Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Economics not Physics (Score 1) 306

Intel's not lagging behind much; it just looks that way because Samsung and TSMC define their feature sizes differently.

Their 10nm process is comparable to Intel's 14nm process, etc.

Both will run out of steam at about the same point -- Intel's 5nm, and Samsung/TSMC's 3nm, will likely be the last process shrink.

Comment Re:Stop Writing Bloatware (Score 1) 306

There are libraries, and then there are libraries. Some libraries, like BLAS, are written by very good programmers who are expert in their domain, avoid common pitfalls (or evolved to avoid them after several development cycles) and have optimized the hell out of the implementation. Other libraries, like almost every javascript framework in existence, are poorly written, horribly slow, and full of bugs (but may provide hard-to-get capabilities). Code re-use is kind of like email implementation -- it seems like it should be straightforward, but it totally isn't. Doing it right requires care and experience.

Submission + - Ed Snowden leaves Hong Kong for Moscow 3

hazeii writes: Ed Snowden, the US whistleblower responsible for exposing the degree to which the US watches its own citizens (as well as the rest of the world) is reported as having left Hong Kong for Moscow. According to the South China Morning Post, he is on a commercial flight to Russia but intriguingly it seems this is not his final destination. It's not clear whether this move is in response to the US request to extradite him.

Submission + - US Hacked Chinese University Network 1

An anonymous reader writes: Hong Kong's South China Morning Post reports that Tsinghua University, widely regarded as the mainland’s top education and research institute, was the target of extensive hacking by US spies this year, according to information leaked by Edward Snowden. The information also showed that the attacks on Tsinghua University were intensive and concerted efforts. In one single day of January, at least 63 computers and servers in Tsinghua University have been hacked by the NSA. The university is home to one of the mainland’s six major backbone networks, the China Education and Research Network (CERNET) from where internet data from millions of Chinese citizens could be mined. Universities in Hong Kong and the mainland were revealed as targets of NSA’s cyber-snooping activities last week when Snowden claimed the Chinese University of Hong Kong had been hacked.

Submission + - Snowden's Big Truth: We Are All Less Free (itworld.com)

chicksdaddy writes: In the days since stories based on classified information leaked by former NSA contractor Edward Snowden hit the headlines, a string of reports and editorials claim that he had his facts wrong, accuse him of treason – or both. Others have accused journalists like Glen Greenwald of The Guardian of rushing to print before they had all the facts.

All of these criticisms could be valid. Technology firms may not have given intelligence agencies unfettered and unchecked access to their users' data. Edward Snowden may be, as the New York Times's David Brooks suggests, one of those 20-something-men leading a "life unshaped by the mediating institutions of civil society." All those critiques may be true without undermining the larger truth of Snowden's revelation: in an age of global, networked communications and interactions, we are all a lot less free than we thought we were.

I say this because nobody has seriously challenged the basic truth of Snowden's leak: that many of the world's leading telecommunications and technology firms are regularly divulging information about their users' activities and communications to law enforcement and intelligence agencies based on warrantless requests and court reviews that are hidden from public scrutiny.

It hasn't always been so. In 1877, the U.S. Supreme Court, weighing the government's ability to inspect the content of letters sent via the postal service, found that "No law of Congress can place in the hands of officials connected with the postal service any authority to invade the secrecy of letters and such sealed packages in the mail; and all regulations adopted as to mail matter of this kind must be in subordination to the great principle embodied in the fourth amendment of the Constitution." That's why all of us understand that exercising the convenience of dropping a letter in the corner post office box doesn't mean that we also consent to the government ripping open that letter and read its contents.

Sadly, we've been steadily conditioned to think differently about our electronic communications. We've been asked by both private sector firms and our government to accept a false choice: that there must be some bargain – a tradeoff between privacy and convenience.

Science

Submission + - nanostructured semiconductor alloy crystals heat to be manipulated like light (eurekalert.org)

An anonymous reader writes: A new technique allows allows thermocrystals to be created that can manipulate heat (a vibration of the atomic lattice of a material). Predicted manipulations include the ability to selectively transmit / reflect or concentrate heat much like light waves can be manipulated by lenses and mirrors. Applications range from better thermoelectric devices to switchable heat insulating/transmitting materials etc. Perhaps this will result in better cooling/heating mechanisms or more efficient engines.
EU

Submission + - EU Antitrust Chief: Google "Diverting Traffic" & Will Be Forced To Change (searchengineland.com)

Dupple writes: It looks like the EU is coming close to a decision regarding its investigation of Google according to the FT and Search Engine Land

While saying he’s “still investigating,” the head of the European Union’s antitrust regulatory body has told the Financial Times that he’s convinced Google is “diverting traffic” and that it will be forced to change its results.

From the FT interview:

“We are still investigating, but my conviction is [Google] are diverting traffic,” Mr Almunia told the Financial Times, referring to Google’s preferential treatment of its own vertical search services.

That’s Joaquin Almunia, who has been leading the EU’s investigation into charges that Google is acting anti-competitively with its search listings. Alumnia also said he felt there was an “abuse” of Google’s dominant position in search.

Encryption

Submission + - New 25 GPU Monster Devours Strong Passwords in Minutes (securityledger.com) 1

chicksdaddy writes: "A presentation at the Passwords^12 Conference in Oslo, Norway (slides: https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fhashcat.net%2Fp12%2F), has moved the goalposts on password cracking yet again. Speaking on Monday, researcher Jeremi Gosney (a.k.a epixoip) demonstrated a rig that leveraged the Open Computing Language (OpenCL) framework and a technology known as Virtual Open Cluster (VCL) to run the HashCat password cracking program across a cluster of five, 4U servers equipped with 25 AMD Radeon GPUs communicating at 10 Gbps and 20 Gbps over Infiniband switched fabric.

