Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Games

The Grown-Up Video Game 152

Phaethon360 writes "Now, more than ever, we're seeing many Mature ratings (M+, 17+, 18) being distributed by various national media regulators. But that isn't the only indicator for a game's intended audience. It doesn't take a thousand swear words, scantily clad women or gratuitous violence to differentiate a ten-year-old's game from a twenty-year-old's. The spectrum of human emotions encompasses a wider palette than just revenge, fear, and loss, but the games that shy away from these are frequently mistaken as being for a younger audience. From the article: 'The human experience is one that is made up of great hardship, pain, loss, death, and a multitude of experiences seemingly designed to destroy a person. However, that same experience is also filled with joy, love, laughter, family and friends. ... These so-called “grown-up” games need not be relegated to the category of niche gaming. In fact, at times we find that these video games are capable of reaching mass popularity among the gaming community. It is here that we find one of our generation’s outlets for the expression of conflict.'"
Robotics

When Will AI Surpass Human Intelligence? 979

destinyland writes "21 AI experts have predicted the date for four artificial intelligence milestones. Seven predict AIs will achieve Nobel prize-winning performance within 20 years, while five predict that will be accompanied by superhuman intelligence. (The other milestones are passing a 3rd grade-level test, and passing a Turing test.) One also predicted that in 30 years, 'virtually all the intellectual work that is done by trained human beings ... can be done by computers for pennies an hour,' adding that AI 'is likely to eliminate almost all of today's decently paying jobs.' The experts also estimated the probability that an AI passing a Turing test would result in an outcome that's bad for humanity ... and four estimated that probability was greater than 60% — regardless of whether the developer was private, military, or even open source."
Security

Botnet Targets Web Sites With Junk SSL Connections 64

angry tapir writes "More than 300 Web sites are being pestered by infected computers that are part of the Pushdo botnet. The FBI, Twitter, and PayPal are among the sites being hit, although it doesn't appear the attacks are designed to knock the sites offline. Pushdo appears to have been recently updated to cause computers infected with it to make SSL connections to various Web sites — the bots start to create an SSL connection, disconnect, and then repeat." SecureWorks's Joe Stewart theorizes that this behavior is designed to obscure Pushdo's command and control in a flurry of bogus SSL traffic.
Power

"Perpetual Motion DeLorean" Scammers Face $26M Judgment 243

An anonymous reader writes "Back in 2002, we discussed a story about the so-called 'Perpetual Motion DeLorean,' which could 'supposedly go "hundreds of miles" at speeds over 100MPH without stopping to recharge.' More than seven years later, the final shoe has dropped on this saga, with a $26 million judgment against Carl Tilley and his wife, who propagated this scam that ran for several years. Probably the height of its audacity was when Tilley told his shareholders in May of 2002 that GE had offered $2 billion 'sight unseen' to buy out the technology."
Security

Interview With a Convicted 419 Scammer 184

An anonymous reader writes "Scam awareness website www.scam-detectives.co.uk has published a two part interview with convicted Nigerian 419 scammer, 'John.' 'John' talks about his experiences of scam victims, how he gains their trust and convinces them to part with their money, and how he would go back for another 'bite' after the original scam, posing as a law enforcement official who has apprehended the scammer and recovered the funds ... for a fee, of course."

Comment Re:Sad, isn't it? (Score 3, Insightful) 213

Pardon me, but isn't protection against security breaches the OPERATING SYSTEM'S JOB???

Partially, but it isn't the operating system's job to stop the user from being an idiot. If you want to run executables from suspicious websites, that's your right. And if the rest of the world wants a device to stab you in the face over the internet, that's their right, too.

