This DMA hack is not new, this was discovered several years ago with the 'inception' attack, which exploits this attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces. Inception tool was created in 2014.
See https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fgithub.com%2Fcarmaa%2Fince...
What? No laser sharks?
NY Times had an article about the cost of mobile ads, the article also had some interesting data about load-times and how much data was javascript, videos, images, embeds etc.
http://www.nytimes.com/interac...
Posting as its related to the efforts described above
> They say that the process of integrating information is equivalent to compressing it.
>
So human consciousness equals gzip?
Wait..what??
> But you can avoid the worst problems by having someone actively managing the checkout
> queues, and this is the solution for bufferbloat as well: AQM (Active Queue Management).
Can someone please implement this system at Heathrow to reduce the queues there?
Enemies? Where is the "Nemesis" button when you need it?
You can't confirm or prove theories, you can only gather supporting evidence or disprove a theory.
Renesys reports that the big four ISPs in Egypt have withdrawn approximately 3,500 individual BGP routes, leaving no valid paths by which to reach the rest of the world. One of the very few exceptions to this block has been Noor Group.
http://www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml
According to Wikipedia the name Yinghuo means "firefly".
Does Joss Whedon know?
Auditors check that the company have security policies, that they have proper procedures and that these have been followed in the past. There is obviously no guarantee that the employees in the company will continue to follow the security procedures, just because they have done so in the past. Security breaches usually occur because someone failed to follow procedure.
Security standards and audits give the company assurance that they have reduced the chance of security breaches as much as possible. However , you can NEVER certify any system as "secure".
Audits usually control access and change procedures for systems and verify that there are controls and procedures that have been followed up to that point in time.
See http://en.wikipedia.org/wiki/IT_audit for more info.
"... I'm a little concerned that we could be raising a generation of very focused accountants.'""
What about those of us that are already "focused accountants" what do we get out of this "Neuro Revolution"?
You know you've been spending too much time on the computer when your friend misdates a check, and you suggest adding a "++" to fix it.