Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:So the studio figured it out (Score 2) 12

> You cannot copyright a name like "Gollum" or an idea like "let's tell a story about looking for Gollum after the trilogy."

That is a totally wrong interpretation of copyright law in the United States, which specifically covers derivative works (parody, criticism, and other Fair Use provisions notwithstanding).

Comment Re:You tell me. (Score 1) 128

Thanks for your comments. This thread has given me a few things to think about, although I'm still not totally sold on the concept.

Some have compared this sort of exercise to a fire drill. We don't do those, at least without prior notification, for fear of freaking people out, like in the trauma caused by active shooter drills on children.

Also, I've not yet fallen for one of these. Given how they come in with our URL checker stripped, having "phishing" tags coded in the image bugs, from domains openly registered to security companies, they are fairly easy to spot.

So it seems like overkill, at least in my environment. I don't work with launch codes or anything, and besides, without my 2FA fob, you're not going to go far with my password anyway.

These are people I'm entrusting with my work files and communications, and they can't even be truthful with me in return. Maybe that's why it rubs me the wrong way, no matter how the means and ends are weighed.

Submission + - Ask Slashdot: How Harmful are In-House Phishing Campaigns? 2

tiltowait writes: My organization has an acceptable use policy which forbids sending out spam. Every few months, however, the central IT office exempts itself from this rule by delivering deceptive e-mails to all employees as a test of their ability to ignore phishing scams. For those who simply delete the messages, they are a small annoyance, comparable to the overhead of having to regularly change passwords—also done largely unnecessarily, perhaps even to the point of being another bad practice. As someone working in a departmental systems office, I can also attest that these campaigns generate a fair amount of workload from inquiries about their legitimacy. Aside from the "gotcha" angle, which perpetuates some ill will amongst staff, I can't help but think that these exercises are of questionable net value, especially with other countermeasures, such as MFA and Safelinks, already in place. Is it worth spreading misinformation to experiment on your colleagues in such a fashion?

Comment Doctorow's Law (Score 0) 28

I'm glad this was fixed, but for several days I had a bricked device (you ended stuck on the activation screen, with no option to skip that process) and in a situation best summed up by Cory Doctorow: “Anytime someone puts a lock on something you own, against your wishes, and doesn’t give you the key, they’re not doing it for your benefit.”

Submission + - 20 Hollow Copyright Claims

tiltowait writes: Slashdot readers should be familiar with most if not all of these, but the list of 20 Hollow Copyright Claims is a somber reminder of the current sorry state of intellectual property laws in the United States--as anyone who’s encountered a paywall or a takedown notice (or remembers Slashdot's run-in with Scientology) can attest. It serves as a call to arms that we not lose sight of the benefits to sharing knowledge.

Comment Re:This makes no sense (Score 1) 424

Old library catalogs and databases, which are still around, work this way. The problem is that unless you've been trained to do non-intuitive things like omit initial articles from titles ("Old Man and the Sea" instead of "The Old Man and the Sea"), they don't work. This causes far more problems than an expert searcher grousing about having to occasionally add back in +/- operators to search for a known it

Comment Another AOL example, phone booth (Score 1) 406

Here's a similar gem, made by Steve Case in 1997, in response to gripes from people unable to connect to swamped AOL servers after their switch to unlimited hours:

Just as you would be sensitive about using a public phone booth if others were waiting in line to use it . . . try to show some restraint at night during the next few months when we're in this transitional mode.

In other words, it's your fault for trying to use what you've paid for.

Comment Re:Low estimate (Score 1) 70

Yes, point taken... "My entire profession" should be "Libraries" above.

As a reference librarian, my main goal is to be Bablyon 5. I'd love it if we succeeded in creating a powerful enough search and retrieval tool with an intuitive interface that negated the need for library user instruction. My career mission is to work towards this ideal. It would, just as how B5 succeeded in its mission so much so that it was no longer necessary, make a large part of what librarians now do obsolete.

Books

Submission + - [Ponies!] Vatican to Digitize Prohibited Archives (tk421.net) 2

tiltowait writes: [in case you want to queue up something for tomorrow... :o] Hot on the heels of their successful iPhone app and drive-through confessional, the BBC News reports that the Vatican has announced plans to digitize their pornography collection and make it available online to paying subscribers. Given what the church has planned for the project's profits, here's hoping they learn lessons from the the New York Times paywall loopholes. Is anyone in on the Indulgentia beta?

Slashdot Top Deals

Thus spake the master programmer: "When a program is being tested, it is too late to make design changes." -- Geoffrey James, "The Tao of Programming"

Working...