An anonymous reader writes "id Software has a history of releasing the source code for their older games under the GPL. Coder Fabien Sanglard has been taking it upon himself to go through each of these releases, analyze the source code, and post a detailed write-up about it. He's now completed a review of the Quake 3 source code, diving into the details of idTech3. It's an interesting read — he says he was impressed in particular by the 'virtual machines system and the associated toolchain that altogether account for 30% of the code released. Under this perspective idTech3 is a mini operating system providing system calls to three processes.'"
Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. ×
itwbennett writes "ICANN announced today that it has canceled the Digital Archery contest it had planned to use to decide which gTLD applications would be evaluated first. The organization gave no indication of what it will do instead. In making the announcement, Cherine Chalaby, chair of the gTLD Program Committee, said, 'We will not make a decision in Prague but will take all of the ideas into account and build a roadmap,' adding that the roadmap will detail the next steps and timelines as well as assess implications to applicants and the risk to the program."
Tmack writes "The last time we had a leap second, sysadmins were taken a bit by surprise when a random smattering of systems locked up (including Slashdot itself) due to a kernel bug causing a race condition specific to the way leap seconds are handled/notified by ntp. The vulnerable kernel versions (prior to 2.6.29) are still common amongst older versions of popular distributions (Debian Lenny, RHEL/CentOS 5) and embedded/black-box style appliances (Switches, load balancers, spam filters/email gateways, NAS devices, etc). Several vendors have released patches and bulletins about the possibility of a repeat of last time. Are you/your team/company ready? Are you upgraded, or are you going to bypass this by simply turning off NTP for the weekend?" Update: 07/01 03:14 GMT by S : ZeroPaid reports that this issue took down the Pirate Bay for a few hours.
Google Input|Output 2012 event. You have Sergey Brin showing off Google Glass, but most of your show consists of talks with titles like Integrate Web Intents into Your Web Application Today and What's New in Android?... which is all great fun, but also a tad boring. Luckily, somebody at Google piped up and said, "I know! We need Android-controlled fighting robots!" And they contacted the Stupid Fun Club, and Lo! There were Android-controlled robots fighting on the show floor, and all was right with the world.
TroysBucket writes "One developer who is trying to fund his development work via donations has taken on an 'Everyone gets the source code, donations get you binaries' business model, where he provides installers and binaries directly only to donating users. Quoting: 'A very central goal of everything I am doing, right now, is to show a concrete [and highly documented] way that other developers can fund their own FOSS work. With that in mind One major mistake I made, right off the bat, was that I provided very little direct benefit to people who donate (no “perks”).' Has anyone seen this work well before with other projects?"
wiredmikey writes "It's refreshing to see a security report from a security vendor that isn't all doom-and-gloom and loaded with FUD. Web Application Security firm WhiteHat Security released a report this week (PDF) showing that the number of major vulnerabilities has fallen dramatically. Based on the raw data gathered from scans of over 7,000 sites, there were only 79 substantial vulnerabilities discovered on average in 2011. To compare, there were 230 vulnerabilities on average discovered in 2010, 480 in 2009, 795 in 2008, and 1,111 in 2007. As for the types of flaws discovered, Cross-Site Scripting (XSS) remained the number one problem, followed by Information Leakage, Content Spoofing, Insufficient Authorization, and Cross-Site Request Forgery (CSRF) flaws. SQL Injection, an oft-mentioned attack vector online – was eighth on the top ten."
redletterdave writes "Apple will begin transitioning the leadership role within its hardware engineering department, now that Bob Mansfield, who led the engineering of many of Apple's most successful products since 2005, has decided to retire. Apple was quick to name Dan Riccio — currently the VP of hardware engineering for the iPad — as Mansfield's successor, mentioning that Riccio will learn the new role over several months. During that time, the hardware engineering team will continue to report to Mansfield."
