Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Dunning-Kruger Effect? (Score 1) 134

FWIW, the GP poster is Matt Dillon. He's a well known FreeBSD/Linux kernel hacker and the founder/maintainer of DragonFly BSD and his list of Nerd Cred is legit and long. I'm sure he's forgotten more about network protocols than I ever knew in spite of my kernel patches and Samba contributions. I'd wager he's painfully aware of the ins-and-outs of NAT and IPv6 at a low level.

Don't get me wrong; that doesn't mean he might not be wrong in his evaluation of the protocol. He'd just be wrong on a much more detailed level than I could comment on with any comfort. :)

Submission + - 'Calibration error' changes GOP votes to Dem in Illinois (foxnews.com)

Okian Warrior writes: Early voting in Illinois got off to a rocky start Monday, as votes being cast for Republican candidates were transformed into votes for Democrats.

Republican state representative candidate Jim Moynihan: “I tried to cast a vote for myself and instead it cast the vote for my opponent,” Moynihan said. “You could imagine my surprise as the same thing happened with a number of races when I tried to vote for a Republican and the machine registered a vote for a Democrat.”

The conservative website Illinois Review reported that “While using a touch screen voting machine in Schaumburg, Moynihan voted for several races on the ballot, only to find that whenever he voted for a Republican candidate, the machine registered the vote for a Democrat in the same race. He notified the election judge at his polling place and demonstrated that it continued to cast a vote for the opposing candidate’s party. Moynihan was eventually allowed to vote for Republican candidates, including his own race.

Submission + - Quantum Research Achieves 10-Fold Boost In Superposition Stability

An anonymous reader writes: A team of Australian researchers has developed a qubit offering ten times the stability of existing technologies. The computer scientists claim that the new innovation could significantly increase the reliability of quantum computing calculations. The new technology, developed at the University of New South Wales (UNSW), has been named a ‘dressed’ quantum bit as it combines a single atom with an electromagnetic field. This process allows the qubit to remain in a superposition state for ten times longer than has previously been achieved. The researchers argue that this extra time in superposition could boost the performance stability of quantum computing calculations. Previously fragile and short-lived, retaining a state of superposition has been one of the major barriers to the development of quantum computing. The ability to remain in two states simultaneously is the key to scaling and strengthening the technology further.

Submission + - Android Devices That Contain Foxconn Firmware May Have a Secret Backdoor (softpedia.com)

An anonymous reader writes: Some Android devices that contain firmware created by Foxconn may be vulnerable via a debugging feature left inside the bootloader, which acts as a backdoor and bypasses authentication procedures for any intruder with USB access to a vulnerable phone. By sending the "reboot-ftm" command to Android devices that contain Foxconn firmware, an attacker would authenticate via USB, and boot the device, running as root with SELinux disabled.

There isn't a list of affected devices available yet, but Jon Sawyer, the researchers that discovered this hidden command provides instructions on how to detect if a phone is affected.

"Due to the ability to get a root shell on a password protected or encrypted device, Pork Explosion would be of value for forensic data extraction, brute forcing encryption keys, or unlocking the boot loader of a device without resetting user data. Phone vendors were unaware this backdoor has been placed into their products," Sawyer says.

Comment Not really what I'd consider a 'robot' (Score 1) 45

Car mode looks fine, but the humanoid mode looks like the robot is standing in the unaltered rear third of the car, and the arms and head look useless.

If it can't walk or pick up things, it's not good enough yet.

This one looks like it's not quite as advanced as this one: http://mashable.com/2014/10/23...

Only a human-sized model last I checked, but far more functional.

Comment Re:Spaceflight is risky (Score 1) 239

Risky doesn't mean impossible.

We can go to Mars if we want to throw enough money at it. Living there in a self-sustaining colony of healthy human beings is probably awaiting several engineering and medical breakthroughs, though.

If you're willing to risk a roughly 99% chance of dying in flight due to environmental failure, we could manage an interstellar generation ship - again, by throwing enough money at it.

Comment Re:stinky (Score 2) 176

> If you don't take a Hollywood shower,

Wet skin. Lather soap. Rinse.

If you really had to shower daily (which is nice in close quarters but not exactly required to sustain life), you could get by on maybe 30 seconds of water.

If you have a system to instantly recycle the shower water for the 'wet' part, you could use the entire 30 seconds for the 'rinse'.

Comment Re:powers (Score 1) 212

Granting them the authority to passively scan wireless traffic, identify the location of the WAP, and then providing that information to the police is fine with me. I mean, still stupid, but legally/morally fine.

So long as that's all they get to do. If they are allowed to be judge, jury and executioner as well instead of passing off evidence to the legal system, that's a big problem.

