Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Interesting, but compiler settings aren't optimal (Score 1) 11 11

Look here at the compiler settings. The x86 processors are somewhat hampered by non-optimal settings. For example the i3 5010U is set to -mtune=generic. In my experience, that's basically going to default to AMD K8 optimization with no AVX/AVX2 support. The better option would be using -mtune=native or better yet -march=native, which would detect the CPU and produce a more optimized binary.


Pro Gamers To Be Tested For Doping 154 154

An anonymous reader writes: The Electronic Sports League is the biggest organization for running video game competitions. The league has now announced that they will begin testing professional video gamers for performance-enhancing drugs. The league is getting help in making policies from anti-doping agencies that help regulate athletes in traditional sports. They say, "[W]e will be administering the first PED skin tests at ESL One Cologne this August, with a view to performing these tests at every Intel Extreme Masters, ESL One and ESL ESEA Pro League event thereafter as soon as the official PED policy is established and tournament rules updated accordingly." This announcement comes after a high-profile Counter-Strike: Global Offensive player admitted last week that he and many other players used Adderall to gain an advantage in tournaments.

Comment Re:Negotiating salaries is for the birds. (Score 1) 428 428

only to have to turn them down after being offered the job because they weren't paying a decent wage for the job at hand

I thought the trend now days was for you to indicate how much you were willing to work for when you applied for the job (complete with salary history of your previous jobs), and hope that you were within the acceptable range.

Comment Re:Misleading and Hyperbolic Title/Comparison (Score 4, Funny) 129 129

A lot of security exploits could fit within a tweet, but I've never seen that comparison before.

You're right .. they should have specified it in pico Libraries of Congress. At least that's a unit of measurement that most people here would understand.

Comment Re:Used to be an obligatory post (Score 1) 54 54

This would be posted when Slashdot was still news for nerds:
"I wonder what a Beowulf cluster of these could do.."

Why don't you ask Natalie Portman why things have gone down hill? I'm sure you can get her comment before her breakfast of hot grits. But just be prepared for an answer that welcomes the new overlords.

The sad thing is that Netcraft will now finally be able to confirm what is going on, to the point that not even an insensitive clod in Soviet Russia will be spared any feelings. Now if you will excuse me, I need to change the onion on my belt.

Comment Re:11 rear enders (Score 1) 549 549

4) You were traveling at normal speed with no visible traffic in front of you, crested a hill and then ran into the traffic that was stopped just over the crest of the hill.

This happened to me once, I had stopped behind the car in front of me (in a line of stopped traffic extending down the hill for about 1km), two cars had stopped behind me. A third car came over the hill, impacted into the last car which shunted into the car behind me, who shunted into my car with enough force that my car was put off the road with a broken rear axle. Fortunately I had stopped with enough room that I wasn't shunted into the car in front of me. This also occurred just after dusk, and a light rain was falling, so it was the worst of all possible conditions.

Submission + - New RC4 Encryption Attacks Reduces Plaintext Recovery Time->

msm1267 writes: Two Belgian security researchers from the University of Leuven have driven new nails into the coffin of the RC4 encryption algorithm. A published paper, expected to be delivered at the upcoming USENIX Security Symposium next month in Washington, D.C., describes new attacks against RC4 that allow an attacker to capture a victim’s cookie and decrypt it in a much shorter amount of time than was previously possible.

The paper “All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS,” written by Mathy Vanhoef and Frank Piessens, explains the discovery of new biases in the algorithm that led to attacks breaking encryption on websites running TLS with RC4, as well as the WPA-TKIP, the Wi-Fi Protected Access Temporal Key Integrity Protocol.

Link to Original Source

Submission + - Flirtey Cleared For Take-Off in First FAA-Approved Drone Delivery Service->

Zothecula writes: One weekend each July, 1,500 people from rural area of Wise County, Virginia descend on the local fairgrounds for a once yearly medical clinic. Here they seek attention for conditions that go untreated for the rest of the year due to lack of access to proper healthcare. In years gone by, medical supplies would be brought into the town by truck, but this year things will be working a little differently. Startup Flirtey has teamed up with NASA to conduct a Federal Aviation Administration (FAA) approved exercise to deliver some of these items by drone. This is a good news for a startup trying to spread its wings, but even better news for rural folk who instead of waiting days for medication will have their prescriptions filled in just half an hour. And as Flirtey CEO Matt Sweeney tells Gizmag, it could be the "Kitty Hawk" moment the drone delivery industry has been longing for.
Link to Original Source

Submission + - Why Enterprise Security Priorities Don't Address The Most Serious Threats

An anonymous reader writes: In 2015, enterprises will spend more than $71.1 billion on information security – more than they have ever spent before, according to Gartner Group figures. Yet, the incidence of major data breaches shows no signs of abating. As enterprises continue to struggle with online attacks and data leaks, many are asking one common question: What are we doing wrong? According to a survey of nearly 500 top-level security experts who have attended Black Hat USA, most enterprises are not spending their time, budget, and staffing resources on the problems that most security professionals consider to be the greatest threats.

My mother is a fish. - William Faulkner