Feeds

Korea sends teen games players to their beds

Curfew imposed on 19 MMORPGs

Choosing a cloud hosting partner with confidence

This is what happens when you have the best broadband in the world: children stay up all night playing computer games online.

Yes, we are talking about Korea, which aims to eradicate computer game addiction among teenagers by imposing a night time shut down on 19 popular "freemium" role-playing games.

These account for 80 per cent of the country's games market, according to local reports. But won't the addicts simply play games offline instead?

Under a new law, underage players must select a six-hour period during which they will lose access to their online games. Also, speeds will slow to a crawl for underage players who play for too long.

Will the curfew work? If Korean kids are anything like their British counterparts on Facebook, they will simply lie about their age.

Alternatively, they will piggyback on the IDs of older brothers and sisters or parents. According to the Korea Herald, the government "intends to establish a countermeasure for youths using their parents' resident registration number to set-up online accounts sometime in the first half of this year". How?

Lastly, what does Korea intend to do about its adult games addicts, two of whom let their real-life daughter starve to death while trying to raise a virtual daughter online. Just asking...

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.