Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Dungeons & Dragons' Influence and Legacy

Fnord666 Re:And all because a copyright expired! (126 comments)

Correlation does not equal causation. And you've left out how Gygax and Arneson were avid wargamers, and how the first ruleset of what would become D&D was an expansion (by Gygax) of a medieval rule set by Jeff Perren... and how Arneson (an avid player of Napoleonic figures based wargames) further expanded on the concept.

Ah yes. I fondly remember playing Chainmail. In fact, I still have my rule book as well as the three book set for the original Dungeons and Dragons.

Actually I originally got started playing such games at an individual level (as opposed to a unit level) thanks to Howard Thompson at Metagaming Concepts. A group of us were playing a lot of the microgames from Metagaming such as Ogre, GEV, WarpWar and Chitin:I when we found the microgames Melee, Wizard, and Death Test by Metagaming. Inexpensive and pocket sized, they were great to carry with you and play whenever the opportunity presented itself. They were the CheapAss Games of the 1970s. In the Labyrinth, Advanced Melee and Advanced Wizard formed The Fantasy Trip and added the necessary RPG aspects to the series for many adventures. After the dustup between Thompson and Steve Jackson, our group ended up switching to Advanced D&D for several years after that. It was too bad since I really liked TFT.

2 days ago
top

FTC To Trap Robocallers With Open Source Software

Fnord666 Re:Ah, how adorable... (123 comments)

To this day I still do not understand what makes this such a difficult and complex issue to tackle.

I don't see why it can't be as simple as: Spam call comes in, I dial a report number, telecom system flags the call and the origin. After 10 reports, 100 reports, that number is blocked. Further outgoing calls from the number are directed to a message to contact a fraud line to get the number reinstated. The longer a number has belonged to a legitimate company, the more immunity it is granted by the system to prevent abuses from angry consumers. The shorter the number has been in service, the more scrunity it is under.

Are the robocallers really able to shield their call origins from the telecoms? That just seems like such a ridiculous concept.

Let me help you out a bit with this. The thing is, those same telecoms that should be able to put a stop to this? They make money on every call. They have absolutely no incentive to do a damn thing about it except sell you caller id (for an extra fee) and the telemarketers the ability to fake their caller id (for an extra fee).
When in doubt, follow the money. Ask yourself who profits if something is done about a situation and who loses.

3 days ago
top

Point-of-Sale System Bought On eBay Yields Treasure Trove of Private Data

Fnord666 Re:SSN on POS? (68 comments)

Full-featured POS systems can handle things like payroll, invoicing, inventory/food ordering, bill payment, appointment reminders for customers, etc.

Yep. They're called Integrated Payment Platforms or Integrated Payment Systems and they're all the rage right now.

4 days ago
top

Source Code Leaked For Tinba Banking Trojan

Fnord666 For those who are interested (75 comments)

For those who are interested, here is a link to the post on opensc that contains the source code download. You will need to register for an account before downloading.

about two weeks ago
top

FAA Pressures Coldwell, Other Realtors To Stop Using Drone Footage

Fnord666 Re:Not a rule (199 comments)

I wonder where crop dusting comes into play under these rules?

about two weeks ago
top

Here Comes the Panopticon: Insurance Companies

Fnord666 The Natural Stopping Point (353 comments)

I suppose the natural stopping point might be the balance between an individual's willingness to be monitored and the desire to reduce insurance premiums.

Possibly, although the cynic in me says that the natural stopping point will be when the insurance companies require that you be monitored or they will not provide you with insurance.

about two weeks ago
top

Algorithm-Generated Articles Won't Kill the Journalism Star

Fnord666 Is the algorithm called... (29 comments)

Is the algorithm called Hasselton v0.1 by any chance?

about two weeks ago
top

Tesla Aims For $30,000 Price, 2017 Launch For Model E

Fnord666 Re:Profit before subsidy? (247 comments)

I just did the calculation for myself, and compared to my $15k 40mpg Hyundai, and given the amount of gas I go through on a weekly basis, if I pay sticker price for the model E it will be just about at the break even point. Any subsidy is just gravy. My current car is only 2 years old, so I won't be in the market for a while, but I'll definitely take a long hard look at a Tesla when I am.

