Language Selection

English French German Italian Portuguese Spanish

Lamest Computer Movie

Never saw most of these movies

...but War Games was LAME!

Good computer movies include "Collossus the Forbin Project"
and the incredibly goofy but enjoyable "The Computer Wore Tennis Shoes."

Antitrust

Seems more of a rehash of Opensource vs Microsoft in a subtle manner, but Hollywood-ised. (Tim Robbins playing an "evil" version of Bill Gates)...Would've been better if they had another character who lacked patience and threw chairs as a form of exercise. Wink

War Games

How about a nice game of chess?

Afternoon amusement

Computers In Movies

Made me smile anyway.

( the edit was to add the link so you people wouldn't see how lazy I am! Smile )

Re: Afternoon amusement

Great link. funny stuff. Big Grin

None

I really don't like movies.

None

gmelendez wrote:
I really don't like movies.

Me neither. I don't have time to watch movies a lot. My favorite movie ever is 'the 300'. I really recommend you check it out.

As for computer related movies, these producers seem to think the audience is a bunch of people who have not idea what the word technology is.

All of the above?

I think the poll needed a "All of the above" option.

Of course outside of documentaries, I think anyone would be hard pressed to name anything that is accurately portrayed in movies (or tv). It is after all entertainment for the masses (the mostly publicly educated masses).

Re: All of the above?

exactly my thought, all of these movies are lame as heck, i think tron was the most entertaining though, swordfish most unrealistic, hackers has to be the stupidest and not just as a computer movie.

Hackers

Unless I am mistaken, isn't this the movie with Angelina Jolie and the guy who tells his friends he got this book on "Unix Operating System"?

Re: Hackers

"Hack the planet! Hack the planet!"

re: Hackers

lolol!

re: hackers?

yeah, that's the one.

More in Tux Machines

Server: GNU/Linux Dominance in Supercomputers, Windows Dominance in Downtime

  • Five Supercomputers That Aren't Supercomputers
    A supercomputer, of course, isn't really a "computer." It's not one giant processor sitting atop an even larger motherboard. Instead, it's a network of thousands of computers tied together to form a single whole, dedicated to a singular set of tasks. They tend to be really fast, but according to the folks at the International Supercomputing Conference, speed is not a prerequisite for being a supercomputer. But speed does help them process tons of data quickly to help solve some of the world's most pressing problems. Summit, for example, is already booked for things such as cancer research; energy research, to model a fusion reactor and its magnetically confined plasma tohasten commercial development of fusion energy; and medical research using AI, centering around identifying patterns in the function and evolution of human proteins and cellular systems to increase understanding of Alzheimer’s, heart disease, or addiction, and to inform the drug discovery process.
  • Office 365 is suffering widespread borkage across Blighty
     

    Some users are complaining that O365 is "completely unusable" with others are reporting a noticeable slowdown, whinging that it's taking 30 minutes to send and receive emails.  

Google: VR180, Android and the Asus Chromebook Flip C101

Security Leftovers

  • Hackers May Have Already Defeated Apple’s USB Restricted Mode For iPhone
    Recently, the iPhone-maker announced a security feature to prevent unauthorized cracking of iPhones. When the device isn’t unlocked for an hour, the Lightning port can be used for nothing but charging. The feature is a part of the iOS 12 update, which is expected to launch later this month.
  • Cops Are Confident iPhone Hackers Have Found a Workaround to Apple’s New Security Feature
    Apple confirmed to The New York Times Wednesday it was going to introduce a new security feature, first reported by Motherboard. USB Restricted Mode, as the new feature is called, essentially turns the iPhone’s lightning cable port into a charge-only interface if someone hasn’t unlocked the device with its passcode within the last hour, meaning phone forensic tools shouldn’t be able to unlock phones. Naturally, this feature has sent waves throughout the mobile phone forensics and law enforcement communities, as accessing iPhones may now be substantially harder, with investigators having to rush a seized phone to an unlocking device as quickly as possible. That includes GrayKey, a relatively new and increasingly popular iPhone cracking tool. But forensics experts suggest that Grayshift, the company behind the tech, is not giving up yet.
  • How Secure Are Wi-Fi Security Cameras?
  • Trump-Kim Meeting Was a Magnet For Russian Cyberattacks

KDE: Usability and Productivity initiative, Kraft and Konsole

  • This week in Usability & Productivity, part 23
    This has been a bit of a light week for KDE’s Usability and Productivity initiative, probably because everyone’s basking in the warm glow of a well-received release: KDE Plasma 5.13 came out on Tuesday and is getting great reviews!
  • Kraft Version 0.81 Released
    I am happy to announce the release of Kraft version 0.81. Kraft is a Qt based desktop application that helps you to handle documents like quotes and invoices in your small business. Version 0.81 is a bugfix release for the previous version 0.80, which was the first stable release based on Qt5 and KDE Frameworks5. Even though it came with way more new features than just the port, it’s first release has proven it’s stability in day-to-day business now for a few month.
  • Giving Konsole some love
    I started to hack in Konsole, and first I was afraid, I was petrified. You know, touching those hardcore apps that are the center of the KDE Software Collection. I started touching it mostly because some easy to fix bugs weren’t fixed, and as every cool user knows, this is free software. So I could pay for someone to fix my bugs, or I could download the source code and try to figure out what the hell was wrong with it. I choosed the second approach.