Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Image

Fundraiser For "White Male" Illness Dropped 241

gubachwa writes "The student association at Carleton University in Canada recently voted that Cystic Fibrosis was a charity unworthy of receiving money raised during orientation week fund-raising activities. The reason behind the decision, as given in the motion on which the student association voted, is that Cystic Fibrosis 'has been recently revealed to only affect white people, and primarily men.'" I'm speechless.
Editorial

The Player Is and Is Not the Character 152

Jill Duffy writes "GameCareerGuide has posted an intellectual article about video games which argues there is no such thing as 'breaking the fourth wall' in games. Written by Matthew Weise, a lead game designer for the Singapore-MIT GAMBIT Game Lab, the article considers the complex relationship between video game players and characters. Weise says that, unlike in theater and film, video games don't ever really break the fourth wall, as it were, because in games, there is no wall. Players are always tethered to the technology, and the player is always just as much the main character as not the main character. Weise looks at both modern experimental games, like Mirror's Edge, as well as old classics, like Sonic the Hedgehog, to defend his point. He writes, 'Both avatars and the technological devices we use to control them are never simply in one reality. They are inherently liminal entities, contributing to a mindset that we, as players, exist in two realities at once. It's just as natural for a player to say, "I defeated that boss," as it is to say, "Snake defeated that boss," since Snake is and is not the player at the same time. It is likewise natural for a player to say, "I punched an enemy soldier," when in reality, she punched no one. All she did was press a button.'"
Databases

Setting Up a Home Dev/Testing Environment? 136

An anonymous reader writes "I'm a Project Manager (hold the remarks) who recently decided that I want/need to get my dev skills more up-to-date, as more projects are looking for their PM's to be hands-on with the development. Looking around my house, I have quite the collection of older (read: real old — it's been a while) PCs — it's pretty much a PC graveyard. Nothing that would really help me set up a nice dev infrastructure for developing web/database apps. So, my question is as follows: Should I buy a number of cheaper PC's, or should I buy one monster machine and leverage (pick your favorite) virtual machine technology?"
Education

Duke Demands Proof of Infringement From RIAA 159

NewYorkCountryLawyer writes "According to a report at p2pnet, Duke University has told the RIAA that it will no longer forward the RIAA's 'early settlement' letters to its students unless the RIAA submits 'evidence that someone actually downloaded from that student,' and said that 'if the RIAA can't prove that actual illegal behavior occurred, then we're not going to comply.' While it is good news that a university is requiring the RIAA to put up or shut up, the forwarding — or not forwarding — of letters is pretty insignificant. What I want to know is this: 'When the RIAA comes knocking with its Star Chamber, ex parte, 'John Doe' litigation to get the students' identities, is the University going to go to bat for the students and fight the litigation on the ground that it's based on zero evidence, and on the ground that the students weren't given prior notice and an opportunity to be heard?' Over 1,000 infringement notices were sent to Duke students in the last year."

Comment finger prints arent that unique! (Score 3, Interesting) 157

the idea that fingerprints are unique is stupid, especially for anyone who is actually in law enforcement or forensics. you need 12 count it TWELVE different points of matching to even get a fingerprint submitted for evidence. so if this odor is just as effective that means its pretty much a scare tactic as much as "we got your fingerprints at the scene!" is
Handhelds

VMware Promises Multiple OSs On One Cellphone 90

superglaze writes to tell us that VMware has announced a large effort behind their Mobile Virtualization Platform, promising the possibility of multiple operating systems on mobile devices. "The company described MVP as a 'thin layer of software' that will be embedded in handsets and 'be optimized to run efficiently on low-power-consuming and memory-constrained mobile phones.' Asked whether MVP would offer something different from the abstraction already provided by mobile Java, VMware's European product director Fredrik Sjostedt told ZDNet UK that MVP would require less recoding. 'If you want to have an application run on a Java-specific appliance, you need to code it for Java,' Sjostedt said. 'What we're introducing with MVP is an [embedded] abstraction layer below that, between the physical hardware and the software layer.'"
Government

Streaming Election Night Broadcast TV? 396

kakapo writes "A couple of years ago, we dumped our cable TV, and don't have much luck getting old-fashioned broadcast where we live. That's fine — we can download or netflix almost anything we want to see, and it is great not to pay the Comcast tax every month. Problem is, now I want to watch the election live, complete with talking heads, pundits, glitzy graphics and all the rest, rather than reading about it on a website. So, is there any way to download network TV / CNN / MSNBC in real time — I don't mind paying. And yes, we could visit friends, but ideally our kids would watch the first part and then go to bed — and a sitter would be expensive if we have to wait until late for the result."
Security

UK Court Rejects Encryption Key Disclosure Defense 708

truthsearch writes "Defendants can't deny police an encryption key because of fears the data it unlocks will incriminate them, a British appeals court has ruled. The case marked an interesting challenge to the UK's Regulation of Investigatory Powers Act (RIPA), which in part compels someone served under the act to divulge an encryption key used to scramble data on a PC's hard drive. The appeals court heard a case in which two suspects refused to give up encryption keys, arguing that disclosure was incompatible with the privilege against self incrimination. In its ruling, the appeals court said an encryption key is no different than a physical key and exists separately from a person's will."
Wireless Networking

Replacing Fiber With 10 Gigabit/Second Wireless 107

Chicken_dinner writes "Engineers at Battelle have come up with a way to send data through the air at 10 Gigabits per second using point-to-point millimeter-wave technology. They used standard optical networking equipment and essentially combined two lower bandwidth signals to produce a 10Gb signal from the interference. They say the technology could replace fiber optics around large campuses or companies or even deliver high-bandwidth streaming within the home."

Slashdot Top Deals

Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson

Working...