decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Phreaks and Geeks | 129 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Phreaks and Geeks
Authored by: Nick_UK on Saturday, February 02 2013 @ 08:51 AM EST
This reminds me of my story...

Years ago when I was 14ish (1974?), my parents bought a small circular lock
mechanism that fitted to the '1' hole on the dialling mechanism of our
telephone to STOP me using it (i.e. the locking device stopped the dialling ring
moving past the finger stop, so you couldn't dial any numbers). Phone lines and
calls were relatively rare AND expensive in those days.

Only by having the key could you remove the device to be able dial a number.

Well, there was a children's TV show on at the time, I cannot remember what it
was called, but it was of a type that was mysterious and spooky. In this
programme, in one scene, somebody dialed a number by tapping the phone cradle -
like 'tap~tap'=2 and 'tap~tap~tap~tap'=4 etc, with the ~ representing about 1
second delay, and by leaving a 5 second delay between 'tapped' numbers you could
build up a number to dial!

'tap~tap~tap' 5s 'tap~tap~tap~tap~tap' 5s 'tap~tap' == 352 e.g.

Needless to say it WORKED! I do not think my parents ever found out.

Nick

[ Reply to This | Parent | # ]

Arrons Law suggestion
Authored by: Anonymous on Saturday, February 02 2013 @ 06:44 PM EST
posted at
http://www.reddit.com/r/IAmA/comments/17pisv/im_rep_zoe_lofgren_here_is_a_modifi
ed_draft/

One way to explain and justify why changing MAC address, IP address, or clearing
cookies does not trigger a violation is to put it that doing anything that would
be the equivalent of using a different computer does not trigger a violation.

So any 'technical measures' that would fail by simply buying a new computer and
using it cannot be a violation

I would also like to see something along the lines that registering a new userid
cannot trigger a violation.

The section saying that providing false personally identifiable information
should not trigger it should be generalized to just say that providing false
information of any kind should not trigger the law. The one exception to this
would be if you are trying to impersonate some other individual

David Lang

[ Reply to This | Parent | # ]

Eric Schmidt Unloads on China in New Book
Authored by: Anonymous on Sunday, February 03 2013 @ 12:05 AM EST
Eric Schmidt Unloads on China in New Book

In the future superpower supplier nations will look to create their spheres of online influence around specific protocols and products, so that their technologies form the backbone of a particular society and their client states come to rely on certain critical infrastructure that the superpower alone builds, services and controls.

Chinese telecom equipment companies, rapidly gaining market share around the world, are at the front lines of the expansion this sphere of influence, they say: "Where Huawei gains market share, the influence and reach of China grow as well".

The rest of the world reads this and sees it as a really good reason to not buy American telecommunications equipment either. The rest of the world isn't any keener to be part of the American "sphere of influence" either. They want to be independent.

The world is a very different place today from what it was a dozen years ago. Many countries, including most of the democratic ones are looking at the situation and deciding that in the balance, Huawei is less of a risk than Cisco.

The pair even speculate that the Internet could eventually fracture into pieces, some controlled by an alliance of states that are relatively tolerant and free, and others by groupings that want their citizens to take part in a less rowdy and open online life.

The "relatively tolerant and free" option doesn't seem to be on the menu. It seems to be a choice between an Internet controlled by national governments, and and Internet controlled by a handful of big American media companies (including Eric Schmidt's Google) and security agencies. If you're not American, the first option doesn't look so bad.

[ Reply to This | Parent | # ]

Linux on Windows 8 PCs: "Progress"???
Authored by: luvr on Sunday, February 03 2013 @ 06:04 AM EST
Linux on Windows 8 PCs: Some progress, but still a nuisance.

Sigh... Why are we even talking about this? Why should we consider Linux the nuisance, when Windows 8 is the disaster in the first place?

In my opinion, there's only one proper solution: FORGET about Windows 8 PCs. Samsung builds its laptops in such a way that they break when you try to run Linux on them? Fine—Goodbye, Samsung laptops. Toshiba doesn't want you to even boot Linux on its laptops? Great—That's the end of Toshiba laptops for me.

We should simply stop feeding the FUD by trying and, inevitably, failing, to work around deliberate sabotage by wannabee vendors. If they don't want us as customers, fine—we'll walk away. Is that really so hard to understand?

[ Reply to This | Parent | # ]

Yes, U.S. authorities can spy on EU cloud data. Here's how
Authored by: kjs on Sunday, February 03 2013 @ 01:09 PM EST
any non-US company which stores data in the cloud (one where they don't own the
servers and have them located in their jurisdiction) should be sued for
infringing on the national laws of data privacy!

>kjs

---
not f'd, you won't find me on farcebook

[ Reply to This | Parent | # ]

Prince George’s considers copyright policy that takes ownership of students’ work
Authored by: JamesK on Sunday, February 03 2013 @ 01:40 PM EST
“Works created by employees and/or students specifically for use by the Prince
George’s County Public Schools or a specific school or department within PGCPS,
are properties of the Board of Education even if created on the employee’s or
student’s time and with the use of their materials,” the policy reads. “Further,
works created during school/work hours, with the use of school system materials,
and within the scope of an employee’s position or student’s classroom work
assignment(s) are the properties of the Board of Education.”

Expropriation?

"In Montgomery County, the school system says supplies, equipment or
instructional materials that are made by a school employee using “substantial
time, facilities or materials” belonging to the system become the property of
the public schools."

Isn't that a public school system? Who actually paid for those materials?
Seems to me it's the tax payers who paid for those materials and not the school
system.


---
The following program contains immature subject matter.
Viewer discretion is advised.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )