Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:"Hard redirect" (Score 4, Interesting) 376

IANAL but this definitely seems to fall within Tortious Interference or similar acts which would serve to break the contract between you and your ISP. Then again there is probably a clause in your ToS which they will attempt to use to allow this based on their "need" to charge Netflix extra for network peering.

Don't forget to read your contract and notifications of change!

Comment Re:Looks like some editorializing by the submitter (Score 1) 89

Ehh, a bit adhomenim for my tastes. TFA makes a bit point about how important "IP" is to the new outfit. In the CEO's own words "...people don't give us credit..." which is code for - we're not making enough money from selling hardware, and lookie here at all these wonderful patents we can use to generate licenses fees or sell as an asset.

Comment RIM is dead, long live RIM's patents (Score 1, Flamebait) 89

Let the race to purchase their Patent portfolio begin!

Who might have enough cash to purchase the biggest stick in the phone wars? Apple or Samsung. Like the highlander it seems there can be only one... then again the Highlander kept having sequels so we might see this fight again and again (yuck).

Submission + - When Reporting On Piracy Becomes Ethically Irresponsible, If Not Illegal (celluloidjunkie.com)

sperlingreich writes: The leak of "Expendables 3" more than three weeks before its theatrical release made me question whether reporting on the news was the right thing to do.

Freedom of the press laws may "allow" media outlets and journalists to report on pirated titles without becoming financially culpable for a producer's losses, though doesn't such activity actually publicize the availability of specific content, thus increasing illegal downloading and ultimately the economic damage it causes?

Submission + - Rightscorp's new plan: Pay our copyright fees, or we take your browser (arstechnica.com)

mpicpp writes: Online copyright cop charging $20 per song explains 2014 strategy to investors.

Internet copyright enforcer Rightscorp has told investors some revelatory details about its strategy in its second-quarter earnings call, as reported by TorrentFreak.

Rightscorp was founded to be a kind of RIAA-lite, getting online pirates to pay record companies and other rights-holders without the need to resort to high-stakes litigation. Instead, it creates e-mail notices demanding $20 per song from users it deems "repeat infringers" and insists that ISPs forward those notices.

The company is growing fast, but is still way, way in the red. Last year it earned $324,000 in revenue, while spending more than $2.1 million to run its operations. This year it's earning more revenue: $440,414 in the first six months of the year. However, operating costs during the same period have already hit $1.8 million.

Rightscorp's two marquee clients are BMG and Warner Music. Together, those two clients account for around one-third of Rightscorp's income.

The company is now working with more than 140 Internet service providers, although they provide differing levels of cooperation. Rightscorp's pitch to these ISPs is that since it has ironclad evidence of which users are "repeat infringers," they're obligated under copyright law to forward the notices; otherwise the ISPs become liable to a high-stakes copyright suit.

Submission + - The Royal Society Proposes First Framework for Climate Engineering Experiments

Jason Koebler writes: The Royal Society of London, the world's oldest scientific publisher, has unveiled a proposal to create the first serious framework for future geoengineering experiments.
It's a sign that what are still considered drastic and risky measures to combat climate change are drifting further into the purview of mainstream science. The scientific body has issued a call to create "an open and transparent review process that ensures such experiments have the necessary social license to operate."

Submission + - Linux Kernel Git Repositories Add 2-Factor Authentication (linux.com)

LibbyMC writes: For a few years now Linux kernel developers have followed a fairly strict authentication policy for those who commit directly to the git repositories housing the Linux kernel. Each is issued their own ssh private key, which then becomes the sole way for them to push code changes to the git repositories hosted at kernel.org. While using ssh keys is much more secure than just passwords, there are still a number of ways for ssh private keys to fall into malicious hands. So they've further tightened access requirements with two-factor authentication using yubikeys.

Submission + - Research Unveils Improved Method To Let Computers Know You Are Human

An anonymous reader writes: CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the University of Alabama at Birmingham. Researchers focused on a broad form of gamelike CAPTCHAs, called dynamic cognitive game, or DCG, CAPTCHAs, which challenge the user to perform a gamelike cognitive task interacting with a series of dynamic images. For example, in a “ship parking” DCG challenge, the user is required to identify the boat from a set of moving objects and drag-and-drop it to the available “dock” location. The puzzle is easy for the human user to solve, but may be difficult for a computer program to figure out. Also, its gamelike nature may make the process more engaging for the user compared to conventional text-based CAPTCHAs.

Comment Re:Where are those chips baked? (Score 3, Insightful) 47

From the article they are using TSMC, which is one of the largest silicon foundries (ASIC manufacturing) in the world.

As for the all out open-source, they also make clear on the project page that hardware patents on the chipset instruction is supposedly strangling innovation for processors. I'm not sure I buy that, ARM, Intel and IBM have moved their architectures along pretty well. Even poor little MIPS has made strides despite losing market share.

