Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Can someone make sense of this story? (Score 2, Informative) 82

The pending patents are for hardware, not software. They cannot apply to a box of software people purchase.

Okay, everyone seems to be very ignorant here, and the article isn't explaining this, so I guess I have to give a damn history lesson:

The US government requires that you put notification of patent use on things you sell. (Either your own patent, or something you've licensed from someone else.)

That is fine for issued patents, but what about pending patents? Remember, you can use something for up to a year before filing a patent on it, and you do have some amount of protection when patents are pending.

Ergo, you should have to put pending patent notifications, so people can look those up, too, and not waste their time building something that's going to be in violation of a patent in two months.

Well, the problem then arose. You see, actual patents are easy to look up. Patent lawyers could have copies of the entire set, you could go to a law courthouse in state capital, etc.

Pending patents, OTOH, are real bitch to find. Only the patent office has those. So some enterprising people who couldn't, or didn't bother, to get patents, just went around putting 'patent pending' on everything, resulting in other people unable to figure out what, exactly, was patented. Or they could keep resubmitted a rejected patent, and it remain 'pending'.

Hence, at some point, falsely claiming to have patents pending, or actually having one pending, but unrelated to what you put it on, was made criminal and you can be fined for it.

Those laws don't really make any sense anymore, but are still there.

Comment Re:Going after Activision in order to go after Kon (Score 1) 82

No one is attempting to enforce any patents, no one is attempting to strike down any patents.

Yet. There are three ways it can play out:

  • Activision can prove in court that its product is patented, and the scope of the patents owned or licensed by Activision becomes clear to competitors.
  • Activision can fail to prove that its product is patented, and the scope of the patents owned or licensed by Activision becomes clear to competitors.
  • Activision can leave it ambiguous, and the anti-patent troll responds: "Grant $developer a license to your game's patents, or we'll seek class action status for every box that you've ever listed a patent on."

Comment Re:You Know What Else This Means ... (Score 1) 161

>>>But seriously where does this end? Will we see the death of Microsoft's .lit format in favor of Kindle's .azw?

Possibly but Microsoft will still win:
- EMBRACE (amazon's standard)
- EXTEND (azw with new features which will be MS proprietary & only readable from Windows)
- EXTINGUISH (because amazon kindles will no longer be able to read the new azw2 format that MS now controls, people will buy the Microsoft Zune Reader instead - Kindles will disappear)

If you don't know what I'm talking about just read wikipedia's article about Microsoft during the 1990s.

Comment WOW! (Score 2, Interesting) 77

TFA isn't particularly enlightning, but the news is indeed slashdot worthy but raises many questions.

While not currently aimed at solar panel technology

Why not?

their research has uncovered a way to turn optical radiation into electrical current that could lead to self-powering molecular circuits

Battery-free gizmos? It doesn't say, but it seems like the photons wouldn't have to be optical wavelengths. However, how much current does this tech produce? "we could conceivably manufacture a 1A, 1V sample the diameter of a human hair and an inch long"

WOW, that's a lot of power from a tinty surface. 1 amp at one volt is one watt; a device using this tech the size of a phone battery could run an air conditioner if there were any way to keep the thing from melting.

At the end of TFA it links the study.

Comment Re:Politics (Score 2, Interesting) 205

Well, I'd put it this way. The Nazis, intellectually speaking, weren't anything.

Tyrannies of that type use ideology, but aren't about ideology. Trying to take their "ideologies" seriously as ideologies only leads to confusion, because they weren't interested in consistency, much less truth. They used language purely for its utility.

Take their idea of "Jewish science". You can't take that notion seriously, because it's all a fantasy they cooked up to target people they were afraid of. So they just lump them in together. It's telling that Himmler wanted to label Heisenberg as a "White Jew". "Jew" doesn't mean "person of historically Jewish descent" or "person who adheres to the Jewish law". It's just the verbal equivalent of a punch in the face.

The same goes for Hitler's views about atheists. Atheists tend to be free thinkers, and therefore likely to oppose the regime. So you take two despised groups and you manufacture a bigger "threat" by glomming them together.

Scapegoating is so critical to tyranny that where there aren't ready made hatreds, the tyrant invents groups to be hated. Stalin invented the "kulik", or rich peasant, as the scapegoat for his failed agricultural policies. They kuliks weren't rich by any means, but if your family were starving and your neighbor's had food, that gave you a satisfying, concrete target for your rage right within reach.

As far as the "Christianity" is concerned, it's about as meaningful as their notion of "Jew". If they'd been living in a predominantly Buddhist society, they'd be filling their propaganda with Buddhist trappings. If they'd been living in a Jewish society, then they'd avail themselves of Jewish symbols and scapegoat Christians and Muslims.

You can connect what the tyrant wants to what he says in this way: The tyrant wants power. To obtain and hold onto it, he needs a compliant people. To make the people compliant, he arouses fear, anger and hatred in them. To arouse those emotions he uses words, not to tell people anything, but to goad them.

Hatred and fear are for the politician like the nose ring a farmer puts on a bull. It allows him to safely lead a big, dumb dangerous animal where he wants it to go. This works for both right wing tyrants and left wing tyrants like Stalin. Remember that next time you are tempted to latch on to some popular political hatred.

