Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Extraordinary claims require extraordinary proo (Score 2) 248

The company I work for owns patents that are licensed in every mobile device you own. Without the patent system we would either immediately stop investing billions in R&D, or have to manufacture everything in house and instead of licensing technology we would sell black box tamper proof chips to cell phone manufacturers. Phones would suck and cost more.

Comment Re:Geometry is hard, as is geography (Score 1) 319

Yes, I was taught in 1970's HS that all maps are a compromise in geometry and that Mercator's projection (and cylindrical projections in general) are popular because they have the useful navigational property that a straight line represents a true bearing. If you don't want to compromise, you want a globe, not a map.
The most common map in western schools is a variation on Mercantor (the axis of the cylinder is different), it has the added feature that the "Land Hemisphere" (where most of the land and people are) is "magnified", so you can fit in more detail. Sure there is less detail in the "Water Hemisphere" but it is 90+% water. Water doesn't really have any details of interest to someone reading a map.

The notion that it was drawn/chosen for political/propaganda purposes is "historical revisionism" from people with an axe to grind. They, not Mercantor are the ones engaging in (not so subtle) political propaganda.

Comment Re:Solving the problem through random numbers (Score 1) 41

Subpoena would more likely be for online threats, locating fugitives, charlie papa, DEA stuff.
DMCA violations are different requests that follow the same technical process but are taken more or less seriously depending on the ISP. If a subpoena is received saying "Email provider X says that a bomb threat was sent from IP A.B.C.D at 4:32 on the 13th of December", more or less. They typically already have subpoena'd some information from Google or Yahoo or Microsoft or somebody. Then the ISP goes back through DHCP/Router logs and reports back which subscriber that was. If CG-NAT is in use, the ISP will also require a TCP port or they can't respond to the request. I don't know anyone who would respond with a list of multiple subscribers. That would be useless for prosecution and real bad for the ISP.

Comment Re:Solving the problem through random numbers (Score 1) 41

I believe that due to subpoena requirements logging is mandatory for ISPs in many (most?) countries. I know I've had to implement that on service routers as a requirement. It becomes a pain in the ass with Carrier Grade NAT because multiple customers share a single public IP. Then you also have to log port and time-stamp and those have to be provided as part of the subpoena.

Comment Re:Upstate (Score 1) 73

Or, it could very likely have been metro fiber connecting to a DSLAM cabinet, a cell tower, or a large business. All telcos are building fiber in all markets, but that doesn't mean they're deploying GPON. VZB doesn't lay much fiber. They mostly buy access circuits/services and provide L3+ services over it.

Comment Re:One negative discovery after another (Score 1) 82

Yes, it absolutely did. They got to keep selling cars for years before someone external found out about it. If they had been smart they could have used that time to get fixes in place and be ready to control the damage, but either way they had nothing to gain from turning themselves in.

Slashdot Top Deals

Veni, Vidi, VISA: I came, I saw, I did a little shopping.

Working...