Christopher Butler has taken to Kickstarter to fund his own version of Half-Life 3, as "Valve seems set on not re-creating a Half-Life 3" but then he adds that he and his fellow developers are "looking to steal the market for this ourselves".
Butler was asking for just $2500 or so for the development of the game, as he has "a small team of 6 people including myself". Butler said on the Kickstarter page for Half-Life 3 that "we all have our own funds in order to keep ourselves paid for the duration of the project, the main ask for pledges is literally just to keep up to date with the latest software and maintenance in a project such as this".
Butler claimed to have worked for both EA and Valve in the last ten years, admitting that he hadn't approached Valve about making the game. He added that he hoped to have a playable alpha build of the game for backers to play within 10 months. Butler was quick to pull the project from Kickstarter, with it now all but gone.
IBM thinks that the days of silicon are numbered, as it spends $3 billion over the next five years on finding ways to create the future generations of microprocessors. Senior VP of IBM Systems & Technology Group, Tom Rosamilia, says: "We really do see the clock ticking on silicon".
Right now, IBM's very latest silicon components are baked onto a 22nm process, but the company is looking five years into the future where parts will become so small that it will be hard to maintain a reliable on and off state. Rosamilia adds: "As we get into the 7 nanometer timeframe, things really begin to taper off".
This has IBM looking at new ways of making components work, funding this new set of research. The company has faith in an alternative to silicon, something known as carbon nanotubes. The concept of this technology still needs considerable work if it hopes to see the fabrication of carbon nanotube-based processors as an alternative to silicon. Another route that IBM could go into is silicon nanophotonics, which uses light instead of electrical signals to blast data around the chip.
It looks like Edward Snowden might not be the only NSA whistleblower according to Glenn Greenwald, with the tease coming from Greenwald who tweeted over the weekend that the fact of a second US whistleblower "seems clear at this point".
Greenwald believes there is a second US whistleblower that is leaking information about the NSA to media around the world. Greenwald added: "The lack of sourcing to Snowden on this & that last article seems petty telling". The tweet was made after a German site published an analysis of the NSA's XKEYSCORE code, which doesn't seem to have some from Snowden.
It was only after this that speculation of a second US whistleblower began, with experts agreeing that it looks like Snowden isn't alone. ARD, a German public broadcaster, said in a report last week that the NSA is using its XKEYSCORE program to track Internet users who search the web on how to stay hidden when on the Internet. Greenwald added: "I've long thought one of the most significant and enduring consequences of Snowden's successful whistleblowing will be that he will inspire other leakers to come forward".
The rise in cyberattacks and digital threats forced business leaders to pay closer attention, and that means more job opportunities. More than half of CEOs will include some type of "digital" leader by the end of 2015, according to research firm Gartner. Moving ahead, one-third of large organizations participating in digital business will have some type of "digital risk" officer.
It's a complicated time with cybercriminals finding great success compromising companies, stealing employee and customer personal data. IT security teams are suffering while trying to keep information secure, the digital risk officers will be tasked with being business savvy and have appropriate knowledge on how to address digital risk issues.
"Digital risk officers will require a mix of business acumen and understanding with sufficient technical knowledge to assess and make recommendations for appropriately addressing digital business risk," said Paul Proctor, Gartner VP and distinguished analyst. "Many traditional security officers will change their titles to digital risk and security officers, but without material change in their scope, mandate, and skills they will not fulfill this role in its entirety."
Microsoft hasn't even had its Xbox One on the market for over 12 months yet, but that shouldn't stop you from thinking the company isn't thinking ahead for its true, proper next-gen console. The company is looking for a new Industrial Designer for its Xbox team.
The company has posted an ad looking for a new Industrial Designer, with their responsibility being: "The Xbox Industrial Design studio is building a world class in house team. We love entertainment. We live for building transformative entertainment experiences that resonate with consumers. We are looking for passionate designers who want to help us create next generation entertainment hardware for Microsoft".
I think we're going to see a new console from Microsoft much quicker than previously thought, something I hope replaces the Xbox One as a proper next-gen console capable of at a bare minimum, 4K at 60FPS. This will pave the way for Microsoft to allow VR headsets like the Oculus Rift to work with it, as VR requires serious horsepower. The Xbox One has seen most of its games rendered at 720p, with most of the frame rates on 'next-gen' games locked at, or around 30FPS. This isn't really any better than the Xbox 360, and if the Xbox One is going to be here for another five years or so, it's simply not good enough.
Potential smartphone addiction mixed with emotional problems can make gambling and other addictions even harder to treat, according to researchers. Smartphones are blamed as part of underlying problems, and have been linked to driving addictions "faster and with more intensity," according to Morningside Recovery executive director Joel Edwards.
The use of smartphones provide accessibility, affordability and anonymity - known as the three A's - and is an easy way to arrange the sale or purchase of illicit narcotics. In addition to drug problems, smartphones are linked to gaming, social networking, and pornography problems, with instant access to any type of vice.
"They may be addicted to sexual content on their phone or gaming on their phone in the same way that people are addicted to gambling rather than casinos," said Larry Rosen, California State at Dominguez Hills psychology professor. "There is no treatment for cellphone addiction or Internet addiction."
Chinese hackers successfully breached a U.S. government network that includes personal data of federal employees and their security clearance applications. The incident took place in March and specifically targeted the Office of Personnel Management, and files included everything from financial data to medical records and other sensitive information.
It's troublesome how easily foreign hackers are able to breach networks, especially when they contain personal data. An unnamed Department of Homeland Security (DHS) official didn't announce that type of data was taken in the breach, but confirmed a security issue did occur.
"The administration has never advocated that all intrusions be made public," said Caitlin Hayden, Obama Administration spokesperson. "We have advocated that business that have suffered an intrusion notify customers if the intruder had access to consumers' personal information. We have also advocated that companies and agencies voluntarily share information about intrusions."
Two people with alleged ties to the Lecpetex botnet, compromising more than 250,000 computers to help mine for bitcoins, were arrested. Lecpetex brought infected PCs into the growing botnet, and compromised machines tried to infect machines using No. 1 social media website Facebook.
Facebook officials contacted Greek police and were able to identify multiple suspects allegedly involved in running the botnet.
"Late last year, our abuse-fighting teams started to see a distinct new botnet," Facebook said in a blog post. "Based on statistics released by the Greek Police, the botnet may have infected as many as 250,000 computers. In addition, the Lecpetex authors appeared to have a good understanding of anti-virus evasion because they made continuous changes to their malware to avoid detection."
The issues related to cybersecurity among utilities companies has a unique twist that sounds like something from a hacker movie made in Hollywood. A cyberattack to compromise a utility provider and demand cash ransom in exchange for access to the networks is possible if security measures aren't improved, according to Dr. Larry Ponemon, Ponemon Institute founder.
Ransomware attacks, made up of custom malware designed to encrypt files and interrupt business operations, is a successful technique that hackers from Eastern Europe and China have deployed. If altered to breach utility networks, the same type of attack might be extremely effective.
"With the increased convergence of cyber and physical world's, attacks are no longer limited to office computers and networks," said Steve Durbin, International Security Forum Managing Director, in a statement. "They can now have physical impact in the real-world."
A new teaser for the latest "Hunger Games" movie was recently released - showing a video broadcast of President Snow, however, it's hacked and the "pirate transmission from District 13," with Beetee proclaiming the Mockingjay lives. The film will be released later this year.
Part 1 is expected to be a platform to help set up most of the action in Part 2, as extending books into multiple movies has become more common in recent years. Although "Mockingjay" is the least bloody book in the series written by Suzanne Collins, it will be curious to see what happens on the big screen.