How dynamic resolution scaling keeps Halo 5 running so smoothly

Digital Foundry’s analysis shows how occasional resolution drops keep Halo 5 running at 60fps. Over the years, gamers have gotten used to highly detailed games that drop frames and get distractingly choppy when the action gets too intense (a deep pain I’ve personally been suffering through since at least  Gradius III on the SNES ). Now it seems some developers are toying with the idea of dropping a few pixels of resolution in those cases in order to keep the frame rate silky smooth. The technique is called dynamic resolution scaling, and a recent analysis by Digital Foundry goes into some detail about how it works in Halo 5: Guardians . Basically, the developers at 343 have prioritized hitting 60fps consistently through the entire game, a big boon for a twitchy first-person shooter (and a first for the Halo series). The level of graphical detail in some game scenes, though, means that such a high frame rate can only be delivered at resolutions well below the Xbox One’s highest 1080p standard. Instead of just statically setting a low resolution ceiling for the entire game, though, Halo 5 dynamically changes the resolution based on the detail of the current in-game scene. This on-the-fly adjustment takes place on both the X and Y axes, with resolutions jumping from as low as 1152×810 to as high as 1536×1080 in Digital Foundry’s analysis. The apparent on-the-fly change in resolution wasn’t even noticeable to my eye during some recent testing. Read 5 remaining paragraphs | Comments

Original post:
How dynamic resolution scaling keeps Halo 5 running so smoothly

US regulators grant DMCA exemption legalizing vehicle software tinkering

(credit: Jerk Alert Productions ) Every three years, the Librarian of Congress issues new rules on Digital Millennium Copyright Act exemptions. Acting Librarian David Mao, in an order (PDF) released Thursday, authorized the public to tinker with software in vehicles for “good faith security research” and for “lawful modification.” The decision comes in the wake of the Volkswagen scandal, in which the German automaker baked bogus code into its software that enabled the automaker’s diesel vehicles to reduce pollutants below acceptable levels during emissions tests. “I am glad they granted these exemptions,” Sherwin Siy, said vice president for legal affairs for Public Knowledge in Washington, DC. “I am not glad it was necessary for them to do so in the first place.” Read 2 remaining paragraphs | Comments

Read More:
US regulators grant DMCA exemption legalizing vehicle software tinkering

First ever online-only NFL game draws over 15 million viewers

(credit: Jaguars.com ) Over the weekend, the NFL and Yahoo streamed the first ever online-only NFL game , a Bills/Jaguars matchup in London. The game was mostly seen as an experiment for the NFL to test the viability of online distribution for a football game. Yahoo seems happy with the turnout, trumpeting 15.2 million unique viewers and 33.6 million total views for the game. The site also claims 33 percent of the streams came from international users. As Deadspin notes, the numbers were seriously pumped up by Yahoo thanks to auto-playing streams on the Yahoo and Tumblr homepages. Anyone who visited either high-traffic homepage counted as a viewer for the game. Still, Yahoo notes that “460 million total minutes” of the game were streamed, which means that each of the 15.2 million viewers hung around for an average of 30 minutes. When the Yahoo/NFL deal was announced, a CNN Money report said that Yahoo paid “at least $10 million” for the rights to the game. The game was available for free online, supported only by advertising. Yahoo promised advertisers 3.5 million viewers in the United States, so things seem to have gone better than expected. Read 4 remaining paragraphs | Comments

See the original article here:
First ever online-only NFL game draws over 15 million viewers

Joomla bug puts millions of websites at risk of remote takeover hacks

Enlarge / Here’s the control panel hackers can access by exploiting a just-patched Joomla vulnerability. (credit: Spiderlabs) Millions of websites used in e-commerce and other sensitive industries are vulnerable to remote take-over hacks made possible by a critical vulnerability that has affected the Joomla content management system for almost two years. The SQL-injection vulnerability was patched by Joomla on Thursday with the release of version 3.4.5 . The vulnerability, which allows attackers to execute malicious code on servers running Joomla, was first introduced in version 3.2 released in early November 2013. Joomla is used by an estimated 2.8 million websites. “Because the vulnerability is found in a core module that doesn’t require any extensions, all websites that use Joomla versions 3.2 and above are vulnerable,” Asaf Orpani, a researcher inside Trustwave’s Spiderlabs, wrote in a blog post  (the post appears to be offline at the moment, but it was working through most of Friday morning). The vulnerability, and two closely related security flaws, have been cataloged as CVE-2015-7297, CVE-2015-7857, and CVE-2015-7858. Read 4 remaining paragraphs | Comments

