Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Games

City of Heroes Reaches Sunset, NCsoft Paying the Price 290

KingSkippus writes "At midnight Pacific on Saturday, December 1, NCsoft shut down the City of Heroes servers for the final time. Since announcing the closure, a group of players has been working hard to revive the game by getting attention from the gaming press, recognition from celebrities such as Sean Astin, Neil Gaiman, and Felicia Day, and assistance from fantasy author Mercedes Lackey. Meanwhile, NCsoft has been drawing negative publicity, including a scathing article about the shutdown from local news site The Korea Times, noting that the game was earning $2.76 million per quarter and that 'it is hard to comprehend what NCsoft means when they say they closed it for strategic reasons.' NCsoft's stock price has fallen over 43% since the announcement in August, almost 30% below its previous 52-week low, right when investors were counting on the success of the recently launched Guild Wars 2 to help boost the company."

Comment Re:Very Simple (Score 3, Informative) 102

Most operating systems these days don't run device driver interrupt handling code directly in the interrupt handler --- it's considered bad practice, as not only do you not know what state the OS is in (because it's just been interrupted!), which means you have an incredibly limited set of functionality available to you, but also while the interrupt handler's running some, if not all, of your interrupts are disabled.

So instead what happens is that you get out of the interrupt handler as quickly as possible and delegate the actual work to a lightweight thread of some description. This will usually run in user mode, although it's part of the kernel and still not considered a user process. This thread is then allowed to do things like wait on mutexes, allocate memory, etc. The exact details all vary according to operating system, of course.

This means that you nearly always have an extra couple of context switches anyway. The extra overhead in a well designed microkernel is negligible. Note that most microkernels are not well designed.

L4 is well designed. It is frigging awesome. One of its key design goals was to reduce context switch time --- we're talking 1/30th the speed of Linux here. I've seen reports that Linux running on top of L4 is actually faster than Linux running on bare metal! L4 is a totally different beast to microkernels like Mach or Minix, and a lot of microkernel folklore simply doesn't apply to L4.

L4 is ubiquitous on the mobile phone world; most featurephones have it, and at least some smartphones have it (e.g. the radio processor on the G1 runs an L4-based operating system). But they're mostly using it because it's small (the kernel is ~32kB), and because it provides excellent task and memory management abstraction. A common setup for featurephones is to run the UI stack in one task, the real-time radio stack in another task, with the UI stack's code dynamically paged from a cheap compressed NAND flash setup --- L4 can do this pretty much trivially.

This is particularly exciting because it looks like the first genuinely practical L4-based desktop operating system around. There have been research OSes using this kind of security architecture for decades, but this is the first one I've seen that actually looks useful. If you haven't watched the LiveCD demo video, do so --- and bear in mind that this is from a couple of years ago. It looks like they're approaching the holy grail of desktop operating systems which, is to be able to run any arbitrary untrusted machine code safely. (And bear in mind that Genode can be run on top of Linux as well as on bare metal. I don't know if you still get the security features without L4 in the background, though.)

This is, basically, the most interesting operating system development I have seen in years.

Technology

Is Intel Planning To Kill Enthusiast PCs? 1009

OceanMan7 writes "According to a story by Charlie Demerjian, a long-time hardware journalist, Intel's next generation of x86 CPUs, Broadwell, will not come in a package having pins. Hence manufacturers will have to solder it onto motherboards. That will likely seriously wound the enthusiast PC market. If Intel doesn't change their plans, the future pasture for enthusiasts looks like it will go to ARM chips or something from offshore manufacturers."

Comment Re:Universal Remote (Score 1) 174

I'd wait until there's more information about the protocols involved. It's almost certain that the video being displayed on the tablet is being broadcast via radio from the console --- which means it's entirely feasible that the tablet is dumb as rocks and isn't programmable; and that all the logic is actually happening on the console.

If that were the case, the only way you'd be able to repurpose the tablet would be to clone the no-doubt proprietary radio link that the console used, which is probably going to be hard.

In any event I expect the first reverse-engineering reports to come out approximately thirty seconds after this thing ships in the US, so it's not as if we'd have to wait very long.