Don't forget to factor in maintenance where the all electric vehicle will be cheaper. The estimated cost for 4 years of maintenance on a Tesla S is $1900. Compare that to $3316 for the Hyundai Sonata Hybrid and $3417 for the regular Hyundai Sonata. Maintenance costs for the Hyundais are from cars.com's "Cost of Ownership" page for each model. Maintenance costs for the Tesla are from Tesla motors. For more equitable "levels" of cars, the Hyundai Equus has a 4 year maintenance cost exceeding $6000.

about three weeks ago
top

Tesla Aims For $30,000 Price, 2017 Launch For Model E

Fnord666 Re:What about range on this smaller car? (247 comments)

(Honestly I think he just likes driving a big ass truck, and the boat is an excuse.)

I think somebody is compensating for something.

about three weeks ago
top

Tesla Aims For $30,000 Price, 2017 Launch For Model E

Fnord666 Re:What about range on this smaller car? (247 comments)

There's a limit to how many amps you can dump in a battery without severely shortening its capacity to hold a charge (not withstanding the heat and other problems related to running hundreds of amps on a connector)

That and the fact that you have people who forget to remove the nozzle before leaving the gas station. How many of these people will a supercharging station fry?

about three weeks ago
top

Qualcomm Takes Down 100+ GitHub Repositories With DMCA Notice

Fnord666 Re:I gotta ask (349 comments)

Is it still not legal to shoot copyright trolls on sight?

And if not, WHY THE HELL NOT?

Maybe we can amend "under penalty of perjury" to "under penalty of death" in that one section of the DMCA.

about three weeks ago
top

Qualcomm Takes Down 100+ GitHub Repositories With DMCA Notice

Fnord666 Re:Github overtaken by thuggish government (349 comments)

Github FAILS the requirement for reliability due to being subject to DMCA horseshit. Will somebody please start the next github in a jurisdiction untouchable by DMCA and other thuggish regulations.

Maybe we could build a data haven on an old abandoned oil drilling platform that is in international waters. I think I read about that somewhere.

about three weeks ago
top

Qualcomm Takes Down 100+ GitHub Repositories With DMCA Notice

Fnord666 Re:Two week downtime (349 comments)

DMCA requires that the service provider wait no fewer than ten and no more than fourteen days after forwarding the counter-notification and then put it back up if the service provider has not received notice of suit in that period.

Thanks for the reply. I'm not sure about the section in bold requiring the ISP to wait 10 days. The phrasing is weird. Here is the relevant section of the DMCA(emphasis mine):

Under the knowledge standard, a service provider is eligible for the limitation on liability only if it does not have actual knowledge of the infringement, is not aware of facts or circumstances from which infringing activity is apparent, or upon gaining such knowledge or awareness, responds expeditiously to take the material down or block access to it.

The statute also establishes procedures for proper notification, and rules as to its effect. (Section 512(c)(3)). Under the notice and takedown procedure, a copyright owner submits a notification under penalty of perjury, including a list of specified elements, to the service providerâ(TM)s designated agent. Failure to comply substantially with the statutory requirements means that the notification will not be considered in determining the requisite level of knowledge by the service provider. If, upon receiving a proper notification, the service provider promptly removes or blocks access to the material identified in the notification, the provider is exempt from monetary liability. In addition, the provider is protected from any liability to any person for claims based on its having taken down the material. (Section 512(g)(1)).

In order to protect against the possibility of erroneous or fraudulent notifications, certain safeguards are built into section 512. Subsection (g)(1) gives the subscriber the opportunity to respond to the notice and takedown by filing a counter notification. In order to qualify for the protection against liability for taking down material, the service provider must promptly notify the subscriber that it has removed or disabled access to the material. If the subscriber serves a counter notification complying with statutory requirements, including a statement under penalty of perjury that the material was removed or disabled through mistake or misidentification, then unless the copyright owner files an action seeking a court order against the subscriber, the service provider must put the material back up within 10-14 business days after receiving the counter notification.

Penalties are provided for knowing material misrepresentations in either a notice or a counter notice. Any person who knowingly materially misrepresents that material is infringing, or that it was removed or blocked through mistake or misidentification, is liable for any resulting damages (including costs and attorneysâ(TM) fees) incurred by the alleged infringer, the copyright owner or its licensee, or the service provider. (Section 512(f)).

