Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:A bit overhyped... (Score 0) 92

This DMA hack is not new, this was discovered several years ago with the 'inception' attack, which exploits this attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces. Inception tool was created in 2014.
See https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fgithub.com%2Fcarmaa%2Fince...

Submission + - Possibly fatal blow against a patent trolls. (computerworld.com)

whoever57 writes: Patent trolls rely on the fact that they have no assets and, if they lose a case, they can fold the company that owned the patent and sued, thus avoiding paying any the defendant's legal bills. However, in a recent case, the judge has told the winning defendant that it can claim its legal bills from the law firm. The decision is based on the plaintiff's law firm using a contract under which it would take a portion of any judgment, making it more than just counsel, but instead a partner with the plaintiff. This will likely result in law firms wanting to be paid up front, instead of offering a contingency-based fee.

Submission + - Monty Montgomery: Next-Next Generation Video: Introducing Daala (livejournal.com)

An anonymous reader writes: Xiph.Org has been working on Daala, a new video codec for some time now, though Opus work had overshadowed it until just recently. With Opus finalized and much of the mop-up work well in hand, Daala development has taken center stage.

I've started work on 'demo' pages for Daala, just like I've done demos of other Xiph development projects. Daala aims to be rather different from other video codecs (and it's the first from-scratch design attempt in a while), so the first few demo pages are going to be mostly concerned with what's new and different in Daala.

I've finished the first 'demo' page (about Daala's lapped transforms), so if you're interested in video coding technology, go have a look!

Comment Alternative uses (Score 1) 134

> But you can avoid the worst problems by having someone actively managing the checkout
> queues, and this is the solution for bufferbloat as well: AQM (Active Queue Management).

Can someone please implement this system at Heathrow to reduce the queues there?

Comment Auditing (Score 1) 209

Auditors check that the company have security policies, that they have proper procedures and that these have been followed in the past. There is obviously no guarantee that the employees in the company will continue to follow the security procedures, just because they have done so in the past. Security breaches usually occur because someone failed to follow procedure.

Security standards and audits give the company assurance that they have reduced the chance of security breaches as much as possible. However , you can NEVER certify any system as "secure".
Audits usually control access and change procedures for systems and verify that there are controls and procedures that have been followed up to that point in time.

See http://en.wikipedia.org/wiki/IT_audit for more info.

Comment Focused accountants (Score 1) 369

"... I'm a little concerned that we could be raising a generation of very focused accountants.'""

What about those of us that are already "focused accountants" what do we get out of this "Neuro Revolution"?

Slashdot Top Deals

You know you've been spending too much time on the computer when your friend misdates a check, and you suggest adding a "++" to fix it.

Working...