Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Transportation

Submission + - The Copyright Battle Over Custom-Built Batmobiles 3

Hugh Pickens writes writes: "Eriq Gardner writes that Warner Brothers is suing California resident Mark Towle, a specialist in customizing replicas of automobiles featured in films and TV shows, for selling replicas of automobiles from the 1960s ABC series Batman by arguing that copyright protection extends to the overall look and feel of the Batmobile. The case hinges on what exactly is a Batmobile — an automobile or a piece of intellectual property? Warner attorney J. Andrew Coombs argues in legal papers that the Batmobile incorporates trademarks with distinctive secondary meaning and that by selling an unauthorized replica, Towle is likely to confuse consumers about whether the cars are DC products are not. Towle's attorney Larry Zerner, argues that automobiles aren't copyrightable. ""It is black letter law that useful articles, such as automobiles, do not qualify as 'sculptural works' and are thus not eligible for copyright protection," writes Zerner adding that a decision to affirm copyright elements of automotive design features could be exploited by automobile manufacturers. "The implications of a ruling upholding this standard are easy to imagine. Ford, Toyota, Ferrari and Honda would start publishing comic books, so that they could protect what, up until now, was unprotectable.""

Submission + - Ask Slashdot: How do you deploy small office WIFI SSIDs? 2

junkfish writes: I am not able to install a controller based WIFI solution in my office due to cost, but I like presenting my users with a Single SSID rather than an array of four or five differently named SSID from different access points. My Question to Slashdot is, What is your experience deploying multiple wireless access points with the same SSID and password? I have been doing this with Cisco 1040 series Access Points this year, and have had good success. It seems like the client is able to determine which AP is best to connect to, and is able to roam around the office with out too much of an interruption when it connects to a different AP. Is this sloppy practice? Or does the general state of the 802.11 provide for this sort of resiliency. I am really interested in your opinion because I have not seem too much documented on this subject. Thanks
Cloud

Submission + - Amazon's Christmas Eve Outage Teaches Recovery Lessons (slashdot.org)

Nerval's Lobster writes: "Amazon’s explanation for the problem that took down Netflix and other sites on Christmas Eve: human error. The Web giant blamed an unnamed developer who ran a maintenance process against state data used by the company’s Elastic Load Balancers, or ELBs. That mistake cascaded into other areas. At its peak, 6.8 percent of the company’s ELBs were affected—which might not sound like a lot, but they were balancing loads across multiple servers. Netflix was forced to apologize for the outage, publicly pinning the blame on AWS infrastructure. Amazon’s mea culpa highlights two areas in which the company can improve: access to its infrastructure, and disaster recovery (even if that disaster was self-inflicted)."
Iphone

Submission + - iPhone "Do Not Disturb" bug hit on January 1

pdclarry writes: As reported in The Guardian and Apple support forums As of January 1 the Do Not Disturb feature of the iPhone's iOS 6 does not turn off. One forum member did an analysis that shows that the bug recurs for several days at the beginning of each year in coming years if not fixed.

Just to add to the embarrassment, Apple chose Wednesday to launch a new advert promoting the iPhone's Do Not Disturb feature. (Replete with tennis's Williams sisters.)
Security

Submission + - Africa's Coming Cyber-Crime Epidemic (itworld.com)

jfruh writes: "Those Nigerian spam scams of the last decade may have just been the first step in a looming African cyber-crime wave. Africa has the world's fastest-growing middle class, whose members are increasingly tech-savvy and Internet connected — and the combination of ambitious, educated people, a ceiling on advancement due to corruption and lack of infrastructure, and lax law enforcement is a perfect petri dish for increased cybercrime."
HP

Submission + - HP cuts workforce by 5% last year as some leave for GM (computerworld.com)

dcblogs writes: Hewlett-Packard's reduced its workforce last year by 17,800 employees, more than half-way to its restructuring goal. But some key IT workers left unexpectedly and have taken jobs with HP customer, General Motors. HP employed 331,800 worldwide as of Oct. 31. It plans to cut 29,000 by the end of 2014. GM, which outsourced its IT for years to EDS, announced plans last year to in-source its IT. HP acquired EDS in 2008. On Nov. 30, 18 employees of HP's Global Information Technology Organization in Austin "resigned en masse and without notice" and "immediately began working for General Motors in Austin in GM's new IT Innovation Center," according to court papers. HP is asking the court for approval to depose some of the exiting workers to determine whether employment contracts were violated. "HP expects that additional resignations will follow as the departed employees will likely seek to build out their teams by filling in with subordinate employees from HP," the company said.
Android

Submission + - California sues Delta Air Lines over mobile privacy (ca.gov)

mrheckman writes: California is suing Delta Air Lines for violation of California's on-line privacy law. Delta failed to "conspicuously post a privacy policy within their mobile app that informs users of what personally identifiable information is being collected and what will be done with it" after a 30-day notice. Delta's app collects "substantial personally identifiable information such as a user’s full name, telephone number, email address, frequent flyer account number and pin code, photographs, and geo-location". Why is it we still can't control what permissions an app has on our phones? It's absurd and disturbing that an app for checking flights and baggage demands all of those permissions.

