Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Submission + - Malibu Media stay lifted, motion to quash denied

NewYorkCountryLawyer writes: In the federal court for the Eastern District of New York, where all Malibu Media cases have been stayed for the past year, the Court has lifted the stay and denied the motion to quash in the lead case, thus permitting all 84 cases to move forward. In his 28-page decision (PDF), Magistrate Judge Steven I. Locke accepted the representations of Malibu's expert, one Michael Patzer from a company called Excipio, that in detecting BitTorrent infringement he relies on "direct detection" rather than "indirect detection", and that it is "not possible" for there to be misidentification.

Comment Re:A news? (Score 2) 188

My Samsung handset is stuck in 2011, and the upgrade path for it ended in 2013. I'm not talking about a software path, but a hardware path: the QWERTY keyboard. It's the main reason I got a smartphone. Now there are none, so I'm going back to a feature phone soon (I'm also tired of paying for "4G" that Sprint never bothered to install in my area).

And before anyone tries to say on-screen keyboards have improved: that's not the point, they're still on the screen obscuring half of what I'm looking at, which is even worse because I do as little as possible on my phone in portrait mode.

Submission + - The timing of error messages contributes to them being ignored (byu.edu)

sandbagger writes: A new study from BYU, in collaboration with Google Chrome engineers, finds the status quo of warning messages appearing haphazardly — while people are typing, watching a video, uploading files, etc. — results in up to 90 percent of users disregarding them.

Researchers found these times are less effective because of "dual task interference," a neural limitation where even simple tasks can't be simultaneously performed without significant performance loss. Or, in human terms, multitasking.

Submission + - Kim Dotcom's Mega 3, with Bitcoin: two bad ideas that go worse together (rocknerd.co.uk)

David Gerard writes: "Colourful racing identity" Kim Dotcom has a scheme for his third Mega enterprise: combining MegaUpload with Bitcoin. It is entirely unclear how anything about this makes sense, but I'm sure that with a trustworthy soul with an impeccable track record like Dotcom at the helm, nothing can possibly go badly for anyone involved.

Submission + - Ask Slashdot: Handling Windows Updates after October 2016 (slashdot.org)

An anonymous reader writes: We've read about the changes coming to Windows Update in October 2016. Average Joe and Grandma Flo will end up getting the cumulative update via WU each month which includes non-security updates. For more discerning users with existing Win 7 / 8.1 systems, one can disable WU and download the security-only update each month. But what happens when it's time to wipe and reload the OS? Or what about installing Windows on different hardware? Admittedly, there are useful non-security updates worth having, but plenty to avoid (e.g. telemetry).

How does one handle this challenge? Set up a personal WSUS box before October to sync all desired updates through October 2016? System images can work if you don't change primary hardware, but what if you do?

Or should one just bend the knee to Microsoft, go to the nearest drug store, and stock up on KY?

Submission + - SingularDTV: using Ethereum for DRM on a sci-fi TV show about the Singularity (rocknerd.co.uk)

David Gerard writes: SingularDTV is an exciting new blockchain-based entertainment industry startup. Their plan is to adapt the DRM that made $121.54 for Imogen Heap, make their own completely premined altcoin and use that to somehow sell two million views of a sci-fi TV show about the Singularity. Using CODE, which is explicitly modeled on The DAO ... which spectacularly imploded days after its launch. There's a white paper, but here's an analysis of why these schemes are a terrible idea for musicians.

Submission + - Mobilize to attack climate change just like we did in WWII (newrepublic.com)

mspohr writes: Bill McKibbin has an article in the New Republic which lays out the case for a broad effort to mobilize our resources to fight climate change.
"For years, our leaders chose to ignore the warnings of our best scientists and top military strategists. Global warming, they told us, was beginning a stealth campaign that would lay waste to vast stretches of the planet, uprooting and killing millions of innocent civilians. But instead of paying heed and taking obvious precautions, we chose to strengthen the enemy with our endless combustion; a billion explosions of a billion pistons inside a billion cylinders have fueled a global threat as lethal as the mushroom-shaped nuclear explosions we long feared. Carbon and methane now represent the deadliest enemy of all time, the first force fully capable of harrying, scattering, and impoverishing our entire civilization."
"By most of the ways we measure wars, climate change is the real deal: Carbon and methane are seizing physical territory, sowing havoc and panic, racking up casualties, and even destabilizing governments. "
He includes analysis of just what it would take in terms of industrial mobilization to stop polluting with CO2. The answer is, a lot, but it is possible.

Submission + - Internet Voting Leaves Out a Cornerstone of Democracy: The Secret Ballot

Presto Vivace writes: Maintaining the secrecy of ballots returned via the Internet is “technologically impossible,” according to a new report.

That’s according to a new report from Verified Voting, a group that advocates for transparency and accuracy in elections. ... A cornerstone of democracy, the secret ballot guards against voter coercion. But “because of current technical challenges and the unique challenge of running public elections, it is impossible to maintain the separation of voters’ identities from their votes when Internet voting is used,” concludes the report, which was written in collaboration with the Electronic Privacy Information Center and the anticorruption advocacy group Common Cause.

Slashdot Top Deals

The steady state of disks is full. -- Ken Thompson

Working...