Comment Re:We'll run out of oil first (Score 1) 807

And our infrastructure for such transportation methods that you suggest? Piddling in comparison to the oil infrastructure. It takes time for such transportation methods to ramp up to the level that oil is at. Time that we once had, but not anymore. How many electric powered shipping trucks do we have now? How many can we seriously expect to have in 5 years? Doesn't the fact that our oil consumption is still increasing even though our reserves are rapidly depleting suggest we are fucked? It would seem that the logical thing to do would be to use the oil however we wanted at first, then as we started to see limits to our supply we would start conserving and focus on developing alternative energy sources. Then, by the time oil reached permanent scarcity we would have phased out our dependence on it entirely.
X

After 2 Years of Development, LTSP 5.2 Is Out 79

The Linux Terminal Server Project has for years been simplifying the task of time-sharing a Linux system by means of X terminals (including repurposed low-end PCs). Now, stgraber writes "After almost two years or work and 994 commits later made by only 14 contributors, the LTSP team is proud to announce that the Linux Terminal Server Project released LTSP 5.2 on Wednesday the 17th of February. As the LTSP team wanted this release to be some kind of a reference point in LTSP's history, LDM (LTSP Display Manager) 2.1 and LTSPfs 0.6 were released on the same day. Packages for LTSP 5.2, LDM 2.1 and LTSPfs 0.6 are already in Ubuntu Lucid and a backport for Karmic is available. For other distributions, packages should be available very soon. And the upstream code is, as always, available on Launchpad."
Security

Can You Trust Chinese Computer Equipment? 460

Ian Lamont writes "Suspicions about China slipping eavesdropping technology into computer exports have been around for years. But the recent spying attacks, attributed to China, on Google and other Internet companies have revived the hardware spying concerns. An IT World blogger suggests the gear can't be trusted, noting that it wouldn't be hard to add security holes to the firmware of Chinese-made USB memory sticks, computers, hard drives, and cameras. He also implies that running automatic checks for data of interest in the compromised gear would not be difficult." The blog post mentions Ken Thompson's admission in 1983 that he had put a backdoor into the Unix C compiler; he laid out the details in the 1983 Turing Award lecture, Reflections On Trusting Trust: "The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect."

Comment Re:Wouldn't it make more sense... (Score 1) 105

its actually worse than that, the US could arbitrarily, in the event of a national emergency, turn OFF gps. And thus before 9/11, the EU wasn't worried about that scenario, after 9/11, they saw that we could and might turn off the GPS system if/when we needed to. -that could wreak havoc in a lot of places...

J

Comment Re:Similar Distraction in 2006 Brazilian Collision (Score 2, Interesting) 518

well, there actually has been a mid air collision of two planes off the coast of africa, a C-141 and another cargo plane <URL:http://www.c141heaven.com/65/pic_65_9405.html>, the accuracies of the flight control systems put them on exact paths and... well, the big sky theory <URL:http://en.wikipedia.org/wiki/Big_sky_theory> was proven wrong once again... there are fundamental flaws in the current design of the airspace system, and the fact that we use walkie talkies to communicate in this digital age is rediciulous... I know there are some messaging systems out there (I have used them)... but in general.. we use 1950's tech to do our most critical communication (tower/approach, etc) - I don't even wanna think of the other safety concerns such an old system has such as hacking, or jamming of those comm systems during a critical phase of flight.

a similar incident happened over hawaii as well: <URL:http://blogs.abcnews.com/rapidreport/2008/02/sleeping-pilots.html>

JP
Commercial Multi Engine Pilot

Comment Re:Mesh networks in Aviation (Score 2, Informative) 131

TCAS: Traffic Collision and Avoidance System
each plane has an active TACAN and they peer -to- peer negotiate away from each other..... been available for a while now...
when coupled to an autopilot it even lets you sleep through your daily commute up the Hudson... ok not really...

John
3000+ hours Commercial Multi Engine Instructor Pilot

Comment Re:Who needs to be a billionaire? (Score 1) 318

I'm sure I saw this quote on the bottom of slashdot a couple of months ago: "Work consists of whatever a body is obliged to do, and play consists of whatever a body is not obliged to do." (Mark Twain) In my experience this is absolutely true. I love my work/coding when I'm working on the frivolous bits of projects that I'm not going to get paid for, or perhaps even finish - the moment any obligation sets in it totally ceases to be fun, right?

Comment Re:Easy fix (Score 1) 228

Just remove the dialer and you're set, Google! You're the paragon of innovation, you'll find a way to, you know, call people without actually dialling them!

Of course, I haven't read TFA, but is that possible? I mean, have Google not integrated the app into the normal contacts list in any way? That would seem to be the best thing, if you could add a 'Google Voice' field to the contact database with the calling details, then just select that 'address' from the list when you want to call somebody via GV and have the call automatically routed through the 'Google Voice' caller.. does Apple have an API that would support all that?

Slashdot Top Deals

It's not an optical illusion, it just looks like one. -- Phil White

Working...