Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Games

The Grown-Up Video Game 152

Phaethon360 writes "Now, more than ever, we're seeing many Mature ratings (M+, 17+, 18) being distributed by various national media regulators. But that isn't the only indicator for a game's intended audience. It doesn't take a thousand swear words, scantily clad women or gratuitous violence to differentiate a ten-year-old's game from a twenty-year-old's. The spectrum of human emotions encompasses a wider palette than just revenge, fear, and loss, but the games that shy away from these are frequently mistaken as being for a younger audience. From the article: 'The human experience is one that is made up of great hardship, pain, loss, death, and a multitude of experiences seemingly designed to destroy a person. However, that same experience is also filled with joy, love, laughter, family and friends. ... These so-called “grown-up” games need not be relegated to the category of niche gaming. In fact, at times we find that these video games are capable of reaching mass popularity among the gaming community. It is here that we find one of our generation’s outlets for the expression of conflict.'"
Networking

Comcast Discloses Throttling Practices 206

Wired reports that Comcast finally provided information on its network management practices late Friday. In a report to the FCC (PDF), the cable company admitted to targeting P2P protocols Ares, BitTorrent, eDonkey, FasTrack, and Gnutella. Quoting: "For each of the managed P2P protocols, the [Sandvine Policy Traffic Switch] monitors and identifies the number of simultaneous unidirectional uploads that are passed from the [Cable Modem Termination System] to the upstream router. Because of the prevalence of P2P traffic on the upstream portion of our network, the number of simultaneous unidirectional upload sessions of any particular P2P protocol at any given time serves as a useful proxy for determining the level of overall network congestion. For each of the protocols, a session threshold is in place that is intended to provide for equivalently fair access between the protocols, but still mitigate the likelihood of congestion that could cause service degradation for our customers."
Communications

Cisco To Buy Jabber 66

Danny Rathjens writes "In the continuing trend of big companies buying out small companies with open source products, Cisco has announced that they are buying Jabber. The press release doesn't really talk about the open source aspect of Jabber, and Jabber's website doesn't mention the news yet. I'm sure the question many of us have is whether Jabber's open source status will be changed in any way due to the purchase." Reader Eddytorial had this to contribute: "eWEEK offers a good look into how Jabber's messaging client will fit into Cisco Systems' overall 'presence' strategy in its market wars with Avaya, Microsoft, Nortel, and others. Cisco, which already had a basic instant messaging option, but one that didn't scale for an enterprise nearly as well as Jabber's, has just about everything else in place." It's also worth noting that Cisco open-sourced Etch in recent months.

Slashdot Top Deals

The nation that controls magnetism controls the universe. -- Chester Gould/Dick Tracy

Working...