Original post:
Joomla bug puts millions of websites at risk of remote takeover hacks

iOS 9.1 release lays groundwork for upcoming Apple TV and iPad Pro

The upcoming iPad Pro will require iOS 9.1 (credit: Andrew Cunningham) Apple has just released iOS 9.1, the first major update to iOS 9 and the third update overall since the OS came out in September. It’s available as an over-the-air download or through iTunes for everything that supports iOS 9: the iPhone 4S or newer, the iPad 2 or newer, all flavors of the iPad Mini, and the fifth- and sixth-generation iPod Touches. The change you’ll notice the most if you do a bunch of texting is that Apple has implemented a bunch of new emoji, mostly from the Unicode 7.0 and 8.0 specs but with a few from earlier specifications mixed in. Tacos, burritos, and extended middle fingers are just a few of the additions you’ll find to the emoji keyboard, which needs a decent search function now more than ever. iOS 9.1 also lays the groundwork for some other iOS devices that are launching soon. One is the new Apple TV, which ships with the iOS-based “tvOS.” The other is the iPad Pro, which brings with it support for the Apple Pencil and its Smart Keyboard cover. The Apple TV ships next week , while the iPad Pro is due sometime in November. Read 2 remaining paragraphs | Comments

Read the article:
iOS 9.1 release lays groundwork for upcoming Apple TV and iPad Pro

Marijuana exposure in utero has lifelong consequences

A newborn mouse. (credit: Credit: Wikimedia Commons ) As marijuana is legalized in more states, questions about its safety and the health consequences of cannabis use are becoming mainstream. A new study published in PNAS finds that use of cannabis by pregnant women can have implications for the neural development of her child, and that some of the consequences continue into adulthood, So, like alcohol, another recreational drug that is legal in the US, marijuana is likely best avoided by pregnant women. The most prominent active ingredient in marijuana is a compound known as THC, which interacts with the naturally occurring cannabinoid receptors in the nervous system. Cannabinoid receptors are known to play an important role in the regulation of brain development, and this paper examines the influence of a prenatal THC exposure on the maturation of pathways regulated by these receptors. The study examined prenatal cannabis consumption in mice, with the aim of identifying the mechanisms responsible for cannabis-related changes in brain function. During the study, pregnant mice were exposed to daily injections of THC or injections of a control liquid. Then the offspring were run through a battery of behavioral tests. The animals’ brains were also examined closely using immunoflouresence and confocal microscopy. Embryonic brain tissue from some litters was also collected and checked for irregularities. Read 5 remaining paragraphs | Comments

View original post here:
Marijuana exposure in utero has lifelong consequences

Cage against the EMP: New composite cases protect against the electro-apocalypse

A Faraday Cases travel case, configured to keep communications gear safe in transit from unfriendly electromagnetism. 2 more images in gallery WASHINGTON, DC—A small company from Utah has developed a composite material that combines carbon fibers with a nickel coating. The result is an extremely lightweight electric-conducting material with the properties of plastic. And now that material is being used to create cases and computer enclosures that are essentially lightweight Faraday cages—containing electromagnetic radiation from digital devices and shielding them from electronic eavesdropping or electromagnetic pulse attacks. Ars got a brief hands-on with some of the materials at the Association of the United States Army expo this week. The company, Conductive Composites , is now selling cases built with the Nickel Chemical Vapor Deposition (NiCVD) composite material through its Faraday Cases division . The cases range in size from suitcase-sized units for carrying smaller digital devices to wheeled portable enclosures that can house servers—providing what is essentially an EMP-shielded portable data center. The cases and enclosures are being marketed not just to the military but to consumers, corporations, and first responders as well. The materials used in Faraday Cases can also be used to create ultra-lightweight antennas, satellite communications reflector dishes, and hundreds of other things that currently need to be made with conductive metal. And they could be a boon to anyone trying to prevent electronic eavesdropping—be it through active wireless bugs, radio retroreflectors used by nation-state intelligence agencies, or passive surveillance through anything from Wi-FI hacking to electromagnetic signals leaking from computer cables and monitors. And in some cases, they could make it possible to create the kind of secure spaces used by government agencies to prevent eavesdropping nearly anywhere. Read 9 remaining paragraphs | Comments

