An anonymous reader writes "Further to the previous story on Slashdot where attorney Candice Schwager threw threats to sue a photographer who reported a DMCA violation against her for infringing use of his photography: Candice has now made a DMCA threat of her own against Petapixel, a photography site that reported on her infringement. The kicker? She's sent the DMCA notice an apparent six times not to Petapixel's registrar or their hosting service, but to Godaddy, her own registrar."
Please create an account to participate in the Slashdot moderation system
New submitter sdoca writes "I am a Java developer and for the past number of years I have mainly been working on server side code. I have an idea for a webpage/application that I would like to develop. For the general public, it will be a site where they can view upcoming events, filter them by type, date etc. and view details of events they're interested in. There will also be an admin section to the app where organizations who want to post their events can log in and set them up. In the long term, writing a view-only version as an Apple and/or Android app is on the radar, but I want to focus on the generic web app for now. I'm not sure what languages/frameworks to look at using for the webpage portion of my project. Many (many!) years ago, I wrote some applets. After that I did some work in WebObjects and after that I tinkered with Wicket. I have no experience with PHP and would like to stay in my Java comfort zone as much as possible, but want to use the right tool. I'm concerned about browser compatibility issues. Chrome didn't exist when I last did web page development. I'm looking for good resources (books, internet) that will guide me through the potential issues and your recommendations for a web development framework."
NormalVisual writes "License-plate reading cameras are popping up on utility poles all over St. Lawrence County in upstate New York, but no one is willing to say who they belong to. One camera was found by a utility crew, removed from the pole, and given to the local police. 'Massena Police Chief Timmy Currier said he returned it to the owner, but wouldn't say how he knew who the owner was, nor would he say who he gave it to....(Andrew) McMahon, the superintendent at Massena Electric Department, said one of his crews found a box on one of their poles and took it down because "it was in the electric space," the top tier of wires on the pole above the telephone and cable TV wires, and whoever put it there had taken a chance with electrocution. He said they had never received a request or been informed about its placement.'"
astroengine writes "Using an Australian very long baseline array (VLBA) of three radio antennae, the first very long baseline interferometry (VLBI) campaign has been carried out on a SETI target star: the famous Gliese 581 red dwarf. However, after 8 hours of observing the star — thought to play host to six exoplanets, two of which are in the star's 'habitable zone' — no alien signals were detected. This result isn't surprising, as the likelihood of us stumbling across intelligent aliens living in the Gliese 581 system transmitting radio is extremely slim, but it does validate VLBI as a very exciting means of using the vast amount of exoplanetary data (coming from missions such as the Kepler space telescope) for 'directed SETI' projects."
MarkWhittington writes "The proposed SpaceX space port in Brownsville, Texas, has run into opposition from an environmental group. Environment Texas is conducting a petition drive to stop the project. According to a news release by the group, the proposed space port, which would include a launch pad and control and spacecraft processing facilities, would be 'almost surrounded' by a park and wildlife refuge. Environment Texas claims the launching of rockets would 'scare the heck' out of every creature in the area and would 'spray noxious chemicals all over the place.' The petition will demand SpaceX build the space port elsewhere." I suspect a lot of people in Brownsville are instead looking forward to the jobs, tourists and excitement that a spaceport would bring.
An anonymous reader links this article describing a newly installed set of rules affecting the already put-upon Internet users of China, specifically affecting users of social network Sina Weibo: "Sina Weibo users each will now receive 80 points to begin with, and this can be boosted to a full 100 points by those who provide their official government-issued identification numbers (like Social Security numbers in the U.S.) and link to a cellphone account. Spreading falsehoods will lead to deductions in points, among other penalties. Spreading an untruth to 100 other users will result in a deduction of two points. Spreading it to 100-1,000 other users will result in a deduction of five points, as well as a week's suspension of the account. Spreading it to more than 1,000 other users will result in a deduction of 10 points, as well as a 15-day suspension of the account." The article explains (in truth, not very helpfully) the extent to which users' freedom to talk freely will be curtailed; the long list of what not to do "includes using 'nonconforming' or false images to mislead," "exaggerating events," "presenting already [resolved] events as ongoing," "efforts to incite ethnic tensions and violence and hurt ethnic unity" and "efforts to spread cultist or superstitious thinking; spreading rumors to disrupt social harmony." (And of course the catch-all: "other activities stipulated by authorities.")
omar.sahal writes "Chris Granger's Light Table IDE, covered here previously on Slashdot, has been successfully funded by a Kickstarter campaign. 7,317 backers brought in $316,720, obliging Chris to support the Python Programming language with his first release. Chris and his team have also been successful in being funded by Y Combinator. Here's some more background (video) on the concepts developed by Bret Victor found in Light Table.
