Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Dont' understand the hype (Score 1) 266

I've never understood the draw behind "neural networks" ... it's a really cool-sounding term for an otherwise not-so-exciting algorithm.

A neural network lets you determine an approximation to a function for which there may be no closed-form expression. It's basically a piece-wise linear approximation with heuristic edge-waiting, where the edge weights are "trained" by inputting numerous samples to the "neural network".

   

The Orange Box Review 358

"PC Gaming is dying," the analysts tell us. "The Massive genre is the only viable business model left," websites report. That they're off the mark is obvious to anyone that's actually played a PC game in the last few years; games like Sam and Max , Battlefield 2 , or any of the numerous puzzle titles available online prove the flexibility and strength of the PC platform. Then, every once in a while, you get an offering like the Orange Box. A value-packed storm of content from Valve, this single sku offers five complete games at an amazing price. That would be great, even if the games weren't any good ... but they are. They're very, very, very good. Read on for my impressions of Half-Life 2: Episode 2, Team Fortress 2, and (the cake is a lie) Portal.
Security

Blackberry "Spy" Software Released 91

Noryungi writes "Maybe the French were on to something after all. It turns out that there is a software available to easily spy on Blackberries, recording voice conversations and all messages (emails or SMS text message) that transmit through the portable device. Of course, the software has to be installed by the owner of the Blackberry, but it would not be surprising to find out that someone has found a way to silently auto-install that software on RIM devices. ZDNet reports that RIM isn't concerned: 'Ian Robertson, senior manager of security and research at RIM, said users need not be particularly worried about the capability of FlexiSPY. "While it's the subject of some debate, I don't consider it a virus nor a Trojan, as it does require conscientious effort from the user to load the program," he said. Robertson said an average user that maintains good [gadget] hygiene would never see the software loaded onto their device without their knowledge.'"

Plan For Cloaking Device Unveiled 342

Robotron23 writes "The BBC is reporting that a plan for a cloaking device has been unveiled. The design is pioneered by Professor Sir John Pendry's team of scientists from the US and Britain. Proof of the ability of his invention could be ready in just 18 months time using radar testing. The method revolves around certain materials making light "flow" around the given object like water."

2006 ACM Programming Contest Complete 180

prostoalex writes "World finals for 2006 ACM programming contest took place in San Antonio, TX this year, and the results are in. Russia's Saratov State University solved 5 contest problems in record time, followed closely by Altai State Technical University (Russia) with 5 problems solved as well. University of Twente (Netherlands), Shanghai Jiao Tong University (China), Warsaw University (Poland), St. Petersburg State University (Russia), Massachusetts Institute of Technology (USA), Moscow State University (Russia), University of Waterloo (Canada) and Jagiellonian University - Krakow (Poland) all completed 4 problems."

Wal-Mart Controls Modern Game Design? 696

An anonymous reader writes "That Wal-Mart smiley face is looking pretty evil now that Allen Varney has explained how much influence they have on virtually every modern game: 'Publisher sales reps inform Wal-Mart buyers of games in development; the games' subjects, titles, artwork and packaging are vetted and sometimes vetoed by Wal-Mart. If Wal-Mart tells a top-end publisher it won't carry a certain game, the publisher kills that game. In short, every triple-A game sold at retail in North America is managed start to finish, top to bottom, with the publisher's gaze fixed squarely on Wal-Mart, and no other.'"

Pentium Computers Vulnerable to Attack? 227

An anonymous reader writes "One of the latest security scares is coming from security experts at CanSecWest/core '06 in the form of a possible hardware-specific attack. The attack is based on the built-in procedure that Pentium based chips use when they overheat. From the article: 'When the processor begins to overheat or encounters other conditions that could threaten the motherboard, the computer interrupts its normal operation, momentarily freezes and stores its activity, said Loïc Duflot, a computer security specialist for the French government's Secretary General for National Defense information technology laboratory. Cyberattackers can take over a computer by appropriating that safeguard to make the machine interrupt operations and enter System Management Mode, Duflot said. Attackers then enter the System Management RAM and replace the default emergency-response software with custom software that, when run, will give them full administrative privileges.'"

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...