Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - Surgeon Simulator: Inside the world's hardest game (redbull.com)

An anonymous reader writes: In the space of a few short months, Surgeon Simulator 2013 has attained cult status. A sort of spiritual successor to the maddening QWOP, the PC game requires you to operate the individual fingers of a hapless surgeon in an increasingly absurd set of gore-filled scenarios. What's so remarkable is the turnaround time: the initial prototype came out of a 48 hour game jam, and was released as a commercial game just a month and a half later. A new profile of the studio's founder looks at how Bossa Studios, the London-based development team behind SS 2013, iterates so quickly, as well as what's next from the team, including an iPad version of Surgeon Simulator, and a cross platform MOBA that's half League of Legends, half Mario Kart battle mode.

Submission + - Why Does Apple Sabotage the MacBook? (magnatecha.com)

Calindae writes: We all know that laptop batteries tend to expire before the rest of the computer, losing all capacity or "needing replacement" in as little as two years of everyday usage. For the past 10 or 15 years, Windows laptops have experienced this and keep on working as usual if you have them plugged in with an AC adaptor. Your laptop essentially becomes a desktop, but otherwise you're fine to go about your business. This isn't so with the MacBook.

Submission + - FOI Request reveals UK Houses of Parliament workers' passion for adult content (independent.co.uk)

Anita Hunt (lissnup) writes: Hot on the heels of Dave Cameron's demands to make such content universally "opt-in", the Independent reports "Westminster computers were prevented from accessing sex sites 114,844 times last November alone and on 55,552 in April, while February saw just 15 and in June officials blocked 397 attempts." No explanation has been offered for the variation, although it would be interesting to know if the fall in the number of recorded/reported attempts coincides with the date the FOI request was filed.

Comment Re:Sugar (Score 1) 926

This is absolutely the most accurate post in this thread.

It boils down to calories, if yoour body gets more calories than it needs and/or it gets calories faster than it needs then it has to do something with them.

It stores them for later. As fat.

"processed" food lets both these things happen.

"unprocessed" food mitigates this.

There's that whole thing about cooking food allowing us to evolve because it meant we could eat more, get more nutrients etc well this is just taking that one step further. Not only do we cook it, but we refine it so that its easy to get a several thousand calorie surplus every day, and still go back for more. The super obese are great case studies in this, and a testemant to the efficiency of the human body in dealing with whatever we throw at it!

Comment Re:Sugar (Score 2) 926

When you disregard the entire thesis because you don't like one of the things the person said. Does that make your counter argument credible?

Seriously there is a massive body of scientific evidence that implicates refined sugars as being a significant factor in things like obesity and metabolic syndrome.

The body is complicated, and figuring out what is good for people is hard. Further complicated by the fact that it doesn't necessarily correspond with what is profitable.

Here is a another thing you might not like for its 'sensationalist' nature, but its worth considering: Sugar acts like a drug. http://en.wikipedia.org/wiki/Sugar_addiction

Comment Re:Satoshi Nakamoto foresaw this (Score 1, Interesting) 396

It's an elaborate double bluff. Satoshi is the US govt/Fed/IMF or some similar consortium of 'money controller', who are quite aware that the current monetary system is out of control.

They have built bitcoin, they own a controlling amount (or are in the process of buying it... they have infinite money to do so). Over time they will engineer themselves into a position of owning a controlling amount of the network (having infinite money to devote to a data-centre or two of miners).

The endgame is that they are going to be processing most blocks and therefore collecting the bulk of transaction fees. The protocol allows the finder of a block to choose which transactions to include, meaning they can effectively block transactions that don't pay sufficient fees.

Then we are back in exactly the same situation as now, except there is no actual cash that people might transact off the books. The USD becomes the black market currency. The majority of the new BTC wealth in the hands of the few, and everyone else paying tax for the privilege of transferring money.

Carerful what you wish for :)

Submission + - An odd symmetry breaking of clocks

stpalli writes: In 1665, Christiaan Huygens' observed, possibly for the first time, spontaneous self-emergent synchronization. He hung two pendulum clocks from a common wooden beam and noticed that the pendula always ended up in exact synchronized motion in spite of how they were started and referred to this as an odd sympathy of clocks an odd sympathy of clocks. Inspired by this classical experiment, researchers now find, in a stunningly simple experiment , the co-existance of of synchrony and desynchrony in coupled metronomes — an odd symmetry breaking of clocks, known as a chimera state.

Submission + - Snowden kills "metadata" argument during live hosted by The Guardian

An anonymous reader writes: In a live chat hosted by the The Guardian, Edward Snowden has clarified that the NSA does not simply have access to metadata, as has been the media rhetoric, and that large volumes of data relating to US citizens is frequently ingested.

Answering one question, he wrote:

If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time — and can be extended further with waivers rather than warrants.

Answering another:

US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection — policy is a one-way ratchet that only loosens) and one very weak technical protection — a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border.

Comment Re:Just because YOUR government is corrupt (Score 2, Insightful) 327

Trying to 'fix' the situation is unlikely to work.

A better strategy is accepting there will be failure, and building systems to cope.

A great example of this, quite fittingly, is the internet itself.

Accept that governments will work most of the time, understand they will fail some of the time. Keep your eyes open. Try and be cool. We are all in it together, despite the example set by some.

Slashdot Top Deals

The clearest way into the Universe is through a forest wilderness. -- John Muir

Working...