It's official. Consumer Reports' engineers have just completed testing the iPhone 4, and have confirmed that there is a problem with its reception. When your finger or hand touches a spot on the phone's lower left side—an easy thing, especially for lefties—the signal can significantly degrade enough to cause you to lose your connection altogether if you're in an area with a weak signal. Due to this problem, we can't recommend the iPhone 4.
jbezorg (1263978) writes "Electronic Frontier Foundation is soliciting for signatures. Here's their pitch.
Buried in the FCCs rules is a deeply problematic loophole. Open Internet principles, the FCC writes, "do not...apply to activities such as the unlawful distribution of copyrighted works."
For years, the entertainment industry has used that innocent-sounding phrase "unlawful distribution of copyrighted works" to pressure Internet service providers around the world to act as copyright cops to surveil the Internet for supposed copyright violations, and then censor or punish the accused users.
From the beginning, a central goal of the Net Neutrality movement has been to prevent corporations from interfering with the Internet in this way so why does the FCCs version of Net Neutrality specifically allow them to do so?
Go to the Real Net Neutrality petition to tell the FCC that if it wants to police the Internet, it first needs to demonstrate that it can protect Internet users and innovators by standing up to powerful industry lobbyists. Sign your name to demand that the copyright enforcement loophole be removed.
Page 51 ~ 139. Third, we propose that broadband Internet access service providers would not violate the principles in taking reasonable steps to address unlawful conduct on the Internet. Specifically, we propose that broadband Internet access service providers may reasonably prevent the transfer of content that is unlawful. For example, as the possession of child pornography is unlawful, consistent with applicable law, it appears reasonable for a broadband Internet access service provider to refuse to transmit child pornography. Moreover, it is important to emphasize that open Internet principles apply only to lawful transfers of content. They do not, for example, apply to activities such as the unlawful distribution
of copyrighted works, which has adverse consequences on the economy and the overall broadband ecosystem. In order for network openness obligations and appropriate enforcement of copyright laws to co-exist, it appears reasonable for a broadband Internet access service provider to refuse to transmit copyrighted material if the transfer of that material would violate applicable laws. Such a rule would be consistent with the Comcast Network Management Practices Order, in which the Commission stated that providers, consistent with federal policy, may block . . . transmissions that violate copyright law.
jbezorg (1263978) writes "Psystar lawyers have begun deposing Apple executives in the copyright infringement lawsuit brought by Apple last year, the Mac clone maker announced.
Surprisingly, it seems that Psystar executives are actually enjoying themselves. In a Thursday post on its Web site called "A taste of their own medicine," Psystar seems to gloat over the fact it is now deposing several Apple executives. "For the past week and for the following ten days we will be doing depositions of some of Apple's highest level people. After numerous depositions of Psystar employees and associates the shoe is finally on the other foot, oh the joy!"" Link to Original Source top
Stewart Brand proclaims 4 environmental 'heresies'
The man who helped usher in the environmental movement in the 1960s and '70s has been rethinking his positions on cities, nuclear power, genetic modification and geo-engineering. This talk at the US State Department is a foretaste of his major new book, sure to provoke widespread debate.
jbezorg writes "With all the recent discussion about whether having AV on a Mac in necessary or not, the world provides a gentle reminder.
INTEGO SECURITY MEMO — December 2, 2008
Exploit: OSX.RSPlug.E Trojan Horse
Discovered: December 2, 2008
Description: A new variant of the RSPlug Trojan horse has been found on several pornographic web sites. (See Intego's Internet Security Memo of October 31, 20071 for more on this Trojan horse.) This new variant is similar to the RSPlug.D Trojan horse2, in that its installer is a downloader, which contacts a remote server to download the files it installs. This means that, in the future, the downloader may be able to install other payloads than the one it currently installs.