Department of Mathematics
 Search | Help | Login | pdf version | printable version

Math @ Duke





.......................

.......................


Yunliang Yu, IT Senior Manager

Yunliang Yu

Open source is an investment in the future.

FDS Motto: we serve and empower the faculty.

Contact Info:
Office Location:  029D Physics
Office Phone:  (919) 660-2803
Email Address:   send me a message
Web Page:   http://www.math.duke.edu/~yu

Office Hours:

12:01AM - 12:02AM every other day except today.
Not by appt :-)
Specialties:

Mathematics
Recent Publications

  1. Y. Yu, test 123 (March, 2010). [PNG, PDF]

Famous Sayings:
Your dream will come true, if you eat your soup.
    --- Angela Yu
Don't be a turkey; read a book.
    --- Christina Yu
Security = avoid "unexpected inputs for unintended results".
    --- moi
To learn and practice what is learned from time to time is pleasure, is it not? To have friends from afar is happiness, is it not? To be unperturbed when not appreciated by others is a gentleman, is it not?
    --- Kungfu Zi
Better to light a candle than to curse the darkness.
    --- Chinese Proverb

mathprograms.org, academicjobsonline.org, mathjobs.org, ShortURLs, sharedworkingplace.org, chinesecalligraphyandwoodcarving.

/. headline news :-)

  • BitTorrent Inventor Bram Cohen Will Start His Own Cryptocurrency
    2017-04-25T17:20:00+00:00
    Bram Cohen, the creator of BitTorrent, has showed deep interest in cryptocurrency in the past, and now it looks like he is going to start his own. From a report: Without going into technical details, Cohen believes that Bitcoin is wasteful. He suggests that a cryptocurrency that pins the mining value on storage space rather than processor time will be superior. In an interview with TorrentFreak's Steal This Show, Cohen revealed that his interest in cryptocurrencies is not merely abstract. It will be his core focus in the near future. "My proposal isn't really to do something to BitCoin. It really has to be a new currency," Cohen says. "I'm going to make a cryptocurrency company. That's my plan." By focusing on a storage based solution, BitTorrent's inventor also hopes to address other Bitcoin flaws, such as the 51% attack. "Sometimes people have this misapprehension that Bitcoin is a democracy. No Bitcoin is not a democracy; it's called a 51% attack for a reason. That's not a majority of the vote, that's not how Bitcoin works."

    Read more of this story at Slashdot.

  • Google Looks at People As it Pledges To Fight Fake News and 'Offensive' Content
    2017-04-25T16:40:00+00:00
    Google said today it is taking its first attempt to combat the circulation of "fake news" on its search engine. The company is offering new tools that will allow users to report misleading or offensive content, and it also pledged to improve results generated by its algorithm. From a report: While the algorithm tweaks should impact on general search results, the reporting tools have been designed for Google's Autocomplete predictions and Featured Snippets which have been problematic in recent months. Updated algorithms should help to ensure more authoritative pages receive greater prominence, while low-quality content is demoted. Vice president of engineering at Google Search, Ben Gomes, admits that people have been trying to "game" the system -- working against the spirit of the purpose of algorithms -- to push poor-quality content and fake news higher up search results. He says that the problem now is the "spread of blatantly misleading, low quality, offensive or downright false information."

    Read more of this story at Slashdot.

  • Antivirus Webroot Deletes Windows Files, Causes Serious Problems For Users
    2017-04-25T16:00:00+00:00
    Users of Webroot's endpoint security product, consumers and businesses alike, had a nasty surprise Monday when the program started flagging Windows files as malicious. From a report: The reports quickly popped up on Twitter and continued on the Webroot community forum -- 14 pages and counting. The company came up with a manual fix to address the issue, but many users still had problems recovering their affected systems. The problem is what's known in the antivirus industry as a "false positive" -- a case where a clean file is flagged as malicious and is blocked or deleted. False positive incidents can range in impact from merely annoying -- for example, when a program cannot run anymore -- to crippling, where the OS itself is affected and no longer boots. The Webroot incident falls somewhere in the middle because it affected legitimate Windows files and sent them to quarantine. This is somewhat unusual because antivirus firms typically build whitelists of OS files specifically to prevent false positive detections.

    Read more of this story at Slashdot.

