Comment DRM (Score 3, Funny) 645
Hows that online requirement DRM working out for you guys?
~UC
Hows that online requirement DRM working out for you guys?
~UC
And apparently it is recyclable into boots! Amazing!
Taken from wiki. This is a breach on at least 3 HIPAA technical safeguards.
Technical Safeguards – controlling access to computer systems and enabling covered entities to protect communications containing PHI transmitted electronically over open networks from being intercepted by anyone other than the intended recipient.
Information systems housing PHI must be protected from intrusion. When information flows over open networks, some form of encryption must be utilized. If closed systems/networks are utilized, existing access controls are considered sufficient and encryption is optional.
Each covered entity is responsible for ensuring that the data within its systems has not been changed or erased in an unauthorized manner.
Data corroboration, including the use of check sum, double-keying, message authentication, and digital signature may be used to ensure data integrity.
Covered entities must also authenticate entities with which they communicate. Authentication consists of corroborating that an entity is who it claims to be.
Examples of corroboration include: password systems, two or three-way handshakes, telephone callback, and token systems.
Covered entities must make documentation of their HIPAA practices available to the government to determine compliance.
In addition to policies and procedures and access records, information technology documentation should also include a written record of all configuration settings on the components of the network because these components are complex, configurable, and always changing.
Documented risk analysis and risk management programs are required. Covered entities must carefully consider the risks of their operations as they implement systems to comply with the act. (The requirement of risk analysis and risk management implies that the act’s security requirements are a minimum standard and places responsibility on covered entities to take all reasonable precautions necessary to prevent PHI from being used for non-health purposes.)
Wait! jddorian?! Like JD, John Dorian, from the show Scrubs? I love that show!
Read the actual bill, the Science Mag reporter is a moron.
Agreed. No respectable gamer spells 1337 w/ letters.
Unrelated, but using fucking as a verb, like I did, makes this much more funny. Albeit rather sexist.
UC
(((Institutionalized embezzlement)))
I may be a minority w/ this thought process, but if I get screwed over by a company once, I'll never buy from them ever again. I can understand if you make a mistake, or your webcode is bugged but if you go out of your way to ruin my experience for profit pushing shareholders then I could care less for your product. I feel bad for Bioware, I really do. I know their policy was not this bad before the EA acquisition but I agree w/ the banned user; they sold their soul to the EA devil. When Bioware was not EA, I remember having lost a Neverwinter key and when I emailed them of the issue, they simply gave me a new one. Try doing that w/ EA...
Thank you for dredging up horrible memories of past EA incompetence. I agree w/ the list w/ the exception of online accounts. WoW and other such online accounts can be resold and often add value to the particular account. Now if you were to say something like the Mass Effect online account, then yes, that setup was beyond terrible and seems non-transferable.
UC
Welcome to EA gaming. Here are my steps for anything EA.
=================
Read "EA" on box (or site)
Put box down and walk away (or navigate away)
=================
Been burnt by this company too many times.
Dear Bioware,
Thank you for reminding me of your DLC centric business model. You have again shown that a pirated version of your software is superior than that of the product offered in your online store. I hope you enjoy alienating your paying customers.
Sincerely,
UC
internet pirates
Thank you for the clarification. I thought the story was talking about pirates hijacking transport ships on the high seas for Microsoft game card booty.
You beat me to it. I was shocked to see a Mac fanboi use gaming as part of THEIR argument. Something new everyday.
"Aha ha ha. Oh, gosh that's funny. That's really funny. Do you write your own material? Do you? Because that is so fresh. You are the weakest link goodbye. You know, I've never heard anyone make that joke before. Mmm. You're the first. I've never heard anyone reference, reference that outside the program before. Because that's what she says on the show right? Isn't it? You are the weakest link goodbye. And yet, you have taken that and used it out of context, to insult me in this everyday situation. God what a clever, smart girl you must be, to come up with a joke like that all by yourself. Mmm, that's so fresh too. Any titanic jokes you want to throw at me while we're hitting these at the height of their popularity? Hmm? Cause... I'm here. God you're SO funny."
TFA explains first that 10000 calls were dropped but the investigation showed that it was 10000 calls failing to connect. Isn't this two completely different situations? The first being the customer connecting then being disconnected and the second never actually connecting. I could see someone failing to connect at all then attempt to dial multiple times in quick succession...
UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn