Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment: Re:Government Intrusion (Score 1) 826

True, but it would not take them nearly as long to check your odometer after notifying you by mail that "You have been selected by random to have your odometer reading verified by an authorized agent of the Oregon Bureau of Motor Vehicles. You are required by law to present your vehicle at the designated BMV location on a Monday, Thursday, or alternate Saturday between the hours of 10:00 AM and 12:00 PM (weather permitting) not more than 30 days before the title holders birthday, prior to having your license tags renewed."

Comment: Re:Government Intrusion (Score 1) 826

Why even go high tech? Every year I have to renew my license tags on my birthday. Just report the odometer reading then and pay the appropriate taxes at that time. In my state with my car it works out to about 1.5 cents per mile. At that rate, I'd pay about $180. Maybe less if they slanted it by weight of vehicle, charging commercial trucks more and passenger cars less. It could be abused, sure, but odometer readings can be reported at time of sale or, depending on where you live, when the car has to go in for emissions testing. Random spot checks could be done as well at the bureau of motor vehicles. It would not take more than 5 minutes for an employee to check an odometer.

Comment: Re:Stupid (Score 1) 387

I'm seriously considering a Neo Smartpen for my own uses. It's under 200 bucks and will be good enough to digitize and organize my handwriting and doodles. I've been logging phone calls and jotting notes in lab books for over a decade, and this looks like a very reasonable way for me to continue to work the way I have been and turn my notes into searchable documentation. The down side is that it requires their special paper, so arbitrary sized work spaces won't be possible.

Comment: Re:Hacked (Score 1) 369

Furthermore, I would argue that bypassing the Sony rootkit is not a felony under the DCMA because, by my reading of section B below, the Sony rootkit does not "effectively control access to a work" because audio CDs with this DRM scheme will work perfectly adequately in a CD player, or Linux or Mac computers where the rootkit can not execute. Since the rootkit is not required to operate to gain access to the work under most circumstance, bypassing it should not be illegal under the special circumstance of playing the CD on a Windows PC.

Section 103 (17 U.S.C Sec. 1201(a)(1)) of the DMCA states:

        No person shall circumvent a technological measure that effectively controls access to a work protected under this title.

The Act defines what it means in Section 1201(a)(3):

        (3) As used in this subsection—

        (A) to "circumvent a technological measure" means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and
        (B) a technological measure "effectively controls access to a work" if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.

Comment: Re:Hacked (Score 1) 369

Where in the long list of notes you linked does it say Edward Felten was "arrested"? Everything there is in reference to a civil suite in regards to him and his team publishing details on weaknesses in audio watermarking, which has nothing to do with the Sony rootkit debacle. Civil suits are not the same as criminal preosecutions, and you don't get arrested just because someone sues you.

Felten's Wikipedia page has references to his involvement with the rootkit investigation, but no mention of arrests. Sony was on the receiving end of many civil actions for that SNAFU. There were a lot of jokes at the time of arresting people for selling Sharpie markers as DRM circumvention tools.

Comment: Re:Missing Option (Score 1) 125

by RatherBeAnonymous (#49633339) Attached to: I've had my current ISP (disregarding mergers) for ...

My mother-in-law used her neighbor's open wireless for years without realizing it. When she bought the house it was advertized as "Wireless Ready", and she assumed that meant it came with wireless. One day she tells me that her wireless stopped working. "But you don't have wireless." I said, "You have been mooching off your neighbors." To which she replied, "Oh...."

Comment: Re:That just shows my point (Score 1) 182

It likely doesn't scale linearly. It comes down to how requests are queued at the routers. Chances are that the routers at your ISP use FIFO (First In First Out) queuing because it's cheap and efficient. On an over-saturated link that will mean each requester will get roughly equal shares of the available bandwidth. The neighbor paying for a 10 Mb link will get about the same throughput as the neighbor paying for 100 Mb.

Comment: Re:That just shows my point (Score 1) 182

No, that's not how it works... at all. If you are paying your ISP for 25 Mb and you only get 10 Mb at prime time it's not because your connection is too slow, it is because there is a bottleneck at your ISP. Upgrade to 2 GB if you want, you will still only get 10 Mb at prime time.

Like punning, programming is a play on words.