Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Addicts indeed (Score 3, Insightful) 386

In my experience--based solely on the people I know that play WoW, not necessarily on the stories you read online--the likelihood of Wow at least *interfering* with your social life is pretty high. You might decide not to go out with some friends one night because you're just so close to leveling up or completing a quest. That might sound like a really minor problem, but it adds up. The probability of it interfering increasing significantly if you are a member of a raiding guild. Since raiders are the people mentioned in the blurb, I think the OP's point was valid. He didn't even seem to be criticizing all WoW players, just those who rush out to "beat" the expansion quicker than anyone else.

Remember, there are exceptions to every rule. Some people that use cocaine do so without any noticeable negative side effects on their lives. A lot of the time, however, there are very bad, very noticeable side effects socially, physically, and financially. I know that's an over the top example, but I think the same is true of WoW. You might be an exception, and if so, that's great. But just because you continue to thrive despite playing WoW doesn't mean others are as lucky. Something to keep in mind, that's all...

Programming

Apple Crippled Its DTrace Port 476

Linnen writes in to note that one of developers of Sun's open source system tracing tool, DTrace, has discovered that Apple crippled its port of the tool so that software like iTunes could not be traced. From Adam Leventhal's blog: "I let it run for a while, made iTunes do some work, and the result when I stopped the script? Nothing. The expensive DTrace invocation clearly caused iTunes to do a lot more work, but DTrace was giving me no output. Which started me thinking... did they? Surely not. They wouldn't disable DTrace for certain applications. But that's exactly what Apple's done with their DTrace implementation. The notion of true systemic tracing was a bit too egalitarian for their classist sensibilities..."
Power

MIT Wirelessly Powers a Lightbulb 394

kcurtis writes "According to the Boston Globe, MIT Researchers have powered a light bulb remotely. The successful experiment lit a 60-watt light bulb from a power source two meters away, with no physical connection between the power source and the light bulb. Details about WiTricity, or wireless electricity, are scheduled to be reported today in Science Express, the advance online publication of the journal Science, the Massachusetts Institute of Technology said. 'The team from MIT is not the first group to suggest wireless energy transfer. Nineteenth-century physicist and engineer Nikola Tesla experimented with long-range wireless energy transfer, but his most ambitious attempt - the 29m high aerial known as Wardenclyffe Tower, in New York - failed when he ran out of money. Others have worked on highly directional mechanisms of energy transfer such as lasers. However, unlike the MIT work, these require an uninterrupted line of sight, and are therefore not good for powering objects around the home.'"
Security

Word Vulnerability Compromised US State Dept. 207

hf256 writes "Apparently hackers using an undisclosed (at the time) vulnerability compromised the State Departments network using a Word document sent as an email attachment. Investigators found multiple instances of infection, informed Microsoft, then had to sever internet connectivity to avoid leaking too much data!"
The Internet

Utah Bans Keyword Advertising 271

Eric Goldman writes "Last month, Utah passed a law banning keyword advertising. Rep. Dan Eastman, the Utah legislator who sponsored the law, believes competitive keyword advertising is the equivalent of corporate identity theft, causing searchers to be (in his words) 'carjacked' and 'shanghaied' by advertisers. He also takes a swipe at the EFF, dismissing its critique of the law as 'criticism from the fringes.'"
Security

Solaris Telnet 0-day vulnerability 342

philos writes "According to SANS ISC, there's a vulnerability in Solaris 10 and 11 telnet that allows anyone to remotely connect as any account, including root, without authentication. Remote access can be gained with nothing more than a telnet client. More information and a Snort signature can be found at riosec.com. Worse, this is almost identical to a bug in AIX and Linux rlogin from way back in 1994."
Science

Women "Advertise" Fertility 317

Dik Zak writes with word of a paper published in the journal Hormones and Behavior. A study found that women take greater care over their appearance when they are at peak levels of monthly fertility. The researchers took two photos of each of 30 women, one near ovulation and one at the other end of her cycle. They then showed the paired photos (with faces obscured) to a group of observers, who were asked to judge in which photo the women were trying to look more attractive. The observers chose the "high fertility" subject nearly 60% more of the time than would be expected by chance.
Databases

Is the One-Size-Fits-All Database Dead? 208

jlbrown writes "In a new benchmarking paper, MIT professor Mike Stonebraker and colleagues demonstrate that specialized databases can have dramatic performance advantages over traditional databases (PDF) in four areas: text processing, data warehousing, stream processing, and scientific and intelligence applications. The advantage can be a factor of 10 or higher. The paper includes some interesting 'apples to apples' performance comparisons between commercial implementations of specialized architectures and relational databases in two areas: data warehousing and stream processing." From the paper: "A single code line will succeed whenever the intended customer base is reasonably uniform in their feature and query requirements. One can easily argue this uniformity for business data processing. However, in the last quarter century, a collection of new markets with new requirements has arisen. In addition, the relentless advance of technology has a tendency to change the optimization tactics from time to time."
Space

Black Hole Found Inside Globular Cluster 73

acidrain writes "Contrary to the prediction of some computer models, scientists have found a black hole resting peacefully in a dense nest of stars called a globular cluster. Previously discovered black holes are either similar in size to a large star, or super massive holes which are millions of times bigger than a star is able to remain stable. This finding indicates there may be an intermediate size range of holes residing within these star clusters."

The Worst Bill You've Never Heard Of 630

AWhiteFlame writes "IPAction.org is reporting on a section of the Reform Act of 2006 that's very shocking and surprisingly not that publicized. From the article: 'This will be a busy week in the House -- Congress goes into summer recess Friday, but not before considering the Section 115 Reform Act of 2006 (SIRA). Never heard of SIRA? That's the way Big Copyright and their lackey's want it, and it's bad news for you. Simply put, SIRA fundamentally redefines copyright and fair use in the digital world. It would require all incidental copies of music to be licensed separately from the originating copy. Even copies of songs that are cached in your computer's memory or buffered over a network would need yet another license.'"

Slashdot Top Deals

To do nothing is to be nothing.

Working...