|The steps that computer gaming has taken visually in only 10 short years are nothing short of amazing, and in the next 10 years we will see games which make today’s high-resolution titles look like the original “Super Mario Bros.,” or perhaps even “Pong.”
Chris Buecheler, Character: The Next Great Gaming Frontier?
Not content with burned-in lighting, developers have moved to ray-tracing technology, coupled with advanced texturing techniques like bump and normal mapping in order to simulate depth. Not satisfied with simple animation, complex shader code has been written to simulate the movement, reflection and refraction of light on various materials.
I think Chris’ article is right on the money. Literally. When it comes to virtual worlds, especially B2B virtual trade shows (VTS), we are really just at the Pong stage.
|“Heuristics are commonly used in computer science to find an optimal solution to a problem when there is not a single ‘right answer’. If you can’t analyze mathematically exactly what you should do…then you end up with heuristics.”
Professor Nick Jennings as quoted in Computer ‘agents’ take to the Web
The BBC reports that “Negotiation Ninjas” will be tested on a shopping website called Aroxo. The agents will use heuristics ( a simple set of rules) based on information provided by the seller and the buyer.
Guess we need to add definitions for Bokode and QR code.
A QR code (quick response code) is a two-dimensional bar code. In Japan, QR codes have become more popular than barcodes. A typical barcode can hold a maximum of 20 digits. A QR code can hold up to 7,089 characters. How? Well, barcodes can only span horizontally. QR codes can span horizontally and vertically.
Bokodes take the concept a step further.
According to Quinn Smithwick at MIT, the current version of bokode tech uses a 2D data matrix with Reed Solomon error correction and can hold megabits of information. Bokodes are going to be perfect for augmented reality.
Imagine going to the opera and looking through your cell phone’s camera at a specific character on stage. Now imagine that character has a bokode beauty mark on her face and when you aim your camera at her face, you can not only find out who that character is, but you can read an entire snyopsis that tells you all about the character and how she fits into the plot. You can even get a bio of the person playing her.
Now imagine doing the same thing when you’re shopping. There might be a bokode on the store’s welcome sign, telling you what’s on sale. There might be a bokode on the sales tag for the jacket you’re looking at, telling you through your camera’s viewfinder what the jacket is made of, where it was made, how much it costs and how to clean it. In the shoe department, that bokode on the bottom of the shoe you want to try on will tell you if the store has it available in your size.
Will all that hoo-ha about RFID tags on consumer goods being too intrusive will fade away? From what I’m learning about bokodes, the answer just might be “yes.”
[kml_flashembed movie="http://www.youtube.com/v/wG7vXI1I1wg" width="425" height="350" wmode="transparent" /]
Preamble is still used in the very same way – the information at the head of a transmission contains information about the message that follows. If you examine a transmission of data on a garden-variety Ethernet network, you will find that each packet of data has a preamble with a unique number and address, among other things.
|“Just because you’ve got the best hammer in the entire world doesn’t make everything a nail. If you’ve got a screw, even a cheap, old, rusty screwdriver is going to do a better job. And MapReduce is a lot better than a cheap, old, rusty screwdriver.”
Mark C. Chu-Carroll, Databases are hammers; MapReduce is a screwdriver
RDBs are absolutely brilliant things. They’re amazing tools, which can be used to build amazing software. I’ve done a lot of work using RDBs, and without them, I wouldn’t have been able to do some of the work that I’m proudest of. I don’t want to cut down RDBs at all: they’re truly great. But not everything is a relational database, and not everything is naturally suited towards being treated as if it were relational. The criticisms of MapReduce all come down to: “But it’s not the way relational databases would do it!” – without every realizing that that’s the point. RDBs don’t parallelize very well: how many RDBs do you know that can efficiently split a task among 1,000 cheap computers? RDBs don’t handle non-tabular data well: RDBs are notorious for doing a poor job on recursive data structures. MapReduce isn’t intended to replace relational databases: it’s intended to provide a lightweight way of programming things so that they can run fast by running in parallel on a lot of machines. That’s all it was intended to do.
|“It’s perfectly legal to rip music from a CD and upload it onto an iPod for personal use; why can’t a person do the same with their own copies of movies?”
Brennon Slattery, Why Pick on RealDVD?
It’s sad that RealDVD, with its sophisticated and lawful approach to DVD-copying, had to swallow the wrath of the MPAA. It’s also clear that the DMCA [Digital Millenium Copyright Act of 1998] needs to be updated to reflect the changes in media distribution 11 years later.
|“…If I were to release a piece of software under the MIT License, and then give you a copy, you would be free to modify, sell, and build upon my creation so long as you leave the notice that I was the source of the original work in your adaptation. Licenses like the MIT License and Creative Commons licenses enable me to hold credit for my work while still giving my consumers some freedoms.”
Winslow Dalpe, Why Go Open Source?
Today’s WhatIs.com Word of the Day is MIT license.
||“The two biggest differences between the CDMA and GSM standards are international compatibility and how the networks handle activating phones.”
Adama D. Brown, Brighthand FAQ: What’s the difference between CDMA and GSM?
Outside the U.S. and Canada, most GSM phones will still work, while almost all CDMA phones simply can’t be used overseas.
CDMA phones are activated remotely, by the carrier, using the phone’s serial number, known as the ESN. Since each carrier has a database of all the ESNs that are approved for its network, this lets most CDMA carriers refuse to activate phones not originally intended for their network.
GSM phones are activated differently. Each account is associated with what’s called a SIM card, or Subscriber Identity Module. This card, about the size of a fingertip and the thickness of a piece of paperboard, carries an encrypted version of all the information needed to identify your wireless account to the network. You slip it into the appropriate slot on a GSM phone (usually under the battery) and that phone is ready to use.
|Pushing fiber close to the customer is generically called “deep fiber,” and various acronyms are used to indicate just how deep the fiber is. FTTH means “fiber to the home,” which is the extreme of giving every user an optical-electrical termination. FTTC takes “fiber to the curb,” serving a group of homes, while FTTN means “fiber to the node” or “neighborhood.”
Tom Nolle, Fiber-optic networks: Access network design