  • Wikipedia Founder Jimmy Wales is Launching an Online Publication To Fight Fake News
    2017-04-25T15:20:00+00:00
    Jimmy Wales, a founder of Wikipedia, is launching a new online publication which will aim to fight fake news by pairing professional journalists with an army of volunteer community contributors. The news site is called Wikitribune. From a report: "We want to make sure that you read fact-based articles that have a real impact in both local and global events," the publication's website states. The site will publish news stories written by professional journalists. But in a page borrowed from Wikipedia, internet users will be able to propose factual corrections and additions. The changes will be reviewed by volunteer fact checkers. Wikitribune says it will be transparent about its sources. It will post the full transcripts of interviews, as well as video and audio, "to the maximum extent possible." The language used will be "factual and neutral."

    Read more of this story at Slashdot.

  • Gamers in Hawaii Can't Compete... Because of Latency
    2017-04-25T14:40:00+00:00
    Sometimes it's very important to know that the servers of the web services you're using are situated somewhere in your neighbourhood. And it's not just because of privacy concerns. The Outline has a story this week in which it talks about gamers in Hawaii who're increasingly finding it difficult to compete in global tournaments because the games' servers are almost every time placed overseas. From the article: [...] The game's server is in Chicago. That means if you live in the Midwest, your computer can communicate with it almost instantaneously. If you're in L.A., it can take roughly 60 milliseconds. But if you're in Hawaii, it can take 120 milliseconds, with some players reporting as long as 200 milliseconds. And at the highest echelons of competitive video gaming, milliseconds matter. [...] In League and other eSports games, playing on a high ping is a big disadvantage. The goal of the game is to set up defenses to protect your base while pushing forward to capture the enemy's base, and there are typically lightning bolts and fireballs and slime-spitting dragons shooting across the screen. Playing on a high ping means players may not see all of the action that happens in a game. Latency can really screw things up for a young eSports scene, said Zack Johnson, who runs gg Circuit, a global tournament provider for gaming centers like PC Gamerz. Players on the mainland sometimes say they don't want to compete against Hawaii players, he said, because the high ping throws things off.

    Read more of this story at Slashdot.

  • Marissa Mayer Will Make $186 Million on Yahoo's Sale To Verizon
    2017-04-25T14:00:00+00:00
    Vindu Goel, reporting for the NYTimes: Yahoo shareholders will vote June 8 on whether to sell the company's internet businesses to Verizon Communications for $4.48 billion. A yes vote, which is widely expected, would end Marissa Mayer's largely unsuccessful five-year effort to restore the internet pioneer to greatness. But Ms. Mayer, the company's chief executive, will be well compensated for her failure. Her Yahoo stock, stock options and restricted stock units are worth a total of $186 million, based on Monday's stock price of $48.15, according to data filed on Monday in the documents sent to shareholders about the Verizon deal. That compensation, which will be fully vested at the time of the shareholder vote, does not include her salary and bonuses over the past five years, or the value of other stock that Ms. Mayer has already sold. All told, her time at Yahoo will have netted her well over $200 million, according to calculations based on company filings.

    Read more of this story at Slashdot.

  • BrickerBot, the Permanent Denial-of-Service Botnet, Is Back With a Vengeance
    2017-04-25T13:00:00+00:00
    An anonymous reader quotes a report from Ars Technica: BrickerBot, the botnet that permanently incapacitates poorly secured Internet of Things devices before they can be conscripted into Internet-crippling denial-of-service armies, is back with a new squadron of foot soldiers armed with a meaner arsenal of weapons. Pascal Geenens, the researcher who first documented what he calls the permanent denial-of-service botnet, has dubbed the fiercest new instance BrickerBot.3. It appeared out of nowhere on April 20, exactly one month after BrickerBot.1 first surfaced. Not only did BrickerBot.3 mount a much quicker number of attacks -- with 1,295 attacks coming in just 15 hours -- it used a modified attack script that added several commands designed to more completely shock and awe its targets. BrickerBot.1, by comparison, fired 1,895 volleys during the four days it was active, and the still-active BrickerBot.2 has spit out close to 12 attacks per day. Shortly after BrickerBot.3 began attacking, Geenens discovered BrickerBot.4. Together, the two newly discovered instances have attempted to attack devices in the research honeypot close to 1,400 times in less than 24 hours. Like BrickerBot.1, the newcomer botnets are made up of IoT devices running an outdated version of the Dropbear SSH server with public, geographically dispersed IP addresses. Those two characteristics lead Geenens to suspect the attacking devices are poorly secured IoT devices themselves that someone has compromised and used to permanently take out similarly unsecured devices. Geenens, of security firm Radware, has more details here.

    Read more of this story at Slashdot.

