Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
News

Submission + - 9th Circuit Rules Copyright Preempts Right of Publ (blogspot.com) 1

David Weiskopf writes: This past week, in Jules Jordan Video vs. 144942 Canada (August 16, 2010), in which Plaintiff (an adult film star) sued Defendant for its pirating and redistributing of plaintiff's films, the Ninth Circuit held, in what I consider to be a very troubling ruling, that the Plaintiff's (California-based) right of publicity claim was preempted by his available claims for copyright infringement under federal copyright law. Specifically, in reversing the lower District Court and vacating the judgment in favor of plaintiff, the Court's three judge panel (which included Judge Kozinski, who, you might remember, famously dissented from the Ninth Circuit's Order rejecting the suggestion of an en banc hearing in Wendt vs. Host International, Inc., based in part on his argument that the Ninth Circuit should have found that that the right of publicity claim at issue was preempted by the the actors' federal copyright claims) held that "[Plaintiff's] right of publicity claim falls within the subject matter of copyright, and that the rights he asserts are equivalent to the rights within the scope of Section 106 of the Copyright Act. The essence of [Plaintiff's] claim is that [Defendants] reproduced and distributed the DVDs without authorization. [Plaintiff's] claim is under the Copyright Act." The Court's primary reasoning appears based on the facts of the case, where the Court makes clear that Defendant's infringing acts were comprised solely of reproducing and distributing pirated DVDs; Defendant did not otherwise use Plaintiff's name or likeness in promoting the fake DVDs, but simply redistributed the illicitly made copies containing the original and otherwise properly authorized performance (likeness) of Plaintiff.
Patents

Submission + - Apple patents tech to record iPhone thieves (goodgearguide.com.au)

angry tapir writes: "A new Apple patent proposes a mechanism to catch iPhone thieves: it would record the voice of the current user of the phone, take photographs of the user, geotag the photograph and activate the accelerometer to "determine a current mode of transportation of the electronic device." (View the patent itself here. [PDF])"
Hardware

Submission + - Small Plug-in solar panels coming out in 2011

KindMind writes: Clarian Power, a Seattle startup, is promising "plug-in" solar panels at $600 to $800 installed per panel for homeowners and small businesses. A typical installation is three panels, at around $2400 installed. These generate about 200 watts a panel, so a three panel systems would be 800 watts A single panel would save 30 to 40 kilowatt hours per month, translating to around $50 a year in energy cost savings. The estimated payback for a setup like this is estimated at four years, with tax credits and rebates taken into account. This is a supplemental power system, for replacing outside utility power, not for selling back to the utility company. The target date to have these for sale is sometime in 2011.

Submission + - Better Way to Grow Stem Cells Developed

An anonymous reader writes: Human pluripotent stem cells, which can become any other kind of body cell, hold great potential to treat a wide range of ailments, including Parkinson's disease, multiple sclerosis and spinal cord injuries. However, scientists who work with such cells have had trouble growing large enough quantities to perform experiments — in particular, to be used in human studies.Furthermore, most materials now used to grow human stem cells include cells or proteins that come from mice embryos, which help stimulate stem-cell growth but would likely cause an immune reaction if injected into a human patient. To overcome those issues, MIT chemical engineers, materials scientists and biologists have devised a synthetic surface that includes no foreign animal material and allows stem cells to stay alive and continue reproducing themselves for at least three months.
Space

Submission + - Non-profit manned space rocket launching in a week (copenhagensuborbitals.com) 2

Plammox writes: Well not really manned in the first go, as this is the first test of the boosters and space craft in combination with the sea launch platform they built. The catch? All of this is a non-profit project based on voluntary labour and sponsors. How will they get the launch platform out in the middle of the Baltic sea to perform the test? With the founder's home built submarine pushing it, of course. Enjoy the pictures.
Government

Submission + - Germany to grant privacy at the workplace (googleusercontent.com)

An anonymous reader writes: The German government is proposing a bill deciding employees do have an expectation of privacy at the workplace. Among other provisions, the bill would ban employers from surveilling their employees by cameras or logging and reading their emails.Also, potential employers would not be allowed to view an applicant's profile at facebook or any other social network that hasn't actually been made for this purpose.
Cellphones

Submission + - National Park Service Says Tech Enabling Stupidity 2

theodp writes: The National Park Service is finding technology to be a double-edged sword. While new technologies can and do save lives, the NPS is also finding that unseasoned hikers and campers are now boldly going where they never would have gone before, counting on cellphones, GPS, and SPOT devices to bail them out if they get into trouble. Last fall, a group of hikers in the Grand Canyon called in rescue helicopters three times by pressing the emergency button on their satellite location device. When rangers arrived the second time, the hikers complained that their water supply tasted salty. 'Because of having that electronic device, people have an expectation that they can do something stupid and be rescued,' said a spokeswoman for Grand Teton National Park. 'Every once in a while we get a call from someone who has gone to the top of a peak, the weather has turned and they are confused about how to get down and they want someone to personally escort them. The answer is that you are up there for the night.'
Security

Submission + - Faulty Alarms Blamed for van Gogh Theft (google.com)

pickens writes: AP reports that none of the alarms and only seven out of 43 surveillance cameras were working at a museum where a Vincent van Gogh painting was stolen, as thieves made off with the canvas, known by the titles of "Poppy Flowers" and "Vase with Flowers," on Saturday from the Mahmoud Khalil Museum in the Egyptian capital of Cairo. This is the second time this painting by the Dutch-born postimpressionist has been stolen from the Khalil museum. Thieves first made off with the canvas in 1978, before authorities recovered it two years later at an undisclosed location in Kuwait. Officials have never fully revealed the details of that theft.

