It's not like it would be the first time, youtuber Ally Law went up there last February with a group of people and a drone. They caused the bridge to be shutdown as a result too though. Video can be found on his youtube channel though. Definitely a sweaty palm sorta video though
Sure it is! the ability to play a small number of old console games on one program is a totally new idea in uncharted waters. I just squeal with delight whenever I go over to my friends house to play us some super mario brothers on his computer! There's never been a way to do it before...right?!
Good to see someone up top speaking out for a change. I don't understand why more dont follow suit....
If you're a rich billionaire oil tycoon, you could invest in windpower and become a rich billionaire wind tycoon...There's no need to be so hell bent on oil
Posted
by
timothy
from the that's-sure-a-big-towel-you've-got dept.
NewYorkCountryLawyer writes "The RIAA has thrown in the towel on one of the leading cases challenging its 'making available' theory, Warner v. Cassin, in which the defendant had moved to dismiss the RIAA's complaint. We have just learned that the RIAA submitted a voluntary notice of dismissal before the judge got to decide the defendant's motion to dismiss the complaint. It will be of interest to see if Ms. Cassin pursues a claim for attorneys' fees in view of recent court rulings that successful copyright defendants are presumptively entitled to an attorneys fee award, even if the dismissal came about from the plaintiffs' having 'thrown in the towel.'"
Posted
by
CmdrTaco
from the because-they-can dept.
An anonymous reader writes "A team of researchers have found that Comcast has quietly rolled out a new traffic-shaping method, which is interfering with web browsers in addition to p2p traffic. The smoking gun that documents this behavior are network traces collected from Comcast subscribers Internet connections. This evidence shows Comcast is forging packets and blocking connection attempts from web browsers. One has to hope this isn't the congestion management system they are touting as no longer targeting BitTorrent, which they are deploying in reaction to the recent FCC investigations."
Posted
by
ScuttleMonkey
from the is-anyone-that-consistant dept.
LinucksGirl writes to share an IBM DeveloperWorks article that shows how to support user verification through keystroke-dynamics processing by modifying the GNOME Display Manager (GDM). You can create and store a one-way encrypted hash of your keystroke patterns when entering your user name. The article shows how to add code to GDM to read current keystroke patterns and permit a user to log in when the characteristics are a match. An interesting idea to be sure but I know I certainly am not that consistent when I type, so I'm skeptical of how well this may work.