Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Round peg, meet round hole (Score 1) 62

Why don't they offer to run this against the thousands of hours of course videos that Berkley just pulled due to ADA? Google gets massive training material, Berkley gets free transcripts, and the material stays online. Everyone wins...

Good idea, but unfortunately it won't work in this case. Many of UCBerkeley's lecture videos only show the slides and you hear the lecturer talk. See, for example,

Comment Not that easy (Score 4, Interesting) 34

It's an interesting idea and nicely carried out, but in the real world I doubt this is of much concern. For the attack to be successful, all of the following must hold
1. memory susceptible to rowhammer attack (in itself not trivial - only few and given memory locations can be flipped)
2. VM manager merges physically identical pages of unrelated VMs (i.e., the identical memory pages of different VMs point to the same physical page)
3. attacker VM must know the contents of the page in the victim VM
4. attacker must register a page with the to-be-attacked contents before the victim VM does so that it can somewhat control its physical location and use rowhammer on it

Especially #3 is not easy. In the paper, the authors assume they know all SSH authorized keys of the victim page which seems a bit far-fetched. Pages holding OS contents are easier to guess; I think an attack on those is more probable.

Also, the fix is trivial. Don't buy cheap RAM that can be attacked with rowhammer for your data centers.

Comment Re:Bizarre opening ceremony... (Score 1) 220

Among the performances was a topless dancer wearing giant wings who soared over orange-suited dancers as they crawled on the ground below.

At another point, humans dressed like bales of hay were seen swaying on a flatbed before running around on the floor.

Don't forget, this is Europe where people are not scared stiff by topless women and worry that their children become sexual predators because seeing a pair of nipples.

Comment Killing off one internet service at a time. (Score 2) 36

Soon, we will never have to leave Google's "intranet" for anything. IMDB, Wipedia, travel, shopping, weather, calculators, dictionnaries, news, now TV program listings...pages providing a particular service get indexed one by one, context integrated, and then obliterated by Google. The new form of embrace, extend and extinguish, apparently.

This is not a new, but a very worrying approach Google is taking here. Monopolies have never been good for the consumers.

Comment Re:MY daighter is schedule to go on school trip... (Score 1) 106

Don't get all hyped up. Your government has been taking photo ID and fingerprints of all (legal) foreign visitors since ~2002. And as of April 1 this year you can only enter the US with a biometric passport which means my data will be stored in electronic form in one of the many databases the US operate and be susceptible to getting hacked.
The only entity that has my fingerprints is a foreign and rouge government - yours. I have been able to get around a biometric passport until now, so not even my government has any biometric identifiers on me - which is how it should be in an ideal world.

Submission + - The problem with self driving cars: who controls the code? (

schwit1 writes: The issue is with the "Trolley Problem" as applied to autonomous vehicles, which asks, if your car has to choose between a maneuver that kills you and one that kills other people, which one should it be programmed to do?

The problem with this formulation of the problem is that it misses the big question that underpins it: if your car was programmed to kill you under normal circumstances, how would the manufacturer stop you from changing its programming so that your car never killed you?

Comment Re:Why do they need ANY info? (Score 2) 423

1. Google says it is not true.
2. Adding things like current speed and wheel angle can really help with dead reckoning when GPS is having a problem getting a lock like going through a tunnel.
3. Knowing how much fuel you have left and your current mpg can help it find the cheapest gas along your route.

True, but to implement 2 or 3 only the navigation app needs that data. You don't need to send it all the way to Google (and TFA says so).

Submission + - Bolivian President's plane rerouted on suspicion Snowden on board

Barnoid writes: Bolivian President Evo Morales' plane was rerouted to Austria and had to land in Vienna after France and Portugal refused to let the plane cross their airspace because of suspicions that NSA leaker Edward Snowden was on board.
Note to France & Portugal: next time, try that with the American President and AirForce One on grounds of illegal CIA prisoners being on board.

Laser Fusion's Brightest Hope 115

First time accepted submitter szotz writes "The National Ignition Facility has one foot in national defense and another in the future of commercial energy generation. That makes understanding the basic justification for the facility, which boasts the world's most powerful laser system, more than a little tricky. This article in IEEE Spectrum looks at NIF's recent missed deadline, what scientists think it will take for the facility to live up to its middle name, and all of the controversy and uncertainty that comes from a project that aspires to jumpstart commercial fusion energy but that also does a lot of classified work. NIF's national defense work is often glossed over in the press. This article pulls in some more detail and, in some cases, some very serious criticism. Physicist Richard Garwin, one of the designers of the hydrogen bomb, doesn't mince words. When it comes to nuclear weapons, he says in the article, '[NIF] has no relevance at all to primaries. It doesn't do a good job of mimicking validates the codes in regions that are not relevant to nuclear weapons.'"

Comment Re:Tell me Professor (Score 1) 454

At our (national) university (not in the US, but similar living cost), a tenured professor shortly before
retirement has a salary of about $80'000. Assistant professors get ~$40K. (To be fair: profs at private
universities get about twice as much). I don't know about other departments, but at least in engineering,
both tenured and assistant profs put in a lot of hours.

If you're working in the systems area (low-level stuff such as OSes, compilers, etc), it's hard to write
even two papers per year and grad student, because we actually implement our ideas, debug them,
and may not be able to publish if the results are worse than expected. And most projects are too big
for one student, so a whole team is working on it.

In computer science, we compete with everyone who has has interet access and a computer. The guys
at, for example, Tsinghua University in Beijing work extremely hard and are at least as talented as your average
grad student in the US or Europe. If we publish something new, a framework, a new scheduling algorithm,
etc., for that first paper we do have some slack. Once it's out, anyone is free to improve the ideas there
and publish a follow-up paper. From that moment on, even though we have a good head start, it's either
publish fast or work on something entirely new. Unfortunately, not everybody has a new cool idea every day.

Slashdot Top Deals

Real programs don't eat cache.