An anonymous reader wrote in with an update in the long drawn out legal proceedings between the DVD CCA and Kaleidescape, a manufacturer of a video jukeboxes. Despite a victory by Kaleidescape in 2007, they ended up back in court in November 2011. The DVD CCA insisted that ripping a DVD was in violation of the license granted to Kaleidescape; Kaleidescape disagreed since their jukebox made a bit-for-bit copy of the disc rather than first decrypting the contents. Unfortunately, in a preliminary ruling, the court agrees with the DVD CCA. Kaleidescape has released a statement.
#NetNeutrality is STILL in danger - Click here to help. DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×
itwbennett writes "In a classic case of 'we say destroy, you say party hard,' the U.S. Dept. of Homeland Security detained a pair of British twenty-somethings for 12 hours and then sent them packing back to the land of the cheeky retort. At issue is a Tweet sent by Leigh Van Bryan about plans to 'destroy America,' starting with LA, which, really, isn't that bad an idea."
An anonymous reader writes "The National Center for Supercomputing Applications at the University of Illinois is finally getting the troubled Blue Waters supercomputer installed. After IBM walked away from the project after 3 years of planning, Cray stepped in to pick up the $188 million contract. Now, in around 9 months time, Blue Waters should be fully operational and achieve performance of 1 petaflop or more. As for the hardware... who wouldn't want access to 235 Cray XE6 cabinets using AMD 16 core Opteron 2600 processors with access to 1.5 petabytes of memory (4GB per chip) and 500 petabytes of local storage."
Hugh Pickens writes "Marissa Taylor says the retail chains' worst nightmare are consumers who come in to take a look at merchandise in-store, but use smartphone apps to shop for cheaper prices online. But now stores like low-end retail chain Target plan to fight 'showrooming' by scaling up their business models and asking vendors to create Target-exclusive products that can't be found online. 'The bottom line is that the more commoditized the product is, the more people are going to look for the cheapest price,' says Morningstar analyst Michael Keara. 'If there's a significant price difference [among retailers] and you're using it on a regular basis, you're going to go to Amazon.' Target recently sent an 'urgent' letter to vendors, asking them to 'create special products that would set it apart from competitors.' Target's letter insisted that it would not 'let online-only retailers use our brick-and-mortar stores as a showroom for their products and undercut our prices without making investments, as we do, to proudly display your brands.' Target also announced that it had teamed up with a handful of unique specialty shops that will offer limited edition merchandise on a rotating basis within Target stores in hopes of creating an evolving shopping experience for customers. Target is 'exercising leverage over its vendors to achieve the same pricing that smaller, online-only retailers receive,' says Weinswig. 'This strategy would help Target compete with retailers like Amazon on like-for-like products.'"
An anonymous reader writes "I used Lego's Digital Designer software to build a model of a Sinclair ZX81 — the computer that kicked me off on my interest in such matters way back in 1981. Until very recently, the software allowed you to upload your model, buy it and get a boxed set with all the pieces to build it (as well as instructions). The ZX81 model is as close to the shape of the original as I could make it, considering that Lego is quite a lo-resolution modelling tool. I even made it so that you can lift off the lid and see a representation of the PCB in side. I have also posted the model to Lego's Cuusoo site — a place where you can post ideas, and if they gain enough support they will be considered for production."
judgecorp writes "The ten-year legal quagmire surrounding Gary McKinnon, who hacked into U.S. military and NASA computers in 2001 and 2002, must end this year, a British High Court Judge has ordered. McKinnon has been appealing against extradition to the U.S., and two medical experts must report in 28 days on his mental state, ruling whether he would be a suicide risk if deported. This ruling could short-circuit an extradition appeal hearing in July."
adeelarshad82 writes "Following a tour of a 3D printer factory, analysts at PCMag wanted to explore the option of building a 3D printer themselves. With the help of a 3D printer manufacturer, Buildatron, they were able to compile a step-by-step guide on how to build a 3D printer."
An anonymous reader writes "Steven Elop of Nokia has placed some of the blame for the struggles of Windows Phone on mobile phone shops — for not pushing it. As The Register points out, sales staff 'want their commission,' and tend to only show phones they think might sell. Exact details of Windows Phone sales numbers are being covered up by both Microsoft and Nokia, who refuse to state specifics; sales figures to operators are stated at one million, but the majority of those seem to be unsold to consumers, and neither Microsoft nor Nokia will give numbers on activations. The best available numbers seem to be maximum Lumia sales estimates from Tomi Ahonen, a former Nokia Executive and the only analyst to correctly predict Nokia's market share fall for the end of 2011. Nokia's Lumia sold around 600,000 phones in 2011 (again, including the large portion in warehouses). One of the worst signs for WP8 is that Nokia's N9 — despite being crippled without marketing, and often selling at full price compared to the almost fully subsidized Lumia phones — is selling better than Nokia's Windows phones, with 1.5M or more phones reaching end users. Interestingly, if the Nokia N9 had been available in all markets, it might have sold almost 5M units and pushed Nokia into profitability."
