Comment Proper CtrlTabbing (Score 1) 195
I *really* prefer ctrl-tab to open the previous tab, and not cycle through the tabs. So Tab Mix Plus.
Anybody know of another plugin to do that for me?
I *really* prefer ctrl-tab to open the previous tab, and not cycle through the tabs. So Tab Mix Plus.
Anybody know of another plugin to do that for me?
As someone who works at a decent-sized bank, and knowing what other 'big' banks are doing around the area, I really wonder what the writer was thinking here.
Financial services are roughly three categories:
* Backoffice -- Mostly IT, so maintenance, development etc. (on aging platforms from time to time, but that doesn't matter). Not something you want to do mobile, you want a decent workstation. Maybe outsourced, maybe in-house (if deemed sensitive enough)
* Frontoffice: helpdesks, financial advisors, etc. They already have apps/tablet software, etc, so they can come to your house to sell you their product. So, nothing new there
* management: doesn't need anything, really. They might want mobile, but all they need is to receive their email, make minutes, etc. And they do that on mobile devices just fine already
(of course, this is traditional banking, not the asset/trust/stock/portfolio management... But even then, they still wouldn't want to do that mobile)
So really, are there *any* advantages to going mobile? The article (which, yes, I browsed), is about employees wanting to go mobile. Really, nobody wants that but some lazy-ass phonepeckering controlfreak manager (and I mean lazy-ass because if you want to do your work quickly, you want a decent workstation to type mails at speed, or call while typing... with 10 fingers instead of one).
It's bad clickbait...
This research shows it's feasible. As others have said, there are a multitude of crypto-systems for which it is worthwhile to determine the private key.
* Determining what algorithm is used isn't that hard. Most are 'off the shelf'. Modifying cryptographic algorithms is almost always a no-no, as it requires heavy resources to ensure it's still accurately safe.
* Determining when an RSA algorithm runs is also not as hard. First, turn down the clock speed. Second, check the energy input/output. This gives a fairly good idea which sort of statements are executed. And then match it to RSA.
* Inducing faults at the proper time then isn't also that hard. Again, turn down clock speed, and do it a couple of times.
In short, it has been done. If there's a one in 50 chance that you insert a proper glitch... and each glitch exposes one bit of the private key, then you'd (only) need 256 successfull glitches. Maybe you can cut it short to, say 200 (as the last 56 you can guess, which might be quicker/easier), so it would require some 1000 break-attempts.
That's still far short of the 2^255 which you'd need to guess the key.
And for expensive systems, it could mean good money.
If I were to pay a couple of students $2000 for a week of dull work, they'd probably do it for me...
Also interesting:
roughly 8 to 12C (depends a bit on relative humidity): breath condensates ('clouds when you breathe'). If it's humid, it condensates quicker. A very bright, dry day, it condensates a bit lower(8 degrees C). On a very cloudy, misty day, it condensates a bit quicker.
So mine would be:
+40 : I'm abroad, walking in death valley.
+30 : welcome to the tropics. I probably took a wrong turn somewhere.
+20 : time to start wearing shorts/shirts
+10 : breath condensates
+0 : water freezes.
-10 : damn it's cold
-20 : I'm not going out there. I'm gonna stay inside and watch Elfstedentocht!
-30 : A new ice age must have arrived.
So, briefly skimming the article, it's about the solar challenge.
60 MPH is squat.
Previous winner Nuna 4 did almost 90, as it had a top speed of 142 km/h (or 88MPH)
The version before that did an average of 63.8 MPH for the entire race. (after that they changed the rules)
So what's the news value of this?
have the rules changed for this years solar challenge?
"If a computer can't directly address all the RAM you can use, it's just a toy." -- anonymous comp.sys.amiga posting, non-sequitir