Forgot your password?
typodupeerror
Businesses

Viacom To Sell Rock Band Creator Harmonix 112

UgLyPuNk tips news that Harmonix, the game developer behind Rock Band and the early Guitar Hero games, will be sold by parent company Viacom, signaling the media conglomerate's exit from the console game market. Quoting Wired: "The news is yet another ominous sign for the music-game business, which exploded seemingly overnight in 2005 with the release of Guitar Hero. ...sales have been in free fall since the dizzying heights of 2008, with Guitar Hero: Warriors of Rock moving only 86,000 copies in its first week... Thus far in calendar year 2010, the balance sheet seems to show that Harmonix has been a $300 million liability for Viacom. And it doesn’t look like Viacom believes in the long-term future of music games. With any luck, the company will find a buyer that can help Harmonix grow, but it’s hard to imagine a better partner in the music biz than MTV."

Forensic Discovery 123

Ben Rothke writes "When most people think of forensics, television shows like Quincy and CSI come to mind. Where such shows deviate from reality is the unrealistic speed at which the actors are able to identify, apprehend and prosecute the perpetrators. In the real world, (unlike television, where the crime must be solved by the end of the family hour), crimes are solved with slow, deliberate and methodical steps. The prodigious incidence of digital crime has elevated computer forensics to a critical role within the field of information security. The focus of computer forensics is twofold: first is the attempt to determine whether a breach has occurred and to stop the perpetrator; second is prosecution of the offender, if the breach was a criminal activity." Read on for Rothke's review of Forensic Discovery.

Know Your Enemy, 2nd Edition 103

Ben Rothke writes "Within law enforcement, establishing a modus operandi is one of the crucial things that can make the difference between finding a criminal and not. For example, a daylight murder with a single bullet to the head is quite different from finding a decapitated and mutilated body in a ditch. While both victims are equally dead, the manner of their deaths is radically different. So too with computer crime; knowing the modus operandi of the attacker can mean the difference between finding the perpetrator and not. In Know Your Enemy: Learning about Security Threats, the members of the Honeynet Project have written an excellent security reference that can enable one to begin to understand the motives of those who are attacking and compromising their systems." Read on for the rest of Rothke's review.

Slashdot Top Deals

Houston, Tranquillity Base here. The Eagle has landed. -- Neil Armstrong

Working...