Star Wars Prequels

Big Changes Planned For The Force Unleashed 2 100

Star Wars: The Force Unleashed debuted in 2008 to less than stellar reviews, but sales of the game were strong. A sequel for the game is due out in October, and the developers spoke at length with the Guardian's Games blog about the improvements they've been working on. One of their priorities was adding depth to the combat system to make it less of a button-mash. "The team has completely redesigned all the familiar Force powers from the first title including Force Push and Force Grip, and has added a few newcomers including the potentially amusing Force Mind Trick that'll allow you to trick Storm Troopers into leaping from high ledges." Enemy AI is another area that's getting some love, and they're trying to make level design more open and less linear. The team's confidence in the changes they're making stems in part from much greater familiarity with their game-building tools. "Like its predecessor, Force Unleashed 2 will combine three third-party physics engines, Havok, Euphoria and Digital Molecular Matter, to provide cutting edge human animation, materials effects and authentic physical forces. ... 'Whenever you're building the first iteration [of a game series] and a brand new game engine at the same time, everything comes in hot and fast – we were literally figuring out how to get the most out of those three technologies all the way up to shipping. The DLC then helped us to learn more, and that knowledge has given us the biggest leap forward.'" A trailer for the game was released at E3.
Image

The Art of Scalability Screenshot-sm 63

Martijn de Boer writes "Creating high performance growing networks is really a special skill managers and network architects should possess to be ready for the future. The Art of Scalability is a book written for these kinds of functions, and prepares you for the present and the imminent future. Scalability is achieved by principles that work on many levels within enterprises, whether it's processes, organizational structure or setting up your project, this book covers it all." Read on for the rest of Martijn's review.
Android

Android Application Development 74

stoolpigeon writes "Google's mobile OS Android has received plenty of press. As with a lot of Google products, there was much anticipation before any devices were even available. Now a number of phones are available, with many more coming out world-wide in the near future. Part of the lure of Android is the openness of the platform and the freely available tools for development. The SDK and accompanying Eclipse plug-in give the would be creator of the next great Android application everything they need to make their idea reality. The bar to entry in the official Google Android Marketplace is very low and it doesn't seem to be much of a stretch to predict that the number of developers working on Android is only going to grow. As with any hot technology the number of books will grow as well and O'Reilly's Android Application Development has jumped into the fray, promising to help budding Android developers what they need to get started." Read on for the rest of JR's review.
Government

Let Big Brother Hawk Anti-Virus Software 405

Frequent Slashdot contributor Bennett Haselton writes with his idea for mass adoption of anti-virus software: "If the US government did more to encourage people to keep their computers secure — by buying TV ads to publicize free private-sector anti-virus programs, or subsidizing the purchase of anti-virus software — we'd all be better off, on average. That's not just idealistic nanny-statism, but something you can argue mathematically, to the point where even some libertarians would agree." Read on for the rest of Bennett's thoughts.
Image

The Manga Guide to Databases Screenshot-sm 236

stoolpigeon writes "Princess Ruruna, of the Kingdom of Kod, has a problem. Her parents, the King and Queen, have left to travel abroad. Ruruna has been left to manage the nations fruit business. Much is at stake, Kod is known as "The Country of Fruit." Ruruna is not happy though, as she is swamped by paperwork and information overload. A mysterious book, sent by her father, contains Tico the fairy. Tico, and the supernatural book are going to help Princess Ruruna solve her problems with the power of the database. This is the setting for all that takes place in The Manga Guide to Databases. If you are like me and learned things like normalization and set operations from a rather dry text book, you may be quite entertained by the contents of this book. If you would like to teach others about creating and using relational databases and you want it to be fun, this book may be exactly what you need." Read below for the rest of JR's review.
Image

