Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Games

Submission + - Why we like games (kenperlin.com)

mutherhacker writes: Ken Perlin a professor at NYU has blogged a very interesting and insightful take on why people like games. Not only computer games but those included as well. He presents a very interesting perspective as to why games, are as important to humans as is food and sex! A must-read for all gamers.

Comment Re:Missing the point? (Score 3, Insightful) 100

I work for a company with a lot of patents. Our products are protected partially by patents and partially by trade secret information. In other words, to recreate our product you would need to license the patents AND figure out how we did the other stuff, that is NOT patented, but is secret. There's no reason you can't mix patented and trade secret technology in one solution.

Comment Re:Ob. Matrix quote (Score 2, Insightful) 478

Ahhh religion, where changing flesh into bread and blood into wine isnt considered "witchcraft". Yet all other "magics" was at one time punishable.
Hypocrisy, it loves religion

Ahhh science, where one logical theory is considered wrong but another one can be considered right.
Hypocrisy loves science too when you oversimplify like you did with religion.

Comment Re:Morality and faeries (Score 1) 845

My point was that morality is subjective. There simply is no objective standard to measure against, and we need to accept that - quickly, because this also means that any AIs we make will have only the morality we explicitly program into them.

Of course, I'm not saying that this means you can't act against someone else breaching your morality. Of course you can; it's physically possible. As to whether it's ethical or not.. well, you'll have to be the judge of that. Me, I'd say it is so long as the reason for your action agrees with my own morality. So would most other people, though some would pretend that's not their reason.

Comment Double the guards....not worthwhile? (Score 1) 361

Whatever your opinion ont he safety at airports, if we could double the guards at the exits/entrances and it *could* help with people like myself who aren't always paying attention to where their feet are taking them, then by all means lets employ some people and bring down our unemployment numbers a bit :)

Intel

Core i5 and i3 CPUs With On-Chip GPUs Launched 235

MojoKid writes "Intel has officially launched their new Core i5 and Core i3 lineup of Arrandale and Clarkdale processors today, for mobile and desktop platforms respectively. Like Intel's recent release of the Pinetrail platform for netbooks, new Arrandale and Clarkdale processors combine both an integrated memory controller (DDR3) and GPU (graphics processor) on the same package as the main processor. Though it's not a monolithic device, but is built upon multi-chip module packaging, it does allow these primary functional blocks to coexist in a single chip footprint or socket. In addition, Intel beefed up their graphics core and it appears that the new Intel GMA HD integrated graphics engine offers solid HD video performance and even a bit of light gaming capability."

Submission + - How 1940s whisky ads predicted the future (technologizer.com)

harrymcc writes: In the mid-1940s, ads for Seagram's VO Canadian whisky featured a series of predictions about technology breakthroughs that would arrive in the postwar era. Some of it did, eventually--including cell phones, video conferencing, speech-to-text voicemail, and bars with flat-screen TVs showing sports broadcasts. But Seagram's also said there would be coin-operated fax machines on street corners, atomic-powered desert farms, and grocery stores inside giant vans. I've collected some of the amazing art that was featured in these ads.

Comment Re:Do power users abuse their IT knowledge? (Score 2, Informative) 460

I don't understand why people always try to "get around" these restrictions. If there is a legitimate business need, then get it approved. These preventions are put in place for a reason. The more open the network, the more risk. The more risk means more virus, trojans, botnets, data leakage, etc. IT then has to cleanup your mess.

Partially right. The problem is, that in many larger organisations the 'legitimate business need --> approval' process does not scale well with regard to the time required to get the approval. So even if you do have a legitimate business need, waiting for the approval might still keep you from getting your job done. Multiply this by say ... 2,000 people waiting 10 days to get an approval for something. This will cost you real money.

It seems to be difficult to balance these things. But having a good zoning concept at hand might be of great help. It keeps the wrong people from tampering with critical resources, but it also allows employees to use necessary services e.g. SFTP. Yes, I've come across a situation were I was not allowed to get a patch from a vendor using SFTP. The idea was: SFTP may be used for stealing data. Use FTP, this is far more secure, as we can scan it with deep packet inspection.

Comment Re:Power Corrupts... (Score 5, Interesting) 460

Yes, we did have something like this happen where I work. Our IT group ended up blocking all social networking sites. Our marketing department raised a fit because they use Facebook for business purposes.

At the place were I currently work we have kind of a "feel free to use the internet as you wish" policy. This actually works out quite well. Sites are not filtered specifically. They basically say "hey, if you end up doing illegal stuff, you're screwed, otherwise we don't care as long as you get to do your work."

I used to work for a financial institution before that. And they had sort of a lockdown-mania. Filtering proxies (no checking your private web mail - could be used for stealing information), read-only USB mass storage, scanning outgoing e-mail attachments etc. I guess, these rules came in place because of management being scared to death by compliance requirements, not because of IT admins abusing their power.

And BTW: Had I wished to steal massive amounts of data, I could have still simply sent them via e-mail in a password-encrypted archive. It's a matter of trust, not only of making it difficult. So basically powerful and clueless management are equally effective as power-abusing admins.

IT

Do IT Pros Abuse Their Power? 460

An anonymous reader writes "I have noticed that many airports and hospitals I've visited have some kind of internet usage policy in place. Some use software similar to Websense, which effectively blocks sites based on blacklisting them by category. A commonly used blacklist prevents users from accessing 'forums or discussion boards,' yet I find that often these networks allow users to access sites like Fark, Slashdot, Digg and other message boards that appeal to the technical culture one might find in the IT world. In your experience, do IT administrators abuse their supervisory powers? Has there ever been a backlash from users or management for doing so?"

Submission + - Bono calls for Internet Controls (www.cbc.ca) 4

Nerdfest writes: The CBC reports that Irish rocker Bono is calling for better restrictions on the internet to protect artists and their work. "A decade's worth of music file-sharing and swiping has made clear that the people it hurts are the creators — in this case, the young, fledgling songwriters who can't live off ticket and T-shirt sales like the least sympathetic among us." And he alleges that "rich service providers" are reaping "the lost receipts of the music business."

The musician claims the technology is available to track and prevent illegal downloading, noting efforts in China which limit its populace from freely accessing the internet.

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...