Toen Nullsoft, een divisie van AOL, vorig jaar met Winamp 3 op de proppen kwam, werden er veel klachten gehoord. Versie 3 van de populaire mediaspeler had dan wel een hoop meer features aan boord dan versie 2, maar was daarmee ook een stuk logger en had dankzij Nullsofts eigen programmeertaal Wasabi veel stabiliteitsproblemen. Winamp 2 werd voor de trouwe fans doorontwikkeld in de vorm van het Winamp Classic-project. Sinds kort biedt Winamp 2 net als z'n grotere broer ondersteuning voor videobestanden en een media library. Nu het aantal features in de buurt komt van versie 3, wil AOL Winamp 2 weer naar de voorgrond verschuiven.
Mediaspelers als Windows Media Player, RealOne en Quicktime zijn op het moment vele malen populairder dan voormalige mediaspeler-koning Winamp. AOL zal dus zijn toevlucht moeten nemen tot het ondersteunen van andere standaarden dan alleen MP3. Microsofts WMA wordt momenteel al ondersteund, en ondersteuning voor de formaten van RealNetworks en Apples QuickTime staan voor de deur. Ook wil AOL Nullsofts eigen mediaformaten, NSV voor video en NSA voor audio, gaan promoten door deals te sluiten met aanbieders van streaming media. In de nabije toekomst kunnen we dus veel interessants verwachten van Nullsoft/AOL, zeker als de nieuwe Winamp 5 wordt uitgebracht:
Although the Winamp3 movement has been put on the back burner, it's by no means dead. Elements of Winamp3 and Wasabi will be combined with the faster, slimmer Winamp 2 for the next version of Winamp, called Winamp 5 (versions 2 plus 3), due out in late 2003. Wasabi code also is still being toyed with inside the halls of Nullsoft's San Francisco loft and will be found inside certain applications in Winamp 5, such as its skinning engine and its media library.
Although the Winamp3 movement has been put on the back burner, it's by no means dead. Elements of Winamp3 and Wasabi will be combined with the faster, slimmer Winamp 2 for the next version of Winamp, called Winamp 5 (versions 2 plus 3), due out in late 2003. Wasabi code also is still being toyed with inside the halls of Nullsoft's San Francisco loft and will be found inside certain applications in Winamp 5, such as its skinning engine and its media library.
Market researcher IDC has trimmed its forecast for spending on information technology to predict essentially flat or little growth in the estimated $871 billion industry this year. That is a rebound from the 4 percent drop in 2002, but far off the go-go double-digit growth rates of the late 1990s.
The x450 uses IBM's Enterprise X Architecture (EXA) chipset, code-named Summit, to join the four processors to memory. A relative of the x450 expected later this year will permit four-processor building blocks to be stacked together to form a 16-processor system.
Right now, you can buy a hammer, a pair of jeans, or a razor blade with anonymity. With RFID tags, that may be a thing of the past. Some manufacturers are planning to tag just the packaging, but others will also tag their products. There is no law requiring a label indicating that an RFID chip is in a product. Once you buy your RFID-tagged jeans at The Gap with RFID-tagged money, walk out of the store wearing RFID-tagged shoes, and get into your car with its RFID-tagged tires, you could be tracked anywhere you travel. Bar codes are usually scanned at the store, but not after purchase. But RFID transponders are, in many cases, forever part of the product, and designed to respond when they receive a signal. Imagine everything you own is "numbered, identified, catalogued, and tracked." Anonymity and privacy? Gone in a hailstorm of invisible communication, betrayed by your very property.
So what could be bad about all of this? A few things come to mind. First, the databases could be used to track people down. Although the current technology is used in the aggregate, there is nothing to stop people from drilling down to individual IP addresses as the technology continues to improve. A number of people have begun to use the geolocating software to ferret out fraud or the potential for fraudulent transactions. And of course there are a number of evasive counter-measures that users can employ to hide their IP address if they are so concerned. Second, Internet advertising could become more intrusive as site operators learn more about their visitors and more closely target their ad servers. And finally, the support and implementation costs for these technologies are enormous currently and the monies spent on them might be better used elsewhere, such as in building some more market share and brand awareness for your site.
Tot nu toe gaven de symbolen alleen een omschrijving aan van leeftijdsgroepen, zoals tieners en volwassenen. De symbolen voor 'adult' en 'mature' worden voortaan ook voorzien van een minimum leeftijd. De lijst van inhoudsomschrijvingen is flink uitgebreid. Zo worden vier soorten geweld onderscheiden: 'cartoon' en 'fantasy violence' voor niet-realistisch geweld en 'intense' en 'sexual violence' voor realistisch of seksueel geweld. De game-industrie is al lange tijd bezig een verbod op verkoop van gewelddadige games aan minderjarigen te voorkomen. Begin deze maand werd in een




"We conclude that the district court's findings are insufficient to support its conclusion that immediate irreparable harm will be sustained if the mandatory preliminary injunction is not entered, and accordingly that injunction must be vacated," the panel said Thursday.