Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Unreliable (Score 1) 356

The person that wrote that post can't get basic facts about stars right. I wouldn't trust them to interpret anything he or she heard correctly.

From the original article "So the really lucky folks (for whom Betelgeuse is only visible at night) will get 24 hour days, everybody else will get at least some time with two suns in the sky." Here's the deal. A given star isn't visible at night to one person and visible during the day to another. Now if a star is visible to people at the same longitude can depend on their latitudes. If the Earth is between Betelgeuse and the Sun, then it's visible at night to everyone who can see it from their latitude. In that case everyone is going to have longer days. It might turn out to not be full daylight for 24 hours depending on the angles. We could get brighter days and shorter nights.

My guess is either the person is making it up, or their lack of basic astronomical knowledge led to them misunderstanding something that was being said about when Betelgeuse dies.

Piracy

App Store Piracy Losses Estimated At $459 Million 202

An anonymous reader passes along this quote from a report at 24/7 Wall St.: "There have been over 3 billion downloads since the inception of the App Store. Assuming the proportion of those that are paid apps falls in the middle of the Bernstein estimate, 17% or 510 million of these were paid applications. Based on our review of current information, paid applications have a piracy rate of around 75%. That supports the figure that for every paid download, there have been 3 pirated downloads. That puts the number of pirate downloads at 1.53 billion. If the average price of a paid application is $3, that is $4.59 billion dollars in losses split between Apple and the application developers. That is, of course, assuming that all of those pirates would have made purchases had the application not been available to them for free. This is almost certainly not the case. A fair estimate of the proportion of people who would have used the App Store if they did not use pirated applications is about 10%. This estimate yields about $459 million in lost revenue for Apple and application developers." A response posted at Mashable takes issue with some of the figures, particularly the 75% piracy rate. While such rates have been seen with game apps, it's unclear whether non-game apps suffer the same fate.
Games

An Inside Look At Warhammer Online's Server Setup 71

An article at Gamasutra provides some details on the hardware Mythic uses to power Warhammer Online, courtesy of Chief Technical Officer Matt Shaw and Online Technical Director Andrew Mann. Quoting: "At any given time, approximately 2,000 servers are in operation, supporting the gameplay in WAR. Matt Shaw commented, 'What we call a server to the user, that main server is actually a cluster of a number of machines. Our Server Farm in Virginia, for example,' Mann said, 'has about 60 Dell Blade chassis running Warhammer Online — each hosting up to 16 servers. All in all, we have about 700 servers in operation at this location.' ... 'We use blade architecture heavily for Warhammer Online,' Mann noted. 'Almost every server that we deploy is a blade system. We don't use virtualization; our software is somewhat virtualized itself. We've always had the technology to run our game world across several pieces of hardware. It's application-layer clustering at a process level. Virtualization wouldn't gain us much because we already run very close to peak CPU usage on these systems.' ... The normalized server configuration — in use across all of the Mythic-managed facilities — features dual Quad-Core Intel Xeon processors running at 3 GHz with 8 GB of RAM."
Censorship

Australian AvP Ban Reversed 71

Earlier this month, we discussed news that Sega's new Aliens vs. Predator video game had been refused classification in Australia, effectively banning it. After a scathing response from the developer saying they wouldn't censor the game, and later news that the classification scheme may be updated to include an R18+ rating, it now seems that the Classification Board has seen fit to give the game a green light after all. Sega's Darren Macbeth told Kotaku, "We are particularly proud that the game will be released in its original entirety, with no content altered or removed whatsoever. This is a big win for Australian gamers. We applaud the Classification Review Board on making a decision that clearly considers the context of the game, and is in line with the modern expectations of reasonable Australians."
Security

Doom-Like Video Surveillance For Ports In Development 56

oranghutan writes "A research and development group down under is working to develop an advanced video surveillance system for ports around the world that uses video superimposed onto a 3D map. With 16-megapixel high-definition cameras on a distributed (cabled) network and a proprietary system written in a variety of languages (C++, Python, SQL, etc.), the group from NICTA is aiming to allow security teams at the Port of Brisbane — which is 110km long — to monitor shipping movements, cargo and people. By scrolling along a 3D map, the security teams can click on a location and then get a real-time video feed superimposed onto the map. Authorities from around the world with the right permissions can then access the same system. The main difference from regular surveillance systems is the ability to switch views without having to know camera numbers/locations and the one screen view."
Input Devices

