Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:Run faster on the treadmill (Score 1) 89

Yahoo's "hope" seems pretty optimistic all right. I'd think they'd be more interested in the finding the vulnerability bit anyway. Run it on your code before you make it live and fix the bugs yourself if you have to.

They probably decided they needed to explain why a major tech company was sponsoring develop of automated cracking tools though.

Comment Re:Technology Buzz Words (Score 1) 89

Your definition isn't the one commonly in use. Most people would say "human-level AI" or at least "hard AI" to talk about what you describe.

From https://en.wikipedia.org/wiki/...:

Artificial intelligence (AI) is intelligence exhibited by machines. In computer science, an ideal "intelligent" machine is a flexible rational agent that perceives its environment and takes actions that maximize its chance of success at some goal.[1] Colloquially, the term "artificial intelligence" is applied when a machine mimics "cognitive" functions that humans associate with other human minds, such as "learning" and "problem solving".[2] As machines become increasingly capable, facilities once thought to require intelligence are removed from the definition. For example, optical character recognition is no longer perceived as an exemplar of "artificial intelligence" having become a routine technology.[3] Capabilities still classified as AI include advanced Chess and Go systems and self-driving cars.

So a program that runs through a list of vulnerabilities checking for each one wouldn't really qualify as AI, but one that used a more sophisticated approach might.

Comment Re:China needs to get out of 1939. (Score 1) 173

Read "The Better Angels of our Nature" by Stephen Pinker.

The answer to your question is that lots of things have changed since 1939 (or 1039 for that matter) and while the exact details of the mechanics may not be precisely clear, the incidence of interstate and civil war, genocide, other killings by governments, terrorism and murder have all decreased dramatically.

Factors that appear to make it unlikely for states to go to war with each other are one or both being democracies, a strong reliance on international trade, and membership in international organizations. While China isn't really a democracy, the US is (mostly) and both rely very heavily on international trade and are members of a great number of international organizations.

Comment Re:Umm, satellites? (Score 2) 173

Satellite imagery can't tell you everything. In this case you might see a building that you suspect might be some kind of military installation, but you're not sure. Pokemon Go usage would probably be a half decent datapoint, but could be confounded by things like civilian employers who don't like their employees goofing off. Realistically, the US probably just monitors which places have government or military cell phones frequenting them.

Comment Re:No backup, artist must consider it unimportant (Score 2) 465

Better! The artist's experiment with a new medium has revealed that it is ephemeral, as are all things in life. While you might think you are working digital marble, like the sculptors of the ancients, the cyber medium is more akin to shifting sand.

I threw up in my mouth a little writing that.

Comment Re:So. . . (Score 3, Insightful) 104

You're assuming there's secret sauce. It sounds like the do a search for whatever their TV show is, and draw a pretty graph of the number of seeders and leechers. There can optionally be a "a verification section that confirms that the peer download file matches the target file."

Sounds like a pretty standard waste of the patent office's time.

Comment Re:Meh (Score 1) 138

That's an example of a failure of defense in depth. Why shouldn't gethostbyname() be executed in the kernel? Seems like a reasonable place to execute system calls no? The reason is, you want to execute everything with the lowest possible privileges. If there is an exploitable bug, the exploit doesn't get you very far.

Slashdot Top Deals

1 Sagan = Billions & Billions

Working...