The Age of Speed Screenshot-sm 114

enactd writes "I feel life is a constant juggle, for every task in hand you have another to react to or let drop. The Age of Speed helps you chart your tasks to keep the important goals in sight while recognizing and reacting to distractions. Being a geek on the cutting edge of technology gets one acquainted with speed quickly, but being able to handle it is another matter and streamlining is an ongoing effort. The goal of the book is to help you decide what is important in your life and extract as much pleasure from those things while minimizing the time spent on the mundane." Keep reading for the rest of Chris's review.
Image

The IDA Pro Book Screenshot-sm 85

An anonymous reader writes "After attending DEFCON in August and seeing the overwhelming interest in this book, I was eager to dive into The IDA Pro Book by Chris Eagle. Chris Eagle's team, School of Root, won the 'Capture the Flag' event at DEFCON this year and Chris gave a presentation on CollabREate, a tool that integrates with IDA Pro to allow collaboration in reverse engineering (RE). All of that — together with the fact that the book sold out — screamed that this book should quickly make it to the top of my list." This review originally appeared on The Ethical Hacker Network.
Image

Zero Day Threat Screenshot-sm 264

Ben Rothke writes "Zero Day Threat: the Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity is an interesting and eye-opening look at how banks and credit card companies make ID theft and fraud rather elementary. But with all that, this book must be read in the larger context of how today's society deals with, and is often oblivious to, risk. When is comes to risk, American society tolerates tens of thousands of drunk-driving deaths, gives millions in federal tobacco subsidies, and is oblivious about near-epidemics such as heart disease, obesity, and diabetes. With all that, it is doubtful that the myriad horror stories Zero Day Threat details will persuade Congress or the other players to do anything to curtail the problem with identity theft and internet fraud." Keep reading for the rest of Ben's review.
Role Playing (Games)

Dungeons and Desktops 176

Aeonite writes "Dungeons and Desktops: The History of Computer Role-playing Games chronicles the rise and fall of the Computer RPG industry, from Akalabeth to Zelda and everything in between. While the bulk of the book is devoted to the genre's 'Golden Age' in the late '80s and early '90s, author Matt Barton explores the entire history of CRPGs, from their origins in the mid '70s to the very recent past. While not entirely comprehensive, the book covers not only the major players and award-winners, but also dozens of obscure 'also-ran' as well as notable games in related genres." Keep reading for the rest of Michael's review.
Programming

Professional Techniques for Video Game Writing 98

Aeonite writes "Professional Techniques for Video Game Writing is the followup to Game Writing: Narrative Skills for Videogames, and the second book written by members of the Game Writers' Special Interest Group of the 14,000 member strong IGDA. The book covers much of the same terrain as its predecessor, but offers a tighter focus on some specific points, covering more technical (as in technique) details rather than broader narrative theory; if the first book was a Google Map, this one would be the Street View." Keep reading for the rest of Michael's review.
Book Reviews

Running Xen 98

David Martinjak writes "Running Xen: A Hands-On Guide to the Art of Virtualization was published by Prentice Hall, and authored by Jeanna N. Matthews, Eli M. Dow, Todd Deshane, Wenjin Hu, Jeremy Bongio, Patrick F. Wilbur, and Brendan Johnson. The book, which will be referred to as simply Running Xen, was a great resource on Xen and virtualization from the administration side. A wide range of topics was covered from installing Xen all the way up to managing virtual resources, including migrating guest environments. Overall, the explanations were concise and understandable; while the information was presented in a straightforward manner. Running Xen was definitely a useful resource for administering systems with Xen." Keep reading for the rest of David's review.

Second Person 184

Aeonite writes "As we all learned in English class, there are three points of view one can employ when writing: first person ("I learned"), second person ("You learned"), and third person ("He learned"). You are about to read a review of Second Person: Role-Playing and Story in Games and Playable Media, a book that addresses the use of second-person narration in games and related media. You are also likely to be eaten by a Grue." Read below for the rest of Michael's review.
Media

Skewz.com Founder Vipul Vyas Answers Your Questions About Media Bias 75

You asked questions about Skewz.com on April 2nd and April 3rd. Here are your answers. This media bias stuff is tricky to deal with. Both Skewz and Microsoft's Blewz are trying, anyway. Skewz people say they want to jump into the conversation attached to this post, so if you have any follow-up questions please feel free to ask them.

