Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Most Hackable Computer (Score 1) 153

I remember when the first Mac came out, completely unexpandable, and The Steve declared that it would never have more than 128K of RAM because that was more than enough for anyone.

Which was ridiculous, because my Apple ][ had 16x that much already.

Your Apple ][ had 2 MB of RAM?!?! Where did you put the auxiliary power supply?!? Perhaps you mean Apple IIgs, right?

Ramworks.

I think the grandparent article was pointing out that an Apple ][ could not have 2MB of RAM "already" when the first Macintosh was released in early 1984, since RamWorks' Applied Engineering and other expansion makers did not offer the 2MB option until later. By September of 1984, it was a moot point, since the Macintosh 512K hit shelves (with the third-party option for more memory).

Cellphones

Owners Smash iPhones To Get Upgrades, Says Insurance Company 406

markass530 writes "An iPhone insurance carrier says that four in six claims are suspicious, and is worse when a new model appears on the market. 'Supercover Insurance is alleging that many iPhone owners are deliberately smashing their devices and filing false claims in order to upgrade to the latest model. The gadget insurance company told Sky News Sunday that it saw a 50-percent rise in claims during the month Apple launched the latest version, the iPhone 3GS.'"
Apple

Has Apple Created the Perfect Board Game Platform? 531

andylim writes "recombu.com is running an interesting piece about how Apple has created a 'Jumanji (board game) platform.' The 9.7-inch multi-touch screen is perfect for playing board games at home, and you could use Wi-Fi or 3G to play against other people when you're on your own. What would be really interesting is if you could pair the iPad with iPhones, 'Imagine a Scrabble iPad game that used iPhones as letter holders. You could hold up your iPhone so that no one else could see your letters and when you were ready to make a word on the Scrabble iPad board, you could slide them on to the board by flicking the word tiles off your iPhone.' Now that would be cool."
Social Networks

Game Distribution Platforms Becoming Annoyingly Common 349

The Escapist's Shamus Young recently posted an article complaining about the proliferation of distribution platforms and social networks for video games. None of the companies who make these are "quite sure how games will be sold and played ten years from now," he writes, "but they all know they want to be the ones running the community or selling the titles." Young continues, "Remember how these systems usually work: The program sets itself up to run when Windows starts, and it must be running if you want to play the game. If you follow this scheme to its logical conclusion, you'll see that the system tray of every gaming PC would eventually end up clogged with loaders, patchers, helpers, and monitors. Every publisher would have a program for serving up content, connecting players, managing digital licenses, performing patches, and (most importantly) selling stuff. Some people don't mind having 'just one more' program running in the background. But what happens when you have programs from Valve, Stardock, Activision, 2k Games, Take-Two, Codemasters, Microsoft, Eidos, and Ubisoft? Sure, you could disable them. But then when you fire the thing up to play a game, it will want to spend fifteen minutes patching itself and the game before it will let you in. And imagine how fun it would be juggling accounts for all of them."
Games

The Murky Origins of Zork's Name 70

mjn writes "Computational media researcher Nick Montfort traces the murky origins of Zork's name. It's well known that the word was used in MIT hacker jargon around that time, but how did it get there? Candidates are the term 'zorch' from late 1950s DIY electronics slang, the use of the term as a placeholder in some early 1970s textbooks, the typo a QWERTY user would get if he typed 'work' on an AZERTY keyboard, and several uses in obscure sci-fi. No solid answers so far, though, as there are problems with many of the possible explanations that would have made MIT hackers unlikely to have run across them at the right time."
Robotics

The Best Robots of 2009 51

kkleiner writes "Singularity Hub has just unveiled its second annual roundup of the best robots of the year. In 2009 robots continued their advance towards world domination with several impressive breakouts in areas such as walking, automation, and agility, while still lacking in adaptability and reasoning ability. It will be several years until robots can gain the artificial intelligence that will truly make them remarkable, but in the meantime they are still pretty awesome."
Image

Jetman Attempts Intercontinental Flight 140

Last year we ran the story of Yves Rossy and his DIY jetwings. Yves spent $190,000 and countless hours building a set of jet-powered wings which he used to cross the English Channel. Rossy's next goal is to cross the Strait of Gibraltar, from Tangier in Morocco and Tarifa on the southwestern tip of Spain. From the article: "Using a four-cylinder jet pack and carbon fibre wings spanning over 8ft, he will jump out of a plane at 6,500 ft and cruise at 130 mph until he reaches the Spanish coast, when he will parachute to earth." Update 18:57 GMT: mytrip writes: "Yves Rossy took off from Tangiers but five minutes into an expected 15-minute flight he was obliged to ditch into the wind-swept waters."

Comment Re:For the unenlightened.. (Score 1) 167

The main target for this act is to stop a file sharing program / network called Winny. Winny is one of the top File sharing program / network in Japan.

The trick is that many (but not all) Japanese users have moved onto a replacement program called Share and other software, after vulnerabilities in Winny's anonymity features were discovered. Then vulnerabilities were discovered in Share, too, so some users have moved onto yet another replacement.

The creator is facing similar claims to that of the Bittorrent creator, where he has created a tool that can be used to share files with the advantage of being anonymous.

The creator actually already faced those claims and was given a 1.5-million-yen (about US$12,000) fine. He has since starting working a SkeedCast, a file-sharing program that is used by Gonzo and other companies for authorized file-sharing. You can find more information about all this here.

Slashdot Top Deals

It is masked but always present. I don't know who built to it. It came before the first kernel.

Working...