Feeds

3dfx tech support says yes to Wrappers

So why are the legal boys trying to kill them, then?

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

A Register reader has mailed us with an intriguing corollary to the moves 3dfx made last week to threaten Web sites posting Glide Wrappers, software utilities that map calls to the company's proprietary Glide 3D graphics API to third-party hardware drivers. It appears that, unbeknownst to the company's aggressive legal team, its tech support people have been suggesting that Voodoo3 users who can't get the controversial UltraHLE Nintendo 64 emulator to run should download and use... a Wrapper. UltraHLE requires the use of a 3D accelerator card based on 3dfx's Voodoo or Voodoo2 chip-sets. However, with development on the emulator suspended, thanks to threatened legal action from Nintendo, the software hasn't yet been extended to fully support the Voodoo3 drivers. So it will not run with a Voodoo3-based card alone. Fortunately, Wrappers seem to solve the problem. One, XGL2000, written by Scott Cutler, apparently works very well, say 3dfx tech support guys. It's a shame, then, that 3dfx forced Cutler's ISP to pull his files, allegedly without his consent. If any other readers have experience of 3dfx tech support's pro-Wrapper advice, we'd like to hear from you. ®

Remote control for virtualized desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.