Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Games

Why Do Games Still Have Levels? 512

a.d.venturer writes "Elite, the Metroid series, Dungeon Siege, God of War I and II, Half-Life (but not Half-Life 2), Shadow of the Colossus, the Grand Theft Auto series; some of the best games ever (and Dungeon Siege) have done away with the level mechanic and created uninterrupted game spaces devoid of loading screens and artificial breaks between periods of play. Much like cut scenes, level loads are anathema to enjoyment of game play, and a throwback to the era of the Vic-20 and Commodore 64 - when games were stored on cassette tapes, and memory was measured in kilobytes. So in this era of multi-megabyte and gigabyte memory and fast access storage devices why do we continue to have games that are dominated by the level structure, be they commercial (Portal), independent (Darwinia) and amateur (Angband)? Why do games still have levels?"
Operating Systems

Bypass Windows With Fast-Boot Technology 348

thatnerdguy writes "Phoenix Technologies, a developer of BIOS software, is working on a new technology called Hyperspace that will allow you to instantly load certain applications like email, web browser and media player, without loading windows. It could even lead to tailoring of computers to even more specific demographics, like a student laptop preloaded with word processor, email and an IM all available at the press of a button." Why is this story setting off alarms in my brain?
Communications

What To Do When Broadband is Not An Option? 577

professorguy writes "I've been on the internet since 1984 (back before email addresses had @'s). But it looks like we're coming to the end of an era. From my home, I have 26.4 kbps dial-up access to the internet (you read that right). Since I am a hospital network administrator, it would be nice to do some stuff remotely when I am on 24/7 call. However, no cable or DSL comes anywhere near my house and because of the particular topography of my property (I'm on a heavily-forested, north-facing hillside), satellite is also not available. Heck, cell phones didn't even work here until January. So far, the technical people I've asked all have the same advice for reasonable connectivity: move. Move out of the house my wife and I built and lived in for 20 years. Has it really come to this? Am I doomed to be an internet refugee? Is this really my only option? Do you have an alternative solution for me?"
AMD

AMD Announces Triple-Core Phenom Processors 334

MojoKid writes "AMD has officially announced their triple-core Phenom multi-core processor offering, suggesting a triple-threat of processors, from dual-cores to triple-cores and native quad-cores coming to market this year. While the term symmetric multi-processing (or SMP) suggests a balanced approach of multiple cores in an even number of engines working together on a single workload, AMD offers that an odd number of processors can slice at that workload just as efficiently. Time will tell how this architecture will scale amongst various multi-threaded applications and real-world usage models. AMD is definitely moving to make use of these quad-cores that don't quite make the cut by testing them fully as triple-cores and realizing some revenue, rather than throwing them away."
Patents

How Do I Secure An IP, While Leaving Options Open? 281

Tiger4 writes "Let's say I have a photograph, or a television script, or have finally perfected the water-to-gasoline conversion process, or some other piece of non-software but copywritable or patentable IP. I know I want it secured in my name, on this date, in a provable and verifiable way. But being an Open Source, free-to-the world sort of person, I'm willing to share my knowledge to the world, as long as all credit points unambiguously to me. Any attempts at theft could, would, and must be immediately rebuffed by my offer of proof from when I first secured the IP. What, if any, tool or method is available to me in the digital world? MD5 and the like are available to show that copied files are the same as the original source, but they don't show time of authorship unambiguously. The same with Public Key crypto. I could lock it up with a time stamp, but what prevents me from faking the stamp that locks the file? Is there a way to homestead a little chunk of time with my IP's name on it?"
Music

Watermarking to Replace DRM? 365

An anonymous reader writes "News.com has an article on the announcement of Microsoft and Universal to introduce watermarking technology into audio files. The technology could serve several purposes including tracking file sharing statistics and inserting advertisements into audio tracks. The article goes on to suggest that watermarking could possibly replace DRM in the near future."
Security

Buffer Overflow Found in RFID Passport Readers 96

epee1221 writes "Wired ran a story describing Lukas Grunwald's Defcon talk on an attack on airport passport readers. After extracting data from the (read-only) chip in a legitimate passport, he placed a version of the data with an altered passport photo (JPEG2000 is used in these chips) into a writable chip. The altered photo created a buffer overflow in two RFID readers he tested, causing both to crash. Grunwald suggests that vendors are typically using off-the-shelf JPEG2000 libraries, which would make the vulnerability common."
Google