Submission + - Mozilla to Remove Hello in Firefox 49 (softpedia.com)

An anonymous reader writes: An entry on Mozilla's issue tracker opened on July 17 reveals ongoing efforts from Mozilla engineers to remove the Hello system add-on from default Firefox installations starting with version 49, set for public release on September 13, 2016.

Mozilla added Hello to Firefox in version 34, released on December 1, 2014, and from the beginning, it was part of the browser's core code, but was moved in December 2015 into a separate add-on, one that came pre-installed with Firefox, making Hello its first ever system add-on.

Mozilla plans to remove Hello from the codebases of Firefox Beta 49, Firefox Developer Edition 50, and Firefox Nightly 51. Based on the currently available information, the deadline for the Hello code removal operations is for this Monday, August 1, after which the first Firefox builds with no Hello integration will be available for testing, and will ship out in the fall with the stable release.

Submission + - SPAM: Nintendo Suffers 90% Drop in Third-Party Support 1

SlappingOysters writes: Despite the success of Pokémon Go, not everything is going well in the Mushroom Kingdom. Just released figures show a dramatic decline in the amount of third-party support for Nintendo's Wii U console when compared to its five predecessors. It's a timely update on Nintendo's current place in the console market, given the gaming world is expecting an official reveal of its next console — the NX — any day now. The NX is due for release in March 2017.

Comment How do you regression test that stuff? (Score 1) 315

Look at LLVM as an instructive example. It's a large complex beast written in heavy C++, but there are bindings for every language you'd ever want to seriously write a compiler in.

Not a great counterexample - The LLVM C bindings are maintained by hand and all of the other bindings are machine-generated from the C bindings.

IIRC, you're involved with LLVM in some way, shape or form. How the heck do you regression test that hand-hacked stuff? I've come to realize lately that even the most trivial of refactorings can be dangerous. I suspect that the reason that the most trivial code changes are so dangerous is because when something seems trivial, we (or more accurately, I) lose perspective sometimes of the big picture and how far out things can be very loosely coupled. I'd be curious to know how you manage that kind of stuff on something that's so difficult to debug when it goes wrong and yet requires hand manipulation of certain things. Surely most of the LLVM guys are smarter than I am and I'm sure it would be automated if there weren't a darn good technical reason to have it that way.

Submission + - SPAM: Class of Large but Very Dim Galaxies Discovered

schwit1 writes: Astronomers have now detected and measured a new class of large but very dim galaxy that previously was not expected to exist.

‘Ultradiffuse’ galaxies came to attention only last year, after Pieter van Dokkum of Yale University in New Haven, Connecticut, and Roberto Abraham of the University of Toronto in Canada built an array of sensitive telephoto lenses named Dragonfly. The astronomers and their colleagues observed the Coma galaxy cluster 101 megaparsecs (330 million light years) away and detected 47 faint smudges.

“They can’t be real,” van Dokkum recalls thinking when he first saw the galaxies on his laptop computer. But their distribution in space matched that of the cluster’s other galaxies, indicating that they were true members. Since then, hundreds more of these galaxies have turned up in the Coma cluster and elsewhere.

Ultradiffuse galaxies are large like the Milky Way — which is much bigger than most — but they glow as dimly as mere dwarf galaxies. It’s as though a city as big as London emitted as little light as Kalamazoo, Michigan.

More significantly, they have now found that these dim galaxies can be as big and as massive as the biggest bright galaxies, suggesting that there are a lot more stars and mass hidden out there and unseen than anyone had previously predicted.

Submission + - Cisco: Potent ransomware is targeting the enterprise at a scary rate (networkworld.com)

coondoggie writes: Enterprise-targeting cyber enemies are deploying vast amounts of potent ransomware to generate revenue and huge profits – nearly $34 million annually according to Cisco’s Mid-Year Cybersecurity Report out this week.
Ransomware, Cisco wrote, has become a particularly effective moneymaker, and enterprise users appear to be the preferred target.

Submission + - Why Belgium leads in IPv6 adoption (networkworld.com)

netbuzz writes: Every time you read a story devoted to worldwide IPv6 adoption rates, sitting atop the list of highest achievers is Belgium, otherwise better known for chocolate, waffles, beer and diamonds. Google, for example, has worldwide IPv6 adoption at about 12%, Belgium leading at 45%. Why Belgium? Eric Vyncke, co-chair of Belgium’s IPv6 Council, explains a unique set of circumstances involving technology, geography, politics and culture.

Submission + - $5000 Student Loans Default the Most (theatlantic.com)

minstrelmike writes: You can read horror stories about people with $150,000 student loans, but they aren't the ones with the most problems. The "typical for-profit student is a 24-year-old from a first-generation family earning less than $40,000, who eventually drops out of school. The completion rates for two-year and four-year for-profit institutions is about 40 percent and 25 percent, respectively." These are the people most at risk of default.

Slashdot Top Deals

Alexander Graham Bell is alive and well in New York, and still waiting for a dial tone.