Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Dunning-Kruger Effect? (Score 1) 135

FWIW, the GP poster is Matt Dillon. He's a well known FreeBSD/Linux kernel hacker and the founder/maintainer of DragonFly BSD and his list of Nerd Cred is legit and long. I'm sure he's forgotten more about network protocols than I ever knew in spite of my kernel patches and Samba contributions. I'd wager he's painfully aware of the ins-and-outs of NAT and IPv6 at a low level.

Don't get me wrong; that doesn't mean he might not be wrong in his evaluation of the protocol. He'd just be wrong on a much more detailed level than I could comment on with any comfort. :)

Submission + - 'Calibration error' changes GOP votes to Dem in Illinois (

Okian Warrior writes: Early voting in Illinois got off to a rocky start Monday, as votes being cast for Republican candidates were transformed into votes for Democrats.

Republican state representative candidate Jim Moynihan: “I tried to cast a vote for myself and instead it cast the vote for my opponent,” Moynihan said. “You could imagine my surprise as the same thing happened with a number of races when I tried to vote for a Republican and the machine registered a vote for a Democrat.”

The conservative website Illinois Review reported that “While using a touch screen voting machine in Schaumburg, Moynihan voted for several races on the ballot, only to find that whenever he voted for a Republican candidate, the machine registered the vote for a Democrat in the same race. He notified the election judge at his polling place and demonstrated that it continued to cast a vote for the opposing candidate’s party. Moynihan was eventually allowed to vote for Republican candidates, including his own race.

Submission + - Quantum Research Achieves 10-Fold Boost In Superposition Stability

An anonymous reader writes: A team of Australian researchers has developed a qubit offering ten times the stability of existing technologies. The computer scientists claim that the new innovation could significantly increase the reliability of quantum computing calculations. The new technology, developed at the University of New South Wales (UNSW), has been named a ‘dressed’ quantum bit as it combines a single atom with an electromagnetic field. This process allows the qubit to remain in a superposition state for ten times longer than has previously been achieved. The researchers argue that this extra time in superposition could boost the performance stability of quantum computing calculations. Previously fragile and short-lived, retaining a state of superposition has been one of the major barriers to the development of quantum computing. The ability to remain in two states simultaneously is the key to scaling and strengthening the technology further.

Submission + - Android Devices That Contain Foxconn Firmware May Have a Secret Backdoor (

An anonymous reader writes: Some Android devices that contain firmware created by Foxconn may be vulnerable via a debugging feature left inside the bootloader, which acts as a backdoor and bypasses authentication procedures for any intruder with USB access to a vulnerable phone. By sending the "reboot-ftm" command to Android devices that contain Foxconn firmware, an attacker would authenticate via USB, and boot the device, running as root with SELinux disabled.

There isn't a list of affected devices available yet, but Jon Sawyer, the researchers that discovered this hidden command provides instructions on how to detect if a phone is affected.

"Due to the ability to get a root shell on a password protected or encrypted device, Pork Explosion would be of value for forensic data extraction, brute forcing encryption keys, or unlocking the boot loader of a device without resetting user data. Phone vendors were unaware this backdoor has been placed into their products," Sawyer says.

Submission + - Mozilla to Remove Hello in Firefox 49 (

An anonymous reader writes: An entry on Mozilla's issue tracker opened on July 17 reveals ongoing efforts from Mozilla engineers to remove the Hello system add-on from default Firefox installations starting with version 49, set for public release on September 13, 2016.

Mozilla added Hello to Firefox in version 34, released on December 1, 2014, and from the beginning, it was part of the browser's core code, but was moved in December 2015 into a separate add-on, one that came pre-installed with Firefox, making Hello its first ever system add-on.

Mozilla plans to remove Hello from the codebases of Firefox Beta 49, Firefox Developer Edition 50, and Firefox Nightly 51. Based on the currently available information, the deadline for the Hello code removal operations is for this Monday, August 1, after which the first Firefox builds with no Hello integration will be available for testing, and will ship out in the fall with the stable release.

Submission + - SPAM: Nintendo Suffers 90% Drop in Third-Party Support 1

SlappingOysters writes: Despite the success of Pokémon Go, not everything is going well in the Mushroom Kingdom. Just released figures show a dramatic decline in the amount of third-party support for Nintendo's Wii U console when compared to its five predecessors. It's a timely update on Nintendo's current place in the console market, given the gaming world is expecting an official reveal of its next console — the NX — any day now. The NX is due for release in March 2017.

Comment How do you regression test that stuff? (Score 1) 315

Look at LLVM as an instructive example. It's a large complex beast written in heavy C++, but there are bindings for every language you'd ever want to seriously write a compiler in.

Not a great counterexample - The LLVM C bindings are maintained by hand and all of the other bindings are machine-generated from the C bindings.

IIRC, you're involved with LLVM in some way, shape or form. How the heck do you regression test that hand-hacked stuff? I've come to realize lately that even the most trivial of refactorings can be dangerous. I suspect that the reason that the most trivial code changes are so dangerous is because when something seems trivial, we (or more accurately, I) lose perspective sometimes of the big picture and how far out things can be very loosely coupled. I'd be curious to know how you manage that kind of stuff on something that's so difficult to debug when it goes wrong and yet requires hand manipulation of certain things. Surely most of the LLVM guys are smarter than I am and I'm sure it would be automated if there weren't a darn good technical reason to have it that way.

