Code Combat recently released the first of there multi player levels on the general public.
Best of all. the entire project is up on Github (MIT license) and welcomes new submissions.
Internet creator Tim Berners-Lee briefly joined Snowden's interview with TED curator Chris Anderson, and came down in the hero camp. When Anderson posed the question to the TED audience — known for famous, innovative, and influential attendees — the idea that Snowden was a force for good met with applause. "Hero patriot or traitor; I would say I am an American citizen just like anyone else," Snowden said. "What really matters here is the kind of government we want; the kind of Internet we want."
"It’s a pity that some of the features like Jigsaw were dropped as modularity, runtime dependencies and interoperability are still a huge problem in Java," James Donelan, vice president of engineering at MuleSoft said. "In fact this is the one area where I still think Java has a long way to go."
Secretary of Defense Chuck Hagel released a budget proposal to shrink the size of the armed forces to their smallest size in decades. Under the budget as proposed, the Air Force's entire fleet of 350 A-10s would be retired in order to save $3.5 billion over five years, and its former combat roles will be handed over to the newer F-35joint strike fighterand the growing drone fleet.
"The A-10 is a 40-year-old single-purpose airplane originally designed to kill enemy tanks on a Cold War battlefield," Hagel said. "It cannot survive or operate effectively where there are more advanced aircraft or air defenses."
There are several returning competitors, including previous champs EA and Comcast, three-time runner-up (and sort of winner from when it acquired Countrywide) Bank of America, the perennially hated Ticketmaster and PayPal (with their respective corporate counterparts LiveNation and eBay). There are also some new names on the list, like Koch Industries and lawsuit-happy seed company Monsanto. There’s also SeaWorld making a splash on WCIA 2014, presumably because people have been watching that Blackfish documentary.
Voting will begin tomorrow, March 19...
Mystic was first used in 2009 and two years later, an additional tool, "Retro", was introduced that had the ability to retrieve and replay voices from any call, a senior manager for the system said. The documents list at least seven target nations where the collection systems were still being used to record "every single" conversation.
Billions of audio files can be stored for 30 days, after which the oldest are deleted unless analysts decide to keep them. Although the analysts listen to less than 1% of all calls, millions of voice clippings are processed and sent to long-term storage every month.
I'm putting my bets on OpenFL, a Haxe-based, fully open-source implementation of the Flash API that might just please both Flash refugees and longtime Flash haters alike.
My article discusses my experiences with it and gives a brief overview for newcomers. In short — I can keep making flash games if I want, but with the same codebase I can also *natively* target Win/Mac/Linux desktops, mobile, and more, without having to mess with Adobe AIR or other virtual machines.
Vern Brownell, CEO of D-Wave Systems Inc., looked out at the crowd and said, "I cannot explain how quantum computing works."
Was he heckled? Did attendees get up and leave? No.
No one in the audience stirred. There was no murmuring. Nobody laughed. No sidelong glances. Nothing.
Quantum computing is just that confusing. Some of the world's best physicists don't understand how it works.
NRL has been studying space-based solar-power systems for several years. It has identified a number of possible applications including supplying power to forward bases, synthfuel production, and powering bistatic radars, sensors, and UAVs.
The military, which often pays much higher prices for energy than civilian customers, especially in remote areas, is seen as a possible anchor tenant for space-based solar power.
The servers are being hijacked by a backdoor Trojan as part of a campaign the researchers are calling 'Operation Windigo.' Once infected, victimized systems are leveraged to steal credentials, redirected web traffic to malicious sites and send as much as 35 million spam messages a day. "Windigo has been gathering strength, largely unnoticed by the security community, for more than two and a half years and currently has 10,000 servers under its control," said Pierre-Marc Bureau, security intelligence program manager at ESET, in a statement.
There are many misconceptions around Linux security, and attacks are not something only Windows users need to worry about. The main threats facing Linux systems aren't zero-day vulnerabilities or malware, but things such as Trojanized applications, PHP backdoors, and malicious login attempts over SSH.
ESET recommends webmasters and system administrators check their systems to see if they are compromised, and has published a detailed report presenting the findings and instructions on how to remove the malicious code if it is present.
Is this a signal that Microsoft decided that they need to compete with Apple by making their productivity applications free?
Terms of the deal were not disclosed, but the arrangement apparently puts the $1 billion fight to rest.
'Google and Viacom today jointly announced the resolution of the Viacom vs. YouTube copyright litigation," the companies said in a joint statement. "This settlement reflects the growing collaborative dialogue between our two companies on important opportunities, and we look forward to working more closely together.'"
In the letter sent Monday to Obama and Congress, several former advisers to and members of the Church committee, including the former chief counsel, said that the current situation involving the NSA bears striking resemblances to the one in 1975 and that the scope of what the NSA is doing today is orders of magnitude larger than what was happening nearly 40 years ago.
“The need for another thorough, independent, and public congressional investigation of intelligence activity practices that affect the rights of Americans is apparent. There is a crisis of public confidence. Misleading statements by agency officials to Congress, the courts, and the public have undermined public trust in the intelligence community and in the capacity for the branches of government to provide meaningful oversight,” the letter says.
The ability to undo a problematic install should be mandatory, but in too many instances it is not. That's because software developers are always operating under the assumption that the latest version is the greatest version, when it may not be. This is especially true in the smartphone and tablet world. There is no rollback to be had for anything in the iOS and Android worlds.
Until the day comes when software developers start releasing perfectly functioning, error-free code, we need the ability to go backwards with all software.
The 16 megapixel camera module consists of six plastic pieces, one more piece than in the existing 13 megapixel camera modules in the Galaxy S4. The problem that Samsung is having is that even though the number of plastic pieces has gone up, the thickness of each piece has remained the same, so in order to fit the new camera module into the Galaxy S5, the lens makers will likely have to develop new technology to make thinner lenses.
Not only that, joining six pieces together instead of five for the 13 megapixel camera modules increases the risk of optical faults surfacing at the lens manufacturers' plants dramatically.