Gosney’s system elevates password cracking to the next level, and effectively renders even the strongest passwords protected with weaker encryption algorithms, like Microsoft’s LM and NTLM, obsolete.

In a test, the researcher’s system was able to generate 348 billion NTLM password hash checks per second. That renders even the most secure password vulnerable to compute-intensive brute force and wordlist (or dictionary) attacks. A 14 character Windows XP password hashed using LM for example, would fall in just six minutes, said Per Thorsheim, organizer of the Passwords^12 Conference.

For some context: In June, Poul-Henning Kamp, creator of the md5crypt() function used by FreeBSD and other Linux-based operating systems was forced to acknowledge that the hashing function is no longer suitable for production use — a victim of GPU powered systems that could perform “close to 1 million checks per second on COTS (commercial off the shelf) GPU hardware,” he wrote. Gosney’s cluster cranks out more than 77 million brute force attempts per second against MD5crypt."

Submission + - Ask Slashdot: Do you still need a phone at your desk?

its a trappist! writes: When I started my career back in the early 1990s, everyone had a "business phone" phone on their desk. The phone was how your co-workers, customers, friends and family got in touch with you during the business day. It had a few features that everyone used — basic calling, transfer, hold, mute, three-way calling (if you could figure it out). This was before personal mobile phones or corporate IM, so the phone was basically the one and only means of real-time communication in the office.

Flash forward 20 years. Today I have a smart phone, corporate IM, several flavors of personal IM, the Skype client and several flavors of collaboration software including Google Apps/Docs, GoToMeeting. My wife and daughter call me or text me on the cell phone. My co-workers who are too lazy or passive aggressive to wander into my office use IM. My brother in Iraq uses Skype. I use GoToMeeting and its built-in VoIP with customers. The big black phone sits there gathering dust. I use it for conference calls a few times each month.

I'm sure that there are sales people out there who would rather give up a body part than their trusty office phone, but do any of the rest of us need them? Around here, the younger engineers frequently unplug them and stick them in a cabinet to free up desk space. Are the days of the office phone (and the office phone system) at an end?
Mars

Submission + - Over 1000 volunteers for 'suicide' mission to Mars (mars-one.com) 1

thAMESresearcher writes: The Dutch company Mars One is organizing a one way mission to Mars 2023. In a press release that came out today, they say they have over a thousand applicants already.
In the press release they also mention that they are now a nor-for-profit Foundation.
It sounds ambitious, but they have a Nobel prize winner, an astronaut and several people from NASA on their board.

The Almighty Buck

Submission + - How the Syrian Games Industry Crumbled Under Sanctions and Violence (arstechnica.com)

Fluffeh writes: "Syria's games industry now looks like just another collateral casualty of dictator Bashar Al-Assad's struggle to hold power. "Life for Syrian game developers has never been better," joked Falafel Games founder Radwan Kasmiya, "You can test the action on the streets and get back to your desktop to script it on your keyboard." Any momentum Syria may have been building as a regional game development hub slowed considerably in 2004, when then-US President George W. Bush levied economic sanctions against the country. Under the sanctions, Syria's game developers found themselves cut off from investment money they needed to grow, as well as from other relationships that were just as important as cash. "Any [closure of opportunity] is devastating to a budding games company as global partnerships are completely hindered," said Rawan Sha'ban of the Jordanian game development company Quirkat. "Even at the simplest infrastructure level, game development engines [from the US] cannot be purchased in a sanctioned country.""
Music

Submission + - What Various Studies Really Reveal About File-Sharing (zeropaid.com)

Dangerous_Minds writes: Drew Wilson of ZeroPaid has an interesting look at file-sharing. It all started with a review of a Phoenix study that was used to promote SOPA. Wilson says that the study was long on wild claims and short on fact. While most writers would simply criticize the study and move on, Wilson took it a step further and looked in to what file-sharing studies have really been saying throughout the years. What he found was an impressive 20 studies which 19 wasn't previously covered. He launched a large series detailing what these studies have to say on file-sharing. The first study suggests that file-sharing litigation was a failure. The second study said that p2p has no effect on music sales. The third study found that the RIAA suppresses innovation. The fourth study says that the MPAA has simply been trying to preserve its oligopoly. The fifth study says that even when one uses the methodology of one download means one lost sale, the losses amount to less than $2 per album. The studies, so far, are being posted on a daily basis and are certainly worth the read.
Image

3D Printers Create Edible Objects 72

MrShaggy writes "An engineering lab and a culinary school have teamed up to construct novel edible objects with 3D printers that use pureed foods in place of ink. From the article: '"It lets you do complex geometries with food that you could never do by hand," said Jeffrey Lipton, a researcher and graduate student at the lab. "So far, we've printed everything from chocolate, cheese and hummus to scallops, turkey, and celery," Lipton told CBC Radio's Spark in an interview that aired Sunday.'"

Submission + - Doctor marries Doctor's daughter, exploding TARDIS (bbcamerica.com)

techmuse writes: In a veritable Who's Who of Doctor Who, 10th Doctor David Tennant is marrying Georgia Moffett, the daughter of 5th Doctor Peter Davison, who played the Doctor's daughter in an episode of Doctor Who. Except that the Doctor's daughter was a clone of the Doctor, which meant that she really was Who. So a newer Doctor is marrying an older Doctor's daughter, who is a clone of the newer doctor, but only has half the DNA of the older Doctor.

Slashdot Top Deals

Brain fried -- Core dumped

Working...