Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Slashdot.org

Slashdot's Games of the Year 364

Not everyone who works on Slashdot plays games. Enough of us do, though, that I thought it would be interesting to tap my co-workers to see what folks would call their 'game of the year'. Below are comments on the best gaming of 2006 from Chris Nandor, CmdrTaco, Chris Brown, Scuttlemonkey, and myself. Then, once you've read that, we need your help in the comments. What was the game you couldn't put down? Perhaps it was over quickly, but you know you'll be thinking about it in the future? Was it a next-gen title, or something for the good old PlayStation 2? In your opinion, what was the best game of the year?
Privacy

Social Network Users Have Ruined Their Privacy 308

Steve Kerrison writes "'There's little point in worrying about ID cards, RFID tags and spyware when more and more people are throwing away their privacy anyway. And the potential consequences are dire.' I've written an article on the dangers of social networks and how many users seem to forget just how public the information they post can be. This follows a warning sent out by the CS department of Bristol University, advising students that they risk lost job opportunities, getting in trouble with their parents and more, if they don't take care. The warning, however, really applies to all social network users, be they college students or over-zealous blog posters."
Novell

Jeremy Allison Resigns From Novell In Protest 344

walterbyrd writes to alert us to word from groklaw.net that Jeremy Allison has turned in his resignation at Novell. "The legendary Jeremy Allison (of Samba fame) has resigned from Novell in protest over the Microsoft-Novell patent agreement, which he calls 'a mistake' that will be 'damaging to Novell's success in the future.' His main issue with the deal, though, is 'that even if it does not violate the letter of the license, it violates the intent of the GPL license the Samba code is released under, which is to treat all recipients of the code equally.' He leaves the company at the end of this month. He explained why in a message sent to several Novell email lists, and the message included his letter to management."
United States

FCC Drops Morse Code Requirement 231

leighklotz writes to mention a story discussing what some might consider a historic event. The FCC has dropped the Morse Testing requirement for amateur radio certifications. The public announcement was made on Friday. Ham radio operators will no longer have to study Morse, in a move patterned after other western nations. Says leighklotz: "The U.S. joins Canada and other countries in eliminating the morse code testing requirement, after being authorized to do so on July 5, 2003, when the World Radio Telecommunications Conference 2003 in Geneva adopted changes to the ITU Radio Regulations."

Metaverse the Next Big Thing? 288

CrashPanic writes to tell us TCS Daily has an article entitled "The Next Big Thing" which is about Multiverse. It does a good job of making the case for the evolution to a 3D web through the lens of the past history of Netscape. From the article: "Forces are coalescing that will produce a shift comparable at least to the spread of broadband. This change will have enormous financial, cultural and political repercussions, and the most interesting aspect of the coming transformation is that it will not be some new and unexpected thing. Rather, the Web for many will become the cliched 3D virtual reality that has been so overused as a literary and cinematic devise that most of us have forgotten how compelling that vision was when it first appeared."

Google Gets Slack with Software Updates 94

An anonymous reader writes "While Google's open source project titled 'Slack' was released over a year ago, last week's Australian Unix Users Group Conference marks the first time that Google has ever discussed the system in public. Corporate systems administrator Michael Still helped to illuminate a little bit about how Google uses Slack and how their network of computers fits together. From the article: '"Slack is a source deployment system and it's the way we install applications on servers," Still said, adding Slack is based around a centralized configuration repository which is then deployed onto selected machines in a "pull" method. Each of the "worker" machines asks for its new configuration regularly or when a manual command is run.'"

MySpace Predator Caught By Code 374

An anonymous reader writes, "Wired News editor and former hacker Kevin Poulsen wrote a 1,000-line Perl script that checked MySpace for registered sex offenders. Sifting through the results, he manually confirmed over 700 offenders, including a serial child molester in New York actively trying to hook up with underage boys on the site, and who has now been arrested as a result. MySpace told Congress last June that it didn't have this capability." Wired News says they will publish Poulsen's code under an open-source license later this week.

Google to Sell Old News Articles 153

Krishna Dagli was one of a few people to note that Google is planning on selling old news. Or more accurately, scanning in 200 years of old newspapers, and selling people the ability to view the full text. They'll be using publications like the NYT and Time magazine. Summaries will be free, but the full article text will have a price.

9 Open Source Companies to Watch 122

An anonymous reader writes "A look at 9 open source companies to watch, focusing on everything from systems management to portals to apps servers. " Silly bits like where their names come from to less silly bits like how much VC they got and what they actually do. I haven't heard of many of these, but it's encouraging to see a growing number of businesses being built around Open Source.

Steal This Film 276

SargeantLobes writes "Steal This Film is the first part of a free documentary series about file-sharing. This part focuses on The Pirate Bay, and copyfighters Piratbyran. From their website: "There have been a few documentaries by 'old media' crews who don't understand the net and see peer-to-peer organisation as a threat to their livelihoods. They have no reason to represent the filesharing movement positively. And no capacity to represent it lucidly.""The film is free for you to share, watch on your DVD-player or on your iPod, or show in cinemas." Torrents are available on their website, or watch part one, two, three and four on YouTube."
News

Experiences with Replacing Desktops w/ VMs? 442

A user asks: "After years of dealing with broken machines, HAL incompatibility, and other Windows frustrations, I'd like to investigate moving to an entirely VM-based solution. Essentially, when an employee comes in in the morning, have them log-in, and automatically download their VM from the server. This gives the benefits of network computing, in that they can sit anywhere, if their machine breaks, we can instantly replace it, etc, and the hope is that the VM will run at near-native speeds. We have gigabit to all of the desktops, so I'm not too worried about network bandwidth, if we keep the images small. Has anyone ever tried this on a large scale? How did it work out for you? What complications did you run of that I probably haven't thought of?"

Network Card for Gamers - Uses Linux to Reduce Lag 410

Cujo writes "The folks at GDHardare have an interview with Bigfoot Networks discussing the pending release of their Killer Network Card which is said to greatly reduce in-game latency. According to the Interview, this card uses a Linux-based subsystem to do its magic."

Cyberwar on NASA Websites 737

Vexorian writes "Two NASA websites were hacked today by a group of Chilean activist hackers. The reason was to protest against the war on Lebanon. The mirror of the defaced site contains an image of an injured child and claims that the sites were running MacOSX."

Network-based Encrypted Backup in 15 Minutes 25

Amanda writes "Many of us plan for mundane (but important) tasks like setting up backup during long weekends. Much of it is because of complexity and cumbersome nature of the tasks involved. This article shows how to quickly and securely set up a network-based backup, all using freely downloadable software tools like Amanda, Samba and Tar."

Agent-based or Agent-less Network Monitoring 34

An anonymous reader writes "ITO has published an interesting article on agent-based and agent-less network monitoring approaches: "Agents can monitor the status (availability and performance) of applications, servers, and network components in significantly more depth than generic management tools, since they are able to gather data through application-specific interfaces, exercise the full application functionality, and perform localised aggregation and summarisation of high volume metrics for example.""

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...