Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Actually, many business travelers will like thi (Score 2) 435

True, but what about the all the travelers who have no checked luggage because they don't want to wait for an hour to get it back at the destination (if at all) ?

I often visit the US for 2-3 days to attend conferences with no other luggage than a small carry-on backpack. Depending on the location, the flight takes between 8 and 12 hours - I am definitely not interested in watching 5 movies back-to-back.

Comment Re:Round peg, meet round hole (Score 1) 62

Why don't they offer to run this against the thousands of hours of course videos that Berkley just pulled due to ADA? Google gets massive training material, Berkley gets free transcripts, and the material stays online. Everyone wins...

Good idea, but unfortunately it won't work in this case. Many of UCBerkeley's lecture videos only show the slides and you hear the lecturer talk. See, for example, https://www.youtube.com/watch?....

Comment Not that easy (Score 4, Interesting) 34

It's an interesting idea and nicely carried out, but in the real world I doubt this is of much concern. For the attack to be successful, all of the following must hold
1. memory susceptible to rowhammer attack (in itself not trivial - only few and given memory locations can be flipped)
2. VM manager merges physically identical pages of unrelated VMs (i.e., the identical memory pages of different VMs point to the same physical page)
3. attacker VM must know the contents of the page in the victim VM
4. attacker must register a page with the to-be-attacked contents before the victim VM does so that it can somewhat control its physical location and use rowhammer on it

Especially #3 is not easy. In the paper, the authors assume they know all SSH authorized keys of the victim page which seems a bit far-fetched. Pages holding OS contents are easier to guess; I think an attack on those is more probable.

Also, the fix is trivial. Don't buy cheap RAM that can be attacked with rowhammer for your data centers.

Comment Re:Bizarre opening ceremony... (Score 1) 220

Among the performances was a topless dancer wearing giant wings who soared over orange-suited dancers as they crawled on the ground below.

At another point, humans dressed like bales of hay were seen swaying on a flatbed before running around on the floor.
http://www.huffingtonpost.com/...

Don't forget, this is Europe where people are not scared stiff by topless women and worry that their children become sexual predators because seeing a pair of nipples.

Comment Killing off one internet service at a time. (Score 2) 36

Soon, we will never have to leave Google's "intranet" for anything. IMDB, Wipedia, travel, shopping, weather, calculators, dictionnaries, news, now TV program listings...pages providing a particular service get indexed one by one, context integrated, and then obliterated by Google. The new form of embrace, extend and extinguish, apparently.

This is not a new, but a very worrying approach Google is taking here. Monopolies have never been good for the consumers.

Comment Re:MY daighter is schedule to go on school trip... (Score 1) 106

Don't get all hyped up. Your government has been taking photo ID and fingerprints of all (legal) foreign visitors since ~2002. And as of April 1 this year you can only enter the US with a biometric passport which means my data will be stored in electronic form in one of the many databases the US operate and be susceptible to getting hacked.
The only entity that has my fingerprints is a foreign and rouge government - yours. I have been able to get around a biometric passport until now, so not even my government has any biometric identifiers on me - which is how it should be in an ideal world.

Submission + - The problem with self driving cars: who controls the code? (theguardian.com)

schwit1 writes: The issue is with the "Trolley Problem" as applied to autonomous vehicles, which asks, if your car has to choose between a maneuver that kills you and one that kills other people, which one should it be programmed to do?

The problem with this formulation of the problem is that it misses the big question that underpins it: if your car was programmed to kill you under normal circumstances, how would the manufacturer stop you from changing its programming so that your car never killed you?

Comment Re:Why do they need ANY info? (Score 2) 423

1. Google says it is not true.
2. Adding things like current speed and wheel angle can really help with dead reckoning when GPS is having a problem getting a lock like going through a tunnel.
3. Knowing how much fuel you have left and your current mpg can help it find the cheapest gas along your route.

True, but to implement 2 or 3 only the navigation app needs that data. You don't need to send it all the way to Google (and TFA says so).

Submission + - Bolivian President's plane rerouted on suspicion Snowden on board

Barnoid writes: Bolivian President Evo Morales' plane was rerouted to Austria and had to land in Vienna after France and Portugal refused to let the plane cross their airspace because of suspicions that NSA leaker Edward Snowden was on board.
Note to France & Portugal: next time, try that with the American President and AirForce One on grounds of illegal CIA prisoners being on board.
Power

Laser Fusion's Brightest Hope 115

First time accepted submitter szotz writes "The National Ignition Facility has one foot in national defense and another in the future of commercial energy generation. That makes understanding the basic justification for the facility, which boasts the world's most powerful laser system, more than a little tricky. This article in IEEE Spectrum looks at NIF's recent missed deadline, what scientists think it will take for the facility to live up to its middle name, and all of the controversy and uncertainty that comes from a project that aspires to jumpstart commercial fusion energy but that also does a lot of classified work. NIF's national defense work is often glossed over in the press. This article pulls in some more detail and, in some cases, some very serious criticism. Physicist Richard Garwin, one of the designers of the hydrogen bomb, doesn't mince words. When it comes to nuclear weapons, he says in the article, '[NIF] has no relevance at all to primaries. It doesn't do a good job of mimicking secondaries...it validates the codes in regions that are not relevant to nuclear weapons.'"

Slashdot Top Deals

The Macintosh is Xerox technology at its best.

Working...