Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Build a Secret Compartment, Go To Jail

DustyShadow Re:co-conspirator (1111 comments)

Very few background check violations are prosecuted. The Obama Administration's stated reason for it is lack of time and manpower. If the Obama Administration currently doesn't have the time or manpower to prosecute those who lie on background check forms, then why do they want more background checks, more paperwork and more forms? It's backdoor gun registration.

about a year ago
top

Hackers Steal Keyless BMW In Under 3 Minutes

DustyShadow Re:Whats the difference... (486 comments)

Used to be "Break My Window"

I'm old.

more than 2 years ago
top

IP Lawfirm Sues Typosquatting Security Researcher

DustyShadow Re:I disagree. (101 comments)

Yes. But it is often not worth the time or money.

more than 2 years ago
top

Microsoft Now Collects Royalties From Over Half of All Android Devices

DustyShadow Re:Plan B (241 comments)

It is often cheaper to sign the license than deal with a patent lawsuit that you know you will defeat.

more than 2 years ago
top

US Drone Fleet Hit By Computer Virus

DustyShadow Re:This is potentially disastrous (370 comments)

Where did you see that these are Windows based computers? I don't have experience with the Predator system but I do with other military drones and to be honest, I would be shocked if the flight computers run windows.

more than 2 years ago
top

iPhone Tracking Ruckus Ongoing

DustyShadow Re:dumb summary again (353 comments)

Airplanes have been doing for a long time what this invention claims:

"1. A computer-implemented method performed by a location aware device, the method comprising: configuring a processor of the location aware device to collect network information broadcast from a number of network transmitters over a time span; and storing the network information and corresponding timestamps in a database as location history data. "

more than 3 years ago
top

Judge Reveals Secret Righthaven Copyright Contract

DustyShadow Re:Workaround (130 comments)

No no no. A copyright owner may assign the right to sue for past infringement if the assignor also assigns the exclusive right that was infringed. The problem with righthaven and the plaintiff in the silvers case is that the assignee/plaintiff was not assigned one of the exclusive rights.

more than 3 years ago
top

Flying Robot Bird Unveiled

DustyShadow Re:Forget Harrier Jump Jets (152 comments)

The Global Hawk is generally fully autonomous. The operators just upload a flight plan into it and it goes. As far as I know, Predators still require an operator to control it the entire time it is in flight.

more than 3 years ago
top

Ask Slashdot: How Do You Choose a Windows Laptop?

DustyShadow Re:A bit confused... (898 comments)

The grammar in the post is correct. The commas are correct and it is a correct use of which.

more than 3 years ago
top

Righthaven Sues For Control of Drudge Report Domain

DustyShadow Re:Domain seizure? (161 comments)

Do they really think transferring the domain into their control is even remotely likely? It's one thing when you're talking about a torrent tracker where an injunction alone is unlikely to prevent future infringement. But if the court tells Matt Drudge to take down that photo, I'm pretty sure he'll take it down (once his appeals are exhausted).

Judges have been known to do even dumber things. Why not try it out and hope you got a dumb one?

more than 3 years ago
top

Righthaven Sues For Control of Drudge Report Domain

DustyShadow Re:Copyrighted Image (161 comments)

The image may very well be copyrighted. However, since both sides are news outlets, Drudge has more than valid claim to fair use of the image. Especially considering that the image was likely only one small part of the article that he linked to. If Righthaven wins on this case, then it may as well go after Google News next (it has snippits AND images). But hasn't that already been tried??

more than 3 years ago
top

Righthaven Sues For Control of Drudge Report Domain

DustyShadow Re:He picked a fight with the wrong website (161 comments)

Not nearly as scary as Barney Frank's rentboys. Or the drugs and sex they sell out of his apartment.

more than 3 years ago
top

Motorola Countersues Microsoft Over 16 Patents

DustyShadow Southern District of FL (62 comments)

Anyone know why Motorola chose this court??

