Forgot your password?

Comment: self defence (Score 1) 134

by darkonc (#47832477) Attached to: After Celebrity Photo Leaks, 4chan Introduces DMCA Policy
You have a bunch of pictures that are KNOWN to have been taken by and stolen from people with enough money to launch some (for anybody else) seriously espensive lawsuits. With a functioning (if often moot) DMCA policy, 4chan is arguably immune from most of those lawsuits.

If the people posting the offending images are willing to defend those lawsuits, it's got nothing to do with 4chan any more.

Comment: It's a Closed-source prodect. (Score 1) 191

by darkonc (#47668679) Attached to: Larry Rosen: A Case Study In Understanding (and Enforcing) the GPL
Versata claiming GPL protection for a Closed-Source product is as obscene as them claiming to be protected by the commercial license, even though they refused to ever write a cheque. The principle is quite simple: If you refuse to abide by the central theme of a license (be it code relicensing or cheque writing), then that license won't protect you.


Comment: Re:What if it were Microsoft code (Score 1) 191

by darkonc (#47668633) Attached to: Larry Rosen: A Case Study In Understanding (and Enforcing) the GPL
You misunderstand: The plaintif's argument is that you are only protected from the patent if the software is distributed via the GPL. Since Versata's customers did NOT get the software under the terms of the GPL, they are not protected by the GPL license that Versata refused to abide by The alternative was to pay for a commercial patent license, but nobody bothered to do that, either.

Thus, both Versata and their customers are in the legal dog house. Technically, Ximpleware doesn't even have to raise the GPL. All that they have to do is sue Versata and their customers for copyright and patent violations. If either tries to claim the GPL as a defense, then the response to that claim is that the GPL doesn't apply to this case because Versata didn't even try to abide by the terms of the GPL.

The code wasn't distributed for free. It was distributed under a choice of two separate licenses: One was the GPL, one was commercial. Clearly, the commercial license route wasn't taken, and the GPL license wasn't adhered to.

Irrelevant if the patent owners argument is accepted that the GPL license did not include a license to use the software because you also needed to obtain a license for the patent that the GPL'd source uses. It's like cops putting out a plate of free 'special' (unmarked as such) brownies next to a plate of $5-per regular brownies at back-to-school night and promptly arresting everybody who eats one of the 'free' brownies.

If Oracle pulled such a BS claim out in their Java lawsuits, everybody but the corporate lawyers would be puking in disgust at such a bold admission of intent to entrap users.

Comment: Re:So criminals should always buy used hard drives (Score 1) 116

by darkonc (#47621251) Attached to: Ask Slashdot: Datacenter HDD Wipe Policy?
They can only say that about data that was clearly deleted.

If I was a criminal, I'd buy used drives in bulk, and see if there was any data on them worth using (or ransom). Using a drive in a way that allowed plausible deniability would take some effort and technical knowledge ... Not the kine of thing that most thieves depend on.

Comment: Re: Physical destruction (Score 1) 116

by darkonc (#47621201) Attached to: Ask Slashdot: Datacenter HDD Wipe Policy?
physical destruction is only 'foolproof' if you're the fool doing it... Otherwise you're depending on the protocols of the people doing the destruction for you.

If you've got a number of drives to go through, wiping drives is a pretty simple process. Get a USB drive enclosure (or 5)... then plug in a drive, turn it on. Run the wipe and wait for the drive to finish wiping. switch off, switch drives and repeat. physical destruction is only called for if the writes fail.

Going beyond wiping a drive is only necessary if someone like the NSA is interested in your data.

Comment: Re:Executive Branch (Score 1) 228

by darkonc (#47366791) Attached to: The New 501(c)(3) and the Future of Open Source In the US
It doesn't "prove" anything that the emails were destroyed. The legal principle is that it can be assumed that there was incriminating evidence in the emails. One of the questions, though, is whether due dilligence was done to secure the emails in question. It is quite possible that the drives really did all die. Manufacturers have bad batches of drives from time to time. It's possible that a bad batch was purchased by the IRS.

I haven't been following that particular escapade. All I will say is that culpability is suspected at this point -- but not entirely proven.

Comment: Re:Yes, maybe... (Score 2) 228

by darkonc (#47366777) Attached to: The New 501(c)(3) and the Future of Open Source In the US

So, let's say a company (IBM) "donates" code that allows an Open Source software package support some unique (patented) feature on their hardware.

Is that charity, or a marketing expense to help the company sell more hardware?

Suppose that I give a group money to house homeless people so that they don't have to huddle around my air vents in the winter. Does that then make the homeless support group a commercial entity?? Charitable groups OFTEN support purposes beyond their direct purpose. That doesn't make them non-charitable... I mean how much do broadcastes make by broadcasting NCAA games?

You're splitting hairs here -- Most people give donations to charitable orginaizations because it, in some way or form, supports their goals. Rifle manufacturers give to the NRA. Drug manufacturers give to research groups at universities (I think that some of those agreements are VERY directly commercial -- especially when there are limits on how the results of the research can be used/disemminated).,,, etc. etc, etc.

Comment: Double-dipping. (Score 1) 182

by darkonc (#47016271) Attached to: FCC Votes To Consider Next Round of 'Net Neutrality' Rules
I already pay Shaw (I'm in Canada) $60/month for a 10megabit connection. If I then have to pay Netflix extra money so that they can pay Shaw to allow the connection to run at 10Mb/s, then Shaw is double-dipping. If I've paid for 10Mb/s then I should GET 10Mb/s if it's technically feasible to do so.

Anything else is false advertising, contractual interference, and/or a Sherman Act violation.

Comment: Re:Seriously. (Score 1) 222

by darkonc (#47016233) Attached to: The Physics of Hot Pockets
If you don't have a problem with Hot Pockets, then you probably have a freezer section that borderline doesn't work. If a hot-pocket is nearly thawed when you throw it into the microwave, it will have pockets of semi-liquid that quickly heat up and help to thaw the internals which then heat up nicely. It doesn't have a whole lot to do with the power of your microwave.

The other solution is to run the thing on 'defrost' for a couple of minutes -- (a short blast of microwaves every 10 seconds or so, with time for the recently-heated liquids to thaw the area around them)... then follow the normal directions to get a properly hot hot-pocket.

Comment: Re:Spreadsheet vs DB (Score 1) 281

Playing with large data sets is more of a pain in a spreadsheet ... and if they have 10K records now, it's not a shock that they'll grow to 100K in a few years. If you're designing for growth, then putting the break, today, at 10K is reasonable. Also, if you've got over 10K records, chances are that you will (eventually) be answering yes to some of the other questions -- like having multiple people doing updates and/or queries on the data.

Comment: Re:Overreacting (Score 1) 384

That's part of the 'invisible hand of the market'. If I don't like the fact that you're pissing on my color/orientation/clothing style, I can refuse to do business with you and discourage my friends from doing so.

It's called 'leverage'. If you don't like it, you don't have to participate in the marketplace. ---- "rather than pissing and moaning about" people talking to their friends.

When you are working hard, get up and retch every so often.