Medicine

Radiation Therapy Mistakes Cost Lives 215

jmtpi recommends a long NY Times investigative report about how powerful medical linear accelerators have contributed to at least two deaths in the New York area. Although the mistakes were largely due to human error, buggy software also played a role. "...the records described 621 mistakes from 2001 to 2008... most were minor... The Times found that on 133 occasions, devices used to shape or modulate radiation beams... were left out, wrongly positioned, or otherwise misused. On 284 occasions, radiation missed all or part of its intended target or treated the wrong body part entirely. ... Another patient with stomach cancer was treated for prostate cancer. Fifty patients received radiation intended for someone else, including one brain cancer patient who received radiation intended for breast cancer."
Communications

Pope Urges Priests To Go Forth and Blog 284

Hugh Pickens writes "Pope Benedict XV, whose own presence on the Web has grown in recent years, is urging priests to use all multimedia tools at their disposal to preach the Gospel and to engage in dialogue with people of other religions and cultures. 'The spread of multimedia communications and its rich "menu of options" might make us think it sufficient simply to be present on the Web,' but priests are 'challenged to proclaim the Gospel by employing the latest generation of audiovisual resources,' says the Pope. The message from the Pope, prepared for the World Day of Communications, suggests such possibilities as images, videos, animated features, blogs, and Web sites and adds that young priests should become familiar with new media while still in seminary, though the Pope stresses that the use of new technologies must reflect theological and spiritual principles. Many priests and top prelates already interact with the faithful online, and one of Benedict's advisers has his own Facebook profile. So does the archbishop of Los Angeles. The Pope adds, 'I renew the invitation to make astute use of the unique possibilities offered by modern communications. May the Lord make all of you enthusiastic heralds of the Gospel in the new "agorà" which the current media are opening up.'"
Google

Google Docs To Host Any File Type 186

ezabi writes "According to a post on the official Google blog, in the coming weeks Google Docs will offer to host all file types with a limit of 250 MB, which as they say is larger than the current limit for email attachments. This will have its consequences: paid file sharing will die, more shared pirated material, newer vulnerabilities and malware distribution channels..."
Censorship

China Faces Piracy Suit Over Censorship Software 113

angry tapir writes "Web software filtering vendor CyberSitter has filed a $2.2B lawsuit against the Chinese government, two Chinese software makers, and seven major computer manufacturers for their distribution of Green Dam Youth Escort, a controversial Web filtering package the Chinese government had mandated to be installed on computers sold there. Researchers at the University of Michigan found that Green Dam copied code from CyberSitter."
Security

Encryption Cracked On NIST-Certified Flash Drives 252

An anonymous reader writes "USB Flash drives with hardware based AES 256-bit encryption manufactured by Kingston, SanDisk and Verbatim have reportedly been cracked by security firm SySS. These drives are advertised to meet security standards suitable for use with sensitive US Government data (unclassified, of course) as emphasized by the FIPS 140-2 Level 2 certificate issued by the US National Institute of Standards and Technology (NIST). It looks likes the Windows-based password entry program always sends the same character string to the drive after performing various crypto operations."
Image

USPTO Awards LOL Patent To IBM Screenshot-sm 274

theodp writes "Among the last batch of patents granted in 2009 was one for IBM's Resolution of Abbreviated Text in an Electronic Communications System. The invention of four IBMers addresses the hitherto unsolvable problem of translating abbreviations to their full meaning — e.g., 'IMHO' means 'In My Humble Opinion' — and vice versa. From the patent: 'One particularly useful application of the invention is to interpret the meaning of shorthand terms ... For example, one database may define the shorthand term "LOL" to mean "laughing out loud."' USPTO records indicate the patent filing was made more than a year after Big Blue called on the industry to stop what it called 'bad behavior' by companies who seek patents for unoriginal work. Yet another example of what USPTO Chief David Kappos called IBM's apparent schizophrenia on patent policy back when he managed Big Blue's IP portfolio."
Communications

$25,000 of Communications Gear In a $500 Car 215

In perhaps one of the finest displays of technological excess in automotive communications gear, one "enthusiast" has managed to cram over $25,000 worth of gear into a $500 car. The car is rigged for just about every conceivable communications band including FM, UHF, VHF, HF, and WTF. What other amazing displays of technological excess have others seen? "The equipment seems to cover an amazing array of technologies, many of which seem to be redundant. For instance, just how many handheld 144 MHz radios do you need? It seems like the owner of the Ham Car is capable of listening to every police/fire/ems/military channel in the world. Simultaneously. There's a laptop and we assume there's some form of cellular or satellite communication setup for that, too."

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...