Google Rolls Out Online Storage Services 285

An anonymous reader writes "The associated press reports that Google is slated to provide online storage at a price. From the article: 'Web search and Internet services company Google Inc. on Friday began selling expanded online storage, targeted for users with large picture, music or video file collections. The prices range from $20 per year for 6 gigabytes of online storage; $75 per year for 25 gigabytes of storage; $250 per year for 100 gigabytes of storage; and $500 per year for 250 gigabytes of storage.' Is this too expensive for what there offering, or are you going to make use of it?"
AMD

Submission + - AMD Backs openSUSE with Huge New Infrastructure (opensuse.org)

apokryphos writes: "AMD has helped sponsor the progress of openSUSE with leading-edge hardware and development expertise. "AMD is helping to ensure that the openSUSE Build Service continues to be an important collaboration and development platform for developers of all distributions," said Terri Hall, AMD vice president of Commercial Systems Marketing. "AMD recognizes the value of the open source development model, and by providing hardware for the openSUSE Build Service, we are able to actively participate in the continued innovation for which the open source community is known."

Are these continued announcements of huge support from large OEMs an indication of a new era?"

IBM

IBM Grants Universal and Perpetual Access To IP 118

StonyandCher writes "IBM is making it easier to utilize its patented intellectual property to implement nearly 200 standards in the SOA, Web services, security and other spaces. Under a pledge issued by the company Wednesday, IBM is granting universal and perpetual access to intellectual property that might be necessary to implement standards designed to make software interoperable. IBM will not assert any patent rights to its technologies featured in these standards. The company believes its move in this space is the largest of its kind."
Media

Analyst Says Blu-ray DRM Safe For 10 Years 493

Mike writes to let us know that a poster on the AVS forum says that the latest issue of HMM magazine (no link given) contains a quote from Richard Doherty, a media analyst with Envisioneering Group, extolling the strength of the DRM in Blu-ray discs, called BD+. Doherty reportedly said, "BD+, unlike AACS, which suffered a partial hack last year, won't likely be breached for 10 years." He added that if it were broken, "the damage would affect one film and one player." As one comment on AVS noted, I'll wait for the Doom9 guys to weigh in.
Security

Have Spammers Overcome the CAPTCHA? 330

thefickler writes "It appears that spammers have found a way to automatically create Hotmail and Yahoo email accounts. They have already generated more than 15,000 bogus Hotmail accounts, according to security company BitDefender. The company says that a new threat, dubbed Trojan.Spammer.HotLan.A, is using automatically generated Yahoo and Hotmail accounts to send out spam email, which suggests that spammers have found a way to overcome Microsoft's and Yahoo's CAPTCHA systems."
Microsoft

Virtualization May Break Vista DRM 294

Nom du Keyboard writes "An article in Computerworld posits that the reason Microsoft has flip-flopped on allowing all versions of Vista to be run in virtual machines, is that it breaks the Vista DRM beyond detection, or repair. So is every future advance in computer security and/or usability going to be held hostage to the gods of Hollywood and Digital Restrictions Management? 'Will encouraging consumer virtualization result in a major uptick in piracy? Not anytime soon, say analysts. One of the main obstacles is the massive size of VMs. Because they include the operating system, the simulated hardware, as well as the software and/or multimedia files, VMs can easily run in the tens of gigabytes, making them hard to exchange over the Internet. But DeGroot says that problem can be partly overcome with .zip and compression tools -- some, ironically, even supplied by Microsoft itself.'"
Google

Google's New Lobbying Power in Washington 167

*SECADM writes "Learning from Microsoft's error, Google is building a lobbying power house in Washington." From the Washington Post article: Two years ago, Google was on the verge of making that Microsoft-like error. Davidson, then a 37-year-old former deputy director of the Center for Democracy & Technology, was the search-engine company's sole staff lobbyist in Washington. As recently as last year, Google co-founder Sergey Brin had trouble getting meetings with members of Congress. To change that, Google went on a hiring spree and now has 12 lobbyists and lobbying-related professionals on staff here — more than double the size of the standard corporate lobbying office — and is continuing to add people.
Communications

No iPhone SDK Means No iPhone Killer Apps 657

iPhoneLover/Hater writes "Gizmodo is running an article analyzing the potential failure of the iPhone as a truly revolutionary platform. The reason: no SDK to harness the true power of Mac OS X and the frameworks contained in Apple's smart cell. From the article: 'According to Apple, "no software developer kit is required for the iPhone." However, the truth is that the lack of an SDK means that there won't be a killer application for the iPhone. It also means the iPhone's potential as an amazing computing and communication platform will never be realized. And because of this and no matter how Apple tries to sell it, the iPhone won't make a revolution happen.'"

Slashdot Top Deals

COBOL is for morons. -- E.W. Dijkstra

Working...