Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Please don't (Score 5, Insightful) 417

If/Once Ad-Block becomes mainstream, companies will further and further integrate advertisements into the content. A good example is to look at how YouTube has ads baked into the flash.

News and other ad-supported information sites would take steps such as inserting an ad jingle or statement in the middle of a paragraph.
Government

Submission + - New Zealand Introduces Internet Filtering (thomasbeagle.net)

Thomas Beagle writes: "The New Zealand government has been stealthily introducing a centralised internet child-pornography specific filtering system. Voluntary for ISPs but not for their users, ISPs representing over 94% of the market are already intending to join. Read the general FAQ and technical FAQ about the proposed Netclean Whitebox implementation."

New RTS Based on DotA Offers Native Linux Client 173

S2 Games, longtime fans of the "Defense of the Ancients" (DotA) mod for Warcraft 3, have decided to create an entire game based around it (which IceFrog had no objection to). Without offending their still-active NDA, I can say that Heroes of Newerth is shaping up to be a very polished RTS, with the ability to play both via S2's own online service and local games, something that even Blizzard seems to be missing these days. Unlike most publishers, S2 has also decided to simultaneously release Windows, Mac, and Linux clients, making this one of the best looking games that I have ever seen on my Linux box. Additionally, S2 would like to invite another 400 players to the HoN beta, so if you are an RTS fan (and especially if you are a DotA fan) just send an email to scuttlemonkey at slashdot dot org with the subject line of "HoN Beta Key Request" and I'll reply to the first 400 requests as best I can. Update 20:37 GMT by SM: In case you don't notice in your haste to create a beta account, let me remind you that this game is still under strict NDA, so please no specifics in the discussion below. Update 00:01 GMT by SM: Well, given the 800+ emails that flooded my inbox in the first half hour or so we're all out of beta keys, but keep an eye out for a release date. Update 01:00 GMT by SM: Apparently your friends over at S2 games were quite impressed with the level of interest and are furnishing another 2,000 beta keys for me to continue working through the requests in my inbox (I'm at around 1,500 requests total as of this update, and only about 350 keys sent out). Please be patient as I slowly try to catch up. Also a point of clarification, while IceFrog doesn't mind S2 diving in to this space with a game based on DotA (competition is good in the long run after all), he wanted to make sure loyal fans of DotA knew that he plans to continue developing and improving DotA for WC3. Update 7/10/2009 13:06 GMT by SM: to all those still waiting on a beta invite, please be patient. I use gmail as the central repository for my email for ease-of-use, and while I was only expecting to have to hand out 400 keys, apparently gmail has an email cap of 500 per day. Last night my account got locked for excessive use, so I am waiting on the wrist-slap to expire so I can continue my key-spam. It looks like all who have requested a key so far will get one.

Comment Re:Sounds bytes (Score 1) 287

... His modus operandi became evident when he ignored the highly voted Internet town hall topic of legalizing marijuana. It appears that at least sometimes, he's only pretending to take the general citizenry's views into account, even when he's saying otherwise.

President Obama did come out and speak to the Marijuana question, but he answer it in a non-serious manner. See here: Legalizing Pot Won't Grow Economy

Comment Re:Not traditional DRM? (Score 1) 232

When somebody copies the data out of a bank database they didn't legally acquire, and media calls it "Stealing customer data", no one blinks an eye at it.
When somebody copies the data of a game they didn't legally acquire, and ANYONE calls it "Stealing a game", people get up in arms.

"Stealing" doesn't require tangibility (steal a kiss, steal an election, steal someones thunder, etc)
Portables

Submission + - Thieves use Bluetooth to find laptops in cars (bluetoothlounge.com)

Alex C writes: "This is not the first time that I heard about people using the Bluetooth technology to get some advantage. The mobile phone technology is being used by thieves to seek out and steal laptops locked in cars in Cambridgeshire County, UK. Up-to-date mobiles often have Bluetooth technology, which allows other compatible devices, including laptops, to link up and exchange information, and log on to the internet. But thieves in Cambridge have cottoned on to an alternative use for the function, using it as a scanner which will let them know if another Bluetooth device is locked in a car boot. Det. Sgt Al Funge, from Cambridge's crime investigation unit, said: "There have been a number of instances of this new technology being used to identify cars which have valuable electronics, including laptops, inside". more...."

Slashdot Top Deals

With your bare hands?!?

Working...