I believe the last paragraph does allow for penalties for deliberately false take down notices. The problem is that you would have to actually take the case to court and discover that they knew the notices would be false. IANAL but if I read this right, if you file a counter claim to get things put back up claiming misidentification or mistake and you are found to be infringing anyway, you could be on the hook for the copyright holder's attorney's fees. If the counter-claim requires a reason, I would recommend something other than one of these two.

about three weeks ago
top

Qualcomm Takes Down 100+ GitHub Repositories With DMCA Notice

Fnord666 Re:Counter-notice! (349 comments)

I respectfully remind you that only timely compliance with this put-back notice absolves you of liability under the Digital Millennium Copyright Act."

Is there such a requirement? Does the DMCA require that the ISP restore things at all or can they just leave it down if they want?

about three weeks ago
top

In 2012, Facebook Altered Content To Tweak Readers' Emotions

Fnord666 Re:consent (130 comments)

There is no such law. In any case, this is the the basis for the entire news business.

While it may not be an actual law, there are strict rules about this for any study, like this one, that receives US federal funding.

about three weeks ago
top

Hospitals Begin Data-Mining Patients

Fnord666 Re:Not likely (162 comments)

Well, that call is in response to yours. I think jamesl meant a "just thinking about you" type of call.

That's because the underlying core of western medicine is a reactive one rather than a proactive one.

about a month ago
top

Hospitals Begin Data-Mining Patients

Fnord666 Re:Doesn't give warm fuzzies (162 comments)

You're wrong, you shouldn't trust your doctor AT ALL. Your life/health and privacy are far too important to do so.

Your doctor is no better of a person than anyone at the insurance company.

You need to understand that every single person at a hospital is also a person, not some mythical creature who actually cares about you.

99.9% of the doctors created today are just as scummy as anyone else. The age where doctors cared has not existed during my life time, if it ever did. The hippocratic oath is a joke at best, nothing more than lip service.

I don't trust my doctor with my personal information because of some vague oath any more than I do any politician to support and defend the constitution. I trust my doctor with my personal information because he has a legal obligation to not disclose that information to other parties without my consent.

about a month ago
top

New Sensors Will Scoop Up "Big Data" On Chicago

Fnord666 Re:I have a IMO a propounding question. (64 comments)

I have a IMO a propounding question. Why is this stuff just done with no voter imput? Wither its a government project or a private one, I thing we should demand public input and maybe even voter approval or disapproval.........And has any privacy agencies tried this method? Just seem to me they shouldn't be using government equipment "poles" "Right of ways".or government property.

No, the proper way to do it is wait until they have spent all the money to buy the equipment and deploy it, then pass a referendum that makes them illegal.

about a month ago
top

Google Forks OpenSSL, Announces BoringSSL

Fnord666 Re:Worrysome (128 comments)

Diversity is good, especially if they wind up diverging and actually being diverse. Not all implementations wind up being vulnerable to the same attacks, except when there are weaknesses inherent to the protocol.

Just be sure that as a developer you write an abstraction layer between the application and the library so that when the interfaces diverge too much you have a single class to rewrite. Diversity in implementations is a good thing. Diversity in the interfaces can be a pain in the butt.

about a month ago
top

Harley-Davidson Unveils Their First Electric Motorcycle

Fnord666 Re:Doppler effect (345 comments)

Apparently you are unfamiliar with the Doppler effect [wikipedia.org]. Even on a Harley making a huge obnoxious racket it is easy to get dangerously close to someone before they hear you

Perhaps you should have read the article you cited. Doppler shift affects the observed frequency of the sounds but does not affect the speed at which that sound travels in a given medium. In addition it is the difference between the speeds of the observer and the source. If both are traveling at the same relative speed, there will not be a shift in the frequency for that observer.

about a month ago

Submissions

top

Google acquires Israeli security startup SlickLogin

Fnord666 Fnord666 writes  |  about 5 months ago

Fnord666 (889225) writes "SlickLogin, an Israeli startup and developer of smart identification technology through user smartphones has been acquired by Google for several million (the official transaction amount remains undisclosed). SlickLogin was founded under a year ago by Or Zelig, Eran Galili and Ori Kabeli. The company first unveiled its technology at TechCrunch Disrupt held last September. the company has yet to launch their product nor have they any customers to date."
Link to Original Source
top

Incredible 3D GIFs Created with a Simple Visual Effect

Fnord666 Fnord666 writes  |  about 5 months ago

Fnord666 (889225) writes "Animated gifs seem to be everywhere these days, but some gif creators are taking the visual experience of viewing quick clips of silent motion to another level. By carefully adding a couple of solid-colored (typically white), vertical lines to the moving images, an incredible three-dimensional effect is created. As characters and objects move into the foreground, they seemingly extend beyond the barrier of the image."
Link to Original Source
top

Nation's most notorious "troll" sues federal government

Fnord666 Fnord666 writes  |  about 6 months ago

Fnord666 (889225) writes "MPHJ Technology Investments quickly became one of the best-known "patent trolls" of all time by sending out thousands of letters to small businesses—16,465 of them, we now know—saying that if the business did not pay a licensing fee of $1,000 or more per worker, it would be sued for patent infringement. MPHJ claimed to have patents that cover any networked "scan-to-email" function.

