Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Dude! Sounds like a real way to make some bread (Score 1) 159

Sorry, but there are lots of very specialized yeast strains. You don't use the same yeast for wine as you do for beer, and that's different from the one you use for bread. Etc. San Francisco sourdough bread used to be made from a regionally available wild yeast, but I think things may have changed so that it no longer lives here. Certainly given the urban levels of pollution I wouldn't want to depend on catching a wild yeast. There was one bakery that used to have a baker who kept his culture growing on his hairy chest, but the food & drug people forbade this., even though it had been safe and popular for decades.

You aren't going to get one strain of yeast to take over the world. Particularly not one that's become dependent on being cultured in a lab.

Comment Re:Requirements for a DMCA takedown. (Score 3, Informative) 157

Except the DMCA is *NOT* written like that.

http://www.law.cornell.edu/usc...

The relevant portion:

(3) ELEMENTS OF NOTIFICATION
(A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:
(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.
(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.
(iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.
(v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
(vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

Notice the wording of section VI: A Statement that the information in the notification is accurate, and UNDER PENALTY OF PERJURY, THAT THE COMPLAINING PARTY IS AUTHORIZED TO ACT...

The only part of any of that in a DMCA takedown is a statement under penalty of perjury that you are actually authorized to send DMCA by the owner of the material you are saying this infringes against. There is no perjury on any other portion of it, including the good faith, or accuracy notification.

This law was written specifically this way to protect any agent of copyright holders from mistakes and/or malice.

Comment Re:Hi speed chase, hum? (Score 1) 443

Many police departments now have a policy of not performing chases for non-violent crimes because, statistically, you're more likely to kill bystanders by chasing than by letting the criminal drive off.

Given that it's a Tesla (and a dealer-owned one at that), was a chase necessary at all? I suspect that Tesla Corp could have given the police a live feed of the car's GPS co-ordinates at any time?

Comment Re:What if they know something we don't? (Score 1) 143

Well...I'm not sure how hidden it is. We know that they are Apple surveilance devices, and we know that Apple will roll over if the Feds ask them to.

That said, I'd be surprised if there weren't zero-day exploits that haven't yet been made public. OTOH, the same is true for EVERY smart phone.

We've also be informed that the NSA records 80% of all voice conversations. (True? False? No way to check.) This plausibly means that they have all cell phone towers bugged. So they probably rarely need to bother Apple for the information.

Siri clearly requires that the phone know where you are to properly understand you. (Also to communicate with you.)

Etc.

So whether they were intentionally designed for the purpose of being a surveilance device or not (I lean towards not) the capabilities are there. It has also been reported that the microphones and cameras can be remotely activated without signal to the user. Bug or feature? Or did it start out as a bug, but has not been documented?

Whatever, what Apple has been accused of seems blatantly true. But perhaps a result of feature creep than of malign intentions.

Comment Re:You have only yourself to blame... (Score 1) 143

You are embarassing. The GP was right about ONE of the messages being sent by this action. It's probably also intended to help a local company. And It's probably also intended to assist in upcoming negotiations with Apple. Etc.

Don't think that a government announcement sends only one message. Each one sends multiple messages.

Also, don't think that just because China has no problem spying on itself, that it wants anybody else to do so, no matter what it, itself, does abroad. The Chinese government is historically more insular and self-centered than even the US government, and with good reason. China holds most of the world's population, just as Africa holds most of the worlds genetic diversity (among humans). If Africa weren't so fragmented they would also be justified in thinking of the rest of the world as "insignificant tag-ends".

FWIW, you might consider that the current supercomputer speed record is held by a Chinese computer. They may have copied much of the technology from elsewhere, but they've certainly improved on it locally.

P.S.: Much of the information that you refer to as being stolen was actually transferred under contractual terms. I will grant that this isn't true of all of it, but if you look back a couple of centuries, you'll see that the North American colonies, and later the United States did a lot of technology stealing from Britain. As well as getting a lot of it via contractual transfer.

Slashdot Top Deals

This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian

Working...