Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Yes and No (Score 1) 512

You have to look past the numbers, it isn't a matter of being "dead", it's a matter of weighing the cost of supporting IE6 specific code against an increasingly small number of users.

Even though your stats indicate Opera and Safari are in the same percentile for your site, they'll render standards compliant content without HTML/CSS/JS specifically written for either one.

If any of my sites had less than 10% of IE6 traffic, I'd stop supporting it officially for them. In reality, most of our B2B sites have > 50% of users on IE6 -- we'll be stuck with it for some time. Hopefully Google's impetus to kill support for IE6 can help sway corporate decisions more than Microsoft's own declaration of obsolescence.

Windows

Hostile ta Vista, Baby 663

Frequent Slashdot contributor Bennett Haselton adds his experience to the litany of woes with Microsoft Vista. Unlike most commentators who have a beef with the operating system, Bennett does a bit of surveying to bolster his points. Read his account by clicking on the magic link.
Role Playing (Games)

World of Warcraft Hits 10 Million Subscribers 450

technirvana writes "Blizzard Entertainment, owners of World of Warcraft, announced today that the game now has more than 10 million paying subscribers around the world. Online gameplay costs an average of $15 USD per month. Those 10 million paying subscribers include 5.5 million players in Asia, 2.5 million in the US and 2 million in Europe. The Warcraft brand was first introduced in 1994 and World of Warcraft was launched in 2001."
Role Playing (Games)

Crime Wave Thwarted in Second Life 183

Ponca City, We Love You writes "The Mercury News reports that a vulnerability in the way Second Life protects a user's money has been identified. Risks for users are reportedly limited because the researchers say the flaw can be quickly patched. The flaw exploits a known problem with Apple's QuickTime - when a virtual character passes by an infected object planted by hackers, the Second Life software activates QuickTime so it can play the video or picture. Hackers can direct the Second Life software to a malicious Web site that then allows them to 'take over the user's avatar and force it to hand over its Linden cash. Second Life is recommending that users disable streaming video playback in the Second Life viewer except when you are attending a known and trusted venue.' The hack raises tough questions for operators of virtual worlds. Should they be as secure as banks and guarantee the safety of money and property that characters in the world possess?"

Bot-avatar Pesters Second Life Users (For Science!) 124

holy_calamity writes "A bot-controlled avatar that tracks down lone avatars in Second Life and purposely invades their personal space has been created by UK researchers. The idea was to see if users value their virtual personal space. Bots avatars are not encouraged by Linden Labs — although this one is being deployed by academics, presumably spam-avatars (spavatars?) won't be far behind."
Toys

Paranormal Investigations and Belief in Ghosts 606

Esther Schindler writes "Sure, everyone uses technology on the job. But you may not have contemplated the tools used by paranormal investigators (at least, not until you began thinking about Halloween) who look for the truth in ghosts and other things that go Bump in the Night. In Paranormal Investigations and Technology: Where Ghosts and Gadgets Meet, CIO's Al Sacco writes about the most unusual of tool chests, with everything from thermometers to blimp cams." You want spooky? An anonymous reader passed a link to a survey that says a third of Americans believe in ghosts. Who you gonna call?
E3

Questioning the New E3 86

This year's E3 is substantially different than events of the past, with an easily navigated show floor just one of the signs of the changing times. There are a number of questions up in the air as to what the new face of E3 means. Hideo Kojima (creator of the Metal Gear series) went on record at the Konami conference saying that he considers the new format a waste of time. Game|Life's Chris Kohler has a piece up on this subject, and he says that the new E3 is all about the status quo: "Yes, there were press conferences. But when Nintendo, Microsoft, and Sony all decide to only show their 2007 games (for the most part) and hold back on announcing huge news (entirely), you know something's up with the venue. At any rate, gamers hoping for some kind of shift in momentum, no matter which direction, didn't get their wish. This year's E3 is all about maintaining the status quo. Typically, it's been the 'battle of the press conferences' to see who 'wins E3.' This year, everybody surrendered."
User Journal

Journal Journal: Our baby boy: 3

7lbs 3oz, born 12:36pm EST Monday September 25th.

He is the most amazing thing I have ever seen.

User Journal

Journal Journal: Preggers! 5

The wife is preggers! Gonna have a little mini-llamalicious running around the house pretty soon.
This is our first one, and I'm pretty damned excited!

That's all, just wanted to share :P

Comment Re:Microsoft *Invented* AJAX. (Score 1) 443

My point about Google was that GMail and then Google Maps were the products that truly alerted the world, in a big way, to the potential of AJAX. Shortly thereafter, tons of people started using AJAX to build sites, MySpace included.

As for start.com: this is a very new Microsoft effort and it isn't an official product. (Live.com is the official product, but that only happened like a week ago.) The important point is that Microsoft had the technology in its hands long ago but failed to capitalize on it in obvious places (again, let me point my finger at MSN's many products.)

Agreed that the press enjoys jumping on all-things-Google these days, but I think it is fair to say that Google was the first company to fully understand the value of AJAX and captilize on it in a way that the general public was aware of.

Comment Is it possible to build in a decoy? (Score 1) 814

Let's say i wanted to encrypt a jpeg

As I understand it, encryption works through software using a given algorithm to convert a given (readable) set of data to an unreadable form. The person encrypting has a key they could use to decrypt the data into a readable form.

Could software be written with the following functionality? I specify the jpeg I want to encrypt (say a picture of me in leather with a rose between my teeth which I use as my profile on a sadomasochism site), specify the encryption algoritm to use, specify the key, and lastly specify a decoy jpeg (say a pic of a rose).

The software then provides me with an encryped file which can be decoded to the original using the key I specified, and it also provides a key which, if used, will convert the encrypted file to the decoy jpeg.

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (2) Thank you for your generous donation, Mr. Wirth.

Working...