Submission + - SPAM: Class of Large but Very Dim Galaxies Discovered

schwit1 writes: Astronomers have now detected and measured a new class of large but very dim galaxy that previously was not expected to exist.

‘Ultradiffuse’ galaxies came to attention only last year, after Pieter van Dokkum of Yale University in New Haven, Connecticut, and Roberto Abraham of the University of Toronto in Canada built an array of sensitive telephoto lenses named Dragonfly. The astronomers and their colleagues observed the Coma galaxy cluster 101 megaparsecs (330 million light years) away and detected 47 faint smudges.

“They can’t be real,” van Dokkum recalls thinking when he first saw the galaxies on his laptop computer. But their distribution in space matched that of the cluster’s other galaxies, indicating that they were true members. Since then, hundreds more of these galaxies have turned up in the Coma cluster and elsewhere.

Ultradiffuse galaxies are large like the Milky Way — which is much bigger than most — but they glow as dimly as mere dwarf galaxies. It’s as though a city as big as London emitted as little light as Kalamazoo, Michigan.

More significantly, they have now found that these dim galaxies can be as big and as massive as the biggest bright galaxies, suggesting that there are a lot more stars and mass hidden out there and unseen than anyone had previously predicted.

Submission + - Cisco: Potent ransomware is targeting the enterprise at a scary rate (

coondoggie writes: Enterprise-targeting cyber enemies are deploying vast amounts of potent ransomware to generate revenue and huge profits – nearly $34 million annually according to Cisco’s Mid-Year Cybersecurity Report out this week.
Ransomware, Cisco wrote, has become a particularly effective moneymaker, and enterprise users appear to be the preferred target.

Submission + - Why Belgium leads in IPv6 adoption (

netbuzz writes: Every time you read a story devoted to worldwide IPv6 adoption rates, sitting atop the list of highest achievers is Belgium, otherwise better known for chocolate, waffles, beer and diamonds. Google, for example, has worldwide IPv6 adoption at about 12%, Belgium leading at 45%. Why Belgium? Eric Vyncke, co-chair of Belgium’s IPv6 Council, explains a unique set of circumstances involving technology, geography, politics and culture.

Submission + - $5000 Student Loans Default the Most (

minstrelmike writes: You can read horror stories about people with $150,000 student loans, but they aren't the ones with the most problems. The "typical for-profit student is a 24-year-old from a first-generation family earning less than $40,000, who eventually drops out of school. The completion rates for two-year and four-year for-profit institutions is about 40 percent and 25 percent, respectively." These are the people most at risk of default.

Submission + - Pending bill would kill a big H-1B loophole (

ErichTheRed writes: This isn't perfect, but it is the first attempt I've seen at removing the "body shop" loophole in the H-1B visa system. A bill has been introduced in Congress that would raise the minimum wage for an H-1B holder from $60K to $100K, and place limits on the body shop companies that employ mostly H-1B holders in a pass-through arrangement. Whether it's enough to stop the direct replacement of workers, or whether it will just accelerate offshoring, remains to be seen. But, I think removing the most blatant and most abused loopholes in the rules is a good start.

Submission + - SPAM: Almost Half of All TSA Employees Have Been Cited for Misconduct

schwit1 writes: Almost half of all TSA employees have been cited for misconduct, and the citations have increased by almost 30 percent since 2013.

Of the total allegations filed, 90.8 percent were against TSA officers, while 4.8 percent were filed against managers or administrators. Of the areas of misconduct, “Attendance & Leave” sees the highest number of offenders, while “Failure to Follow Instructions,” “Screening & Security,” “Neglect of Duty,” and “Disruptive Behavior” round out the top five.

It also appears that the TSA has been reducing the sanctions it has been giving out for this bad behavior.

Submission + - Maximizing economic output with linear programming ... and communism (

mkwan writes: Economies are just a collection of processes that convert raw materials and labour into useful goods and services. By representing these processes as a series of equations and solving a humongous linear programming problem, it should be possible to maximize an economy's GDP. The catch? The economy needs to go communist.

Submission + - Library of Congress Hit With A Denial-Of-Service Attack (

An anonymous reader writes: The Library of Congress (LOC) announced via Twitter Monday that they were the target of a denial-of-service attack. The attack was detected on July 17 and has caused other websites hosted by the LOC, including the U.S. Copyright Office, to go down. In addition, employees of the Library of Congress were unable to access their work email accounts and to visit internal websites. The outages continue to affect some online properties managed by the library. "In June 2015, the Government Accountability Office, or GAO, published a limited distribution report — undisclosed publicly though it was sourced in a 2015 GAO testimony to the Committee on House Administration — highlighting digital security deficiencies apparent at the Library of Congress, including poor software patch management and firewall protections," reports FedScoop.

Slashdot Top Deals

If at first you don't succeed, you must be a programmer.