Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
PC Games (Games)

Experimental Video Game Evolves Its Own Content 167

Ken Stanley writes "Just as interest in user-generated content in video games is heating up, a team of researchers at the University of Central Florida has released an experimental multiplayer game in which content items compete with each other in an evolutionary arms race to satisfy the players. As a result, particle system-based weapons, which are the evolving class of content, continually invent their own new behaviors based on what users liked in the past. Does the resulting experience in this game, called Galactic Arms Race, suggest that evolutionary algorithms may be the key to automated content generation in future multiplayer gaming and MMOs?"
Space

Cosmic Fireworks Display Seen Inside Helix Nebula 34

goran72 writes "A new image, taken with an infrared camera on the Subaru Telescope in Hawaii, has revealed a cosmic fireworks display, in the form of tens of thousands of previously unseen comet-shaped knots inside the Helix Nebula. Unlike previous optical images of the Helix Nebula knots, the infrared image shows thousands of clearly resolved knots, extending out from the central star at greater distances than previously observed. These images enable astronomers to estimate that there may be as many as 40,000 knots in the entire nebula, each of which are billions of kilometers/miles across. Their total mass may be as much as 30,000 Earths, or one-tenth the mass of our Sun."
Data Storage

Revisiting the Five-Minute Rule 153

In 1987, a study published by Jim Gray and Gianfranco Putzolu evaluated the trade-offs between holding data in memory and storing it on a disk. Known widely as the "five-minute rule," their research was updated and expanded 10 years later. Now, as jamie points out, Communications of the ACM is running an article by Goetz Graefe with another decennial update, evaluating the rule using hardware and software typical of 2007, with an eye toward how flash memory will affect the situation. An excerpt from Graefe's conclusion: "The 20-year-old five-minute rule for RAM and disks still holds, but for ever-larger disk pages. Moreover, it should be augmented by two new five-minute rules: one for small pages moving between RAM and flash memory and one for large pages moving between flash memory and traditional disks. For small pages moving between RAM and disk, Gray and Putzolu were amazingly accurate in predicting a five-hour break-even point two decades into the future. Research into flash memory and its place in system architectures is urgent and important. Within a few years, flash memory will be used to fill the gap between traditional RAM and traditional disk drives in many operating systems, file systems, and database systems."
Encryption

Behind the First Secure Quantum Crypto Network 51

schliz writes "Researchers behind the world's largest quantum encrypted network said the technology could secure business networks inside six years. The prototype Quantum Key Distribution network was built by the Secure Communication Based On Quantum Cryptography (SECOQC) group last year. It is described in a journal paper published by the Institute of Physics this week, which includes details on how it is based on the trusted-repeater paradigm."
Image

Universal Design for Web Applications 85

Michael J. Ross writes "Two decades ago, Web usage was limited to a single individual (Sir Tim Berners-Lee) using the only browser in existence (WorldWideWeb) running on a single platform (a NeXT Computer). Nowadays, billions of people access the Web daily, with the ability to choose from over a dozen browsers running on desktop computers, laptops, and a variety of mobile devices, such as cell phones. The number of possible combinations is growing rapidly, and makes it increasingly difficult for Web designers and developers to craft their sites so as to be universally accessible. This is particularly true when accounting for Web users with physical and cognitive disabilities — especially if they do not have access to assistive technologies. The challenges and solutions for anyone creating an accessible website are addressed in Universal Design for Web Applications, authored by Wendy Chisholm and Matt May." Keep reading for the rest of Michael and Laura's review.
Image

The Rootkit Arsenal 79

Nicola Hahn writes "One of the first things I noticed while flipping through this hefty book is the sheer number of topics covered. Perhaps this is a necessity. As the author puts it, rootkits lie "at the intersection of several related disciplines: computer security, forensics, reverse-engineering, system internals, and device drivers." Upon closer inspection, it becomes clear that great pains have been taken to cover each subject in sufficient depth and to present ideas in a manner that's both articulate and well organized. This accounts for the book's girth; it weighs in at roughly 900 pages." Keep reading for the rest of Nicola's review.
Announcements

Submission + - Passenger landed plane with 'focused fear' (cnn.com)

phobot writes: "White saved the day after the pilot passed out.

"He was just sitting there. He had his chin on his chest, looking down at his lap, but there's nothing in his lap that he needed to be looking at.
That's when I kind of looked at him for a minute, probably two, three seconds, and I touched him on the shoulder. I said, 'Joe! Joe!, and that's when his head rolled over to the side, and his eyes rolled back in his head, and his arm fell off the armrest ... and I knew if he wasn't gone then, he was in deep distress, but we were in trouble."

The plane's autopilot was on, and the plane was at about 5,000 feet and climbing, White said. Although he was a certified single-engine pilot and had about 130 flying hours, he had no idea how to fly the much larger Super King Air two-engine turboprop plane.

"The only thing I knew how to do up there was talk on the radio," White told WINK. "I've only been up there (in the cockpit) one other time. I made it a point to ask the pilot — not Joe, but another one — 'How do I talk on the radio?' and they showed me what button to push.""

