logo

A Mind @ Play

Ten Reasons Valve’s Steam Fails to Live Up to Standards

I’ve been using Steam for a fair while now, in fact pretty much since the beginning, and have seen the program grow on from its fairly humble origins. There are now hundreds of titles available, including games from big-name publishers and independent game houses alike, and the usual crashes and quirks that afflicted the early releases are pretty much gone. Nevertheless, there are still a number of key areas in which Steam continues to live up to standards, at times making using the system a bit of a nightmare. This is a list of some of those issues which in my eyes prevent Steam from becoming a really top class product, delivering everything the platform really promises. Some of these issues admittedly have their origins outside of Valve’s headquarters, but the way in which they are dealt with only compounds the problems further, for both customers and clients.

14 minutes to read

Another WordPress Blank Page

There are plenty of examples out there of WordPress installs suddenly displaying blank pages—on admin pages as well as frontend posts—after changing themes, adding/removing plugins or updating the WordPress backend. Whilst there is plenty of good information out there covering most of the usual suspects, I just came across another which was fairly difficult to track down given the lack of information, though pretty easy to solve once I’d found it. If like me you’ve at any point tried to streamline your WordPress install by cutting down on a few unnecessary services, and reducing the number of calls to the database, you may have added some lines to your wp-config.php file like so:
One minute to read

Deleting the Undeletable

It’s a fairly common problem with Windows. Somehow a program manages to create a file with a name containing illegal characters or otherwise outside the file system’s parameters. No matter what you try, you just can’t rid yourself of it. The file certainly isn’t in use and being locked up by another program. Trying to delete or rename the file only results in Windows telling you the file cannot be found: “This is no longer in . Verify the item’s location and try again.” Even running the Command Prompt with administrator privileges doesn’t allow you to move, rename or delete the blasted thing!
One minute to read

Dick Dastardly’s DSL

Interesting little snippet about the current state of South African Internet services. Designed simply to show up the state of South Africa’s Internet options, the test pitted a pigeon against a connection delivered by their largest provider. The pigeon managed to deliver 4GB of data 60 miles in little over an hour, and it took the company another hour to upload the data (one can only assume they were for some reason using an old USB 1.o/1.1 connection). In this time, just 4% of the data had been transferred via ADSL. Humbling though this message might be, I really wonder if services in the UK would fare much better? At a rough estimate, in the total amount of time it took the pigeon, my own connection might have managed around 5% of the total. The average business connection would probably have achieved twice that, but either way, the pigeon method wins hands down. Having said that, I don’t think we’ll be seeing any alternative pigeon networks set up in the UK just yet. ‘Packet loss’ due to hawk attacks would be monumental.
2 minutes to read

Open Source Bridges

Bridge solutions

Many of us have found ourselves in this position. Your business or group make use of an online system, such as a forum, wiki, blog etc., which you then wish to augment or combine with some other system. How you go about doing that, of course, depends entirely on your goals and the systems you’re trying to use together. Design and styling are usually the least of those worries.

The problem which consistently presents itself when attempting such a combination is what to do with the userbase. Whilst this issue can sometimes be simply ignored, in the hope that only a small number of the users of one system will need access to the second, this isn’t always the case. When it comes to one userbase requiring access to two or more systems, the first question that needs to be answered is whether the user information should be shared, enabling a unified login procedure amongst other benefits. Requiring users to sign up to various different pieces of the puzzle is a time-consuming process, and one that many will find confusing and unnecessary. And since different online systems often have conflicting requirements when it comes to usernames and passwords, for example, this can also lead to more lost password checks and work for the system administrator. However, programming such functionality oneself certainly isn’t within the realms of the abilities of all of us, and keeping such modifications functioning across various systems and versions can be a painful procedure.

3 minutes to read

Reliving an Old Gaming Experience

Classics of their medium, but which will have a harder time in the future?

In comparison to a medium like cinema, computer games suffer from a particularly poor level of longevity. The vast majority of films can still happily be viewed today, often in an updated format, though keeping to the original production. That isn’t to suggest that films do not become dated, nor that more than just distribution formats are updated in later productions. Only recently I had the privilege of watching a once lost silent Polish film, A Strong Man (Mocny Człowiek ), rediscovered in 1997. As there were no hints as to what musical accompaniment was meant to be played with the film, the DVD was released with a modern ambient style, that took a short while to get used to, but actually fit the film’s plot and style rather beautifully. On the whole, however, a film produced fifty years ago can be viewed with much the same clarity today as on the day it was released.

6 minutes to read

Playing with the WordPress Database

After initially solving my database character encoding problems by ignoring the specific strings in the wp-config.php file, I was finally forced to alter the characters in the database during a recent reshuffle. Whilst there are two automated solutions available via plugin, namely g30rg3x ’s UTF-8 Database Converter and the Modified UTF8 Sanitize Plugin , sadly neither worked in my particular instance, and indeed the former is no longer supported for current versions of WordPress, though reports on the WordPress support forum suggest there should be no issues.

Fortunately, an excellent guide was available on Alex King’s blog . For more information and follow-up comments, you should definitely read the full post, but here’s a summary of the method that worked for me.

2 minutes to read

Web Design for Dummies

Web Design for Dummies
Whilst I normally steer clear of this kind of book, I saw it in a local library and thought I’d have a look, thinking there might at least be a few useful tips. Unfortunately, I was not only disappointed on the tips front, but in the general presentation of this book. Like a previous viewer, I was left rather perplexed as to exactly who the book is aimed at. The blurb suggests it is designed for people planning to build professional, rather than personal websites, and yet the content never quite seems to match up. At once Lopuck suggests that when providing designs for clients you should delegate to members of your team (also dummies, presumably?) so that the designs reflect different interpretations of the requirements, and a few pages later, something as mundane as copying and pasting images will be covered.
2 minutes to read

Wireless for the Masses

In the last year, I heard how Dublin City Council had given up on plans to run a free, city-wide wireless Internet programme on the grounds that it was against EU regulations, anti-competitive and bad for the consumer. As Ireland currently has some of the slowest and most expensive broadband options available in Europe, it seems obvious how the consumer will benefit from having to continue paying for their poor services. But there could be a nicer alternative to centralised WiFi. In a post much earlier this year, Bruce Schneier generated a lot of debate when he claimed he leaves his wireless network open and unprotected for just about anyone to use. This he considers a common courtesy, and whilst acknowledging the risks, considers them to be largely inflated. As many of the people commenting on his article or reporting about it elsewhere point out, there are risks involved, and as far as many of the people in authority are concerned, his common courtesy leaves him much more culpable. Many ISPs stipulate that sharing a connection in this manner would be a breach of contract, and from a legal perspective infringements undertaken by someone piggybacking the network could result in a rather unwelcome investigation for the owner.

6 minutes to read

Ubuntu Grub Installation Errors

I recently installed Ubuntu on a system with a slightly irregular hard drive configuration. Two SATA drives were running Windows on a mirrored (fake) RAID array, and a third SATA drive was ready to have linux installed. The Ubuntu installer recognised the drive as the third hard drive, and installed itself as expected, with Grub installed in the MBR of this drive, being first in the BIOS’ boot queue. However, all references in Grub’s menu.lst for the Ubuntu installation pointed to (hd2,0), which resulted in an “Error 17: Cannot mount selected partition.” message from Grub. The solution was simply to edit the entries to read (hd0,0) for (hd2,0) as Grub now recognised the third drive as the first on account of its place in the boot order.
One minute to read