Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:So much for being a CISA CISSP MSIA ... (Score 5, Insightful) 183

Not to mention these gems:

I installed ... security software ... The scan found two instances of a commercial keylogger called StarLogger ... This key logger is completely undetectable ...

So, this program found something which couldn't be found. Check.

After an in-depth analysis of the laptop, my conclusion was that this software was installed by the manufacturer, Samsung. I removed the keylogger software, cleaned up the laptop

Removed the keylogger by removing the folder? Check.

I found the same StarLogger software in the c:\windows\SL folder of the new laptop. The findings are false-positive proof since I have used the tool that discovered it for six years now and I am yet to see it misidentify an item throughout the years.

So, "false-positive proof." Good to know that your extensive experience running an anti-virus program has yielded perfect results. Don't worry about the fact that you don't actually know what you're talking about.

... logged incident 2101163379 with Samsung Support (SS). First, as Sony BMG did six years ago, the SS personnel denied ... SS changed its story ... SS personnel relented and escalated the incident ...

Can we claim Godwin here? I have a feeling Samsung Support doesn't refer to itself as the SS.

You obviously have some kind of agenda, Mohamed Hassan, MSIA, CISSP, CISA. I know now to never trust anything NetSec Consulting Corp does. Also, congrats on being an "adjunct professor of Information Systems in the School of Business at the University of Phoenix."

Comment Re:Greetings OnLive Shill/Fanboy (Score 1) 316

That's not really true though, that you have to download "all of the data" before you can see it, is it? For instance with JPEG2000 you can see the entire image with just a fraction of the file downloaded because the rest of the file is a series of refinements on what came before it.

For practical purposes it is true. What you're referring to is called interlacing. Monitors do it as well as many video and image formats. A simple interlacing technique using two passes would download half of the image and display every other line. This produces a rough idea of what the image will look like ( which looks a little better than garbage ). The subsequent pass fill in the other lines. This does not reduce the amount of bandwidth consumption. If it did, you would see horribly detailed images. All this does is reduce the perception of the actual latency. You can't really use this technique with a video codec, but you can with a still image. Video codecs use different techniques such as dropping frames or only sending data which has changed from the previous frame ( black pixel stays black: don't send ).

Also, this debate assumes TCP. If this product were using TCP ( which I highly doubt ), it would require all of the packets to be there for each frame. Some packets take longer than others so the client would block until all of the packets are there then it would reassemble them in the correct order. I would imagine this service would be using UDP with a custom developed codec which is highly tolerant of missing data.


The NoSQL Ecosystem 381

abartels writes 'Unprecedented data volumes are driving businesses to look at alternatives to the traditional relational database technology that has served us well for over thirty years. Collectively, these alternatives have become known as NoSQL databases. The fundamental problem is that relational databases cannot handle many modern workloads. There are three specific problem areas: scaling out to data sets like Digg's (3 TB for green badges) or Facebook's (50 TB for inbox search) or eBay's (2 PB overall); per-server performance; and rigid schema design.'

Comment Re:Browsers might be ready for GL but not Javascri (Score 2, Interesting) 181

...these games use 99% of the CPU...
You're doing it wrong (TM). I am working on a game right now, 2 months so far, which has animations and other eye candy and uses no where near 100% CPU on a 4 year old core2duo laptop. It looks like the original Legend of Zelda on the NES or FF 1-6.
... and it runs on everything back to IE 6 AND BEYOND. Fully supported browsers include IE 6 (2001), IE 7, IE 8, Firefox 1.0, Firefox 2.0, Firefox 3.0, Firefox 3.5, Safari 3.1, Safari 4, Opera 9/10, Chrome / Chromium, and iPhone.

What people don't realize is that you don't need the canvas element. If you use the canvas element, you are defeating the purpose of a web game since the web is all about accessibility. In a few years, yes, use it heavily! By using the canvas, you create an artificial barrier to entry for your players by saying "your must be on the bleeding edge to play."

There's no decent way to manipulate sounds
100% agreed! Hell, you can't even use MIDIs anymore!

There's no way to switch to full screen or to capture every key stroke/mouse movement.
I can't think of a single key on normal keyboard that can't be captured. Shift, alt, control, etc are all capturable. Mouse movement is the same.

As far as full screen, have the user press F11. All browsers I'm aware of use this same binding. Then use a bit of JS to get the desktop resolution and the window dimensions to verify.

It seems that what you are experiencing is game design problems. Try designing games with the limitations in mind rather than trying to design a game then making it fit with the technology.


FCC Probing Apple, AT&T Rejection of Google Voice 204

suraj.sun writes with an update to the news from a few days ago about Apple pulling Google Voice apps for the iPhone. Their actions have raised the interest of the FCC, which is now beginning an investigation into the matter. "In a letter sent to Apple, the FCC asked the company why it turned down Google Voice for the iPhone and pulled several other Google Voice-related programs from the iPhone's only sanctioned online mart. The FCC also sent similar letters to both AT&T — Apple's exclusive carrier partner in the US — and Google, asking both firms to provide more information on the issue. The FCC's letter asked Apple whether it rejected Google Voice and dumped other applications on its own, or 'in consultation with AT&T,' and if the latter, to describe the conversations the partners had. In other questions, the FCC asked Apple whether AT&T has any role in the approval of iPhone applications, wants the company to explain how Google Voice differs from any other VoIP software that has been approved, and requested a list of all applications that have been rejected and why."

Slashdot Top Deals

The IBM purchase of ROLM gives new meaning to the term "twisted pair". -- Howard Anderson, "Yankee Group"