Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment It's nineteen-dickety-two all over again! (Score 1) 401

"My story begins in nineteen-dickety-two. We had to say dickety because the Kaiser had stolen our word twenty. I chased that rascal to get it back, but gave up after dickety-six miles."
--Abe Simpson

Just substitute "Steve Jobs" for "the Kaiser" and "pod" for "twenty", and there you go! History repeats itself.

Comment Re:The odd thing? (Score 1) 374

Using DRM to create artificial scarcity for digital media can never be more than a stopgap solution.

As for the question "How will authors get paid" -- have you considered that just maybe the world might be a better place if *fewer* people were able to make a living by writing?

If you produce something that's not a good or service that tangibly contributes to human welfare, it should be harder to earn money from it. This is already the case to some extent.

I'm not saying that writing and arts and other intangibles cannot contribute to human welfare--on the contrary, they can do so in ways that ordinary goods and services cannot. What I AM saying is that 90%+ of books and CDs are steaming piles of manure written to make a buck and contribute absolutely nothing. Maybe artificial scarcity of media has made it too easy to get paid for producing something of zero worth.

If someone has a strong enough passion for writing/creating, they will create no matter what. Some of those will be recognized and compensated in their lifetimes, and others will not. Of course, it's not "fair". But is it less fair than the way the big publishers, who rely absolutely on scarcity, treat content creators now?

I still feel the quality of discourse in society would greatly improve if the only people who were writers were people who were at least willing to be poor for it.
Google

Android Also Comes With a Kill-Switch 300

Aviran writes "The search giant is retaining the right to delete applications from Android handsets on a whim. Unlike Apple, the company has made no attempt to hide its intentions, and includes the details in the Android Market terms and conditions, as spotted by Computer World: 'Google may discover a product that violates the developer distribution agreement... in such an instance, Google retains the right to remotely remove those applications from your device at its sole discretion.'"
Handhelds

Submission + - Study:iPhone touch keyboard "better than expec

thefickler writes: In the weeks leading up to the launch of the iPhone commentators such as John Dvorak and Business Week's Peter Burrows had speculated that the touch keyboard could be the iPhone's downfall.

However a study by Chicago-based User Centric has shown that the touch keyboard actually performs "better than expected" for text messaging tasks

"We conduct studies on different text input systems and we were surprised to find that these iPhone users were more efficient with the touch keyboard when composing text messages than they were when using the phones they owned just a week earlier," said Gavin Lew, Managing Director of User Centric.
Operating Systems

Submission + - Microsoft Admits Vista Failure

mnath77 writes: ""With two overlapping events, Microsoft admitted what we have been saying all along, Vista, aka Windows MeII, is a joke that no one wants. It did two unprecedented things this week that frankly stunned us... "What happened is the OEMs revolted in the background and forced Microsoft's hand. This is a big neon sign above MeII saying 'FAILURE'. Blink blink blink. OK, MeII won't fail, they have OEMs whipped and threatened into a corner, it will sell, but you can almost hear the defectors marching toward Linux. This is a watershed..." http://www.theinquirer.net/default.aspx?article=39 087"
Security

Submission + - DOD Security Breach

Anonymous Coward writes: "you may want to do some research on this: 1. click on DOD URL http://dodsearch.afis.osd.mil/search?q=Sac&www.YOF AST.org=1&access=p&output=xml_no_dtd&ie=UTF-8&clie nt=defenselink&proxystylesheet=defenselink&ip=999. 999.999.999 2. right mouse click and view source 3. find commercial URL embedded in code. this shows that DOD is presently susceptible to outside influence. image www.YOFAST.org can be changed to NEWS http://dodsearch.afis.osd.mil/search?q=Sac&NEWS=1& access=p&output=xml_no_dtd&ie=UTF-8&client=defense link&proxystylesheet=defenselink&ip=999.999.999.99 9 BUT WORSE: imagine if an enemy state modified the page . . . hope this is useful"
Music

Submission + - Safeguards Set for RIAA Hard Drive Inspection

NewYorkCountryLawyer writes: "In SONY v. Arellanes, an RIAA case in Sherman, Texas, the Court entered a protective order (pdf), which spells out the following procedure for the RIAA's examination of the defendant's hard drive: (1) RIAA imaging specialist makes mirror image of hard drive; (2) mutually acceptable computer forensics expert makes make 2 verified bit images, and creates an MD5 or equivalent hash code; (3) one mirror image is held in escrow by the expert, the other given to defendant's lawyer for a 'privilege review'; (4) defendant's lawyer provides plaintiffs' lawyer with a "privilege log" (list of privileged files); (5) after privilege questions are resolved, the escrowed image — with privileged files deleted — will be turned over to RIAA lawyers, to be held for 'lawyers' eyes only'. The order differs from the earlier order (pdf) entered in the case, in that it (a) permits the RIAA's own imaging person to make the initial mirror image and (b) spells out the details of the method for safeguarding privilege and privacy."

Slashdot Top Deals

Pound for pound, the amoeba is the most vicious animal on earth.

Working...