Mashiki writes: The CEO of Reddit, has confessed that he edited posts claiming that it's been a tough week. Those posts? Well they said "Fuck/u/spez" This in itself now opens multiple legal and ethical problems for reddit, as not even subreddit moderators can edit posts, but administrators can without leaving any visible trail. As people have been prosecuted for reddit posts, such as this individual. Does that mean that the person prosecuted really did post it? Have they edited or modified any other posts positively or negatively to hide or promote something?
from the pass-some-of-that-wisdom dept.
Joren writes "In Japan, in a case that has been five years running, the Osaka High Court on Thursday overturned a lower court ruling that had convicted and fined the developer of controversial file-sharing softwareWinny of assisting violations of the Copyright Law. Originally charged in 2004, Isamu Kaneko, 39, a former research assistant at the University of Tokyo, was declared not guilty, and will not be required to pay a 1.5 million yen fine levied by a December 2006 Kyoto District Court ruling. 'Merely being aware of the possibility that the software could be abused does not constitute a crime of aiding violations of the law, and the court cannot accept that the defendant supplied the software solely to be used for copyright violations,' presiding judge Masazo Ogura said. Furthermore, in siding with the defense, the appeal ruling stated that 'Anonymity is not something to be looked on as illegal, and it is not something that applies specifically to copyright violations. The technical value of the software is neutral.'"
"Sure Warcraft has a raid-game end-game to cater to the 'hard core' but most people don't go there, and really, to really suceed in Warcrafts raid game you just have to be -there-, you don't have to be -good-."
This is a stereotype of the older, larger raids (20 and 40 person teams). New raids in WoW are much smaller (10 and 25 person teams) and thus require better players to succeed as a whole.
An anonymous reader writes: The group representing AACS has downplayed muslix64's attack on their highly touted DRM scheme. "The large size of the files and the high cost of writable hi-def discs make large-scale copying of high-definition DVDs impractical, but the attacks on the new format echo the early days of illegal trafficking in music files," Michael Ayers, spokesman of AACS said on Thursday.
However, Slyck.com is running an article that points the fragility of AACS, and how muslix's exploit is a real danger to its longevity.
"In other words, one could argue that AACS has not been attacked directly — which in the strictest and most literal interpretation is true. However this is much like saying four stolen tires is not an attack on a car's engine. Either way, the individual is stuck — and like AACS, it has been merely ignored in exchange for the ultimate goal. In many ways, not attacking AACS directly is much worse than a direct assault, as it highlights the irrelevance of this once highly regarded copy "protection" scheme."
R. Mirman writes: "String theory has been proven with mathematical rigor to be wrong. It has long been known that physics (a universe)would be impossible in any dimension but 3+1. Also there is a quantum theory of gravity, the only possible one since it is required by geometry: GR. The description of the books showing this is at impunv.blogspot.com. For the dimension see
Our Almost Impossible Universe: Why the laws of nature make the existence of humans extraordinarily unlikely R. Mirman
and for the derivation of GR from geometry (the Poincare group) and quantum gravity see Massless Representations of the Poincare Group electromagnetism, gravitation, quantum mechanics, geometry R. Mirman. The proofs are rigorous and verified by others."
from the dueling-press-releases dept.
Intel announced a major breakthrough in microprocessor design Friday that will allow it to keep on the curve of Moore's Law a while longer. IBM, working with AMD, rushed out a press release announcing essentially equivalent advances. Both companies said they will be using alloys of hafnium as insulating layers, replacing the silicon dioxide that has been used for more than 40 years. The New York Times story (and coverage from the AP and others) features he-said, she-said commentary from dueling analysts. If there is a consensus, it's that Intel is 6 or more months ahead for the next generation. IBM vigorously disputes this, saying that they and AMD are simply working in a different part of the processor market — concentrating on the high-end server space, as opposed to the portable, low-power end.
Tony Bradley writes: "Charter Communications introduced a new "service". Some might call it browser hijacking. The new "feature" from Charter will intercept traffic to your default search engine and redirect you to their Charter-branded, 'powered by Yahoo!' search engine. Charter calls the new feature an opt-in service, however they opted everyone in by default with no notice and force you to allow a cookie to be installed if you wish to stay opted out. They provide a link to visit if you wish to change your settings, but the link is dead. There is no such site. Oh! Charter also feels that only users of Windows Live Search need the benefit of their new feature. Searches aimed at Google, Yahoo or AOL are not redirected, but searches directed to Microsoft's search engine are hijacked unless you have the opt-out cookie. You can get more details, along with screen shots, in this article on About.com: http://netsecurity.about.com/od/webbrowsersecurity /ss/charterhijack.htm"
Reader trparky recommends an article on Technet (which, be warned, is rather chaotically formatted). Mark Russinovich, whose company Winternals Software was recently bought by Microsoft, has published the first of a series of articles on what's new in the Vista kernel. Russinovich writes: "In this issue, I'll look at changes in the areas of processes and threads, and in I/O. Future installments will cover memory management, startup and shutdown, reliability and recovery, and security. The scope of this article comprises changes to the Windows Vista kernel only, specifically Ntoskrnl.exe and its closely associated components. Please remember that there are many other significant changes in Windows Vista that fall outside the kernel proper and therefore won't be covered."
Audi will use RFID tags through production and delivery of its TT sports car for "quality-assurance." But how are the embedded tags used over a car's lifetime? Plus: BMW fields a remote-control convertible top. In Autopia.