Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Role Playing (Games)

The Evolution of RPGs, Storytelling 64

Sessions held yesterday and today touched on the future of games and story in this new generation of games. Yesterday Microsoft held a panel with RPG veterans Hironobu Sakaguchi (currently working on Blue Planet), Peter Molyneux(Fable 2), and Dr. Ray Muzkya(Mass Effect). Between the three of them, these well known designers offered a view of the next step in RPGs. Sakaguchi in particular was vocal about his love of online RPGs, and there was some talk of differing player experiences the content-heavy titles genre. Meanwhile, on the heels of Phil Harrison's keynote, Warren Spector took the stage in a conference room to discuss next-gen storytelling. His biggest complaint was the linear nature of games today, and the sameness of experiences. Different talks, with insightful and similar conclusions.
Sun Microsystems

Submission + - Can Sun Spark A Comeback?

Anonymous writes: "Despite Sun's precarious slide in recent years, its fortunes appear to be on the rise, according to a ChannelWeb.com analysis. The vendor's revenue is steadily creeping north, it's gaining share at the expense of larger rivals Dell, Hewlett-Packard and IBM, and it has realigned the organization into four business units. The question is, is it enough to spark a comeback?"
Education

Submission + - The Coevolution of Lice & Their Hosts

eldavojohn writes: "It might be an uncomfortable subject but parasites are an interesting subject when it comes to evolution. Ever wonder if pocket gophers have lice? Well, they do. And most interesting of all is the evolution of these lice mirroring the evolution of gophers. To study the genes of lice may shed just as much light on evolutionary trees as studying the genes of the actual host the lice has evolved to. The most unsettling result from these studies is that human head lice and human pubic lice (crabs) vary so greatly that they are in two separate genera. There were similarities between our pubic lice and the lice found on gorillas. Scientists came to the conclusion, "which they published today in BMC Biology, is just as striking as their earlier one about head lice. But it is hardly the same. We did not get pubic lice from other hominids. We got them from the ancestors of gorillas.""
Intel

Submission + - Intel to sample flash-killer PRAM this year

Station writes: Intel's new phase-change memory technology (PRAM) will begin sampling this year. Samsung, IBM, and Hitachi are all working on phase-change memory as a successor to flash as it has a lower (~20ns) read latency than flash (50-90ns). 'Intel says they plan to ship the first PRAM modules as a straight-ahead NOR flash replacement so that they can work the kinks out of the design before trying to move it up the memory hierarchy. The company claims a much higher number of read-write cycles (100 million) than flash, as well as a potential 10 years' worth of data retention. NOR flash is typically used as program storage memory for mobile devices like cell phones, while more durable but slower NAND flash is used for mass storage in devices like the iPod nano.'
Security

RFID Passports Cloned Without Opening the Package 168

Jeremy writes to tell us that using some simple deduction, a security consultant discovered how to clone a passport as it's being mailed to its recipient, without ever opening the package. "But the key in this first generation of biometric passport is relatively easy to identify/crack. It is not random, but consists of passport number, the passport holder's date of birth and the passport expiry date. The Mail found it relatively easy to identify the holder's date of birth, while the expiry date is 10 years from the issue date, which for a newly-delivered passport would clearly fall within a few days. The passport number consists of a number of predictable elements, including an identifier for the issuing office, so effectively a significant part of the key can be reconstructed from the envelope and its address label."
Hardware Hacking

Submission + - Ten Tips for Choosing the Right CPU

ThinSkin writes: "Loyd Case over at ExtremeTech has come up with ten tips for choosing the right CPU, citing that "on the surface, the fastest processor you can afford for your needs" is the first misstep someone can take. Some tips include building a well-balanced system, recognizing your usage patterns, and considering power output."
Security

Submission + - cingular voicemail hack

gomez writes: "i have no idea where to let people know about this. but i'm loyal to slashhdot so why not here?

i'm an admin for a call center and i was messing around with caller id the other day. i remember dialing voicemail by pressing 1 on my cingular cell phone and getting straight in w/ out a verification of password. well i thought, what if i can change my outbound ISDN caller ID on my landline phone to a friends phone, figuring that if the mechanism is only checking caller ID why not fake it? it totally worked. i was in my friends voicemail checking his messages.

i thought, well who has the power to change caller id? only admins right? well i checked the client app for use with our PBX, and lo and behold they of course (with certain user privileges) have the power to change outbound caller ID on the fly. I think most phone systems these days in a business environment allow a user to do so, but again only if they have the privileges.

cingular has already been notified about this, i just thought i'd light the fire under their arses.

check your phone software to see if you can change your outbound caller id.. i bet you see the same result.

    — gomez"
Software

Submission + - Torrent Overview | goitexpert.com | XP-Erienced IT

Tdak writes: "This article offers a simple, no high tech stuff, description of the BitTorrent network and how it works, it also offers a list of most popular Torrent applications, with pros and cos of them. One section is dedicated to tweaking your bit torrent. From the article: "BitTorrent is a peer-to-peer network based on the idea that many people sharing a single file is more productive than a single host for a single file. It was not designed as a haven for pirates and copyright violation." Also this article offers an overview of common bit torrent files Click here to read it "
Security

Submission + - Leak Hunters

darkreadingman writes: "How does a company know when its employees are giving away confidential information via blogs or chat rooms? How does it know when phishers or competitors are misusing its logos or brand information? Most companies don't. Now there's a growing group of cyberintelligence companies that are trying to help. Using Web crawlers and skilled researchers, these companies scour the Internet for evidence of security leaks or misuse of confidential information. Want to know if a prospective employee blogs too much about his company? Want to know what competitors are saying about your company? These services can tell you. But while such services may help companies beef up their security, they raise some interesting privacy issues. Should a corporation use its employee's personal blogs against them? Is it ethical for companies to monitor what employees say in online chat rooms? Some interesting questions here. http://www.darkreading.com/document.asp?doc_id=118 872&WT.svl=news1_2"
Censorship

Submission + - Free speech challenged at law student forum

The Xoxo Reader writes: "The Washington Post has a front-page article about AutoAdmit (a.k.a Xoxohth), a message board for law students and lawyers that has been criticized for allowing users to post racist and sexist attacks under the cover of anonymity. The article (and the message board itself) raises important questions about whether freedom of speech can go too far, even if anonymity and loose moderation can otherwise promote useful discussion about the legal community."
Microsoft

Submission + - The Deal Steve Jobs Couldn't Refuse

Government Drone writes: "Remember the 1997 deal in which Microsoft bought $150 million in non-voting Apple stock? According to this story in InformationWeek, it wasn't done all out of the goodness of Bill Gates' heart:

Weeks prior to bailing out a struggling Apple Computer by purchasing $150 million of its stock, Microsoft officials threatened to cut development of a key product for the Macintosh in order to coerce its rival to make the deal, according to an e-mail unearthed during a recent court hearing.

The original text of the E-mail is here, which mentions a threat to pull the plug on Office for Mac, but argues against it for a variety of reasons. An interesting backend view of what was happening in Apple's darkest days."
Data Storage

Submission + - Samsung Begins Shipping Hybrid Hard Drives

writertype writes: "Samsung has become the first company begin shipping hybrid hard drives, we report on ExtremeTech. Unfortunately, there's no word yet (besides "soon") on when retail shipments will begin, or when (or if) 3.5-inch models will be available. Note that these are different than the ReadyBoost USB flash drives optimized for Vista; hybrid drives contain a smaller amount of flash, and work as a write cache for your notebook drive, extending battery life."

Slashdot Top Deals

The answer to the question of Life, the Universe, and Everything is... Four day work week, Two ply toilet paper!

Working...