
Hands on: Trillian conversation sync is mobile messaging bliss
Most of the mainstream instant messaging protocols already allow users to establish multiple connections or run multiple client instances at the same time, but they don't echo the full conversation on all connected devices or allow you to see the contents of your existing conversations when you establish a new connection on a different device. Trillian's continuous client functionality remedies those issues by fully synchronizing the contents of your open chat windows between instances of the client.

Read the comments on this post
Read More ...
Double the playtime? We test Nyko's third-party 3DS battery
Installation is a breeze, and while it adds some bulk to the system it remains comfortable to hold and play. But more importantly, we now know how long it will allow you to play... and those results were impressive.

Read the comments on this post
Read More ...
Cable-backed anti-muni broadband bill advances in North Carolina
Whatever you call it, H129 passed the state's House of Representatives on Monday 81 to 37. Its sponsor, Marilyn Avila (R-Wake), told WRAL TV that the legislation would protect businesses from "predatory" local governments that want to build their own ISPs. "We have to have some sort of framework that everybody understands when you go into this," she explained. "This bill is going to establish those rules."
Baloney, responded Rep. Bill Faison (D-Orange). The law will "make it practically impossible" for cities to provide a "fundamental service," he insisted. "Let's be clear about whose bill this is. This is Time Warner's bill."

Read the comments on this post
Read More ...
Games work "neurological magic," says QWOP creator
Bennett Foddy, deputy director of the Institute for Science and Ethics at Oxford University, makes games about embodiment, and the “neurological magic” in gaming which allows us to inhabit the heroes on screen.But unlike most artsy, experimental games with a point to make, Foddy’s free Flash games are hilarious, alarmingly addictive and eminently playable. His latest, a fiendishly compulsive rock-climbing simulation called GIRP, is a masochistically difficult game that turns your keyboard into a cliff face.

Read the comments on this post
Read More ...
Feature: Ars System Guide: March 2011 Edition
The gory details aside, computers today are what we say about almost every update—the System Guide gets faster and cheaper, and we get more and more happy with the performance.

Read the comments on this post
Read More ...
Amazon on Cloud Player: we don't need no stinkin' licenses
That's Amazon spokesperson Cat Griffin's response to questions over whether the company's new music storage and playback services require licenses from the record companies to operate. Amazon seems to insist that since users are uploading and playing back their own music, the original download licenses still apply and no new licenses are necessary—a seemingly logical conclusion that the record industry disagrees with.

Read the comments on this post
Read More ...
Rustock repercussions: Spam down by a third, at least for now
The full report shows that there's still a lot of work to be done. In 2010, 88 percent of all spam emails were sent by botnets, and of that botnet-originated spam, Rustock was responsible for an average of 28 percent. Taking out Rustock has unsurprisingly had a substantial impact on spam levels. However, MessageLabs reports that other botnets have increased spam production over the same period, making it likely that previous spam volumes will be resumed soon enough.
The data does give some reason for optimism, however. Just ten botnets (including Rustock) are responsible for about 74 percent of all spam. Taking out these botnets would not be a minor undertaking, but it's still a manageable scale—the botnet market is relatively consolidated. While eradicating the botnets certainly won't eradicate spam, it may well reduce it to tolerable levels. Gradual improvements in system security—not least the slow abandonment of Windows XP—and replacement of infected systems should make it harder to recruit large-scale botnets in the future, amplifying the effect of each botnet takedown.
That future is, alas, still some way off; in the meantime, aggressive spam filtering at the server and client level is the only viable recourse. A case might also be made for better legislation—one of the more surprising aspects of Microsoft's Rustock lawsuit was the circuitous route by which the company had the server hardware used by the botnet seized. The company had to use trademark law—claiming that Rustock's spam infringed on both its own and Pfizer's trademarks—in order to have the server hardware seized. Existing anti-spam legislation only allows domain names to be taken—an insufficient tool for taking down Rustock.
Read the comments on this post
Read More ...
Microsoft expands Hotmail Active Views, hopes you never leave your inbox

Read the comments on this post
Read More ...
Accurate and credible news tweets? Automated system finds them
The rise of social media has turned it into a source of basic news for many people; even Twitter's character limit allows for a brief description of a newsworthy event, along with a link to more details. However, the ease of creating and sharing information through social networks has also raised concerns about how easily they can be used to spread misinformation, either accidentally or with intent. Some researchers at Yahoo have tracked the spread of news (reliable and otherwise) through Twitter, and found that it's possible to create an automated system that identifies newsworthy events and judges their reliability with an accuracy of nearly 90 percent.
The authors (who are based in Barcelona and Chile—working for Yahoo might not be all bad news) note that assessing credibility is not simply an academic exercise, as a hacked Twitter account produced a fake tsunami warning last year. A lot of people aren't very good at it, and the lack of easy indications of credibility online lead readers to focus on irrelevant items, like the visual design of a source's webpage. Tweets, which often contain little more than an icon associated with a source, would seem to make matters even more challenging.

Read the comments on this post
Read More ...
DUST 514 makes contract killers out of EVE Online players

Read the comments on this post
Read More ...
Copyright troll Righthaven's epic blunder: a lawsuit targeting Ars
Why was the case ever brought? It was (cough) a "clerical mistake."

Read the comments on this post
Read More ...
Rumor: voice-controlled, cloud streaming LTE iPhone this fall
So far, it appears that Apple will end up focusing on Mac OS X Lion and updated cloud-based services which are said to integrate with Lion during its annual Worldwide Developers Conference in early June. Apple is also likely to at least give an early sneak peek at iOS 5, which is believed to be slated for a fall release. iOS 5 is planned to integrate with any new Apple cloud services.

Read the comments on this post
Read More ...
How Amazon could loosen Google's iron grip on Android
This could prove to be especially significant right now, because Google's decision to withhold the Android 3.0 source code for the foreseeable future has created a need for Android hardware vendors to pursue more autonomy and insulate themselves from Google's increasingly dictatorial control over the operating system.

Read the comments on this post
Read More ...
Dragon Age 2's gay character controversial with straight, gay gamers
This debate continues to be played out across the Internet, and the biggest takeaway appears to be that it remains incredibly difficult to portray characters that seem both real and human. It's doubly so when they belong to a group that inspires so many strong feelings.

Read the comments on this post
Read More ...
"Don't filter me": ACLU fights schools that block LGBT websites

Read the comments on this post
Read More ...
Amazon beats Apple, Google to music storage, streaming service
According to Amazon, all US-based Amazon customers automatically get 5GB of Cloud Drive space where they can upload their music libraries. The files must be unencrypted AACs or MP3s, and they can be uploaded at their original bit rate. Those who purchase an album from Amazon's MP3 service get the sweetest deal, though—20GB of space—and all new MP3 purchases will be automatically copied to your Cloud Drive without counting against your storage quota (you can still download the MP3s, too).

Read the comments on this post
Read More ...
Blizzard founder sticks up for Activision's Bobby Kotick; we don't
This may be evidence that Kotick isn't the demon we like to portray him as, but it's not surprising that Morhaime is sticking up for him.

Read the comments on this post
Read More ...
No comments:
Post a Comment