Education

College Police Think Using Linux Is Suspicious Behavior 1079

FutureDomain writes "The Boston College Campus Police have seized the electronics of a computer science student for allegedly sending an email outing another student. The probable cause? The search warrant application states that he is 'a computer science major' and he uses 'two different operating systems for hiding his illegal activity. One is the regular B.C. operating system and the other is a black screen with white font which he uses prompt commands on.' The EFF is currently representing him."
Google

UK To Train Pro-West Islamic Groups To Game Google 469

Hugh Pickens writes "The British government's Office of Security and Counter-Terrorism (OSCT), a 200-strong Home Office unit created 18 months ago, has said in meetings it wants to 'flood the internet' with 'positive' interpretations of Islam and plans to train government-approved groups in search engine optimization techniques, which it is hoped will boost their profile online and battle radicalization. A Home Office spokesman confirmed search engine optimization training is part of the government's anti-radicalization strategy. 'In order to support mainstream voices, we work with local partners to help develop their communication, representational and leadership skills. This support could include media training, which can help make their voices heard more widely, and support the development of skills which allow communities to be more effective in debate.' However the effectiveness of search engine optimization in reducing traffic to extremist websites has been dismissed by academics. A report produced by the International Centre for the Study of Radicalisation (ICSR) said young Muslims were much more likely to be directed to extremist material online by web forums and offline associates than by Google or other search engines. 'Tweaking the results for supposedly extremist terms would be largely ineffectual, not least because it is unlikely that any but the most callow wannabe terrorist would use a mainstream search engine to find banned material.'"
Networking

Grad Student Project Uses Wikis To Stash Data, Miffs Admins 268

Anonymous writes "Two graduate students at the Ivy League's Brown University built a P2P system to use abandoned wiki sites to store data. The students were stealing bandwidth from open MediaWiki sites to send data between users as an alternative to BitTorrent. There was immediate backlash as site operators quickly complained to the University. The project appears to be shutdown, but many of the pages still remain on the web. The project homepage was also taken down and the students posted an apology this afternoon." The same submitter links to two different forum discussions on the project.
Intel

Submission + - Intel launches new chip logos, rating system (cnet.com)

N!NJA writes: Intel has revamped its processor badging and rating system. Consumers are the main target, though business systems will get new badging too.

The new badges include a die (the chip minus the packaging) accent in the upper right hand corner, a prominent main brand (e.g., "Core"), and the modifier (e.g., "i7").

Intel has also instituted a star system that rates chips from five stars (best performance in class) to one star (lowest performance). "So when a consumer goes into a Best Buy store they can distinguish between Centrino, Core, Celeron, Core 2 Duo, Core 2 Quad," said Intel spokesman Bill Calder.

Linux Business

Submission + - "We're Linux" Finalists announced (ostatic.com)

ruphus13 writes: In an effort to drive more awareness to Linux, the Linux Foundation announced the "We're Linux" contest. Over 90 entries were received, and the finalists are now out. From the article, "The contest was spawned from the idea that other software companies were paying millions of dollars to celebrities for endorsements, while Linux was promoted and shared by enthusiastic, passionate, actual users. Contestants were given a simple directive: tell the Linux Foundation what Linux is for you, why you use it, and why you'd encourage others to do the same. Humor and professional production quality weren't required — it just had to be genuine." Details on the finalists can be found on the Linux Foundation Video site here.
Hardware Hacking

Submission + - Ergonomic, Innovative Laptop Document Holder (sidequik.com)

Johnny Law writes: "My friend invented this "Sidequik" laptop document holder a few years ago and has just recently brought it to market. It's a hinged panel that attaches to the back of a laptop and then can slide out from either side. It has built in clips for inserting paper, and you can also attach or hang notebooks on it. I wish I would have had something like this in graduate school. It would have saved me a lot of time when I typing up research papers. Nothing like this exists. Sure, there are other products, but they are hard to find and they don't work well. This thing really has to be seen to be understood, since nothing like it currently exists, although it is simple enough. Check out the youtube video on the website: http://www.sidequik.com./ Thanks."
Movies

Submission + - 6 companies control all the media you're seeing... (youtube.com)

ANewWingman writes: "Watch this HD film movement call-out from The Wingmen, the group behind the scifi/fantasy cross-platform film project 'Artemis Eternal.' Their focus is confronting media politics via film, all while making a movie. "While we may have a leader, we follow an ideal: that films should be a covenant between filmmaker and audience in which the message is pure, direct, and unfiltered. The specter of commercialism has long hung over the film industry, but of late it has evolved into a fog of bureaucracy and materialism, of plastic cups and bad advertisements. The artist is obscured, and the audience is force-fed cheap ideas devoid of any purpose. There is no truth, no depth, in something so manufactured, and it must end." ...Intelligent exploration of propaganda plus a sick online film "experience" that shows the path a film takes from conception to delivery."

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...