  • Intel Launches Optane Memory That Makes Standard Hard Drives Perform Like SSDs
    2017-04-25T10:00:00+00:00
    MojoKid writes: Intel has officially launched its Optane Memory line of Solid State Drives today, lifting embargo on performance benchmark results as well. Optane Memory is designed to accelerate the storage subsystem on compatible machines, to improve transfer speeds, and reduce latency. It is among the first products to leverage 3D XPoint memory technology that was co-developed by Intel and Micron, offering many of the same properties as NAND flash memory, but with higher endurance and certain performance characteristics that are similar to DRAM. The SSD can be paired to the boot drive in a system, regardless of the capacity or drive type, though Optane Memory will most commonly be linked to slower hard drives. Optane Memory is used as a high-speed repository, as usage patterns on the hard drive are monitored and the most frequently accessed bits of data are copied from the boot drive to the Optane SSD. Since the SSD is used as a cache, it is not presented to the end-user as a separate volume and works transparently in the background. Paired with an inexpensive SATA hard drive, general system performance is more in line with an NVMe SSD. In benchmark testing, Intel Optane Memory delivers a dramatic lift in overall system performance. Boot times, application load time, file searches, and overall system responsiveness are improved significantly. Setting up Intel Optane Memory is also quick and easy with "set it and forget it" type of solution. Optane Memory modules will hit retail this week in 16GB and 32GB capacities, at $44 and $77, respectively.

    Read more of this story at Slashdot.

  • In Preparation For Model 3, Tesla Plans To Double the Size of Its Supercharger Network This Year
    2017-04-25T07:00:00+00:00
    An anonymous reader quotes a report from Fortune: Tesla says it will double the number of electric vehicle chargers in its network this year as the automaker prepares for the production of its mass-market vehicle the Model 3. The plan, announced Monday in a blog post on the company's website, will grow its global network of Superchargers from more than 5,400 today to more than 10,000 by the end of the year. Tesla, which had previously announced in its annual shareholder letter plans to double the network in North America, did not disclose the cost of such an ambitious expansion. Many sites will soon enter construction to open in advance of the summer travel season, according to Tesla. The company says it will add charging locations within city centers as well as highway sites this year. The goal is to make "charging ubiquitous in urban centers," Tesla says in its blog post. The company says it will build larger sites along busy travel routes to accommodate several dozen Teslas simultaneously. These larger sites will also have customer service centers.

    Read more of this story at Slashdot.

  • How Online Shopping Makes Suckers of Us All
    2017-04-25T03:30:00+00:00
    Thelasko shares an excerpt from a report via The Atlantic, which describes how price discrimination is used in online shopping and how businesses like Amazon try to extract consumer surplus: Will you pay more for those shoes before 7 p.m.? Would the price tag be different if you lived in the suburbs? Standard prices and simple discounts are giving way to far more exotic strategies, designed to extract every last dollar from the consumer. We live in the age of the variable airfare, the surge-priced ride, the pay-what-you-want Radiohead album, and other novel price developments. But what was this? Some weird computer glitch? More like a deliberate glitch, it seems. "It's most likely a strategy to get more data and test the right price," Guru Hariharan explained, after I had sketched the pattern on a whiteboard. The right price -- the one that will extract the most profit from consumers' wallets -- has become the fixation of a large and growing number of quantitative types, many of them economists who have left academia for Silicon Valley. It's also the preoccupation of Boomerang Commerce, a five-year-old start-up founded by Hariharan, an Amazon alum. He says these sorts of price experiments have become a routine part of finding that right price -- and refinding it, because the right price can change by the day or even by the hour. (Amazon says its price changes are not attempts to gather data on customers' spending habits, but rather to give shoppers the lowest price out there.)

    Read more of this story at Slashdot.

  • A Caterpillar May Lead To a 'Plastic Pollution' Solution
    2017-04-25T01:45:00+00:00
    New submitter FatdogHaiku quotes a report from BBC: Researchers at Cambridge University have discovered that the larvae of the moth, which eats wax in bee hives, can also degrade plastic. Experiments show the insect can break down the chemical bonds of plastic in a similar way to digesting beeswax. The plastic is used to make shopping bags and food packaging, among other things, but it can take hundreds of years to decompose completely. However, caterpillars of the moth (Galleria mellonella) can make holes in a plastic bag in under an hour. They think microbes in the caterpillar -- as well as the insect itself -- might play a role in breaking down plastic. If the chemical process can be identified, it could lead to a solution to managing plastic waste in the environment.

    Read more of this story at Slashdot.

