Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

+ - 1/10 Scale Model Cray Supercomputer built from FPGA->

Submitted by bmurray7
bmurray7 (2784743) writes "Chris Fenton has built a model Cray-1 supercomputer from an FPGA. The Cray-1 was the iconic supercomputer of the 1970s. It featured a then staggering 32 MB of RAM and could perform ~100 million floating point operations per second. To build his model, Fenton designed a Verilog-200 FPGA implementation of the Cray 1. The FPGA circuit board wasn't pretty, so he built case at 1/10 scale. The model runs at 50 mhz, close to the original's 80 mhz clock speed."
Link to Original Source

+ - Analysis of Linux backdoor used in freenode hack

Submitted by Anonymous Coward
An anonymous reader writes "A detailed analysis has been done of the Linux backdoor used in the freenode hack. It employed port knocking and crypto to provide security of the backdoor against others using it.. This seems a little more sophisticated than your average jane hacker.. Criminal? Government?"

+ - Scientific Linux 7.0 x86_64 released

Submitted by Anonymous Coward
An anonymous reader writes "Scientific Linux has released version 7.0 of its enterprise Linux clone. "Fermilab's intention is to continue the development and support of Scientific Linux and refine its focus as an operating system for scientific computing.". You can grab an ISO images by visiting this url. It is recommended to read both the Scientific Linux release notes and the RHEL7 release notes."

+ - Windows Flaw Allowed Hackers to Spy On NATO, Ukraine, Others->

Submitted by Anonymous Coward
An anonymous reader writes "Reuters reports that a cybersecurity firm has found evidence that a bug in Microsoft's Windows operating system has allowed hackers located in Russia to spy on computers used by NATO, Ukraine, the European Union, and others for the past five years. Before disclosing the flaw, the firm alerted Microsoft, who plans to roll out a fix on Tuesday. "While technical indicators do not indicate whether the hackers have ties to the Russian government, Hulquist said he believed they were supported by a nation state because they were engaging in espionage, not cyber crime. For example, in December 2013, NATO was targeted with a malicious document on European diplomacy. Several regional governments in the Ukraine and an academic working on Russian issues in the United States were sent tainted emails that claimed to contain a list of pro-Russian extremist activities, according to iSight.""
Link to Original Source

+ - Bitcoin price soars over $266 and hits a new all-time high->

Submitted by Anonymous Coward
An anonymous reader writes "Today, the price of bitcoin (in USD) surged over it's previous high which was recorded back in April of this year. After a mini-crash when Silk Road go shut down the price has bounced back and surged with additional support from China and investors backing the digital currency.

The current volatility could play a part in if the currency can be taken seriously as a means of exchange, with many wishing to hold onto coins as an investment."

Link to Original Source

+ - Good Luck Finding A Data Scientist->

Submitted by CowboyRobot
CowboyRobot (671517) writes "If you are in the market for a data scientist, chances are the search will be long, difficult and costly. The term 'big data' is definitely overused, but there is no doubt that business and technology leaders are banking that big data will help provide analytics for a variety of needs in the very near future, including regulatory reporting, client targeting, trading strategies, portfolio management and more. "Finding big data talent is difficult, retaining it is nearly impossible," said Dr. Usama Fayyad, chairman of Oasis500, and former CDO at Yahoo! "And the role of data scientist is impossible to fill, especially outside of the US." Unfortunately, universities are not yet up to the task of producing large numbers of data scientists. Only a few schools have degrees that focus on the data sciences. For instance, Stanford offers online courses for data mining and statistics. The University of California at Berkeley offers a Master of Information and Data Science (MIDS), but the program is only starting up in January 2014. It will take most students about a year to complete the MIDS course, but keep in mind that many enrollees will likely have full-time jobs and will only take the courses part time, lengthening the time until they graduate."
Link to Original Source

+ - TrueCrypt to go Through a Crowdfunded, Public Security Audit 1

Submitted by Anonymous Coward
An anonymous reader writes "After all the revelations about NSA’s spying efforts, and especially after the disclosure of details about its Bullrun program aimed at subverting encryption standards and efforts around the world, the question has been raised of whether any encryption software can be trusted. Security experts have repeatedly said that it you want to trust this type of software, your best bet is to choose software that is open source. But, in order to be entirely sure, a security audit of the code by independent experts sounds like a definitive answer to that issue.