Businesses

Hostess To Close; No More Twinkies 674

RenderSeven writes "In a press release issued today, baker Hostess Brands asked a bankruptcy court for permission to close all of its plants and sell off their assets, immediately laying off 18,500 workers. Citing high labor and rising health care costs, increasing competition and growing consumer awareness of healthy foods, Hostess says it can no longer operate without union concessions. A crippling strike has already shut down operations at all facilities, and while the Teamsters Union has ratified a new contract to keep Hostess in business, the Bakers Union has refused saying they would rather see the company closed than accept pension cuts. The Teamsters union is urging the bakers union to hold a secret ballot on whether to continue striking; citing its financial experts who had access to the company's books, the Teamsters say that Hostess' warning of liquidation is 'not an empty threat or a negotiating tactic' but a certain outcome if workers keep striking. If your late-night programming is fueled by Twinkies, Ding Dongs and Zingers, better stock up now." [Editor's note: A whole bunch of users submitted this news. I worry about our readership's cholesterol levels.]

Comment Javascript? Pfah (Score 4, Funny) 60

Anyone can compile C into Javascript. Only I can compile C into... Perl.

See cluecc.

(Clue allows C to be compiled, badly, into a variety of scripting languages including Lua, Javascript and Perl as well as Java. Some nutter even contributed a Common Lisp backend. It was an experiment to see whether exploiting certain vaguenesses in the ANSI C spec concerning pointer representation was useful. Unlike Enscripten, Clue doesn't have a big array of bytes representing the C memory; instead pointers are represented as object-offset tuples. It worked really well, but unfortunately nearly all existing code out there doesn't work right on a system where sizeof(int)==sizeof(double)==sizeof(char)==1 and sizeof(void*)==2. Plus, the compiler frontend I was using had a number of major issues. But it works well enough to run benchmarks.)

(And before you ask, yes, compiling C into Perl 5 is a total, utter, complete waste of time.)

Twitter

UW Imposes 20-Tweet Limit On Live Events 196

theodp writes "GeekWire's Taylor Soper reports that the University of Washington has capped live sports coverage at 20 Tweets per basketball game (45 for football) and threatens to revoke the credentials of journalists who dare exceed the Twitter limits. Tacoma News Tribune reporter Todd Dybas was reportedly 'reprimanded' after drawing the ire of the UW Athletic Dept. for apparently Tweeting too much during UW's 85-63 Sunday win over Loyola."
Books

Book Review: Reverse Deception 43

benrothke writes "Advanced persistent threat (APT) is one of the most common information security terms used today and it is an undeniably real and dangerous menace. Wikipedia notes that APT's usually refer to a group, such as a foreign government, with both the capability and the intent to persistently and effectively target a specific entity. The term is commonly used to refer to cyber threats, in particular that of Internet-enabled espionage using a variety of intelligence gathering techniques to access sensitive information, but applies equally to other threats such as that of traditional espionage or attack. Every organization of size and scope is a target, and many of the world's largest firms and governments have been victims. In Reverse Deception: Organized Cyber Threat Counter-Exploitation, Dr. Max Kilger and his co-authors provide an effective counterintelligence approach in which to deal with APT. The good news is that the authors provide an effective framework. The bad news is that creating an effective defense is not an easy undertaking." Keep reading below for the rest of Ben's review.
Businesses

Google Outage Shows Risk of Doing Business In China 113

Hugh Pickens writes "The WSJ reports that widespread disruptions to Google in China over the weekend, halting use of everything from Google's search engine to its Gmail email service to its Google Play mobile-applications store, underscore the uncertainty surrounding Beijing's effort to control the flow of information into the country, as well as the risks that effort poses to the government's efforts to draw global businesses. The source of the disruptions couldn't be determined, but Internet experts pointed to China's Internet censorship efforts, which have been ratcheted up ahead of the 18th Party Congress. 'There appears to be a throttling under way of Web access,' says David Wolf, citing recent articles in foreign media about corruption and wealth in China spurred by the party congress and the fall of former party star Bo Xilai, 'that's their primary concern, people getting news either through Google or through its services.' Beijing risks a backlash if it were to block Google outright on a long-term basis, says Wolf and such a move could put Beijing in violation of its free-trade commitment under the World Trade Organization and make China a less-attractive place to do business. 'If China insists in the medium and long term of creating another Great Firewall between the China cloud and the rest of the world, China will be an increasingly untenable place to do business.'"

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...