  • Uber Gets Sued Over Alleged 'Hell' Program To Track Lyft Drivers
    2017-04-25T01:05:00+00:00
    An anonymous reader quotes a report from TechCrunch: Uber has another lawsuit on its hands. This time, it's about Uber's alleged use of a program called "Hell." The plaintiff, Michael Gonzales, drove for Lyft during the time Uber allegedly used the software. He's seeking $5 million in a class action lawsuit. As the story goes, Uber allegedly tracked Lyft drivers using a secret software program internally referred to as "Hell." It allegedly let Uber see how many Lyft drivers were available to give rides, and what their prices were. Hell could allegedly also determine if people were driving for both Uber and Lyft. The lawsuit, filed in the U.S. District Court for the Northern District of California, alleges Uber broadly invaded the privacy of the Lyft drivers, specifically violated the California Invasion of Privacy Act and Federal Wiretap Act and engaged in unfair competition. Uber has not confirmed nor outright denied the claims.

    Read more of this story at Slashdot.

  • Square Said To Acquire Team From Struggling Social App Yik Yak
    2017-04-25T00:35:00+00:00
    According to Bloomberg, Square has acquired the engineering team of Yik Yak for "less than $3 million." From the report: The payments processor paid less than $3 million for between five and ten of Yik Yak's engineers, according to the person. Atlanta-based Yik Yak's Chief Executive Officer Tyler Droll will not join Square, the person added, asking not to be identified talking about a private matter. Atlanta-based Yik Yak, which started in 2013, created a smartphone app that allowed people to contribute to anonymous chat groups in a narrow geographical radius -- like college campuses.

    Read more of this story at Slashdot.

  • Slashdot Asks: Which Wireless Carrier Do You Prefer?
    2017-04-25T00:05:00+00:00
    Earlier this year, telecommunications giants like T-Mobile, AT&T, Verizon and Sprint were battling to see who could release the best unlimited data plan(s). T-Mobile started the domino chain reaction with the launch of its "One" unlimited plan in August. But the competition became especially fierce in February when Verizon introduced unlimited data plans of their own, causing Sprint and AT&T to unveil new unlimited data plans that same week, both of which have their own restrictions and pricing. Each of the four major carriers have since continued to tweak their plans to ultimately undercut their competitors and retain as many customers are possible. Given how almost everyone has a smartphone these days and the thirst for data has never been higher, we'd like to ask you about your current wireless carrier and plan. Which wireless carrier and plan do you have any why? Is there any one carrier or unlimited data plan that stands out from the others? T-Mobile, for example, recently announced that it added 1.1 million customers in Q1 2017, which means that it has added more than 1 million customers every quarter for the past four years. Have they managed to earn your business?

    Read more of this story at Slashdot.

  • NSA's DoublePulsar Kernel Exploit a 'Bloodbath'
    2017-04-24T23:20:00+00:00
    msm1267 quotes a report from Threatpost: A little more than two weeks after the latest ShadowBrokers leak of NSA hacking tools, experts are certain that the DoublePulsar post-exploitation Windows kernel attack will have similar staying power to the Conficker bug, and that pen-testers will be finding servers exposed to the flaws patched in MS17-010 for years to come. MS17-010 was released in March and it closes a number of holes in Windows SMB Server exploited by the NSA. Exploits such as EternalBlue, EternalChampion, EternalSynergy and EternalRomance that are part of the Fuzzbunch exploit platform all drop DoublePulsar onto compromised hosts. DoublePulsar is a sophisticated memory-based kernel payload that hooks onto x86 and 64-bit systems and allows an attacker to execute any raw shellcode payload they wish. "This is a full ring0 payload that gives you full control over the system and you can do what you want to it," said Sean Dillon, senior security analyst at RiskSense. Dillon was the first to reverse-engineer a DoublePulsar payload, and published his analysis last Friday. "This is going to be on networks for years to come. The last major vulnerability of this class was MS08-067, and it's still found in a lot of places," Dillon said. "I find it everywhere. This is the most critical Windows patch since that vulnerability." Dan Tentler, founder and CEO of Phobos Group, said internet-net wide scans he's running have found about 3.1 percent of vulnerable machines are already infected (between 62,000 and 65,000 so far), and that percentage is likely to go up as scans continue. "This is easily describable as a bloodbath," Tentler said.

    Read more of this story at Slashdot.

 

dept@math.duke.edu
ph: 919.660.2800
fax: 919.660.2821

Mathematics Department
Duke University, Box 90320
Durham, NC 27708-0320