Forgot your password?
typodupeerror

Comment: Ignorance may be bliss (Score 1) 4

by CoffeeDog (#37108584) Attached to: Ask SIashdot: How to Write Legal Software?
IANAL, but in the US if you know about a patent and infringe upon it then that's considered "willful" infringement and they can triple the damages against you. Therefore many people in your position don't look at any patents whatsoever so they can plead innocence if a patent infringement occurs and minimize any potiential settlement. If you start looking for and reading over patents to try and cover your ass, you may end up digging a deeper hole later on. Given the huge number and scope of some patents, even if you do look you may miss one or think that one doesn't apply when a lawyer/judge thinks otherwise. If you start pulling in large amounts of cash, keep a good laywer on retainer and pray none of the big guys with large portfolios decide to come after you.
The Almighty Buck

+ - Fired IT workers claim discrimination ->

Submitted by dcblogs
dcblogs (1096431) writes "Eighteen IT employees of Molina Healthcare Inc. who were laid-off after their jobs were offshored, have filed a lawsuit in California claiming they are victims of discrimination after they were replaced with foreign nationals, Indian workers from a outsourcing company. As the company's offshore engagement increased, Indian workers dominated the IT shop so much so that meetings sometimes shifted to an Indian language, which added to a growing sense of isolation among the Molina IT employees. When the IT workers were informed of their layoff at a mass meeting, they went on the attack. "We were being quite confrontational about why they are laying us off and keeping all these H-1B workers," said one of the fired IT professionals."
Link to Original Source
Technology

+ - Swarmanoid Robots Work Together to Steal Books->

Submitted by Zothecula
Zothecula (1870348) writes "Swarms of small, intercommunicating robots are now being eyed up for all sorts of potential uses, including the creation of communications networks for disaster relief, mapping out hazardous environments, or even perhaps helping with the colonization of Mars. Since 2007, a group of European research groups have been collaborating on the now-completed Swarmanoid project, in which a variety of purpose-specific mini robots where programmed to cooperate in order to accomplish a task. Although the bots have been perfecting their book-stealing routine since 2009, a video depicting the task won the Best Video award at last week's 2011 Artificial Intelligence Conference in San Francisco, and was many peoples' introduction to Swarmanoid."
Link to Original Source

+ - Stunning Reversal for Copyright Troll Righthaven

Submitted by
Hugh Pickens writes
Hugh Pickens writes writes "Steve Green writes that in a stunning reversal for Righthaven, the Las Vegas copyright troll won’t be collecting any damages from a man it once branded as a copyright infringer but instead must pay the man's legal fees of $34,045. US District Judge Philip Pro awarded the fees in the case of Kentucky message board poster Wayne Hoehn dismissing Righthaven's suit and finding that Righthaven didn’t have standing to sue him due to the Review-Journal maintaining control of the column despite Righthaven's claims of ownership and even that if Righthaven did have ownership, Hoehn was protected by the fair use doctrine in posting an entire Las Vegas Review-Journal column on a sports betting website message board. This is the second attorney’s fee award against Righthaven. Earlier, Randazza Legal Group was awarded $3,815 for representing defendant Michael Leon. But these are likely just the tip of the iceberg, with prevailing defendant Thomas DiBiase asking for $199,250 while the Democratic Underground will likely seek a fee award of many hundreds of thousands of dollars after Righthaven was dismissed from that suit for lack of standing. The bottom line for Righthaven is that so far it has not won a single lawsuit – of 275 lawsuits filed since 2010 – on the merits."
Advertising

+ - Digital Tech and the Re-Birth of Product Placement->

Submitted by
pbahra
pbahra writes "When you think of product placement on television you tend to think of cumbersome 1950s examples where the actor would cheesily turn to camera and hold up say a bar of soap—where do you think the sobriquet soap opera came from—to deliver his line. Perhaps to save all of us the artistic murder, the practice was prohibited in Europe, but recently the prohibition has been relaxed and a U.K. start up is offering digital producers the chance to inject products realistically in post production with full directorial control. The problem with existing physical product placement is that there are no clear business plans, and the process is incredibly slow. In Europe, legal constraints prohibit directors from re-writing scripts to include products, so any placement has to be done at the creative stage. “This means 9-12 months to get the result from the idea of introducing a brand into a show to broadcast,” says Mark Popkiewicz, CEO of MirriAd.
For three of its four years, says Mr. Popkiewicz, the company was building and perfecting the technology that allows it to process, in quicker than real time, video to identify opportunities to inject products after shooting, and the parallel technology to scan the product and inject it into the video unobtrusively. The key to success is two fold: artistically how well the products blend into the movie, and commercially, how successful it is for the advertisers."

