What we judge when we judge freemium, and the money we’ve spent on Hearthstone

BagoGames Few people know what to make of the Kim Kardashian: Hollywood mobile game. By reputation it’s boring, vapid, materialistic, and shallow—according to many serious gamers—and is deplorable not least because players can spend money to get ahead. The wails only grew louder when reports indicated that the game earned $1.6 million in its first five days and is on track to make $200 million in annual revenue , according to one analyst. While many gamers and gaming journalists struggled to figure out why anyone would spend money on a game made by and featuring a reality TV star, we aren’t totally in the dark. For one, casting shade on the subject matter is a value judgment of a certain set of interests and lifestyle. And on a meta level,  how people use their leisure time . Let he who has lived every moment deliberately immersed in deep consideration of the universe cast the first Angry Bird. Materialism in games probably does not cause materialism in the streets . For another, Kim K is actually pretty self-aware of its own materialism and glorification of social climbing and has a sense of irony about the world it gives players to try and thrive in. To wit, one of the things you can spend in-game money on is new body parts. Read 25 remaining paragraphs | Comments

See original article:
What we judge when we judge freemium, and the money we’ve spent on Hearthstone

Chip-based credit cards are a decade old; why doesn’t the US rely on them yet?

Ciaran McGuiggan Earlier this week, mobile payments company Square announced that it had developed a credit card reader that will verify purchases from an embedded chip on the card. Currently, US consumers primarily rely on swipe-and-sign credit cards, which give card details to a merchant through the magnetic stripe on the back. But because the swipe-and-sign system became overburdened with instances of fraud, MasterCard, Visa, and other financial groups decided in 2012 that they would transition their systems to a chip-based setup called EMV (eponymous for EuroPay, MasterCard, and Visa, the three primary developers of the standard) by October 2015. Square is hoping to capitalize on this transition by being one of the first companies out of the gate in the US to offer small and medium-sized business owners a smaller, less-expensive alternative to buying a whole new set of credit card terminals. The EMV standard works using a chip that’s embedded in a credit card, which effectively acts as a mini-computer. Instead of swiping quickly and having your card give its details to a merchant’s point of sale (POS) system, an EMV card creates a unique code for each transaction and (ideally) requires the consumer to enter a PIN associated with the card instead of relying on a signature. Because of this, EMV is often called chip-and-PIN. Making a purchase with an EMV card also requires the card to be present in the card reader throughout the transaction. Read 15 remaining paragraphs | Comments

Visit site:
Chip-based credit cards are a decade old; why doesn’t the US rely on them yet?

Podcasting patent troll: We tried to drop lawsuit against Adam Carolla

wasim muklashy Personal Audio LLC is an East Texas shell company that gleaned national attention when it claimed it had the right to demand cash from every podcaster. The company was wielding a patent on “episodic content,” which it said included anyone doing a podcast, as well as many types of online video. Now the company is trying to walk away from its highest-profile lawsuit against comedian Adam Carolla—but Carolla won’t let the case drop. In a statement  released today, Personal Audio says that Carolla, who has raised more than $450,000 from fans to fight the case, is wasting their money on an unnecessary lawsuit. The company, which is a “patent troll” with no business other than lawsuits, has said Carolla just doesn’t care since his fans are paying his lawyers’ bills. Read 12 remaining paragraphs | Comments

See more here:
Podcasting patent troll: We tried to drop lawsuit against Adam Carolla

Chinese military “hacked” Israel’s Iron Dome

Iron Dome The technology behind Iron Dome, the missile defense system Israel has been using since 2011, was allegedly stolen by Chinese military hackers. That claim was made by Cyber Engineering Services   to  Brian Krebs of security news site Krebs On Security , and it identifies Elisra Group, Israel Aerospace Industries (IAI), and Rafael Advanced Defense Systems as the three defense companies that were compromised during the cyber assault. The perpetrators, Cyber Engineering Services says, are the same ones behind a spate of attacks that have come to light in the past few years, all attributed to Unit 61398, a Shanghai-based arm of the Chinese army. The five Chinese military officers indicted by the US earlier this year  for allegedly hacking energy firms in the country also belong to the same unit. The hacks took place from October 2011, some six months after Iron Dome became operational, and continued up until August 2012. Israel Defense Forces (IDF) has said that many hundreds of rockets fired from Gaza, particularly during the current military operation and a series of clashes in 2012, have been scuppered by the system, which is thought to be one of the most effective missile-defense technologies in the world. Read 7 remaining paragraphs | Comments

Read More:
Chinese military “hacked” Israel’s Iron Dome

It’s not just Verizon: All major US carriers throttle “unlimited” data

Verizon Wireless One of the most common reactions to Verizon’s announcement that it will throttle the heaviest users of its “unlimited” 4G plans went something like this: “That’s the last straw, I’m switching to T-Mobile!” Unfortunately, switching to T-Mobile, AT&T, or Sprint won’t protect you from getting throttled, even if the carrier is claiming to sell you “unlimited” data. Let’s take a look at the relevant passages in each carrier’s terms and conditions. We’ll start with the Verizon Wireless announcement last week: Read 15 remaining paragraphs | Comments