As the debate over so-called "patent trolls" has flared up in Congress, MPHJ became the go-to example for politicians and attorneys general trying to show that patent abuse has spun out of control. "We're talking about bottom feeders," said Sen. Claire McCaskill (D-MO) in one Senate hearing focused on patent demand letters.

We now know that MPHJ has also become the first patent troll targeted by the Federal Trade Commission. The FTC's interest in MPHJ was revealed in an audacious "preemptive strike" lawsuit that MPHJ actually filed against the FTC on Monday. The suit, which names the four sitting FTC commissioners personally, says that the agency has overstepped its bounds and trampled on MPHJ's constitutional rights."

Link to Original Source
top

Court Strikes Down FCC Open Internet Order

Fnord666 Fnord666 writes  |  about 6 months ago

Fnord666 (889225) writes "WASHINGTON — On Tuesday, the D.C. Circuit Court of Appeals struck down the Federal Communications Commission’s Open Internet Order. In its decision, the court said that the FCC lacked the authority to implement and enforce its rules under the legal framework the agency put forth.

The FCC’s 2010 order was intended to prevent broadband Internet access providers from blocking or interfering with traffic on the Web. Instead of reversing a Bush-era FCC decision that weakened the FCC’s authority over broadband, and establishing solid legal footing for its rules, former FCC Chairman Julius Genachowski pushed for rules under the complicated legal framework the court rejected today."

Link to Original Source
top

Hackers Steal Card Data from Neiman Marcus

Fnord666 Fnord666 writes  |  about 6 months ago

Fnord666 (889225) writes "Another day another data breach. Apparently high end retailer Neiman Marcus has also suffered a breach of credit card data. Krebs on Security has the news:.
"Responding to inquiries about a possible data breach involving customer credit and debit card information, upscale retailer Neiman Marcus acknowledged today that it is working with the U.S. Secret Service to investigate a hacker break-in that has exposed an unknown number of customer cards.""

Link to Original Source
top

AllThingsD co-founders launch new tech site, Re/code.

Fnord666 Fnord666 writes  |  about 7 months ago

Fnord666 (889225) writes "The founders of popular technology website AllThingsD have launched a new digital news and review website after parting ways with Dow Jones back in September.

The site, Re/code, was announced on Thursday by co-founders Kara Swisher and Walt Mossberg. The site and conference, which will be called Code, are to be managed by Revere Digital LLC, which received investments from the NBCUniversal News Group as well as Windsor Media, founded by former Yahoo chairman and CEO Terry Semel. The first conference under the new company will be held in late May outside Los Angeles."

Link to Original Source
top

Secret New UAS Shows Stealth, Efficiency Advances

Fnord666 Fnord666 writes  |  about 7 months ago

Fnord666 (889225) writes "A large, classified unmanned aircraft developed by Northrop Grumman is now flying—and it demonstrates a major advance in combining stealth and aerodynamic efficiency. Defense and intelligence officials say the secret unmanned aerial system (UAS), designed for intelligence, surveillance and reconnaissance (ISR) missions, is scheduled to enter production for the U.S. Air Force and could be operational by 2015.

Funded through the Air Force’s classified budget, the program to build this new UAS, dubbed the RQ-180, was awarded to Northrop Grumman after a competition that included Boeing and Lockheed Martin. The aircraft will conduct the penetrating ISR mission that has been left unaddressed, and under wide debate, since retirement of the Lockheed SR-71 in 1998."

Link to Original Source
top

Twitter Implements Forward Secrecy for Connections

Fnord666 Fnord666 writes  |  about 8 months ago

Fnord666 (889225) writes "Twitter has enabled Perfect Forward Secrecy across its mobile site, website and API feeds in order to protect against future cracking of the service’s encryption. The PFS method ensures that, if the encryption key Twitter uses is cracked in the future, all of the past data transported through the network does not become an open book right away.