more than 3 years ago

Submissions

top

University of Florida Eliminates Computer Science Department

DustyShadow DustyShadow writes  |  more than 2 years ago

DustyShadow (691635) writes "The University of Florida announced this past week that it was dropping its computer science department, which will allow it to save about $1.7 million. The school is eliminating all funding for teaching assistants in computer science, cutting the graduate and research programs entirely, and moving the tattered remnants into other departments. Students at UF have already organized protests, and have created a website dedicated to saving the CS department. Several distinguished computer scientists have written to the president of UF to express their concerns, in very blunt terms. Prof. Zvi Galil, Dean of Computing at Georgia Tech, is “amazed, shocked, and angered.” Prof. S.N. Maheshwari, former Dean of Engineering at IIT Delhi, calls this move “outrageously wrong.” Computer scientist Carl de Boor, a member of the National Academy of Sciences and winner of the 2003 National Medal of Science, asked the UF president “What were you thinking?”"
Link to Original Source
top

GoDaddy Suspends RightHaven Domain

DustyShadow DustyShadow writes  |  more than 3 years ago

DustyShadow (691635) writes "It appears that someone has reported Righthaven for having an invalid WHOIS entry on their Righthaven.com domain. Their registrar, the ever vigilant GoDaddy, then took control of the domain, taking Righthaven completely offline. Righthaven has made a business out of scouring the net for websites that have used even the smallest parts of their partner newspapers’ materials and then threatening them with legal action. Very often this results in their victims having to pay thousands of dollars in settlements and in some cases even being forced to hand over their domain names. Today, this copyright troll company is getting a sweet taste of their own medicine."
Link to Original Source
top

Websites Don't Have to Remove Defamatory Comments

DustyShadow DustyShadow writes  |  more than 3 years ago

DustyShadow (691635) writes "In the case of Blockowicz v. Williams, The US Seventh Circuit Court of Appeals refused to force Ripoff Report to remove allegedly defamatory comments posted by a user. The Ripoff Report has a well-publicized no-takedown policy, even if the author wants to remove his/her post, so the Ripoff Report refused. The Blockowiczs then claimed that the Ripoff Report violated FRCP 65(d) because the Ripoff Report was "in active concert or participation" with the initial posters by refusing the injunction's removal order. The district court (and the Court of Appeals) disagreed with the Blockowiczs. Absent the "active concert or participation," the website was outside the court's control. Ripoff Report has released a statement concerning this case: "In keeping with our core mission of protecting speech to the fullest extent of the law, we decided that it was not just our right but also our duty to ask questions and dig deeper before we could comply with such an order. Other sites claim they support free speech, but when the going gets rough, they will usually protect their bottom line rather than the Constitutional rights and freedoms this country was founded upon. Unlike other sites, even when the speech involved is harsh or negative and even if our position sometimes generates negative press for us, we think that the First Amendment requires us to put our principles before our pocketbook and fight against censorship.""
Link to Original Source
top

Intellectual Ventures Files Three Patent Lawsuits

DustyShadow DustyShadow writes  |  more than 3 years ago

DustyShadow (691635) writes "After a decade of stockpiling thousands of patents and using them to force huge payments privately from alleged infringers, Intellectual Ventures went public this week and filed infringement cases against nine large high technology companies. Complaints in the software security industry were filed against Check Point Software Technologies, McAfee, Symantec, and Trend Micro. In the DRAM and flash memory segment, the companies targeted are Elpida Memory and Hynix Semiconductor. FPGA industry companies named in the complaints are Altera, Lattice Semiconductor, and Microsemi. Intellectual Ventures indicated that the complaint against Microsemi may be based on that firm's acquisition of Actel its FPGA business."
Link to Original Source
top

Supreme Court Fails to Eliminate Software Patents

DustyShadow DustyShadow writes  |  more than 4 years ago

DustyShadow (691635) writes "The Supreme Court today affirmed the Federal Circuit's decision in Bilski v. Kappos, which held that the risk-management method was not the type of innovation that may be patented. "However, the machine-or-transformation test is not the sole test for determining patentability. In general, the opinion offers no clarity or aid for those tasked with determining whether a particular innovation falls within Section 101. The opinion provides no new lines to be avoided. Rather, the outcome from the decision might be best stated as "business as usual.""
Link to Original Source
top

Will ACTA be Unconstitutional?

