Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Piracy

Actual Damages For 1 Download = Cost of a 1 License 647

NewYorkCountryLawyer writes "In Real View v 20-20 Technologies, it was held that the actual copyright infringement damages for a single unauthorized download of a computer program was the lost license fee that would have been charged. The judge, in the District Court of Massachusetts, granted remittitur, reducing the jury's verdict from $1,370,590.00 to $4200 unless the plaintiff seeks a new trial. Something tells me the plaintiff will seek a new trial."
AT&T

AT&T Officially Ends Plans To Acquire T-Mobile USA 176

An anonymous reader writes "AT&T has officially announced that it no longer plans to purchase T-Mobile USA from Deutsche Telekom. In a press release, the company said, 'The actions by the Federal Communications Commission and the Department of Justice to block this transaction do not change the realities of the U.S. wireless industry. It is one of the most fiercely competitive industries in the world, with a mounting need for more spectrum that has not diminished and must be addressed immediately. The AT&T and T-Mobile USA combination would have offered an interim solution to this spectrum shortage. In the absence of such steps, customers will be harmed and needed investment will be stifled.'"

Comment Re:Too cynical? (Score 1) 537

To understand this, I think we need to make clear the difference between sexuality and pornography. For example, lots of shows show girls in bikinis on the beach, or strippers dancing with a pole - that's pornography.

Your definition of pornography is quite different then my definition. If the girl (or boy, for that matter) is clothed, it is not pornography. As an example for a even stricter definition of pornography, in Germany, for anything to count as pornography, it has at least to show penetration, or depict genitals in a "provoking" manner (e.g. an erect penis, or a slose-up shout of a vagina.)

Comment Re:Hackers, obviously... (Score 1) 1200

Shamelessly copied from the youtube comments:

she's really very smart. She squirted out that stream of technobabble to cover her exit, went back to her cubicle, cat'd a shell script to track the guy's IP address, opened a random VB file to display in case her boss (who happens to be a big VB fan) walked by, whipped up the GUI with Tcl/Tk, and spent the next 15 minutes looking for a better job.

Actually, "VisualBasic" was probably just product placement. I hope it generated lots of support calls to Redmond.

And you say there are no funny comments on YouTube!

Comment Re:Uh, what? Nonsense! (Score 1) 133

Your car will probably have a lot more then just two busses. It will probably even have ECUs that are conected to more then two busses. However, I'd guess that in theroy the network of ECUs and busses will be fully connected, e.g. most systems report data to the dashboard, so that will be a point where many busses will meet. (Not that this would help taking over the bus or safety relevant systems in any relevant way)

Comment Re:Uh, what? (Score 2) 133

That's simply wrong. Lots of safety relevant systems, like ESP, communicate via CAN (or FlexRey in more modern cars). So, in theory, if you hijacked the whole bus you could pretty easily kill everyone inside the car. In praxis, however, it's not quite that simple. e.g. the bus driver of a FlexRay bus will electrically prevent sending any data outside of your designated timeslot, so you can't override data send by other ECUs. (Not to mention that the only place data from the entertainment system and from safety related systems will meet is probably the dashboard, and that's pretty much a dead end).

Comment Re:This will NO break any encryption algorithms... (Score 1) 318

Your definition is the definition of NP, not NP complete. NP is the set of all problems that are in NP and NP hard (i.e. all problems in NP can be reduced in polynomial time to a problem in NP-complete). If P=NP, all problems in NP can be reduced in polynomial time to any other problem in NP (because they can be solved in polynomial time)

Slashdot Top Deals

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...