but the general rule of thumb should be that you can do whatever you want to your own body and mind, just don't do it to anyone else.

Comment: Re:That's Ripple (Score 3, Informative) 100

by TheRaven64 (#47489731) Attached to: New Digital Currency Bases Value On Reputation
Not really. Whuffle is more sensible as a currency concept - it's fungible. There's no difference in how you can use Whuffle based on who gave it to you. There are some interesting economics papers based on the idea that anyone can create a mint and the value of its currency would be tracked based on the reputation of the person.

Comment: Re:Derp (Score 4, Informative) 164

by TheRaven64 (#47481865) Attached to: New Mayhem Malware Targets Linux and UNIX-Like Servers
It's difficult to rate-limit login attempts from a botnet. The attack pattern I see on my server is one IP making three login attempts, then another IP making three login attempts, and so on. I do rate limit (via temporary IP blocking) attempts from one IP, but it doesn't help much. Of course, they're all doing password-based login attempts and I disable password-based SSH logins for all Internet-connected machines...

Comment: Re:How does it compare to Unisys MCP ? (Score 1) 59

by TheRaven64 (#47481157) Attached to: SRI/Cambridge Opens CHERI Secure Processor Design

Yup. Compiling for the Burroughs architecture was easier than many segment-based systems, because they allowed segment descriptors to be placed in main memory, with the CPU responsible for tracking the value type by updating a tag. We adapt this slightly so that we only require one tag bit per 256 bits of main memory (the paper describes the implementation of this in some detail, but I'm happy to answer questions) to be able to safely store capabilities in main memory. Our design also allows normal C data structures to work as expected. You can mix C code compiled for MIPS and C code compiled for CHERI in the same binary (though you only get coarse-grained protection in the MIPS code).

The Burroughs architecture had very little impact on the computer architecture community, but was enormously influential in the design of VMs for high-level languages. One of our goals is to pull out the aspects of such VMs that are required for memory protection and put them back in the hardware, so a buggy VM has a far more limited security impact. My student's work on JNI dramatically reduced the amount of C code in the trusted computing base for the JVM implementation that he used.

Comment: Re:Look this gifthorse in the mouth (Score 1) 59

by TheRaven64 (#47481135) Attached to: SRI/Cambridge Opens CHERI Secure Processor Design

The flippant answer is all that your paranoia deserves. The work was undertaken by SRI and The University of Cambridge. The funding was provided by DARPA, but that's the extent of their involvement (other than creating a program with the goal of being able to redesign any aspect of computing with security in mind).

The code is no more or less meriting an independent audit than any other open source code. Less, actually, because we don't anticipate anyone actually using our open source reference implementation in production, we hope that CPU vendors will take the ISA extensions and apply them to their own chips, but we expect that (if they do) they'll do independent reimplementations. At the ISA levels, we have PVS / SAL proofs that we'll be publishing soon that the ISA does provide the desired security properties and you're welcome to audit those too.

"The Amiga is the only personal computer where you can run a multitasking operating system and get realtime performance, out of the box." -- Peter da Silva

Working...