An anonymous reader writes "NTT DoCoMo has had enough of Android's effects on its mobile network in Japan. Following a service disruption due to Google's Android VoIP app, the company is now asking Google to look at reducing Android's data use. In particular, the amount of time allowed between control signals being sent either by official apps or 3rd party ones. Typically these occur as often as every 3 minutes, but scale that up to thousands of apps on millions of handsets and you can see the issue DoCoMo has. So, does DoCoMo need to invest more in its infrastructure, or is Android a data hog that needs reining in?"
New submitter advid.net writes "According to the Associated Press, user data from the recently-closed file-hosting site Megaupload could be destroyed as soon as Thursday. Apparently Megaupload paid another company to actually store the data. 'But Megaupload attorney Ira Rothken said Sunday that the government has frozen its money. A letter filed in the case Friday by the U.S. Attorney's Office for the Eastern District of Virginia said storage companies Carpathia Hosting Inc. and Cogent Communications Group Inc. may begin deleting data Thursday. ... The letter said the government copied some data from the servers but did not physically take them. It said that now that it has executed its search warrants, it has no right to access the data. The servers are controlled by Carpathia and Cogent and issues about the future of the data must be resolved with them, prosecutors said." There's also been talk of a lawsuit against the FBI over users' lost files.
snydeq writes "With so many threats to a free and open Internet, sooner or later, people will need to arm themselves for the fight, writes Deep End's Paul Venezia. 'If the baboons succeed in constraining speech and information flow on the broader Internet, the new Internet will emerge quickly. For an analogy, consider the iPhone and the efforts of a few smart hackers who have allowed anyone to jailbreak an iPhone with only a small downloaded app and a few minutes,' Venezia writes. 'All that scenario would require would be a way to wrap up existing technologies into a nice, easily-installed package available through any number of methods. Picture the harrowing future of rampant Internet take-downs and censorship, and then picture a single installer that runs under Windows, Mac OS X, and Linux that installs tor, tools to leverage alternative DNS servers, anonymizing proxies, and even private VPN services. A few clicks of the mouse, and suddenly that machine would be able to access sites "banned" through general means.'"
astroengine writes "In a recent debate, Republican presidential candidate Newt Gingrich said he would like to beat the Chinese back to the moon. He has even been so bold as to propose setting up a manned base by 2020, driven by empowering private industry to take the initiative. It's ironic to hear moon travel still being debated 40 years after the last Apollo landing in 1972. Between then and now, NASA's small space shuttle fleet filled in for space travel, but astronauts could only venture as far a low earth orbit — at an altitude much lower than the early pioneers reached. If there were no Apollo crash program to beat the Soviets to the moon, would we have planned to go to the moon eventually? But this time with a commitment of staying? Or would we never go?"
A few weeks back, you asked gaming-world academic and game designer Ian Bogost questions from the business, philosophical, and aesthetic sides of gaming; below, find his responses. Thanks, Ian!
Sparrowvsrevolution writes with this excerpt from a Forbes piece recounting a scary demo at the just-ended Shmoocon: "[Security researcher Kristin] Paget aimed to indisputably prove what hackers have long known and the payment card industry has repeatedly downplayed and denied: That RFID-enabled credit card data can be easily, cheaply, and undetectably stolen and used for fraudulent transactions. With a Vivotech RFID credit card reader she bought on eBay for $50, Paget wirelessly read a volunteer's credit card onstage and obtained the card's number and expiration date, along with the one-time CVV number used by contactless cards to authenticate payments. A second later, she used a $300 card-magnetizing tool to encode that data onto a blank card. And then, with a Square attachment for the iPhone that allows anyone to swipe a card and receive payments, she paid herself $15 of the volunteer's money with the counterfeit card she'd just created. (She also handed the volunteer a twenty dollar bill, essentially selling the bill on stage for $15 to avoid any charges of illegal fraud.) ... A stealthy attacker in a crowded public place could easily scan hundreds of cards through wallets or purses."
judgecorp writes "Google, Microsoft, PayPal, Facebook and others have proposed DMARC, or Domain-based Message Authentication, Reporting and Conformance, an email authentication protocol to combat phishing attacks. Authentication has been proposed before; this group of big names might get it adopted." Adds reader Trailrunner7, "The specification is the product of a collaboration among the large email receivers such as AOL, Gmail, Yahoo Mail and Hotmail, and major email senders such as Facebook, Bank of America and others, all of whom have a vested interest in either knowing which emails are legitimate or being able to prove that their messages are authentic. The DMARC specification is meant to be a policy layer that works in conjunction with existing mail authentication systems such as DKIM (DomainKeys Identified Mail) and SPF (Sender Policy Framework)."