View article:
Cage against the EMP: New composite cases protect against the electro-apocalypse

University of Cambridge study finds 87% of Android devices are insecure

The study’s estimate of the proportion of known “insecure,” “maybe secure” and “secure” devices over time. (credit: androidvulnerabilities.org ) It’s easy to see that the Android ecosystem currently has a rather lax policy toward security, but a recent study from the University of Cambridge put some hard numbers to Android’s security failings. The conclusion finds that “on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities.” Data for the study was collected through the group’s ” Device Analyzer ” app, which has been available for free on the Play Store since May 2011. After the participants opted into the survey, the University says it collected daily Android version and build number information from over 20,400 devices. The study then compared this version information against 13 critical vulnerabilities (including the Stagefright vulnerabilities ) dating back to 2010. Each individual device was then labeled “secure” or “insecure” based on whether or not its OS version was patched against these vulnerabilities, or placed in a special “maybe secure” category if it could have gotten a specialized, backported fix. As for why so many Android devices are insecure, the study found that most of the blame sits with OEMs. The group states that “the bottleneck for the delivery of updates in the Android ecosystem rests with the manufacturers, who fail to provide updates to fix critical vulnerabilities.” Along with the study, the University of Cambridge is launching ” AndroidVulnerabilities.org ,” a site that houses this data and grades OEMs based on their security record. The group came up with a 1-10 security rating for OEMs that it calls the “FUM” score. This algorithm takes into account the number of days a proportion of running devices has no known vulnerabilities ( F ree), the proportion of devices that run the latest version of Android ( U pdate), and the mean number of vulnerabilities not fixed on any device the company sells ( M ean). The study found that Google’s Nexus devices were the most secure out there, with a FUM score of 5.2 out of 10. Surprisingly, LG was next with 4.0, followed by Motorola, Samsung, Sony, and HTC, respectively. Read 3 remaining paragraphs | Comments

Read the article:
University of Cambridge study finds 87% of Android devices are insecure

Webflow’s “first visual CMS” is like WordPress mixed with Photoshop

A demo video showing off Webflow CMS. Web design tools like Webflow have done a lot to thin the line between designers and developers. Now, however, the birthed-by-Y-Combinator startup wants to take it further with what it describes as the world’s first visual content management system (CMS). There’s not much to it right now. In a nutshell, Webflow CMS is a barebones WordPress installation jammed into a Photoshop-like interface. The idea here is to provide a way to create “completely custom websites powered by dynamic content” without any knowledge of HTML, CSS, PHP, or databases. And to an extent, it works. The Webflow CMS allows users to create or use pre-existing “Collections”—templates for dynamic content types. From there, you can then determine the kind of fields associated with the Collection, such as whether they’re mandatory to be completed, if they’re to be linked to another Collection, and what kind of minimum word counts are to be expected. These criteria are universal for any instance of the Collection. All Blog Posts, for example, will draw from the parent Blog Posts Collection. Read 4 remaining paragraphs | Comments

Continue reading here:
Webflow’s “first visual CMS” is like WordPress mixed with Photoshop

iOS 9’s space-saving “app slicing” disabled for now, will return in future update

Enlarge / Apple’s sample universal binary here is just 60 percent of its original size when downloaded to an iPad or iPhone. (credit: Andrew Cunningham) Back in June, we wrote a bit about App Thinning , a collection of iOS 9 features that are supposed to make iOS 9 apps take up less space on iDevices. Apple has just announced to developers that one of those features, “app slicing,” is not available in current iOS 9 versions due to an iCloud bug. It will be re-enabled in a future iOS update after the bug has been resolved. App slicing ensures that your iDevice only downloads the app assets it needs to work. In older versions of iOS, all devices downloaded “universal” versions of apps that included all of the assets those apps needed to work on each and every targeted iDevice. If you downloaded an app to your iPhone 5, for example, it could include larger image assets made for the larger-screened iPhones 6 and 6 Plus, 64-bit code that its 32-bit processor couldn’t use, and Metal graphics code that its GPU didn’t support. That’s all wasted space, a problem app slicing was designed to resolve. Apple says the iCloud bug affects users who are restoring backups to new devices—if you moved from that iPhone 5 to a new iPhone 6S, for example, iCloud would restore iPhone 5-compatible versions of some apps without the assets required by the newer, larger device. Read 1 remaining paragraphs | Comments

View post:
iOS 9’s space-saving “app slicing” disabled for now, will return in future update