Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:not protects (Score 1) 1066

Try the Oxford English Dictionary. The definition it cites is:

3. a. A person or company who reproduces or uses the work of another (as a book, recording, computer program, etc.) without authority and esp. in contravention of patent or copyright; a plagiarist. Also: a thing reproduced or used in this way.

The first quote it provides is from 1608. It also provides quotes from 1668, 1703, 1758, 1822, 1887, 1928, and 1996. I would consider a word in use for over 400 years to be "old", but that's just me.

Comment Re:GOOGLE MAIL (Score 1) 467

Are you implying that there are more zip files floating around in workplace environments than there are rar files floating around bittorrent and other file sharing worlds? Honestly, considering the feature set I wouldn't even consider winzip to be a contiguous archive format. It was intended to compress small collections of files in the early days and true "archive" features like multi-part files or archives larger than 4GB have only been added to select programs outside of specifications.

I will concede that if you consider popularity strictly from the perspective of public knowledge zip (weather or not it's a true archive) would easily win. If we were to look at the number of files or size of files stored and transmitted nothing will come close to RAR.

Comment Re:GOOGLE MAIL (Score 1) 467

There's a reason why RAR is the most popular archive format, it provides small files and sound performance, especially on multi-core systems. As long as you're not doing anything illegal the severity of encryption isn't an issue, the DMCA makes snooping encrypted files or communications punishable with extreme repercussions.
Networking

VPN Flaw Shows Users' IP Addresses 124

AHuxley writes "A VPN flaw announced at the Telecomix Cyphernetics Assembly in Sweden allows individual users to be identified. 'The flaw is caused by a combination of IPv6, which is a new Internet protocol due to replace the current IPv4, and PPTP (point-to-point tunneling protocol)-based VPN services, which are the most widely used. ... The flaw means that the IP address of a user hiding behind a VPN can still be found, thanks to the connection broadcasting information that can be used to identify it. It's also relatively easy to find a MAC address (which identifies a particular device) and a computer's name on the network that it's on.' The Swedish anti-piracy bureau could already be gathering data using the exploit."

Comment Re:RTFA (Score 1) 214

Somebody posting at 2 points should know better than to make stupid incorrect analogies like that. Broadcasting unencrypted WiFi is more like leaving your furniture on the front lawn, or even on the curb with a "please take" sign. Even so, your communications aren't being stolen, they're simply being recorded. That's the real issue here, governments love recording citizens, but when someone else does it they feel jealous. That's why google is being ordered to hand over the data instead of being fined.
Handhelds

Asus Joins Tablet PC Race 235

WrongSizeGlass writes "Reuters is reporting that netbook pioneer Asustek Computer Inc. has become the latest technology company to jump on the tablet PC bandwagon. The device will be called the Eee Pad, will run on Intel or ARM chips, and use Microsoft's Windows operating system. 'The Eee Pad can display Adobe Flash for the full web experience, has a USB port and a camera,' Asus Chairman Jonney Shih said. Asus did not release pricing details or a potential release date, and did not provide further details on the format or a launch date for the new app store."
Networking

7Gbps Wi-Fi Networking Kit Could Launch In 2010 156

Mark.JUK writes "Wireless Local Area Networking (WLAN 802.11) adapters capable of speeds 'up to' 7Gigabits per second could be in stores by the end of this year. The Wireless Gigabit Alliance (WiGig), which seeks to advance the worldwide adoption and use of 60GHz wireless networking technology, has published a unified specification for its approach and opened an Adopter Program. The move means that WiGig members can now begin developing a Wi-Fi kit that uses the unlicensed 60GHz spectrum."
Patents

Interactive Exercise Company Sues Nintendo For Patent Infringement 67

isometric writes with this excerpt from Gamasutra: "IA Labs is accusing Nintendo of infringing on two separate IA Labs patents through technology used in the Nintendo Wii, Wii Fit, Wii Fit Plus, the Wii Balance Board, Wii Remote, Wii Wheel, Wii MotionPlus, Wii Nunchuck and Wii Zapper. ... The patents in question are 'Computer interactive isometric exercise system and method for operatively interconnecting the exercise system to a computer system for use as a peripheral' and 'Force measurement system for an isometric exercise device.' The claim said that IA Labs had been in contact with Nintendo during 2007-2008, discussing possible overlaps of IA Labs and Nintendo patents. Emails between IA Labs and Nintendo showed that IA Labs wanted to license its technology to Nintendo. IA Labs was also in talks with Nintendo about a product called Sqweeze, a controller for Wii and PC that's meant to increase physical activity when gaming."

Comment Warning, simple logic here (Score 1) 419

I can't speak for DesCorp, but I'll try anyway :)

The funding problem is centered around the best way to get more funding, not whether the amount of funding is sufficient, or if the government has allocated enough funding to the education sector as a whole.

Going back to your Utah example, Utah would never be _given_ more money, because politics don't work that way. The phenomenon that leads to higher budget schools being lower quality than low budget is the method for receiving more funds; success in this case is often proving to the right bureaucracy that you don't have enough funding by performing poorly. Where funds are distributed like this we see the same problems that the financial sector has: failure to the people isn't failure for the organization, it's an opportunity.

Comment Re:Duh (Score 1) 561

since I liked my first puff of cigarette smoke I was addicted from the first puff.

Not at all and you're correct that physical addiction takes some (variable) amount of time, depending on the substance. That said, I find it very hard to believe you actually liked/enjoyed your first N cigarettes. The motivators to take up smoking are varied, but "enjoy" in the common sense of the word isn't one of them. Thoughts to the contrary are, I suspect, rose-colored remembrances.

Comment Re:CmdrTaco drags big brass ones along the ground (Score 0, Flamebait) 750

It's fine to develop a whole new category of devices. But if you're going to do so, it follows that you should start by at least defining who your audience is and what the purpose of the device is. And many of us simply can't figure out the point of this thing. Of course the die-hard Macheads would happily shell out cash if Steve Jobs took a crap on a plate and sold it as the iShit, but why should someone who's not just an Apple fan in general want one? So it's not an iPhone or a netbook, okay that's fine, but what exactly is it then and why should we buy it? Aside from some typical Apple doublespeak, I've yet to hear a good answer.

Slashdot Top Deals

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...