Forgot your password?
typodupeerror

Comment What's the problem? (Score 1) 82

With all of GitHub's great new AI features, it writes all your code for you! It doesn't matter whether the site is up at any given moment; just download your newly completed app at some point then the site is online. You're free to kick back, relax and scroll your social feeds because you don't actually have to do anything anymore. This is truly a golden era!

Comment Re:We need humility, not arrogance (Score 1) 172

Formal verification mathematically proves code implements a specification. It does not catch bugs that are specified.
There are entire classes of bugs (logic bugs) that LLMs can find that formal verification literally doesn't even try to.

So you prompt the LLM to "find all the bugs".

Even if the LLM can find every last bug (which in turn assumes that this type of problem isn't NP-hard or has some issue that Godel would point out), just defining to the LLM exactly what a "bug" is seems to be pretty much the same thing as those formal specifications that you just convincingly dismissed as inadequate.

I don't think that there's anything magical about LLMs that would let them get around fundamental mathematical roadblocks.

Comment Re:How did they get initial access to the routers? (Score 2) 70

According to a Brian Krebs article, initial access to devices such as routers and TV boxes that are vulnerable on the LAN side of a NATed home internet connection is sometimes via 'free' smartphone games and apps that contain residential proxy software.

Some 'free' smartphone games and apps make money by allowing nefarious people to relay traffic through your home internet connection for things like fake social media accounts and credit card fraud but sometimes they also relay traffic to LAN ip addresses, typically 192.168.0.x, allowing hacking of devices that have default passwords, security holes in the crappy web interface, "Android Debug Bridge" enable and suchlike.

https://krebsonsecurity.com/20...

Comment Re:Intel's political marketing has always been bad (Score 4, Insightful) 23

If you read this post it shows that AMD stole Intel's design and reverse engineered it.

If you dig deeper, you'll find that AMD originally reverse engineered the *8080*, not the 8086. The two companies had entered into a cross-licensing agreement by 1976. Intel agreed to let AMD second-source the 8086 in order to secure the PC deal with IBM, who insisted on having a second source vendor.

There would have been no Intel success story without AMD to back them up.

(That actually would have been for the best. IBM would probably have selected an non-segmented CPU from somebody else instead of Intel's kludge.)

Slashdot Top Deals

Mausoleum: The final and funniest folly of the rich. -- Ambrose Bierce

Working...