Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - 42 Artificial Intelligences Are Going Head to Head in 'Civilization V'

rossgneumann writes: The r/Civ subreddit is currently hosting a fascinating "Battle Royale" in the strategy game Civilization V, pitting 42 of the game's built-in, computer-controlled players against each other for world domination. The match is being played on the largest Earth-shaped map the game is capable of, with both civilizations that were included in the retail version of the game and custom, player-created civilizations that were modded into it after release.

Comment Try low, wide, non-progressive (Score 2) 464

After about ten years of struggling with this I've settled on two 27" 1920p monitors, using broad but low +1.5 glasses that I can peer over when I glance at anything else in the room. I can actually work with the monitors without the glasses as long as Chrome is set to 125% zoom, but it's slightly more comfortable with the glasses, since I can then use the default fonts for virtually everything.

Submission + - Nvidia Cracked (wccftech.com) 4

jones_supa writes: Another day, another corporate network intrusion. Nvidia has reportedly been breached in the first week of December with the attack compromising personal information of the employees. There is no indication that other data has been compromised. This is according to an email sent out by the company's privacy office and Nvidia's SVP and CIO Bob Worwall on December 17th. It took Nvidia a couple of weeks to pick up all the pieces and assess the incident. It appears that the issue was pinned down to an employee or several employees getting their personal data compromised outside of the company network. After that, the information was used to gain unauthorized access to the internal corporate network. Nvidia's IT team has taken extensive measures since then to enhance the security of the network against similar attacks in the future.

Comment Re:UPS (Score 1) 236

Yes. We use PowerChute everywhere; it's a good product.

But, at least in a production system, you still should be doing regular "real" failover tests to ensure that what is supposed to happen does really happen. For example, a common problem is a sequence like:

- Power fails, UPS predicts 20 minutes of runtime;
- Servers are set to shut themselves down when 5 minutes of runtime remains;
- Fifteen minutes later, the servers start their shutdown sequences;
- The increased CPU and disk activity from the shutdown increase the power draw, causing the battery to empty and all power to be cut 90 seconds earlier than expected.

Another issue is that software added during a system's lifetime can cause a server that took 180 seconds to shut down last year to now require 240 seconds.

Either issue can mean you wind up with servers that powered off with a 90% completed shutdown.

The only way you'll discover these kinds of problems is to actually simulate a real power fail once in a while.

Comment Re:UPS (Score 1) 236

Really, a $150 investment to protect your $500+ computer is more than worth it.

Don't forget to add the cost of replacing the UPS battery every year or two. Plus the time to setup and regularly test the fail-over and auto-shutdown.

FWIW I generally use a UPS on the servers and firewalls, but not on any of the clients.

Submission + - Canadian Police Recommend Ending Anonymity on the Internet (michaelgeist.ca) 1

An anonymous reader writes: Michael Geist reports that last week the Ontario Provincial Police, one of Canada's largest police forces, recommended legally ending anonymity on the Internet. Noting the need for drivers licenses to drive or marriage licenses to get married, the police suggested that an Internet license that would reveal all users is needed to address online crime. The Canadian Supreme Court strongly endorsed a right to anonymity earlier this year.

Submission + - Microsoft Prepares for Mega Patch Tuesday

jones_supa writes: The dentist is in the house. Next week will see Microsoft's biggest Patch Tuesday in years, with 16 bulletins scheduled including 5 critical updates. The previous record of 17 patches is from 2011. All of the upcoming patches fix serious security problems under topics of remote code execution, elevation of privilege, security feature bypass, information disclosure, and denial of service. The affected products are Windows, Internet Explorer, .NET, Office and Exchange. Karl Sigler, threat intelligence manager at Trustwave, explained that one of the critical bulletins may also address the Windows OLE remote code execution flaw.

Comment Re:If you 'speak' C (Score 1) 316

BALR *,13 to you, sir.

surely it was

        BALR 15,0
        USING *,15

no?

PS: I blame this to be the start of the enormous overuse of #define in subsequent decades, as most people thought it was cool to equate R15 to 15 (etcetera) and then write the above as

        BALR R15,R0
        USING *,R15

leading to the endless nested equating we get in modern C and C++.

PPS: for the worst such mess ever created, does anyone else remember the COBOL "ALTER" command?

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...