“If an adversary is currently recording all Twitter users’ encrypted traffic, and they later crack or steal Twitter’s private keys, they should not be able to use those keys to decrypt the recorded traffic,” says Twitter’s Jacob Hoffman-Andrews. “As the Electronic Frontier Foundation points out, this type of protection is increasingly important on today’s Internet.”"

Link to Original Source
top

Apple, betrayed by its own law firm

Fnord666 Fnord666 writes  |  about a year ago

Fnord666 (889225) writes "When a company called FlatWorld Interactives LLC filed suit against Apple just over a year ago, it looked like a typical "patent troll" lawsuit against a tech company, brought by someone who no longer had much of a business beyond lawsuits.
Court documents unsealed this week reveal who's behind FlatWorld, and it's anything but typical. FlatWorld is partly owned by the named inventor on the patents, a Philadelphia design professor named Slavko Milekic. But 35 percent of the company has been quietly controlled by an attorney at one of Apple's own go-to law firms, Morgan, Lewis & Bockius. E-mail logs show that the attorney, John McAleese, worked together with his wife and began planning a wide-ranging patent attack against Apple's touch-screen products in January 2007—just days after the iPhone was revealed to the world."

Link to Original Source
top

FBI Pursuing Real-Time Gmail Spying Powers as "Top Priority" for 2013

Fnord666 Fnord666 writes  |  about a year ago

Fnord666 (889225) writes "Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year."
Link to Original Source
top

Researchers Demonstrate 3D Spy Trojan for Mobile Phones

Fnord666 Fnord666 writes  |  about 2 years ago

Fnord666 (889225) writes "Researchers at the University of Indiana at Bloomington and the Crane Division of the Naval Surface Warfare Center (NSWC) created a program to use a phone's camera to take surreptitious pictures of its surroundings, weed out poor photos, and send the remaining stills back to be used to construct a 3D model of the environment. Called PlaceRaider, the project shows that virtual thieves and spies could identify and steal information from a remote location, the researchers said in a paper posted online on Sept. 26."
Link to Original Source
top

Research Shows Half of All Androids Contain Known Vulnerabilities

Fnord666 Fnord666 writes  |  about 2 years ago

Fnord666 (889225) writes "According to an article on threatpost, the Kaspersky Lab Security News Service, "About half of all Android phones contain at least one vulnerability that could be used to take control of the device, according to new research. Duo Security, which launched a free vulnerability scanning app for Android this summer, said their preliminary data from users shows a huge number of the devices are vulnerable to at least one of the known Android flaws.""
Link to Original Source
top

Novel text analysis uses PageRank to identify influential Victorian authors

Fnord666 Fnord666 writes  |  about 2 years ago

Fnord666 (889225) writes "A literature professor has developed software using Google's PageRank algorithm that has identified Jane Austen and Walter Scott as the most influential authors of the 1800s.

Matthew Jockers of the University of Nebraska analysed 3,592 digitized novels published in the UK, Ireland and the US between 1780 and 1900 using a combination of Google's algorithm, machine learning and a series of techniques used in computational text analysis including stylometry, corpus linguistics and network analysis."

Link to Original Source
top

US-CERT discloses security flaw in Intel chips

Fnord666 Fnord666 writes  |  more than 2 years ago

Fnord666 (889225) writes "The U.S. Computer Emergency Readiness Team (US-CERT) has disclosed a flaw in Intel chips that could allow hackers to gain control of Windows and other operating systems, security experts say.

The flaw was disclosed the vulnerability in a security advisory released this week. Hackers could exploit the flaw to execute malicious code with kernel privileges, said a report in the Bitdefender blog.

"Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack," the US-CERT advisory says. "The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape.""

Link to Original Source
top

New Twist On Ancient Math Problem Could Improve Medicine, Microelectronics

Fnord666 Fnord666 writes  |  more than 2 years ago

Fnord666 (889225) writes "A hidden facet of a math problem that goes back to Sanskrit scrolls has just been exposed by nanotechnology researchers at the University of Michigan and the University of Connecticut.

Called the "filling problem," it seeks the best way to cover the inside of an object with a particular shape, such as filling a triangle with discs of varying sizes. Unlike the traditional packing problem, the discs can overlap. It also differs from the "covering problem" because the discs can't extend beyond the triangle's boundaries."