Link to Original Source
Data Storage

+ - Five-dimensional glass disc storage->

Submitted by
MrSeb
MrSeb writes "Researchers from the University of Southampton, England, have successfully recorded, read, and erased data from a clear piece of nano-structured glass. This technique could revolutionize microscopy in general, and medical imaging in specific — and, perhaps more importantly for computing, it could also be used to store binary data, like an optical disc. Beyond the standard three dimensions that are used by optical disc storage — vertical and horizontal positions on the piece of glass, and varying depths — wavelength and polarization can also be used to carry data. Ta'da, five dimensions."
Link to Original Source
Transportation

+ - EV travels a record 1,000 miles+ on single charge->

Submitted by cylonlover
cylonlover (1921924) writes "The “Schluckspecht E” electric vehicle built by a team at the University of Applied Sciences in Offenberg, Germany has broken the world record for the longest distance traveled on a single charge. The world record attempt was made at the Bosch test track in Boxberg with the vehicle traveling a total distance of 1631.5 km (1,013.76 miles), breaking the previous record of 1,003 km (623 miles) set by the Japan Electric Vehicle Club last year."
Link to Original Source
Software

+ - Ask SIashdot: How to Write Legal Software? 4

Submitted by craznar
craznar (710808) writes "I am a professional software developer, currently writing some 'high-tech' point of sale software with some pretty unique features in it. The company I work for is a start up and doesn't have much in the way of financial resources.

Almost all of the code is my design, the over all structure is my design — but it uses a stack of novel approaches to problems that I worked out with customers over a period of a year or more.

This brings me to my primary concern — how many patents am I unknowingly breaking, how on earth can I possibly find out, and fundamentally is it at all possible to actually write software free of patent infringement any more.

For the moment, ignore the patent infringements in your purchased (and or open source) development libraries and development tools and focus the question just on the parts I have developed and written myself ?"

Comment: TPB is down for me (Score 2, Insightful) 325

by CoffeeDog (#33497344) Attached to: Pirate Bay Down; Police Raids Across Europe
I've been trying to get on Pirate Bay this morning and most times my connection either times out or I get an error page about connecting to a caching server and only after mashing the reload button many times do I actually get a page.

Then again this could just be the effect of everyone reading news stories about it being down and trying to "test" if the site is up, thus overloading and taking down the server for real. Hooray for self-fulfilling prophecy!

+ - Slashdot is Dying, New York Times Confims It-> 12

Submitted by Anonymous Coward
An anonymous reader writes "The New York Times is running a story about how Slashdot has dropped in popularity compared to other news sites in social web space. Quote: "Why is Slashdot almost irrelevant to the social media community? It used to be the biggest driver of traffic to tech web sites, but now it hardly delivers any traffic at all to them. We explore some of the reasons, including input from our own community.""
Link to Original Source
Science

+ - Data leak: galaxy rich in Earth-like planets->

Submitted by sciencehabit
sciencehabit (1205606) writes "A leak from an Oxford conference about the Kepler satellite mission reveals that out of approximately 265 planets represented on a particular graph, about 140 were labeled "like Earth"--having a radius smaller than twice Earth's radius. So the unauthorized presentation of preliminary results would seem to confirm that Kepler has succeeded in showing that Earth is no fluke."
Link to Original Source
Security

+ - WiFi WPA2 vulnerability found->

Submitted by BobB-nw
BobB-nw (666) writes "Perhaps it was only a matter of time. But wireless security researchers say they have uncovered a vulnerability in the WPA2 security protocol, which is the strongest form of Wi-Fi encryption and authentication currently standardized and available.

Malicious insiders can exploit the vulnerability, named "Hole 196" by the researcher who discovered it at wireless security company AirTight Networks. The moniker refers to the page of the IEEE 802.11 Standard (Revision, 2007) on which the vulnerability is buried. Hole 196 lends itself to man-in-the-middle-style exploits, whereby an internal, authorized Wi-Fi user can decrypt, over the air, the private data of others, inject malicious traffic into the network and compromise other authorized devices using open source software, according to AirTight.

"There's nothing in the standard to upgrade to in order to patch or fix the hole," says Kaustubh Phanse, AirTight's wireless architect who describes Hole 196 as a "zero-day vulnerability that creates a window of opportunity" for exploitation."

Link to Original Source

The universe does not have laws -- it has habits, and habits can be broken.

Working...