Oregon Senate Candidate Steve Novick Answers Your Questions 393

Wow. More politicians (of all parties) need to be as open and thorough as Steve Novick is here. We selected 10 of the questions you submitted and sent them to him by email, and his responses... let's just say that if every candidate spoke out like Steve, we'd have a much clearer view of our choices and would be able to cast our votes a lot more rationally.

Book Reviews

Java Generics and Collections 278

andrew cooke writes "Java 6 was recently released, but many programmers are still exploring the features introduced in Java 5 — probably the most significant changes in the language's twelve year history. Amongst those changes (enumerations, auto-boxing, foreach, varargs) generics was the most far-reaching, introducing generic programming in a simpler, safer way than C++ templates and, unlike generics in C#, maintaining backwards (and forwards) compatibility with existing Java code." Read on for the rest of Andrew's review.
Book Reviews

Who won? 555

doom writes "I think they call them "exit polls" because people bolt for the exits when you mention them, but I'm still fascinated by the subject myself, and this book is one of the reasons why. In Was the 2004 Presidential Election Stolen?, the central focus is, of course, on the infamous exit-poll discrepancies of the 2004 US Presidential election; but the authors also put it into context: they discuss the 2000 election, the irregularities in Ohio in 2004, the electronic voting machines issues, and the media's strange reluctance to report on any of these problems. Further, in the chapter "How did America really vote?", they compare the indications of the raw exit-poll data to other available polling data. Throughout, Freeman and Bleifuss do an excellent job of presenting arguments based on statistical analysis in a clear, concise way." Read the rest of doom's review

Terror Plot, NASA, DHS Patch Alert 341

Read on for some of the most interesting comments from yesterday's stories on NASA's lost moon-walk tapes, the reported foiling of a large-scale terror attack planned against the U.S. to have been staged from the U.K., and the Department of Homeland Security's sudden warning to patch Windows with the latest security updates, in today's Backslash summary of those conversations.

AMD Launches Counterstrike Against Core 2 Duo 277

DigitalDame2 writes to mention a PC Magazine article about the AMD 4x4 enthusiast platform, which is meant to counter Core 2 Duo. The article observes that AMD is now facing many of the same business practices it used in its war against Intel. From the article: "While imitation may be the sincerest form of flattery, improvement can often be a slap in the face. Intel's C2D was designed with both low power and performance per watt in mind, two key design metrics that helped AMD cut into Intel's market share with the Athlon 64 and Athlon 64 X2. And, as preliminary numbers have indicated and final performance reviews now show, the C2D has learned its lesson well: its performance now tops AMD's Athlon 64 architecture by a substantial margin."

The Indie Developer's Guide to Selling Games 60

Aeonite writes "The word "Selling" is boldfaced and blue on the cover of The Indie Developer's Guide to Selling Games, making it abundantly clear that it's the emphasis of the book. To that end, the book stays away from everything that drifts away from the topic of selling; you won't find advice here on how to design a mascot, or how to create game levels that will keep players coming back for more. You will, however, learn a lot about how best to market your game to the public, both before and after you've actually created it." Read the rest of Michael's review.

Slashback: Kororaa GPL, ICANN .XXX, BellSouth NSA 216

Slashback tonight brings some corrections, clarifications, and updates to previous Slashdot stories including an update to the Kororaa GPL accusations, BellSouth demands a retraction to NSA story, South Korea rejects Microsft antitrust appeal, Tim Berners Lee continues net neutrality fight, ICANN possibly pressured to nix .XXX domain, another side to Vista Beta2 reviews, and the worst tech IPO in 2 years -- Read on for details.

Slashdot Top Deals