Nintendo NX Is a Portable Console With Detachable Controllers, Says Report

An anonymous reader writes from a report via Eurogamer.net: We now have a good idea as to what the Nintendo NX will consist of thanks to a new report from Eurogamer. According to a number of sources, Nintendo’s upcoming NX will be a portable, handheld console with detachable controllers. Eurogamer.net reports: “On the move, NX will function as a high-powered handheld console with its own display. So far so normal — but here’s the twist: we’ve heard the screen is bookended by two controller sections on either side, which can be attached or detached as required. Then, when you get home, the system can connect to your TV for gaming on the big screen. A base unit, or dock station, is used to connect the brain of the NX — within the controller — to display on your TV. NX will use game cartridges as its choice of physical media, multiple sources have also told [Eurogamer]. Another source said the system would run on a new operating system from Nintendo. It won’t, contrary to some earlier rumors, simply run on Android. The system will harness Nvidia’s powerful mobile processor Tegra. Graphical comparisons with current consoles are difficult due to the vastly different nature of the device — but once again we’ve heard Nintendo is not chasing graphical parity. Quite the opposite, it is sacrificing power to ensure it can squeeze all of this technology into a handheld, something which also tallies with earlier reports. Finally, we’ve heard from one source that NX planning has recently moved up a gear within Nintendo ahead of the console’s unveiling, which is currently slated for September. After the confused PR fiasco of the Wii U launch, the company is already settling on a simple marketing message for NX — of being able to take your games with you on the go.” Read more of this story at Slashdot.

See original article:
Nintendo NX Is a Portable Console With Detachable Controllers, Says Report

AMD unveils Radeon Pro SSG graphics card with up to 1TB of M.2 flash memory

While graphics cards with more than 8GB of memory might seem like overkill to gamers, those in the creative industries like VFX and 3D modelling can’t get enough of the stuff. After all, VFX studios like MPC often create scenes that require upwards of 64GB per frame to render . The trouble is, even the most capacious graphics card—AMD’s FirePro S9170 server GPU—tops out at 32GB GDDR5, and there are steep cost and design issues with adding more. AMD has come up with another solution. Instead of adding more expensive graphics memory, why not let users add their own in the form of M.2 solid state storage? That’s the pitch behind the all new Radeon Pro SSG (solid state graphics), which was revealed at the Siggraph computer graphics conference on Monday. The Radeon Pro SSG features two PCIe 3.0 M.2 slots for adding up to 1TB of NAND flash, massively increasing the available frame buffer for high-end rendering work. The SSG will cost you, though: beta developer kits go on sale immediately for a cool $9999 (probably £8000+). Read 7 remaining paragraphs | Comments

Read More:
AMD unveils Radeon Pro SSG graphics card with up to 1TB of M.2 flash memory

2,000-year-old toilet paper gives us a whiff of life on the Silk Road in China

Archaeologists scraped fecal bits off these ancient wipe sticks, discovered in a 2,000-year-old latrine at a pit stop along the Silk Road in Dunhuang, China. (credit: Hui-Yuan Yeh) For almost 1,500 years, the many trade routes known today as the Silk Road joined eastern China with western China, India, the Middle East, Europe, and the Swahili Coast of Africa . These trade routes created their own culture, uniting empires and connecting distant civilizations through trade goods like books, textiles, and precious substances. But the most important use for the Silk Road was immigration. Now, a new analysis of 2,000-year-old toilet wipes found near Dunhuang in western China has revealed that these immigrants traveled vast distances on roads maintained by the Han in 100 CE. Unfortunately, these wanderers brought their diseases with them. In a new paper published this week in the Journal of Archaeological Science: Reports , a group of archaeologists in China and England describe how they found preserved fecal matter on wipe sticks used in a latrine at the Silk Road’s Xuanquanzhi rest stop. Archaeologists excavated the rest stop roughly 20 years ago and discovered that it was one of many such oases maintained by the Han government during the early centuries of the Silk Road. Weary travelers with the right documents could stop there to refresh themselves and their pack animals. They could also, apparently, use the bathrooms. What made the Xuanquanzhi rest stop special was its location near the deadly hot Taklamakan Desert. The arid region has preserved countless treasures from the heyday of the Silk Road, including a bundle of sticks wrapped in rags near the Xuanquanzhi latrines. While analyzing a collection of excavated goods from Xuanquanzhi, a group of archaeologists realized that these were no ordinary sticks. “These have been described in ancient Chinese texts of the period as a personal hygiene tool for wiping the anus after going to the toilet. Some of the cloth had a dark solid material still adhered to it after all this time,” Cambridge  anthropologist Piers Mitchell wrote . Read 6 remaining paragraphs | Comments