Link to Original Source
top

A new approach to motion capture

Fnord666 Fnord666 writes  |  more than 2 years ago

Fnord666 (889225) writes "Traditional motion capture techniques use cameras to meticulously record the movements of actors inside studios, enabling those movements to be translated into digital models. But by turning the cameras around — mounting almost two dozen, outward-facing cameras on the actors themselves — scientists at Disney Research, Pittsburgh (DRP), and Carnegie Mellon University (CMU) have shown that motion capture can occur almost anywhere — in natural environments, over large areas and outdoors."
Link to Original Source
top

VAT to be implemented in the US?

Fnord666 Fnord666 writes  |  more than 4 years ago

Fnord666 (889225) writes ""Have you heard about the value-added tax (VAT), a horrible new tariff Americans will soon have to shoulder? The alarm is sounding on the conservative Web site Townhall.com, in the editorials of The Wall Street Journal, and on the opinion pages of The Washington Post (as well as in the pages of NEWSWEEK): consumers can expect to soon see the feared VAT sneaked into price tags nationwide.""
Link to Original Source
top

Toktumi releases Line2 VoIP app

Fnord666 Fnord666 writes  |  more than 4 years ago

Fnord666 (889225) writes ""For a little $1 iPhone app, Line2 sure has the potential to shake up an entire industry. It can save you money. It can make calls where AT&T’s signal is weak, like indoors. It can turn an iPod Touch into a full-blown cellphone. And it can ruin the sleep of cellphone executives everywhere.

Line2 gives your iPhone a second phone number — a second phone line, complete with its own contacts list, voice mail, and so on.""

Link to Original Source
top

Fnord666 Fnord666 writes  |  more than 7 years ago

Fnord666 (889225) writes "According to an article in tgdaily, Best Buy Burbank has given the boot to the ten people waiting for the Sony PlayStation 3 launch. According to our sources in the line, Best Buy kicked the group off property on Friday afternoon November 10th. ...The group was in high spirits Wednesday night when we interviewed them for our "PS3 fans quit jobs and postpone engagement to wait in line " article. At that time they seemed to have the full support of Best Buy and several employees walked by to chat with the group. ...It's unknown if the call to move the campers was a Best Buy corporate decision or if instructions came down from the Empire Center, the mall where Best Buy Burbank is located, property management. Calls to the Best Buy corporate offices and Best Buy Burbank went unanswered."
top

Fnord666 Fnord666 writes  |  more than 7 years ago

Fnord666 writes "On Monday, interface developer Synaptics, together with Pilotfish, an industrial design company, announced a keyless prototype of a mobile phone that is all screen — all touch pad screen, to be exact. ..."Device manufacturers want to have larger and larger LCDs, so suddenly you need to have a touch input system on top of the LCD — and that's what we're suggesting here," said Mandi Mena, senior corporate marketing manager for Synaptics. ...This creates new possibilities such as assigning functions to two-finger taps, closing tasks by swiping an "X" over them, performing drag and drop applications, and answering the phone by simply pressing it next to your face. ...The two companies worked together to develop the phone, which uses Synaptics' ClearPad touch screen technology and interaction design with Pilotfish's user interface and industrial design. ..."We see the enabled ClearPad technology as something that can be applicable to remote controls or any sort of handheld device that is experiencing the same content overload that mobile phones are experiencing today," Mena said."

Journals

top

D&D Cofounder Dave Arneson has died

Fnord666 Fnord666 writes  |  more than 5 years ago "APOLIS -- Dave Arneson, one of the co-creators of the Dungeons & Dragons fantasy game and a pioneer of role-playing entertainment, died after a two-year battle with cancer, his family said Thursday. He was 61. Arneson and Gary Gygax developed Dungeons & Dragons in 1974 using medieval characters and mythical creatures. The game known for its oddly shaped dice became a hit, particularly among teenage boys. It eventually was turned into video games, books and movies. Gygax died in March 2008." - The Huffington Post

top

Fnord666 Fnord666 writes  |  about 6 years ago This article on macworld is just a waste of server space. I especially like the second editor,

who's as gung-ho about the iPhone 3G as ever.

Apparently he has not one, but two 1st gen iPhones, yet he can't even get signal most of the time! He doesn't use text messaging, so why does he even have the thing? He could just as easily use an ipod touch and wifi to do everything else. Instead he is planning on getting an iphone 3G, which uses a faster network that he will get "the day before never". If this is the technical insight I can expect from macworld, I'm glad I don't subscribe.

In true Slashdot fashion, I'll just end with a question:

Why would anyone listen to this person?

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...