Feed Google News Sci Tech: IBM Gets US Approval for Sale of Server Business to Lenovo - Bloomberg (google.com)


Reuters UK

IBM Gets US Approval for Sale of Server Business to Lenovo
Bloomberg
International Business Machines Corp. (IBM) cleared a U.S. national-security review for the sale of its low-end server business to China's Lenovo Group Ltd. (992), letting the $2.3 billion transaction go forward even amid tensions between the two nations.
Partners: IBM x86 Sale Approval Could Set Off Security Questions For LenovoCRN
UPDATE 1-IBM says $2.3 bln server sale gets regulator approvalReuters
Lenovo's x86 server buyout from IBM clears last US hurdlePCWorld
ZDNet-Wall Street Journal (blog)-News & Observer
all 28 news articles

Submission + - 60,000 Oculus Rift DK2 Orders, 20,000+ Units Shipped, New Orders Ship in October (roadtovr.com)

An anonymous reader writes: The much lauded Oculus Rift DK2 is in high demand. Shipping began at the end of July and Oculus says they've already shipped more than 20,000 of their 60,000 orders. The company recently updated their order page to indicate that new units are expected to ship starting in October. The Oculus Rift DK2 is the company’s second development kit which offers a number of major improvements over the original kit, called the DK1, which was the result of a successful Kickstarter back in August, 2012. Although the DK2 is intended for developers, the company openly offers the VR headset up for sale to anyone interested for $350. The Oculus Rift DK2s most notable enhancements are a higher resolution display and positional tracking capability as well as a number of other under-the-hood enhancements make the DK2 a huge improvement over its predecessor.

Submission + - Project Aims to Build a Fully Open SoC and Dev Board (linuxgizmos.com)

__aajbyc7391 writes: A non-profit company is developing an open source 64-bit system-on-chip that will enable fully open hardware, 'from the CPU core to the development board.' The 'lowRISC' SoC is the brainchild of a team of hardware and software hackers from the University of Cambridge, with the stated goal of implementing a 'fully open computing eco-system, including the instruction set architecture (ISA), processor silicon, and development boards.' The lowRISC's design is based on a new 64-bit RISC-V ISA, developed at UC Berkeley. The RISC-V core design has now advanced enough for the lowRISC project to begin designing an SoC around it. Prototype silicon of a 'RISC-V Rocket' core itself has already been benchmarked at UC Berkeley, with results results (on GitHub) suggesting that in comparison to a 32-bit ARM Cortex-A5 core, the RISC-V core is faster, smaller, and uses less power. And on top of that it's open source. Oh, and there's a nifty JavaScript-based RISC-V simulator that runs in your browser.

Submission + - Supervalu Becomes Another Hacking Victim (fierceretail.com)

plover writes: Supervalu (NYSE:SVU) is the latest retailer to experience a data breach, announcing today that cybercriminals had accessed payment card transactions at some of its stores.

The Minneapolis-based company said it had "experienced a criminal intrusion" into the portion of its computer network that processes payment card transactions for some of its stores. There was no confirmation that any cardholder data was in fact stolen and no evidence the data was misused, according to the company.

The event occurred between June 22 and July 17, 2014 at 180 Supervalu stores and stand-alone liquor stores. Affected banners include Cub Foods, Farm Fresh, Hornbacher's, Shop 'n Save and Shoppers Food & Pharmacy.

Submission + - Watch a Cat Video, Get Hacked: The Death of Clear-Text

onproton writes: Citizen Lab released new research today on a targeted exploitation technique used by state actors involving "network injection appliances" installed at ISPs. These devices can target and intercept unencrypted YouTube traffic and replace it with malicious code that gives the operator control over the system or installs a surveillance backdoor. One of the researchers writes, "many otherwise well-informed people think they have to do something wrong, or stupid, or insecure to get hacked—like clicking on the wrong attachments, or browsing malicious websites...many of these commonly held beliefs are not necessarily true." This technique is largely designed for targeted attacks, so it's likely most of us will be safe for now — but just one more reminder to use https.

Submission + - Object Storage versus Block Storage: Understanding the Technology Differences 2

Esther Schindler writes: Even very technical people scratch their heads over the business value of object storage. In other words, what problems does it solve? What are its drawbacks and limitations? Which types of applications run better, what breaks, and what do you need to completely redesign to take advantage of the storage technology?

Ultimately every IT admin wants to know if object storage is a good fit for certain workloads. This article defines object storage, compares it to alternatives, and gives an overview of where it can make a performance difference for enterprise computing.

Slashdot Top Deals

The earth is like a tiny grain of sand, only much, much heavier.

Working...