Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:why does the poster thing this helps VP9? (Score 1) 68

How do you call VP9 royalty-free in the same article as the rest of this info.

There is not currently a patent pool for VP9. That doesn't mean it's in a better position than HEVC, given there could be a "freelance" patent pool for VP9 any day now.

Any standard which becomes successful attracts leeches. VP9 is no exception.

How do you call VP9 royalty-free in the same article as the rest of this info.

There is not currently a patent pool for VP9. That doesn't mean it's in a better position than HEVC, given there could be a "freelance" patent pool for VP9 any day now.

Any standard which becomes successful attracts leeches. VP9 is no exception.

Carefully avoiding all known patents puts them into a better position, even if the position is just a smaller number of patents.

Comment Re:Its a shame WebM sucks (Score 1) 68

I think there are two distinct worlds, people who handle the distribution of video and content creators. For content creators, they need highly polished GUIs ... like those provided by Final Cut Pro and iMovie. There are also batch video conversion tools that are entirely oriented around the GUI.

Comment Re:So You are Saying (Score 1) 68

... these are not single algorithms, nor are they in any way simple. This is very sophisticated software. At least scan through the Wikipedia entry linked in the summary to get a rough idea of the complexity of these monsters.

I actually read through some of the patents Nokia was threatening VP8/9 with and they really are not sophisticated at all, they are just written in the most confusing possible way. For example, the following paragraph is from a Nokia patent that basically describes the selection of neighboring pixels:

selecting a first reference video pixel in the first video block and a second reference video pixel in the second video block, the first reference video pixel and the second reference video pixel being other than the first boundary video pixel and the second boundary video pixel and the first reference video pixel and the second reference video pixel being placed closer to a central portion of each of said video blocks than the respective boundary video pixel, in such a way that the reference video pixels and the boundary video pixels are situated on a straight line, the straight line being transverse to the boundary, drawn from the first reference video pixel to the second reference video pixel, wherein the first and the second boundary video pixels are located between the first and the second reference video pixels on the straight line,

I was planning on busting all of the Nokia patents myself, but then I got busy :p

Comment How much work do the archivists have ahead of them (Score 1) 140

It would be nice to hear from an archivist about how they plan to go about archiving the projects. How well does Archive.org's time machine cover Google Code? It would be cool if Google would post a link to a zip export of every project so you can just pul upl the last (and latest) result up on Archive.org and download the project.

Comment Language Requirements are a Scam (Score 1) 259

Foreign language graduation requirements are a scam to employ PhD and masters students in the linguistics department. I know a lot of about educational psych and language learning and there was little about the intensive foreign language course I had to take at the UW that could be mistaken as for prepping us for actual fluency. These classes are designed to allow students to pass a test, not speak a foreign language. It actually got easier as the summer went on because each grad student got more desperate for high reviews and thus more forgiving of mistakes.

Whatever you stance on learning foreign languages, computer languages give a window into a different way of logic. This is at least as educational as rote memorization of vocabulary and verb forms.

Submission + - A ChillingEffects.org for Domain Names (indolering.com)

fsterman writes: Domain name seizures used to be a rare occurrence, but US law enforcement has become adept at exploiting a quirk in the Internet's governance structure that allows them to seize a wide range of domains without due process. The rate has been increasing exponentially, with a total of 87 in 2010 to 1,700 in mid-2013. A month ago, nearly 5,000 domains were seized by a corporation using civil proceedings. The types of attacks targeting DNS have been increasing as well, such as when a US embassy had GoDaddy shut down a political protest site.

Submission + - Research Shows RISC vs CISC Doesn't Matter 1

fsterman writes: The power advantages brought by the RISC instruction sets used in Power and ARM chips is often pitted against the X86's efficiencies of scale. It's difficult to asses how much the difference between instruction sets matter because teasing out the theoretical efficiency of an ISA from the proficiency of a chip's design team, technical expertise of its manufacturer, and support for architecture-specific optimizations in compilers is nearly impossible . However, new research examining the performance of a variety of ARM, MIPS, and X86 processors gives weight to Intel's conclusion: the benefits of a given ISA to the power envelope of a chip are minute.

Comment High Horse (Score 1) 170

... 'It's a kind of delightful revelation given the fact that the Germans have been on their high horse.' Christian Whiton, a former ... State Department senior advisor

Yup, Germany stepped off their high-horse and dived right into our cesspool. But just because everyone is violating our fundamental civil liberties en-mass doesn't make it any less evil.

The only thing this tells us is what our threat model should have been from the start.

Comment Re:How many years could he be charged with? (Score 4, Informative) 299

Except per Swedish and EU law that would be illegal.

I don't know why you people keep bringing it up.

Because Assange has said that if Britain and Sweden would put forth a good-faith promise not to extradite him he would happily travel to Sweden to face the molestation charges.

If what you are saying is true then I don't know why Glenn Greenwald (a former lawyer) and others would have put together a document detailing exactly how the two governments could make that promise,

This is why this is so crucial: if Sweden (and/or Britain) would provide some meaningful assurance that Assange would not be extradited to the US to face espionage charges for WikiLeaks' journalism, then the vast majority of asylum supporters (including me) would loudly demand that he immediately travel to Stockholm to confront those allegations; Assange himself has said he would do so. That gives the lie to the ugly slander that those who have expressed support for Ecuador's asylum decision are dismissive of the sex assault claims or do not care about seeing them resolved.

Speaking for myself, I have always said the same thing about those allegations in Sweden from the moment they emerged: they are serious and deserve legal resolution. It is not Assange or his supporters preventing that resolution, but the Swedish and British governments, which are strangely refusing even to negotiate as to how Assange's rights against unjust extradition and political persecution can be safeguarded along with the rights of the complainants to have their allegations addressed.

Of course, Greenwald and the Guardian might be lying but, at this point, I trust them much more than I trust British and Swedish governments.

Comment Yup (Score 1) 263

Patents were created to help protect the upfront capital investments required for creating physical goods. We came up with a set of rules that protect against utterly absurd misapplications of this temporary monopoly. The justices are trying to apply these baseline protections to an area of investment and innovation that is radically different. If only we could just pass a law saying "this is stupid" and move on....

Submission + - Speech.is: interop for Nameoin censorship resistant DNS (speech.is)

fsterman writes: Growing up on Slashdot, I've been watched ICANN and the slow decline of the DNS system with great dismay. A year ago, I set out to create a scalable interoperability layer for Namecoin that doesn't involve proxies or mirroring content.

Speech.is reimplements DNS lookups within the browser itself. When coupled with emerging WebRTC P2P networks we are able to push all processing to the client side, shielding us from legal liability.

What's *really* amazing is that I was able to backport some of the censorship resistant properties of the Namecoin .bit TLD to regular websites. Governments will be unable to selectively censor websites and it will be *very* difficult for politicians and judges to rationalize their way into blacklisting the entire domain.

The www.speech.is website has the full nitty-gritty details. However, remember that this is a developer preview!

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...