DustyShadow DustyShadow writes  |  more than 4 years ago

DustyShadow (691635) writes "Harvard’s Jack Goldsmith and Lawrence Lessig have an interesting op-ed in today’s Washington Post arguing that it would be constitutionally dubious for President Obama to adopt the Anti-Counterfeiting Trade Agreement (ACTA) as an executive agreement. "[T]he Obama administration has suggested it will adopt the pact as a "sole executive agreement" that requires only the president's approval." "Joining ACTA by sole executive agreement would far exceed these precedents. The president has no independent constitutional authority over intellectual property or communications policy, and there is no long historical practice of making sole executive agreements in this area. To the contrary, the Constitution gives primary authority over these matters to Congress, which is charged with making laws that regulate foreign commerce and intellectual property.""
Link to Original Source
top

Insurgents Intercept U.S. Predator Drone Video

DustyShadow DustyShadow writes  |  more than 4 years ago

DustyShadow (691635) writes "The Wall Street Journal is reporting that "[m]ilitants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations." The most surprising part of this story is not that they intercepted it, but that the video link is unencrypted. As one commenter put it, "[e]ven the graduates of the local high school programming courses know better than to leave to chance an important security hole.""
Link to Original Source
top

Russians Claim More Climate Data Was Manipulated

DustyShadow DustyShadow writes  |  more than 4 years ago

DustyShadow (691635) writes "On Tuesday, the Moscow-based Institute of Economic Analysis (IEA) claimed that the Hadley Center for Climate Change had probably tampered with Russian-climate data. The IEA believes that Russian meteorological-station data did not substantiate the anthropogenic global-warming theory. Analysts say Russian meteorological stations cover most of the country’s territory, and that the Hadley Center had used data submitted by only 25% of such stations in its reports. Over 40% of Russian territory was not included in global-temperature calculations for some other reasons, rather than the lack of meteorological stations and observations. The data of stations located in areas not listed in the Hadley CRU survey often does not show any substantial warming in the late 20th century and the early 21st century."
Link to Original Source
top

E-mail Not Protected by 4th Amendment

DustyShadow DustyShadow writes  |  more than 4 years ago

DustyShadow (691635) writes "In the case In re United States, Judge Mosman ruled that there is no constitutional requirement of notice to the account holder because the Fourth Amendment does not apply to e-mails under the third-party doctrine. "When a person uses the Internet, the user’s actions are no longer in his or her physical home; in fact he or she is not truly acting in private space at all. The user is generally accessing the Internet with a network account and computer storage owned by an ISP like Comcast or NetZero. All materials stored online, whether they are e-mails or remotely stored documents, are physically stored on servers owned by an ISP. When we send an e-mail or instant message from the comfort of our own homes to a friend across town the message travels from our computer to computers owned by a third party, the ISP, before being delivered to the intended recipient. Thus, “private” information is actually being held by third-party private companies.""
Link to Original Source
top

Rockthevote Privacy Failure: Sends SSN Over Email

DustyShadow DustyShadow writes  |  more than 5 years ago

DustyShadow (691635) writes "We just discussed websites that fail basic privacy practices. Well today I went over to Rockthevote.com to register to vote for the upcoming election. I ended up not using the site because in order to complete registration there I have to enter my full name, address, telephone number, email address and social security number which are all sent over an unencrypted connection and then emailed to me in a PDF form. Just like the P&G website, Rockthevote also has an empty privacy promise: "Rock the Vote makes every effort to ensure the secure collection and transmission of sensitive user information using industry accepted data collection methodologies." Someone needs to tell them that email is not secure."
top

"Patent Troll Tracker" Unmasked as Cisco A

DustyShadow DustyShadow writes  |  more than 6 years ago

DustyShadow (691635) writes "Slashdot previously discussed the $10,000 bounty that was put on the identity of the Patent Troll Tracker author by a law firm that represents patent holding "shell" companies. After he received a threatening email last week, the author identified himself as Richard Frenkel, a director in Cisco Systems' intellectual property group . According to law.com, many patent litigators have followed the Troll Tracker closely and are worried that it may now be discontinued. Will this be the new trend for exposing anonymous bloggers?"
top

FBI prepares vast database of biometrics

DustyShadow DustyShadow writes  |  more than 6 years ago

DustyShadow (691635) writes "The FBI is embarking on a $1 billion effort to build the world's largest computer database of peoples' physical characteristics, a project that would give the government unprecedented abilities to identify individuals in the United States and abroad. [L]aw enforcement authorities around the world will be able to rely on iris patterns, face-shape data, scars and perhaps even the unique ways people walk and talk, to solve crimes and identify criminals and terrorists. The FBI will also retain, upon request by employers, the fingerprints of employees who have undergone criminal background checks so the employers can be notified if employees have brushes with the law."

Journals

DustyShadow has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>