1sockchuck writes "An Amazon Web Services data center in northern Virginia lost power Friday night during an electrical storm, causing downtime for numerous customers — including Netflix, which uses an architecture designed to route around problems at a single availability zone. The same data center suffered a power outage two weeks ago and had connectivity problems earlier on Friday."
shinjikun34 writes "I am currently stationed on a U.S. Navy ship deployed in a country with restrictive internet policies. We are currently in the process of setting up an entertainment internet connection for the crew to use in their downtime. I suggested (and was thereby tasked with finding) a VPN service that would support 100 to 500 devices, have an end point inside the continental United States, be reasonably priced, and secure/trustworthy. Something that is safe to use for banking and other financial affairs. Ideally, it would be fast enough to support several VoIP calls (Skype, Google Voice, etc) along side online gaming, with possible movie/music streaming. It will need an end point in the U.S. to allow for use of Google Books, Netflix, Hulu, and other services that restrict access based on region. I, in all honesty, have no idea where to begin searching, and I ask the good folks of Slashdot to aid me in my quest. One of the main requirements I was given is that the company has to be trustworthy. And it has to be a company — computer in someone's closet hosting a VPN isn't acceptable to the Navy. What services would Slashdot recommend? (I understand that our connection without a VN probably won't be able to handle the described load, but I would prefer a VN service that offers capacity above our need. That way when T/S'ing the connection, the VPN can be at least partially ruled out.)"
Pigskin-Referee sends this excerpt from an article at ProPublica: "Jonathan Mayer had a hunch. A gifted computer scientist, Mayer suspected that online advertisers might be getting around browser settings that are designed to block tracking devices known as cookies. If his instinct was right, advertisers were following people as they moved from one website to another even though their browsers were configured to prevent this sort of digital shadowing. Working long hours at his office, Mayer ran a series of clever tests in which he purchased ads that acted as sniffers for the sort of unauthorized cookies he was looking for. He hit the jackpot, unearthing one of the biggest privacy scandals of the past year: Google was secretly planting cookies on a vast number of iPhone browsers. Mayer thinks millions of iPhones were targeted by Google."
CWmike writes "Microsoft will support full upgrades to Windows 8 only from the three-year old Windows 7, according to a report Thursday by ZDNet blogger Mary Jo Foley. Citing unnamed sources, Foley said that Microsoft has informed select partners of the upgrade paths to Windows 8. While Microsoft may be revealing upgrade paths to some partners, it has been much more reticent to keep customers informed than three years ago when it rolled out Windows 7. Among the details the company has not disclosed are the on-sale date and the pricing of the two retail editions. By this time in 2009, Microsoft had revealed both: On June 2 that year, it pegged a launch date for Windows 7, and by June 25 had not only posted prices for the operating system but had also kicked off a pre-sale that discounted upgrades by as much as 58%. The increased secrecy from the company was demonstrated best last week, when it unveiled its first-ever tablet, the Surface, but left many questions unanswered, including the price, sales date, and even the hardware's battery life."
theodp writes "'Perhaps nothing will have as large an impact on advanced analytics in the coming year as the ongoing explosion of new and powerful data sources,' writes Bill Franks in Taming The Big Data Tidal Wave. And one of the hottest new sources of Big Data, reports the WSJ's Alexandra Alter in Your E-Book Is Reading You, is the estimated 40 million e-readers and 65 million tablets in use in the U.S. that are ripe for the picking by data scientists working for Amazon, Apple, Google, and Barnes & Noble. Some privacy watchdogs argue that e-book users should be protected from having their digital reading habits recorded. 'There's a societal ideal that what you read is nobody else's business,' says the EFF's Cindy Cohn."
Dr. Eggman writes "If you don't recall, then Broadband/DSL Reports is here to remind us that ISPs around the U.S. will begin adhering to the RIAA/MPAA-fueled 'Six Strikes' agreement on July 1st. Or is it July 12th? Comcast, AT&T, Verizon and Cablevision are all counted among the participants. They will each introduce 'mitigation measures' against suspected pirates, including: throttling down connection speeds and suspending Web access."
New submitter busyqth writes "After the injunction against the Galaxy Tab 10.1 earlier in the week, A U.S. district court judge has now also granted an injunction against the sale of Google's flagship ICS phone, the Galaxy Nexus. Is Steve Jobs laughing in the great beyond? Is this the beginning of the end for Android?" Two blows to Samsung in one week, and now the FTC is investigating Google for misuse of Motorola Mobility patents in relation to RAND standards.
sweetpea86 writes with an update on color e-ink screens. From the article: "Plastic electronics company Plastic Logic has demonstrated color video animation on a flexible plastic display, which it claims is the first example of an organic thin-film transistor (OTFT) driving electronic paper at video rate. The demonstration proves that the potential uses of electronic paper extend far beyond monochrome text-based e-readers to more sophisticated tablet-style devices that can run color video, while still keeping power consumption low." SlashGear also took a look at it and has a short video of the animated e-ink display.