In Defense of the Classic Controller 251

Kotaku has an opinion piece by Leigh Alexander singing the praises of classic, button-rich controllers for the level of precision and complexity they offer. While the Wii Remote and upcoming motion-control offerings from Microsoft and Sony are generating a lot of interest, there will always be games for which more traditional input devices are better suited. Quoting: "With all this talk about new audiences — and the tech designed to serve them — it's easy to get excited. It's also easy to feel a little lost in the shuffle. For gamers who've been there since before anyone cared about making games 'for everyone,' having that object in our hands was more than a way to access the game world — it was half the appeal. Anyone who's ever pulled off a chain of combos in a console fighter can tell you about the joy of expertise and control. ... Gamers may suffer some kind of identity crisis as the familiar markers of their beloved niche evolve — or disappear entirely. The solution to that one's easy: Get over it. Like it or not, it's clear that gaming's not a 'niche' anymore, and its shape will change. The more pressing issue is whether or not controller-less gaming will truly make the medium richer. Making something 'more accessible' doesn't necessarily make it better."
Security

Windows 7 Users Warned Over Filename Security Risk 613

nandemoari writes "Would-be Windows 7 users have been warned to change a default setting which could leave them vulnerable to attack via bogus files. As a result, Microsoft is taking flak for failing to correct a problem found in previous editions of Windows. The issue involves the way Windows Explorer displays filenames. In all editions of Windows after Windows 98, the default setting hides the filename extension (which identifies what type of file it is). This means that a Word file titled 'partyinvite.doc' will show up in Windows Explorer as simply 'partyinvite'. The only exception to this rule is if Windows does not recognize the file type. The reason for this setting is that it makes for a less cluttered look and avoids filling the screen with redundant detail. However, a flaw in the way it works leaves it liable to exploitation by hackers. They can take an executable file (which can do much more damage to a computer when opened) and disguise it by calling it 'partyinvite.doc.exe.'"

Comment Re:Simple FTL question (Score 1) 541

The energy required to hold on to the stick and rotate at a rate so that the velocity at the end of the stick faster than the speed of light would be infinite.

So, no. The ship wouldn't move faster than the speed of light because you wouldn't be able to generate the force required to make it do so.

Comment Re:Hell yes! (Score 2, Interesting) 660

I suspected that was your point, but it is not what you said.

You said (my emphasis) "Here's the difference. You can buy OS X and install it on any machine you want. Apple won't stop you; however, don't expect Apple to support it as it runs on non-Apple hardware. Now the moment you create a business to start selling it, you become a re-seller. As a re-seller, Apple can dictate what you can and cannot do."

My point (of which you're probably aware) was that Apple actually does try to dictate to everyone that OS X may only be installed on Apple hardware. However, unlike the RIAA, they don't seem to think it's worth it to sue each individual user. Though that view doesn't stop them from trying to use the DMCA to keep the information from users http://www.appleinsider.com/articles/06/02/17/apple_serves_dmca_notice_to_osx86_project.html. The only difference between an individual and a group to Apple is how much effort they are willing to expend to stop you from using OS X in violation of the EULA.

Comment Re:Hell yes! (Score 1) 660

Here's the difference. You can buy OS X and install it on any machine you want. Apple won't stop you;

WRONG

OSX contains DRM to stop this type of thing.

From the http://wiki.osx86project.org/wiki/index.php/FAQ
Do I need Apple hardware to run Mac OS X?

Not anymore.

Projects such as OSx86 have succeeded in allowing the Intel-based version of Mac OS X to run on non-Apple hardware largely by bypassing the TPM in software.

The "Trusted Platform Module," or TPM, is a computer chip embedded inside Intel-based Macs to prevent the Intel-based version of Mac OS X from running on non-Apple hardware. (during installation of Mac OS X, Mac OS X interfaces with the TPM. If Mac OS X finds that the TPM doesn't exist, Mac OS X refuses to install or run.)

In building your "Hackintosh" however, you may want to keep as close to the hardware configuration of Intel-based Macs for the best compatibility. Intel Macs use (or have used) either a Core Solo, Core Duo, Core 2 Duo, or Xeon processor. For graphics cards, Intel Macs have seen Intel's GMA950; ATI's Mobility Radeon X1600, Radeon X1600, and Radeon X1900 XT; and nVidia's GeForce 7300GT, 7600GT, 8600M GT or Quadro FX4500. . . . . .

Comment People you can trust. (Score 1) 197

I went to the Carbonite website to see what these people have to say. I like what they have to say about "How does Carbonite Online Backup keep my data secure?" It reads (my emphasis in the quoted text):

"Carbonite uses a combination of encryption techniques, similar to those used by banks, to safeguard your data. Files are encrypted twice before they leave your PC and remain encrypted on our servers, making it virtually impossible for anyone to access your files without your secret password. Users are also given the option to manage their own encryption key."

Clearly these are the kind of people you can trust to not put in a backdoor, mine your data, and sell it.

Comment Re:Fingerprint scanners suck. (Score 1) 166

Although you're right that using the fingerprint itself for encryption is not realisitic, the solution that a good fingerprint system will use to provide the same basic functionality is to match the fingerprint in hardware. If the fingerprint swipe matches, then the hardware will release the decryption key. This way you get to do the fuzzy match, but get a fixed result.

Slashdot Top Deals

Living on Earth may be expensive, but it includes an annual free trip around the Sun.

Working...