Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
The Courts

Submission + - RIAA Brief Attacks Free Software Foundation (blogspot.com)

NewYorkCountryLawyer writes: "The RIAA has requested permission to file a response to the amicus curiae brief filed by the Free Software Foundation in SONY BMG Music Entertainment v. Tenenbaum, the Boston case against a Boston University grad student accused of having downloaded some song files when in his teens. In their proposed response, the RIAA lawyers personally attacked The Free Software Foundation, Ray Beckerman (NewYorkCountryLawyer), and NYCL's blog, 'Recording Industry vs. The People'. The 9-page response (PDF) — 4 pages longer than the document to which it was responding — termed the FSF an organization 'dedicated to eliminating restrictions on copying, redistribution, and modifying computer programs', and accused the FSF of having an 'open and virulent bias against copyrights' and 'blatant bias' against the record companies. They called 'Recording Industry vs. The People' an 'anti-recording industry web site' and stated that NYCL 'is currently subject to a pending sanctions motion for his conduct in representing a defendant' (without disclosing that plaintiffs' lawyers were 'subject to a pending motion for Rule 11 sanctions for their conduct in representing plaintiffs' in that very case)."

Comment Re:remember the carnagie melon self guided vehicle (Score 1) 499

Unfortunately, most .NET coders are drawn to the language because it has features like this that are designed to make it easier for them to code, so they don't usually want to know that it is harder than they expected.

Trust me, I know... I've worked with people like this :-)

Education

Bill Allows Teachers to Contradict Evolution 1049

Helical writes "In an attempt to defy the newly approved state science standards, Florida Senator Rhonda Storms has proposed a bill that would allow teachers to contradict the teaching of evolution. Her bill states that 'Every public school teacher in the state's K-12 school system shall have the affirmative right and freedom to objectively present scientific information relevant to the full range of scientific views regarding biological and chemical evolution in connection with teaching any prescribed curriculum regarding chemical or biological origins.' The bill's main focus is on protecting teachers who want to adopt alternative teaching plans from sanction, and to allow teachers the freedom to teach whatever they wish, even if it is in opposition to current standards."
Wireless Networking

Cellphones to Monitor Highway Traffic 119

Roland Piquepaille writes "On February 8, 2008, about 100 UC Berkeley students will participate in the Mobile Century experiment, using GPS mobile phones as traffic sensors. During the whole day, these students carrying the GPS-equipped Nokia N95 will drive along a 10-mile stretch of I-880 between Hayward and Fremont, California. 'The phones will store the vehicles' speed and position information every 3 seconds. These measurements will be sent wirelessly to a server for real-time processing.' As more and more cellphones are GPS-equipped, the traffic engineering community, which currently monitors traffic using mostly fixed sensors such as cameras and loop detectors, is tempted to use our phones to get real-time information about traffic."
Networking

Bandwidth Caps May Be Critical Error For Broadband Companies 317

Technical Writing Geek writes "An Ars Technica article argues that after many years of stagnation, the US broadband landscape is finally 'primed for change'. Companies like Time Warner that decide to cap bandwidth risk being relegated to a 'broadband ghetto. Alternatives to the standard cable modem vs. DSL conundrum will come from technologies like WiMax and (eventually) the 'white space' broadband that might be offered by whoever wins the 700mhz auction. 'All of that is to say that cable and DSL won't always be the only games in town. If wireless solutions are able to deliver on their promises of high speeds with no usage limits, capped cable broadband service like Time Warner has planned is likely to be unattractive, to say the least. Instead of developing plans designed to discourage consumers from feeding at the bandwidth trough, cable companies would be better served in the long run by making investments in new technologies like DOCSIS 3.0 and the kind of infrastructure improvements necessary to meet bandwidth demands.'"

Sperm Could Power Nanobots 259

Lucas123 writes "According to MSNBC, scientists are experimenting with using a sperm's flagellum to overcome the problem of supplying energy to nanobots that could be implanted in the body as smart probes that would release disease-fighting drugs, monitor enzymes and perform other medical roles within a patient's body. Powered by a compound called adenosine triphosphate or ATP, a sperm's flagellum can propel it at about 7 inches an hour. Energy from ATP could also power the pumps charged with dispensing the medication at a certain rate from the nanobots."
Music

EMI May Cut Funding To RIAA, IFPI 158

Teen Bainwolf notes a report that Big Four record label EMI, which is under new ownership, is considering a big cut in its funding for the IFPI and RIAA. Each of the labels reportedly contributed over $132 million per year to fund industry trade groups, and EMI apparently believes that money could be better spent elsewhere. "One of the chief activities of the RIAA is coordinating the Big Four labels' legal campaign, and those thousands of lawsuits have done nothing but generate ill will from record fans, while costing the labels millions of dollars and doing little (if anything) to actually reduce the amount of file-sharing going on."

