May
11
2009
Drivintin is one of many who have written to tell us about how The Pirate Bay has taken an interesting approach to the 30 million SEK fine levied in their recent court case (which they said they wont pay). “The bill inspired anakata to devise a plan involving sending money to Danowsky’s law firm, but not to pay the fine of course which they say will never be payed. Anakata’s clever plan is called internet-avgift, internet-fee in English. Anakata encourages all Internet users to pay extremely small sums around 1 SEK (0.13 USD) to Danowsky’s law firm, which represented the music companies at the Pirate Bay trial. The music companies will not benefit from this, instead it will cost them money to handle and process all the money.”

Read more of this story at Slashdot.



Comments Off on The Pirate Bay Seeks Interesting Route To "Pay" Fine | tags: pirate bay | posted in technical news
May
11
2009
brothke writes “In The Road to Big Brother: One Man’s Struggle Against the Surveillance Society, Ross Clark journals his struggles to avoid the myriad CCTV cameras in his native England. That’s difficult given the millions of cameras in public locations there. Before going forward, the use of the term ‘Big Brother’ in both the title and throughout the book is erroneous. Big Brother has its roots in George Orwell’s novel 1984 and refers to an omnipresent, seemingly benevolent figure representing the oppressive control over individual lives exerted by an authoritarian government. The term has been misappropriated to describe everything from legitimate crime-fighting, to surveillance cameras, to corporate e-mail and network usage monitoring. Localities that deploy CCTV cameras in public thoroughfares in the hope of combating crime are in no way indicative of the oppressive control of Orwell’s Big Brother. Should we be concerned that such a scenario play itself out in Ross Clark’s UK or in the US? Likely no, as US government agencies are widely decentralized and isolated. Just getting the networks within a single federal agency unified is a daunting task; getting all of the agencies to have a single unified data sharing mechanism is a pipe-dream. Look at it this way: the US Department of Defense has more networks than some countries have computers.” Read below for the rest of Ben’s review.

Read more of this story at Slashdot.



Comments Off on The Road to Big Brother | tags: computers, network, tv | posted in technical news
May
11
2009
With today’s Free Summit broaching the subject of the “dangers” of free, TechDirt has an interesting perusal of why free often can’t work without a good business model and why it often gets such a bad reputation. “I tend to wonder if this is really a case of free gone wrong or free done wrong. First, I’m always a bit skeptical of ‘free’ business models that rely on a ‘free’ scarcity (such as physical newspapers). While it can work in some cases, it’s much more difficult. You’re not leveraging an infinite good — you’re putting yourself in a big hole that you have to be able to climb out of. Second, in some ways the model that was set up was a static one where everyone focused on the ‘free’ part, and no one looked at leapfrogging the others by providing additional value where money could be made. The trick with free is you need to leverage the free part to increase the value of something that is scarce and that you control, which is not easily copied. […] Still, it’s an important point that bears repeating. Free, by itself, is meaningless. Free, with a bad business model, isn’t helpful either. The real trick is figuring out how to properly combine free with a good business model, and then you can succeed.”

Read more of this story at Slashdot.



Comments Off on The "Dangers" of Free | tags: news | posted in technical news
May
11
2009
eldavojohn writes “At some point in the history of video games, violence became uncomfortably real for censors and some parents. In addition to that, realistic use of narcotics has entered mainstream games. While gamers (of adult age) have by and large won the right to this entertainment, a large amount of games have arisen lately that challenge a different aspect of video games — inappropriate or sensitive topics. We’ve covered it before on Columbine to Fallujah, but I noticed through GamePolitics recently a large trend in severely controversial video games. Where do you stand on these titles?” Read on for the rest of eldavojohn’s thoughts.

Read more of this story at Slashdot.



Comments Off on On the Advent of Controversial Video Games | tags: games | posted in technical news
May
11
2009
An anonymous reader writes “Various members of the OpenOffice.org community have been submitting their first revisions of proposals to the OpenOffice.org Call for Design Proposals to redesign the user interface of Open Office. As part of Project Renaissance, attention is being drawn to the OpenOffice user interface, and it’s ‘user-friendliness.’ Among the designs, is FLUX UI, which won an award at the Sun Microsystems Community Innovation Awards Program. Anyone can, and is encouraged, to check out the proposals (scroll to bottom of page) and leave your comments so that the designers can improve their designs for the final deadline for proposal submissions to the community.”

Read more of this story at Slashdot.



Comments Off on OpenOffice UI Design Proposals Published | tags: program | posted in technical news
May
11
2009
Comments Off on Israel limits Gaza Christians hoping to see Pope – Reuters | tags: google, news, tv, youtube | posted in technical news
May
11
2009
Comments Off on GM Says It's 'More Probable' to File for Bankruptcy – Bloomberg | tags: google, news, tv, youtube | posted in technical news
May
11
2009
Comments Off on McGuinty tells Tamils to protest legally – Toronto Sun | tags: google, network, news, youtube | posted in technical news
May
11
2009
Comments Off on It’s 2 A.M. What Do You Do? [Billboard] | posted in technical news
May
11
2009
Using pieces of disassembled code, API calls, memory addresses and subroutines associated with virus threats, the data was analyzed by frequency, density, and groupings. Algorithms were then developed and two commissioned artists mapped the data to the inputs of the algorithms, which then generated virtual, 3D entities.



Comments Off on Viral Art: A Gallery Of Security Threats | tags: security, virus | posted in technical news