Originally posted here:
It’s not just Verizon: All major US carriers throttle “unlimited” data

Model drone finds elderly man, missing for three days, alive

It took just 20 minutes for a model drone to locate a missing elderly Wisconsin man, a feat that helicopters, search dogs, and volunteers couldn’t accomplish in three days. Just don’t tell that to the Federal Aviation Administration, whose regulatory wings are already flapping about model drones. This weekend’s discovery of the 82-year-old man in an area of crops and woods comes amid a legal tussle between flight regulators and model drone operators—the latest of which coincidentally involves search-and-rescue missions. Read 10 remaining paragraphs | Comments

Read More:
Model drone finds elderly man, missing for three days, alive

Robotic glove gives you extra fingers for grabbing

Melanie Gonick / MIT Four fingers and a thumb on each hand is pretty useful. Humans have gone from caves to sprawling cities in part because of our dexterous digits. But researchers at MIT think we could do even better if we had an upgrade. They have developed a glove with two extra robotic fingers that respond intelligently to your movements, allowing you to perform two-handed tasks with just one robot-enhanced hand. “You do not need to command the robot, but simply move your fingers naturally. Then the robotic fingers react and assist your fingers,” said the glove’s creator Harry Asada, of MIT’s Department of Mechanical Engineering . Read 10 remaining paragraphs | Comments

Read more here:
Robotic glove gives you extra fingers for grabbing

Ars editor learns feds have his old IP addresses, full credit card numbers

Jonathan Ryan In May 2014, I reported on my efforts to learn what the feds know about me whenever I enter and exit the country. In particular, I wanted my Passenger Name Records (PNR), data created by airlines, hotels, and cruise ships whenever travel is booked. But instead of providing what I had requested, the United States Customs and Border Protection (CBP) turned over only basic information about my travel going back to 1994. So I appealed—and without explanation , the government recently turned over the actual PNRs I had requested the first time. The 76 new pages of data, covering 2005 through 2013, show that CBP retains massive amounts of data on us when we travel internationally. My own PNRs include not just every mailing address, e-mail, and phone number I’ve ever used; some of them also contain: Read 24 remaining paragraphs | Comments

See the original article here:
Ars editor learns feds have his old IP addresses, full credit card numbers

Quasiparticles carry entanglement to near infinite speeds

crocus08 In a recent experiment, scientists were able to observe quasiparticles propagating across a string of ions, creating waves of quantum entanglement in their wake. Experiments like this one, which study systems with multiple quantum bodies, are crucial to learning about the behavior of quasiparticles and their interactions with more traditional particles. It’s tempting to think that quasiparticles are not particles at all. Quasiparticles are “objects” that emerge within a complex system, such as a solid object. The collective behavior of the particles in the solid can create the impression of a new particle. The impression—or quasiparticle—moves through the solid as if it were a real particle moving through empty space, and it behaves according to the same rules. Nevertheless, within their system, quasiparticles can have real effects on their environment. Most recently, scientists were able to track the propagation of quasiparticles called magnons through a collection of atoms. Now, scientists have been able to watch as that propagation changed the behavior of these atoms. And in the process, the quasiparticles reached speeds where a conventional model, which we use to understand time, breaks down. Read 13 remaining paragraphs | Comments

See more here:
Quasiparticles carry entanglement to near infinite speeds

Why Google took years to address a battery-draining “bug” in Chrome

Aurich Lawson A recent Forbes report  says that Chrome on Windows uses up more battery than competing browsers, thanks to a high system timer setting. Unlike Linux or Mac OS X, Windows uses a timer to schedule tasks. At idle, the timer on Windows is set to about 15 ms, so if it has no work to do, it will go to sleep and only wake up every 15 ms to check if it needs to do something. Applications can change this timer, and other browsers like Firefox and Internet Explorer don’t mess with it until they need to do something processor intensive, like playing a video. After the video is done, the timer is set to return to 15 ms so that the computer can idle again. Chrome, though, boosts the timer to 1 ms and keeps it there forever. The difference means that on Firefox at idle, the CPU only wakes 64 times a second. On Chrome, it wakes up 1,000 times a second. In its Windows documentation, Microsoft notes that setting the system timer to a high value can increase power consumption by “as much as 25 percent.” This means that on a laptop, you’ll get a shorter runtime with Chrome than you will on a competing browser. And the issue has been around for a long time. Forbes links to a bug report documenting the problem that was first filed in 2010. Read 7 remaining paragraphs | Comments

View article:
Why Google took years to address a battery-draining “bug” in Chrome