Visit link:
2,000-year-old toilet paper gives us a whiff of life on the Silk Road in China

Apple’s Touch ID blocks feds—armed with warrant—from unlocking iPhone

Accused Dallas pimp Martavious Banks Keys was ordered by a federal judge to unlock his iPhone with his fingerprint. (credit: Facebook via The Dallas Morning News ) A Dallas, Texas man accused of prostituting underage girls was secretly ordered by a federal judge to unlock his iPhone using his fingerprint, according to federal court documents that are now unsealed. It’s rare that we  see  a case demanding that a phone be unlocked in that manner, but we should expect more as the mainstream public begins embracing fingerprint technology. Ever since 2013, when Apple popularized this form of unlocking technology, legal experts have predicted that these types of government demands would slowly become more common. Experts also warned these demands are probably not a breach of the Fifth Amendment right against compelled self-incrimination. As an aside, some courts don’t necessarily think that compelling a suspect to reveal their computer passcode is a constitutional violation. A Philadelphia man accused of possessing child pornography has been behind bars on a contempt charge for more than seven months for refusing to divulge his password.  The man’s attorney claims it’s a constitutional violation to compel his client to assist the authorities with their prosecution. A federal appeals court has tentatively agreed to hear the case in September as the suspect (who has not been charged with a crime) remains in prison. Read 11 remaining paragraphs | Comments

Read the article:
Apple’s Touch ID blocks feds—armed with warrant—from unlocking iPhone

The quest to get a unique SNES CD-ROM prototype working again

Part 1 of Ben Heck’s SNES-CD restoration project (part 2 at the bottom of this post). Since a prototype of the fabled, unreleased SNES-CD (aka the “Nintendo PlayStation”) was first found and disassembled last year, we’ve learned enough about this one-of-a-kind piece of hardware to actually emulate homebrew games as if they were running on its CD-ROM drive. The prototype console itself, though, has never been fully functional—it couldn’t generate sound, the CD-ROM drive wouldn’t spin up, and, after a recent trip to Hong Kong, it actually stopped generating a picture. That’s when the prototype’s owners, Terry and Dan Diebold, went to famed gaming hardware hacker Ben Heck . They want this piece of gaming history up and running again. Heck documented his efforts in a fascinating two-part YouTube series that reveals a lot about the system and what makes it tick. Terry Diebold starts off talking about how he first discovered the prototype SNES while boxing up an estate sale, where it was sold in a lot alongside CDs, cups, saucers, and other knickknacks. After paying $75 for the entire lot, Diebold recalls, “if you break it down to everything I did buy, I probably paid a nickel for it.” Read 6 remaining paragraphs | Comments

Continue Reading:
The quest to get a unique SNES CD-ROM prototype working again

Hacker Steals 1.6 Million Accounts From Top Mobile Game’s Forum

Zack Whittaker, reporting for ZDNet: A hacker has targeted the official forum of popular mobile game “Clash of Kings, ” making off with close to 1.6 million accounts. The hack was carried out on July 14 by a hacker, who wants to remain nameless, and a copy of the leaked database was provided to breach notification site LeakedSource.com, which allows users to search their usernames and email addresses in a wealth of stolen and hacked data. In a sample given to ZDNet, the database contains (among other things) usernames, email addresses, IP addresses (which can often determine the user’s location), device identifiers, as well as Facebook data and access tokens (if the user signed in with their social account). Passwords stored in the database are hashed and salted. LeakedSource has now added the total 1, 597, 717 stolen records to its systems. Read more of this story at Slashdot.