And that it exactly what Matthew Green, cryptographer and research professor at Johns Hopkins University, and Kenneth White, co-founder of hosted healthcare services provider BAO Systems, have set out to do. The software that will be audited is the famous file and disk encryption software package TrueCrypt. Green and White have started fundraising at FundFill and IndieGoGo, and have so far raised over $50,000 in total."

+ - Auto-Detecting Fake Social Media Accounts->

Submitted by jfruh
jfruh (300774) writes "Facebook estimates 5 percent of its accounts are bots, frauds, or otherwise fake; Twitter puts the estimate for its accounts at 7 percent. Now services are arising that claim to automatically assess an account to tell whether or not it represents a real human. One such service, called BeehiveID, is already helping assess online dating accounts to check for fakes, and surely other companies will jump into this market soon enough."
Link to Original Source

Comment: Re:Active fucking X?! (Score 1) 218

by bmurray7 (#45340761) Attached to: Why Internet Explorer Still Dominates South Korea.

You can run 3D game engines completely in JavaScript

Unless the installed browser blocks WebGL due to "unresolved driver issues" (such as Firefox on Ubuntu on an Atom N450 according to about:support). Or unless the installed browser doesn't implement WebGL at all (such as IE on XP or Vista, or Safari and Safari wrappers on iOS).

You can run 3D game engines in JavaScript without WebGL. It might be slow, but that doesn't JavaScript isn't Turing complete.

+ - Politicians & Celebrities Personal Data Stolen in Limo Cloud Service Hack

Submitted by alphatel
alphatel (1450715) writes "In as yet another Plain Text hack, a company which handles bookings for Limousine companies through an online portal had user credit card, address and personal data exposed, including pickups and activities. These may be the same attackers who recently lifted PR Newswire and Adobe info from the same servers. Beyond the credit card data were important personal notes, including who to contact and what, if any, illicit activity may have occurred in the vehicles.

It must be interesting to have all your data exposed to a group of violent strangers, like the way the rest of the world is exposing itself to the NSA. Shoe, meet foot."

+ - AMD and NVIDIA Go To War In Q4, Radeon R 290 Launched->

Submitted by MojoKid
MojoKid (1002251) writes "There is little love lost between team Red and team Green, when it comes to 3D graphics cards, but AMD and NVIDIA seem to be engaged in an even more vicious volley of attacks on each other's business as the holiday shopping season approaches, and consumers will ultimately be the benefactor. Recently NVIDIA responded to AMD's Radeon R9 290X launch with a massive price cut on their GeForce GTX 780 card, dropping it by a full $150 to $499. Today, AMD is back at it again with the launch of the Radeon R9 290, a lower cost ($399) derivative of the R9 290X with a few stream processors disabled. However, just before launch, AMD delivered a driver drop and a clock speed boost, such that the new $399 Radeon R9 290 performs a lot more in line with NVIDIA's $499 GeForce GTX 780. In the benchmarks, the two cards trade victories depending on the game engine at play. However, for a full $100 less, it's clear AMD is not going to lose the battle on price. On the flip side, AMD's new Hawaii GPU-based cards do run hotter and a little louder than NVIDIA's flagship GPUs."
Link to Original Source

+ - Internet Explorer Still Dominant in South Korea.->

Submitted by bmurray7
bmurray7 (2784743) writes "You might think that the country that has the fastest average home internet speeds would be a first adapter of modern browsers. Instead, as the Washington Post reports, a payment processing security standard forces most South Korean's to rely upon Internet Explorer for online shopping. Since the standard uses a unique encryption algorithm, an ActiveX control is required to complete online purchase. As a result, many internet users are in the habit of approving all AtivceX control prompts, potentially exposing them to malware."
Link to Original Source

Round Numbers are always false. -- Samuel Johnson

Working...