McGruber writes "Joseph Bonneau, a computer scientist at the University of Cambridge, calculated the password strengths of nearly 70 million Yahoo! users. He compared the strengths of passwords chosen by different demographic groups and compared the results. People over the age of 55 pick passwords double the strength of those chosen by people under 25 years old." Does this mean that the younger users are more cavalier and naive, or are they simply more cynical about the actual value of strong passwords in the era of large-scale user-database compromises?
judgecorp writes "Google has applied for the .lol domain in ICANN's sale of generic top level domains (gTLDs). Google also asked for .google, .docs, and .youtube at a cost of $185,000 each, in the round of applications which has finally closed. A glitch in the application system may have leaked some of the applicants' data to other applicants."
alphabet26 writes "The Canadian Information Processing Society has formally responded to the Protecting Children from Internet Predators Act introduced in February of this year. Bill C-30 would grant authorities extended powers to monitor and track Canadians online. In the statement CIPS recommends that the Government of Canada 'prohibit access to personal information, related records/data, content, communications or records of internet use without the safeguard of a warrant.' CIPS is a non-profit organization that represents Canadian IT professionals and is a member of the International Federation for Information Processing (IFIP)."
aonsquared writes "In a previous Slashdot story, I demonstrated a voice-controlled robotic arm using the open-source speech decoder Julius. This time, I have managed to port the system to a Raspberry Pi to control the same robotic arm, and as usual, posted the tutorial and source code. Some negative reviews of the Raspberry Pi are starting to appear, and they're missing the educational point of this device — I'm hoping this will counter the naysayers, and help inspire a new generation of hackers, as well as also bring open-source speech recognition the same attention as proprietary solutions (i.e Siri) are getting!"
Hugh Pickens writes "Megan Garber writes that wireless routers have become the lawn signs of the digital age, particularly in large apartment buildings, where almost every unit has a unique Wi-Fi network that will be detected in turn by all the other unique Wi-Fi networks. SSIDs can be a cheeky, geeky way to broadcast messages to your immediate neighbors. Most of us keep it simple with '275_Elm_Street,' 'Apt23,' or 'my_network,' but some get more creative with names like: 'Apt112IHaveYourMail,' 'PrettyFlyForAWiFi,' or 'WeCanHearYouHavingSex' — a great way to freak out your annoying neighbors without hiding in their bushes or peeping in their windows late at night. Now the team at OpenSignalMaps, which maintains a database of geolocated Wi-Fi access points, analyzed the data they've collected about wireless routers to see whether Wi-Fi names are 'being used to fly political colors' and have found, globally, 1,140 results for 'Obama' and an additional six for 'Romney' — an indication not necessarily of Romney's popularity relative to the president's, but of the attention that four years as president can confer. 'There's something uniquely contemporary and incredibly old-school about that kind of broadcasting: It's messaging meant only for your immediate neighbors,' writes Garber. 'The politicized network names are like lawn signs for people who don't have lawns.'"
DillyTonto writes "U.S. officials have acknowledged playing a role in the development and deployment of Stuxnet, Duqu and other cyberweapons against Iran. The acknowledgement makes cyberattacks more legitimate as a tool of not-quite-lethal international diplomacy. It also legitimizes them as more-combative tools for political conflict over social issues, in the same way Tasers gave police less-than-lethal alternatives to shooting suspects and gave those who abuse their power something other than a club to hit a suspect with. Political parties and single-issue political organizations already use 'opposition research' to name-and-shame their opponents with real or exaggerated revelations from a checkered past, jerrymander districts to ensure their candidates a victory and vote-suppression or get-out-the-vote efforts to skew vote tallies. Imagine what they'll do with custom malware, the ability to DDOS an opponent's web site or redirect donations from an opponent's site to their own. Cyberweapons may give nations a way to attack enemies without killing anyone. They'll definitely give domestic political groups a whole new world of dirty tricks to play."
New submitter lsatenstein writes with this snippet from The H:"The regional government of Spain's Basque Country has decreed that all software produced for Basque government agencies and public bodies should be open sourced. Joinup, the European Commission's open source web site, cites an article in Spanish newspaper El Pais [English translation], saying that the only exceptions will be software that directly affects state security and a handful of projects which are being conducted in conjunction with commercial software suppliers."
schliz writes "Australian tech publication iTnews is defining 'patent trolls' as those who claim rights to an invention without commercializing it, and notes that government research organization CSIRO could come under that definition. The CSIRO in April reached a $220 million settlement over three U.S. telcos' usage of WLAN that it invented in the early 1990s. Critics have argued that the CSIRO had failed to contribute to the world's first wifi 802.11 standard, failed to commercialize the wifi chip through its spin-off, Radiata, and chose to wage its campaign in the Eastern District courts of Texas, a location favored by more notorious patent trolls."