Submission + - Critical e-voting researcher arrested in India (freedom-to-tinker.com)

mpawlo writes: Hari Prasad, a researcher working with J. Alex Halderman, Ed Felten and Rop Gonggrijp on a (highly) critical study of flaws in Indias e-voting system was arrested by ten police officers in Hyderabad, India yesterday. It appears this is a political arrest to unveil the groups anonymous source whom provided a voting machine to the group's study.
Education

Submission + - Ancient Nalanda University to be resurrected

An anonymous reader writes: Nalanda University [http://en.wikipedia.org/wiki/Nalanda] — "one of the first great universities in recorded history" — an ancient Indian center of advanced learning (427-1193CE) that attracted pan-Asian scholars is planned to be resurrected by Indian Government through passage of a parliamentary bill. Nalanda Mentor Group has been constituted to which is headed by Nobel laureate Professor Amartya Sen. It will act as its Interim Governing Board.

The University was visited by Buddha Himself in His lifetime, and served as major center of Budhdhist teachings throughout its existence. It was finally sacked and its library burned down by Moghuls. The library is recorded to have burned for three months, with precious materials lost forever.

Read more at: http://www.ndtv.com/article/india/recreating-nalanda-an-indian-renaissance-46197?cp
Medicine

Submission + - Look-Alike Tubes Are Killing Hospital Patients (nytimes.com) 1

Hugh Pickens writes: "The NY Times reports that in hospitals around the country nurses connect and disconnect interchangeable clear plastic tubing sticking out of patients' bodies to deliver or extract medicine, nutrition, fluids, gases or blood — sometimes with deadly consequences. Tubes intended to inflate blood-pressure cuffs have been connected to intravenous lines leading to deadly air embolisms., intravenous fluids have been connected to tubes intended to deliver oxygen leading to suffocation, and in 2006 a nurse at in Wisconsin mistakenly put a spinal anesthetic into a vein, killing 16-year-old who was giving birth. "Nurses should not have to work in an environment where it is even possible to make that kind of mistake," says Nancy Pratt, a vocal advocate for changing the system. Critics say the tubing problem, which has gone on for decades, is an example of how the FDA fails to protect the public. "FDA could fix this tubing problem tomorrow, but because the agency is so worried about making industry happy, people continue to die," says Dr. Robert Smith."
Privacy

Is RFID Really That Scary? 338

tcd004 writes "Defcon participant Chris Paget demonstrated his ability to capture RFID data from people hundreds of feet away for the PBS NewsHour. Paget went through the regular laundry list of security concerns over RFID: people can be tracked, their information accessed, their identities comprimised. Not so fast, says Mark Roberti of RFID Journal. Mark challenges Paget to point to a single instance where RFID was successfully used for nefarious purposes. The signals are too weak and the data is too obscure, according to Roberti. So who is right? Has RFID yet lead to a single instance of identity theft, illegal monitoring, or other security compromise?"
Bug

40 Windows Apps Said To Contain Critical Bug 158

CWmike writes "About 40 different Windows applications contain a critical flaw that can be used by attackers to hijack PCs and infect them with malware, says HD Moore, chief security officer at Rapid7 and creator of the open-source Metasploit penetration-testing toolkit. Gregg Keizer reports that the bug was patched by Apple in its iTunes software for Windows four months ago, but remains in more than three dozen other Windows programs. Moore did not reveal the names of the vulnerable applications or their makers, however. Each affected program will have to be patched separately. Moore first hinted at the widespread bug in a message on Twitter on Wednesday. 'The cat is out of the bag, this issue affects about 40 different apps, including the Windows shell,' he tweeted, then linked to an advisory published by Acros, a Slovenian security firm."
Image

Bicycles As a Gateway To Government Control 634

somaTh writes "Dan Maes, a candidate for governor of Colorado, thinks he's found an international conspiracy that starts with bike sharing. The article describes his current complaints with the incumbent's policies. 'The bike program in it of itself, if that's all it is, I wouldn't be opposed to it,' Maes told 9NEWS. 'What I am opposed to is if it's part of a bigger program that the mayor has signed on to as part of a UN program. That I would be opposed to.' He goes on to argue that the bicycle program is only a gateway into bigger policies including, but not limited to, forced abortions and population control. I understand that bike seats are uncomfortable, but I had no idea it was on purpose."
Security

Intel Buys McAfee 377

Several readers have noted that Intel has agreed to buy McAfee, the computer antivirus software maker, for about $7.7 billion in cash. There is also a press release available if you are into that sort of thing.

Slashdot Top Deals

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...