C# Memory Leak Torpedoed Princeton's DARPA Chances 560

nil0lab writes "In a case of 20/20 hindsight, Princeton DARPA Grand Challenge team member Bryan Cattle reflects on how their code failed to forget obstacles it had passed. It was written in Microsoft's C#, which isn't supposed to let you have memory leaks. 'We kept noticing that the computer would begin to bog down after extended periods of driving. This problem was pernicious because it only showed up after 40 minutes to an hour of driving around and collecting obstacles. The computer performance would just gradually slow down until the car just simply stopped responding, usually with the gas pedal down, and would just drive off into the bush until we pulled the plug. We looked through the code on paper, literally line by line, and just couldn't for the life of us imagine what the problem was.'"
Security

New NSA-Approved Encryption Standard May Contain Backdoor 322

Hugh Pickens writes "Bruce Schneier has a story on Wired about the new official standard for random-number generators the NIST released this year that will likely be followed by software and hardware developers around the world. There are four different approved techniques (pdf), called DRBGs, or 'Deterministic Random Bit Generators' based on existing cryptographic primitives. One is based on hash functions, one on HMAC, one on block ciphers and one on elliptic curves. The generator based on elliptic curves called Dual_EC_DRBG has been championed by the NSA and contains a weakness that can only be described as a backdoor. In a presentation at the CRYPTO 2007 conference (pdf) in August, Dan Shumow and Niels Ferguson showed that there are constants in the standard used to define the algorithm's elliptic curve that have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG."
Encryption

NIST Opens Competition for a New Hash Algorithm 187

Invisible Pink Unicorn writes "The National Institute of Standards and Technology has opened a public competition for the development of a new cryptographic hash algorithm, which will be called Secure Hash Algorithm-3 (SHA-3), and will augment the current algorithms specified in the Federal Information Processing Standard (FIPS) 180-2. This is in response to serious attacks reported in recent years against cryptographic hash algorithms, including SHA-1, and because SHA-1 and the SHA-2 family share a similar design. Submissions are being accepted through October 2008, and the competition timeline indicates that a winner will be announced in 2012."
The Courts

Submission + - Is a Domain Name an Automatic Trademark? 2

TheWorkingStiff writes: "I registered a descriptive domain name like "thesimpledog.com" and started a blog on it. About a month later I get a threatening letter from a link farmer who owns "simpledog.com" The owner of simpledog.com is claiming that he owns the trademark to the words simpledog even though he has no real business or rights by that name other than a static page with some text and Adsense slapped on it. There is no product, service or brand whatsoever

Does simply registering a two or three word domain give you instant trademark rights to those words even though you've never done anything with them? Should I give up my domain to a link farmer who is trying to bully me, or does he have a valid right to any phrase he registers that isn't already trademarked?"
Microsoft

Microsoft Forces Desktop Search On Windows Update 579

An anonymous reader writes "The Register is reporting that the blogosphere is alight with accusations of Microsoft forcing Windows Desktop Search on networks via the 'automatic install' feature of Windows Update — even if they had configured their systems not to use the program. Once installed, the search program began diligently indexing C drives and entire networks slowed to a crawl."
Databases

MySQL to Get Injection of Google Code 195

inkslinger77 writes to mention that MySQL has published their software roadmap out through 2009 and it includes an injection of code from Google. Google remains relatively secretive about how their systems work but they are one of the largest users of MySQL. Earlier this year Google signed a Contributor License Agreement which provides a framework for them to contribute code to MySQL. "The search company has done a lot of work customizing MySQL to meet its special needs, which include better database replication, and tools to monitor a high volume of database instances, Axmark said in an interview at MySQL's user conference in Paris. MySQL will include some of those capabilities in future versions of its database, probably in point upgrades to MySQL 6.0, which is scheduled for general availability in late 2008, Axmark said."

Slashdot Top Deals

"Don't discount flying pigs before you have good air defense." -- jvh@clinet.FI

Working...