Continue Reading:
Hacker Steals 1.6 Million Accounts From Top Mobile Game’s Forum

Malicious computers caught snooping on Tor-anonymized Dark Web sites

Enlarge / A map of hidden services directories detected as malicious. The trust of the Tor anonymity network is in many cases only as strong as the individual volunteers whose computers form its building blocks. On Friday, researchers said they found at least 110 such machines actively snooping on Dark Web sites that use Tor to mask their operators’ identities. All of the 110 malicious relays were designated as hidden services directories, which store information that end users need to reach the “.onion” addresses that rely on Tor for anonymity. Over a 72-day period that started on February 12, computer scientists at Northeastern University tracked the rogue machines using honeypot .onion addresses they dubbed “honions.” The honions operated like normal hidden services, but their addresses were kept confidential. By tracking the traffic sent to the honions, the researchers were able to identify directories that were behaving in a manner that’s well outside of Tor rules. “Such snooping allows [the malicious directories] to index the hidden services, also visit them, and attack them,” Guevara Noubir, a professor in Northeastern University’s College of Computer and Information Science, wrote in an e-mail. “Some of them tried to attack the hidden services (websites using hidden services) through a variety of means including SQL Injection , Cross-Site Scripting (XSS) , user enumeration, server load/performance, etc.” Read 7 remaining paragraphs | Comments

Visit link:
Malicious computers caught snooping on Tor-anonymized Dark Web sites

Verizon creates monthly “maintenance” fee for customers with old routers

The Verizon FiOS Quantum Gateway (no maintenance fee required). (credit: Verizon) Verizon FiOS customers using one of the company’s older routers are being told they must pay a new monthly “maintenance charge” of $2.80 to cover the cost of supporting the apparently outdated equipment. Customers also have the option of buying one of the company’s newer routers, though some report being able to convince Verizon to give them a new one for free. “Our records indicate that you have an older model router that is being discontinued,” says an e-mail to customers published today by DSLReports . “If you do plan to keep using your current router, we will begin billing, on 9.29.16, a monthly Router Maintenance Charge of $2.80 (plus taxes), to ensure we deliver the best support.” Verizon confirmed the change to DSLReports, saying that the notice was sent to customers using the BHR1 and BHR2 routers. “Many of these routers have been in use for nearly ten years and have required more frequent repairs, so we’re trying to reduce that maintenance load and expense,” Verizon said. Read 5 remaining paragraphs | Comments

See the article here:
Verizon creates monthly “maintenance” fee for customers with old routers

Rare US version of the N64’s disc-drive add-on unearthed near Seattle

Jason Lindsey That’s quite the find! 6 more images in gallery Nintendo has launched a few pieces of hardware in Japan that never made their way to the West, including the backlit Game Boy Light and the Satellaview online attachment for the Super Famicom. But the best-known of Nintendo’s Japan-only hardware has to be the 64DD—as in, the disk-drive attachment for the Nintendo 64 that landed with a whopping thud in Japan in 1999. Though Nintendo of America had originally hinted at the add-on launching in the United States, that never happened, even though the company had once reached out to Western developers about making software for the system—and taking advantage of its disks’ maximum 38MB of rewritable memory (which was huge compared to the N64’s 32KB memory cards). But that doesn’t mean an American 64DD  never existed. A game-console collector announced on Tuesday that he had discovered an English-language version of the 64DD hardware—and based on insider Nintendo knowledge, this is almost certainly a retail prototype, as opposed to a dev kit. Former Sierra game developer Jason Lindsey took to the Assembler Games forums this week—where you’ll find no shortage of classic and rare gaming topics —to show off his latest acquisition. Lindsey told the forum that he had purchased a “prototype for the US version of the 64DD.” His attached photos include two screens of the 64DD’s boot-up sequence, which normally contains kanji characters asking players to insert a disk; his unit, however, offers those instructions in English. Read 5 remaining paragraphs | Comments

Read this article:
Rare US version of the N64’s disc-drive add-on unearthed near Seattle

Building a Windows 98 Gaming PC in 2016 Is a Pain in the Ass

1998 was such a good year for PC gaming. Half-Life , Grim Fandango , Baldur’s Gate, Star Craft , Rogue Squadron , and many, many more. Dang. Those looking to relive the glory days could easily run most of these games through a virtual machine, but YouTuber nine took it a step (or several) further and built a period-accurate 1998 gaming rig. Read more…

Follow this link:
Building a Windows 98 Gaming PC in 2016 Is a Pain in the Ass