Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Games

The Struggle For Private Game Servers 125

A story at the BBC takes a look at the use of private game servers for games that tend not to allow them. While most gamers are happy to let companies like Blizzard and NCSoft administer the servers that host their MMORPGs, others want different rules, a cheaper way to play, or the technical challenge of setting up their own. A South African player called Hendrick put up his own WoW server because the game "wasn't available in the country at the time." A 21-year-old Swede created a server called Epilogue, which "had strict codes of conduct and rules, as well as a high degree of customized content (such as new currency, methods of earning experience, the ability to construct buildings and hire non-player characters, plus 'permanent' player death) unavailable in the retail version of the game." The game companies make an effort to quash these servers when they can, though it's frequently more trouble that it's worth. An NCSoft representative referenced the "growing menace" of IP theft, and a Blizzard spokesperson said,"We also have a responsibility to our players to ensure the integrity and reliability of their World of Warcraft gaming experience and that responsibility compels us to protect our rights."
Privacy

Privacy, Mobile Phones, and Ubiquitous Data Collection 61

ChelleChelle writes "Participatory sensing technologies are greatly expanding the possible uses of mobile phones in ways that could improve our lives and our communities (for example, by helping us to understand our exposure to air pollution or our daily carbon footprint). However, with these potential gains comes great risk, particularly to our privacy. With their built-in microphones, cameras and location awareness, mobile phones could, at the extreme, become the most widespread embedded surveillance tools in history. Whether phones engaged in sensing data are tools for self and community research, coercion or surveillance depends on who collects the data, how it is handled, and what privacy protections users are given. This article gives a number of opinions about what programmers might do to make this sort of data collection work without slipping into surveillance and control."
Image

Kids Score 40 Percent Higher When They Get Paid For Grades 716

A large number of schools participating in a pay-for-grades program have seen test scores in reading and math go up by almost 40 percentage points. The Sparks program will pay seventh-graders up to $500 and fourth-graders as much as $250 for good performance on 10 assessment tests. About two-thirds of the 59 schools in the program improved their scores by margins above the citywide average. "It's an ego booster in terms of self-worth. When they get the checks, there's that competitiveness -- 'Oh, I'm going to get more money than you next time' -- so it's something that excites them," said Rose Marie Mills, principal at MS 343 in Mott Haven. Critics, who are unaware that most college students don't become liberal arts majors, argue that paying kids corrupts the notion of learning for education's sake alone.
Encryption

F5 Fires Back On Open Source SSL Accelerator 120

Random Feature writes "In response to Build an Open Source SSL Accelerator, in which o3 magazine detailed how to build a solution comparable to an F5 BIG-IP 6900 on the cheap, F5 Fires Back claiming it's not as cheap as it appears and pointing out the potential performance implications of a 'cobbled together set of components designed to mimic similar functionality.' The discussion on the performance of the Open Source solution based on Opteron RSA operation processing capabilities brings into question the validity of the 'more SSL TPS for cheaper' argument presented by o3."
Power

Submission + - Solar Panels drop to $1 a Watt 1

ZosX writes: "An article over at Popular Mechanics has announced that for the first time, Solar Cells have reached the mythical $1/watt figure. They also talk about supply problems and a few other issues. I'm not the biggest fan of PM, but this article is actually pretty good."

Comment Re:sure... (Score 4, Insightful) 233

What he's actually telling you is that the existing encryption is good enough. You really need to spend more time fixing the human problems since that's where most of the attacks come from.
He's basically telling that we've reached or are close to the point of diminishing returns, where advances in cryptology (newer algorithms or quantum crypto) can no longer be justified based on the increase in cost for these advances versus the % of attacks on existing crypto.
Christmas Cheer

Submission + - Sidestepping the Santa Myth 1

jaredbpd writes: "As the agnostic, geeky parents of a four year old girl, my wife and I are trying to find different ways to address the Santa myth that meets the following criteria:
  1. Does not involve lying to our daughter. We've always taught her the importance of honesty and don't want to give her reason to distrust us when she learns the eventual truth.
  2. Will not ruin Christmas for other kids. She attends preschool and we don't want a bunch of phone calls from irate parents whose children were told "There's no Santa" from our daughter.
  3. Doesn't make her feeling like she's being left out. We've told her that she gets presents from mommy & daddy, but her friends also get presents from Santa.


Our daughter understands the difference between real and make believe, so we're confident that she's mature enough to hear the truth. However, it's a lot to ask of a four year old to keep that truth a secret from her friends, since they still believe. How have the parents of future Slashdotters handled this?"
Programming

How to Deal With Stolen Code? 799

greenrom writes "I work for a small company as a software developer. While investigating a bug in one of our products, I found source code on a website that was nearly identical to code used in our product. Even the comments were the same. It's obvious that a developer at our company found some useful code on the web and copied it. The original author didn't attach any particular license to the code. It's just 200 lines of code the author posted in a forum. Is it legitimate to use source code that's publicly available but doesn't fall under any particular license? If not, what's the best way to deal with this kind of situation? Since I'm now the only person working on this code, there's no practical way to report the situation confidentially. I'm new to the company, and the developer who copied the code is the project lead. Reporting him to management doesn't seem like a good career move. I could rewrite the copied code without reporting him, but since the product is very close to release it would be difficult to make a significant change without providing some justification."
Robotics

Submission + - High-Tech Hobbies For Geeks 3

MotorMachineMercenar writes: I'm a thirty-something geek who works in finance, plays computer games and wastes time on the internet — ie. I spend pretty much all my time in front of a screen. Lately I've started looking for a hobby, something outside the slouching-in-front-of-the-computer realm, and hopefully something to do with my hands with concrete stuff. I'm not talking about the gym, martial arts, photography or books (do that already), but something novel, high-tech and creative. The potential to actually make new discoveries applicable in the real world would be a huge benefit. The most appealing choice I've found thus far is BEAM robotics, although I'm quite skeptical of the potential for new discoveries. So perhaps a robosoccer challenge would be a better option. Amateur rocketry sounds like fun, but I'd like to keep traveling without being subjected to a "routine" cavity search.
Hardware Hacking

Submission + - Is "Non Commercial" License Open Source? 4

wacco webstack writes: "On OSNews the issue has been brought up that project VGA might not be using a license that is following the Open Source Definition because I included a "Non Commerical" clause. At the moment, all information is licensed under BY-NC-SA 3.0 but I'm willing to switch to GPL. Being that this project is developing an hardware platform however, I don't know if the GPL will be able to protect my rights. With the schematic and soon the board layout released to the public it's very easy for other companies to make 'clones' which don't support the open source community. Is there an open source license specifically dealing with hardware, or will the GPL suffice?"
Businesses

Submission + - Auctioning H-1B Visas Instead of Complaining

Chris Chiasson writes: "Every year, we hear about technology companies complaining that they can't find enough skilled workers in America to fill their open positions. Every year, we hear accusations that these companies just want to spend less on payroll by hiring foreign workers. So, my question to you is, instead of paying a flat fee for workers to acquire these visas, why not subject the visa slots to auctions? By tying the slots to auctions, I think we could be more sure that companies that really need the foreign workers they say they do — since they would likely be paying through the nose. Also, it could give a cost advantage to American workers. The government would probably like the proposal since it would result in more revenue. What do you think?"

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...