Submission + - "Flame" didn't take a nation state to develop (netsq.com)

mrheckman writes: Security researcher Todd Heberlein shows how easy it is to create AV-evading viruses:
http://www.netsq.com/Podcasts/Data/2012/GlowingEmbers/ (HTML5 video)

"Flame is the latest high profile cyber espionage attack, and two things stand out about it: how long it has been around without being noticed and its size and breadth of capabilities. This has led to a lot of handwringing in the anti-virus community and computer security community in general. One explanation given for the fact that such capable malware could have gone so long without being noticed is that it was developed by a nation state with huge budgets. Glowing Embers sets out to show that this is not the case. A single person in a single week can accomplish many of the things Flame can all while evading anti-virus software. "

Security

Submission + - LIfe and death reasons to protect digital data (cjr.org)

mrheckman writes: Sure, those in the information security trade are concerned with complying with various regulatory requirements, etc., but here's how a journalist's failure to protect his data led to the arrest (and probable torture and death) of activists he interviewed: http://www.cjr.org/feature/the_spy_who_came_in_from_the_c.php?page=1

The article links to an EFF site on the basics of how to protect data. How many of us and our organizations do even these things? https://ssd.eff.org/your-computer/protect

Shouldn't basic encryption of data on smartphones, for example, be the default? Why are things like that even a question at this point in time?

Books

Submission + - The Case for a World Republic that even Ronald Reagan Supported (thebulletin.org)

Lasrick writes: Tad Daley takes a look at Lawrence Wittner's 2009 book, Confronting the Bomb: A Short History of the World Nuclear Disarmament Movement, and comes up with some great US history that I'll be most people don't remember. The advent of the bomb drove many people to support a world republic, at least do deal with these horrific new weapons, and many familiar names were on board: Ronald Reagan, John Steinbeck, Alan Cranston, and many others. Great read.
KDE

Submission + - Open-Source Desktops Losing Competitiveness? (phoronix.com)

An anonymous reader writes: Peter Penz has been a KDE user K Desktop Environment 1.2 and led the development of the Dolphin file manager for the past six years, but now he's quitting KDE development and handing off Dolphin. The reasons for quitting KDE development are described in his blog post where he speaks of KDE losing competitiveness to Apple and Microsoft, increased complexity, and other reasons. Are open-source desktops losing?
Piracy

Submission + - UK's 'Three Strikes' Piracy Measures Published (techweekeurope.co.uk)

judgecorp writes: "The UK regulator Ofcom, has published details of plans to disconnect illegal file-sharers. It is the "three strikes" policy which ISPs unsuccessfully appealed against, and requires ISPs to keep a list of persistent copyright infringers (identified as usual by their IP address...). ISPs will have to send monthly warning letters to those who infringe above a certain threshold. If a user gets three letters within a single year, the ISP must hand anonymised details to the copyright owner, who can apply for a court order to obtain the infringer's identity (or at least, an identity associated with that IP address)."
Government

Submission + - ADA to force Netflix to provid closed captioning on content (sfgate.com) 2

Shivetya writes: A judge has decided that the American Disabilities Act requires services like Netflix to provide Closed Captioning support for any video it streams on its website. The easiest means to comply would be to remove all videos which do not have a closed captioning component, the other route would require Netflix to pay to have this done to any video it wants to provide. The implications to other provides is immense as well.
EU

Submission + - EU Commissioner Reveals He Will Simply Ignore Any Rejection Of ACTA (techdirt.com)

Dupple writes: whatever happens next week, the European Commission will wait for the European Court of Justice (ECJ) to rule on whether ACTA is compatible with EU law. If it is found to be incompatible, De Gucht admits that rather than accept this ruling, the European Commission will try to find some trick to circumvent it:
If the Court questions the conformity of the agreement with the Treaties we will assess at that stage how this can be addressed.
This implicitly confirms that the referral was simply a way to buy time, rather than an honest question about ACTA's legality.

Comment Nader, Gore, Bush redux? (Score 1) 249

"A credible, nonpartisan ticket"? Third-party candidates have historically done very poorly in American presidential elections. There is no reason to expect this one, even if it comes off, to do any better. I don't see the effort as "credible". And it certainly won't be "non-partisan". The mere fact that they want someone to vote for the ticket makes it "partisan". At best, the organizers want to straddle some kind of middle-ground between Republicans and Democrats, but that middle ground is a fantasy and, despite the expressed desire to "force Democrats and Republicans in the nation's capital to start bridging their cavernous ideological divide", that divide is unbridgeable at this point. Republicans believe they can win by not compromising. They have been busy not compromising for Obama's entire time in office. The effort could only succeed if it convinces Republicans that they have more to gain by compromising than by stonewalling, but Republicans are very good at holding the line. More likely this effort will siphon off Democratic voters. Do you remember how voters for Nader drew enough voters in Florida from Gore to (after Supreme Court intervention) throw the election to Bush? Are the organizers of the Internet primary moderate Democrats or Republicans? Who would have the most to gain?

Slashdot Top Deals

Happiness is twin floppies.

Working...