GTA fans might have something to look forward to in November if a recent rumor turns out to be true. According to UK retailer Gameseek, the next installment in the Grand Theft Auto series will be hitting the streets on November 7th 2014. This is not that far off and ties in with a few other items that have been floating around about the game.
There is a rumor that is claiming AMD will not have a new desktop processor until 2016 that has been making the rounds today. The claim is that AMD is shifting their current focus to mobile CPUs and APUs. Originally it was thought that Carrizo would be the next chip offering that that it would keep up with Intel by offering support for DDR4.
The long rumored acquisition of game-streaming service Twitch by Ad-Giant Google has finally been confirmed, in what is looking to be a $1Billion deal. The original rumor surfaced back in May of this year when an article appeared in Variety. There were rumors that Microsoft and even Facebook were also looking into a purchase.
Why do the really great game development companies seem to disappear? If you have been around for a while you might remember a game development company by the name of Looking Glass Studios. This company is responsible for titles like Thief: the Dark Project, Thief II: The Metal Age and System Shock 1 and 2. These games were amazing for their time (and still are today) with concepts that brought about a new thought process in what a first person game could be.
A couple of days ago we posted a story about a group of developers that complained to Valve about their lack of a Bug Bounty. In their complaint was an inference that having a form of reward would make people want to identify and report bugs and exploits in a timely manner. On the surface that would seem to make sense, but there is a flip side to this line of thinking. There will also be times when people will wait to report something to ensure they get the most money out of their efforts.
The TOR Project has been the go-to group when it comes to anonymity. This group and their TOR browser bundle are used by millions of people daily and not just to surf for illegal items or porn. In many cases the use of TOR allows dissidents in countries with oppressive governments to maintain connections to the outside world and also communicate. In areas like China TOR and their obfuscator project allow free access to the internet despite the great firewall of China.
One of the items we have always beat AMD up on is there poor memory performance in their CPUs and APUs. This little issue is what has separated AMD from Intel since the AM2 days. It has always been understood that latency has a massive impact on an internal memory controller. As you latency increases your efficiency decreases. You can offset some of this by enlarging your cache and also optimizing the CPU to use it more efficiently. This is one area that AMD has traditionally had issues with, even going back to the Athlon 64 we saw them reducing cache sizes to remove problems and bump performance.
Remember all of the jokes about EA putting out games before they were ready? I do and many of them were very funny. Apparently someone at EA might have read them too and while we can picture them having an amused chuckle at first they might have also been a little concerned. Around the time that E3 was happening EA made comments to the effect that they would no longer push games out the door before they were ready. We all looked on with a look of “yeah right” on our faces and waited for the next unfinished game to hit the streets.
In 2012 ago we heard about a new type of internet tracking that involved making every computer identify itself and then following that ID around. At the time we thought the idea was very interesting. What we did not know was that the technology was already being worked on and ready for testing. The new type of identification was put together after very strict laws were put in place about the use of tracking cookies. Data miners and advertising companies needed a new method to see what you were doing.
There is a lot of information flying around the internet about security this month. Much of this is due to the looming Black Hat and DEF CON conferences that kick off in August. While many of the articles hitting the net are malware centric we are hearing about a few more that punch more than a few holes in the security of some very popular devices. We have seen Blackberry poke at Samsung and their Knox secure phone layer and vice versa. The biggest one that we have seen is the 58 page document published by security expert Jonathan Zdiarski about the iPhone.