Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:I am the author of DosBox Turbo (Score 4, Insightful) 371

I informed him that I make available the source code [only] to my users whom I've distributed a binary to and that the GPL specifically allows for this.

That's only the case if you include the source code along with the binaries. Otherwise you must accompany the binaries with a written offer for the source code, of which anybody (including those who aren't your customers) is then free to take advantage.

Comment Re:GPL != Free (Score 1) 371

THE DISTRIBUTOR IS REQUIRES TO DISTRIBUTE THE SOURCE CODE

So if you get the binary from an AppStore, you are entitled for the source code. IF you then get it from a 3rd party, then that 3rd party is required to give you the source code, NOT the original distributor through the AppStore.

Not true. If the developer in question chose to include a written offer for the source code instead of the source code itself, that developer is then required to provide the sources to anybody who chooses to take advantage of the written offer, regardless of whether or not they obtained the binaries directly from the developer.

... morons not understand what GPL even is.

No, I suppose they don't.

Comment Re:You misread the GPL. (Score 1) 371

However that binary you paid for is under the seller's copyright, and you need his permission and must comply with his terms if you want to redistribute it.

Wrong. The GPL requires derivative works to be distributed under the same terms as the original work. This means anybody who gets a GPL'd binary from you is free to redistribute that binary and is entitled to a copy of the source code.

Comment Indexing Bots (Score 1) 144

They say once they're done with this latest DMCA notice they'll be left with "an impossible task of policing our indexing bots." I'm not aware of any law requiring content to be filtered as it arrives, so why would they have to police their indexing bots?

Comment Re:Misunderstood? (Score 1) 277

"Misunderstood, my ass. Never attribute to stupidity that which can be explained by greedy self-interest."

Imagine Facebook receives an order to remove information concerning a particular incident. How does Facebook remove this information without going through what all its users have shared or otherwise posted to their accounts?

Comment Privacy has nothing to do with it (Score 5, Insightful) 277

To grant one person the right to be forgotten is to deprive another of the right to remember. The sharing of information once legitimately published cannot become illegitimate just because the person involved doesn't want it to be known. The "right" to be forgotten is a form of censorship and has nothing at all to do with privacy.

Comment Re:If only they were consistent (Score 1) 297

The DMCA (which is the only one that passed) is arguably beneficial, and in any case far less intrusive than the other two. So I don't get your point.

The DMCA's safe harbor provisions are certainly beneficial, but the takedown procedures are not. The DMCA's takedown procedures have been abused and misused on numerous occasions, and the requirement that user accounts be disabled after repeated instances of alleged infringement is a serious problem.

Comment Overreaching? (Score 5, Interesting) 409

Does this apply to all apps or just games? If it's just games then the claim may be indeed be legitimate (or not), but if it's all apps then it's certainly a case of overreaching by the trademark holder (or else an overreaction by Apple).

The most ridiculous element is the ban on the use of "memory" as a keyword. Trademark law was never intended to forbid others from naming competitors' products or from using trademarked words in their descriptive sense ("this game will enhance your memory and give you super-strength!").

Comment Re:Is this surprising? (Score 1) 105

Can the authorities abuse their position of power for various nefarious deeds? Absolutely. Are some of their requests legally or ethically dubious? No doubt. Nevertheless, there's plenty of legitimate reasons for governments to request user information and it should come as no surprise that the number of such requests is increasing.

The problem with "legitimate" requests begins when they become so routine that they end up as fishing expeditions rather than legitimate criminal investigations.

Slashdot Top Deals

Unix will self-destruct in five seconds... 4... 3... 2... 1...

Working...