Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - Microsoft Open-Sources Checked C, a Safer Version of C (softpedia.com)

An anonymous reader writes: Microsoft has open-sourced Checked C, an extension to the C programming language that brings new features to address a series of security-related issues. As its name hints, Checked C will add checking to C, and more specifically pointer bounds checking. The company hopes to curb the high-number of security bugs such as buffer overruns, out-of-bounds memory accesses, and incorrect type casts, all which would be easier to catch in Checked C. Despite tangible benefits to security, the problem of porting code to Checked C still exists, just like it did when C# or Rust came out, both C alternatives.

Submission + - More Details Emerge On 32-Core AMD Zen Server Chip Code Named 'Naples' (hothardware.com)

MojoKid writes: AMD is hoping their next generation Zen processor architecture will be able to go toe-to-toe with the best that Intel has to offer and AMD is reportedly working on a high-end server variant of Zen as well, codenamed Naples. Naples would have a total of 32 cores, with a cluster of Zen cores sharing an 8MB pool of L3 cache. Total L3 shared cache is pegged at a stout 64MB and Naples will be capable of executing 64 threads while operating within a 180W power envelope. Naples reportedly will support eight independent memory channels and up to 128 PCIe Gen 3 lanes. In addition, a 16x10 GbE Ethernet controller is integrated into the chipset and Naples will use an SP3 LGA socket. The first server-based Zen processor could possibly squeak by for a late 2016 introduction, but odds are that we won't see widespread availability until 2017. At that time, you should expect Zen server processors in dual-, quad-, 16- and 32-core variants, with TDPs ranging from 35 watts to 180 watts. This is the second sighting of a 32-core AMD Zen variant. Earlier this year a CERN Engineer had details corroborating its existence in a presentation he was giving.

Comment Re:Too late (Score 1) 197

Many large companies have a lot of trouble with git. It's not a coincidence that Facebook and Google have been working on Mercurial backends: For their needs, Git is absolutely insufficient.

These companies should consider using Fossil. Fossil is a mature DVCS, BSD-licensed. It is extremely elegantly written, and provides client, server, GUI, CGI executable and web server in a single binary file. It includes a Wiki and a bug tracker for each project. It does not litter your working copy with unnecessary files - only a single dot-file in the highest directory. It was not written in two weeks.

Fossil deserves to be much better known, but for some reason Git gets all the attention.

https://www.fossil-scm.org/

Free project hosting is available here:
http://chiselapp.com/

Comment The Flaw Lurking In Every Deep Neural Net (Score 1) 230

No need to wait for self-driving cars. If the NSA is using neural networks to analyse big data and look for terrorists, it will sometimes miss obvious terrorists, and sometimes classify harmless people as terrorists. I would hope that the latter would be screened out by human review, but there's not much we can do about the former without improving our understanding of neural nets.

Comment Why is the web slow? (Score 1) 220

When a web page is slow to load, it is often because of all the data that must be loaded from 3rd-party sites - Google Analytics is one of the worst, but there is also Facebook, Twitter, etc (probably for 3rd-party logins). SPDY is not going to fix that. If Google wants to speed up the web, it should start by reducing the latency of its own services.

Submission + - Apple Drops Snow Leopard Security Updates, Doesn't Tell Anyone (computerworld.com)

Freshly Exhumed writes: As Apple issued an update for Mavericks, Mountain Lion, and Lion yesterday, Snow Leopard users have not seen a security update since September, 2013. This would not be noteworthy if Apple, like a host of other major software vendors, would clearly spell out its OS support policies and warn users of such changes, but they have not. Thus, the approximately 20% of Mac users still running Snow Leopard now find themselves in a very vulnerable state without the latest security updates.

Submission + - Yes, You Too Can Be An Evil Network Overlord - On The Cheap With OpenBSD, pflow (blogspot.ca)

badger.foo writes: Have you ever wanted to know what's really going on in your network? Some free tools with surprising origins can help you to an almost frightening degree. Peter Hansteen shares some monitoring insights, anecdotes and practical advice in his latest column on how to really know your network. All of it with free software, of course.

Comment Re:What contradiction? (Score 2) 491

Exactly right. Also, from the purchaser's viewpoint, he wants good quality oranges but wants to pay the poor-quality price.

There are purchasers all over the country who could make best-selling orange juice, if only they could buy good quality fruit at trash prices. The flaw is in their own business model, not in the way that oranges are produced.

Comment Evidence that we are living in a simulation (Score 1) 745

How would a mathematician run a simulation?

(1) It would not be a QCD simulation of the whole universe, because in most times and places a simpler approximation than QCD would be sufficient.
(2) Special Relativity - helps the simulation, because it constrains the crosstalk between different star systems, different galaxies etc. A full simulation of the entire universe would not be necessary.
(3) Quantum Mechanics - hinders the simulation, by increasing the computational complexity. Incompletely decohered multiple worlds must be simulated, and this is hugely computationally expensive - unless you have a quantum computer.

A corollary of the simulation hypothesis is therefore: if we are living in a computer simulation, then quantum computers are physically possible, at least in the host world.

Comment Re:Presumed Complicit. (Score 1) 195

The original story is ambiguous, but the linked articles appear to state that it was the operator of Freedom Hosting, not TorMail, who was charged with enabling CP. If the feds can run a Tor client to see what a site on the dark web is offering, it is a reasonable assumption that the hosting provider can do the same, and should do some basic diligence to ensure that the sites he is hosting comply with the law.

It is interesting of course that GMail, EC2, AT&T etc escape responsibility for what their customers do.

Bruce Schneier said "What I took away from reading the Snowden documents was that if the NSA wants in to your computer, it's in. Period."

This applies even if you are using TOR. TOR conceals your IP address, but it cannot remove the vulnerability of the end points - the client and server of the web/mail/whatever service. The Silk Road server was running PHP, and was probably compromised within hours of coming to the attention of the authorities. For the next two years the FBI was most likely building a case by parallel construction.

It is not a smart idea to use TOR or other services to break the law.

Comment Re: Amp hours per kilogram (Score 1) 199

Well spotted. The figure guessed above (0.13V) is incorrect because the maximum power density and maximum current density do not occur under the same conditions.

The paper claims "an order of magnitude" higher power density than Li ion batteries. The table in the png file shows that, by "an order of magnitude", they mean a factor of two.

Some of the technological problems are mentioned in comments below.

It's a very nice piece of scientific work, but I don't expect these batteries will be coming to our phones any time soon.

Slashdot Top Deals

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...