Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Intel

ASUS and Intel Launch Collaborative PC Design Site 85

Jupix writes "There's an interesting new community by ASUS and Intel called WePC. It enables anyone to post their dream PC including not only function, but form as well. You can draw up your dream and describe it in words, and also fiddle with some predetermined properties. No doubt the two companies are looking for common configurations so they can implement them in future products, but according to the press release, even individual designs may get the two companies' backing."
Media

Making 3D Models from Video Clips 103

BoingBoing is covering an interesting piece of software called VideoTrace that allows you to easily create 3D models from the images in video clips. "The user interacts with VideoTrace by tracing the shape of the object to be modeled over one or more frames of the video. By interpreting the sketch drawn by the user in light of 3D information obtained from computer vision techniques, a small number of simple 2D interactions can be used to generate a realistic 3D model."
The Courts

Oregon AG Seeks to Investigate RIAA Tactics 114

NewYorkCountryLawyer writes "Turning the tables on the RIAA's attempt to subpoena information from the University of Oregon, that state's Attorney General has now filed additional papers to conduct immediate discovery into the RIAA's 'data mining' techniques. These techniques include the use of unlicensed investigators, the turning over of subpoenaed information to collection agencies, and the obtaining of personal information from computers. The AG pointed out (pdf) that 'Because Plaintiffs routinely obtain ex parte discovery in their John Doe infringement suits ... their factual assertions supporting their good cause argument are never challenged by an adverse party and their investigative methods remain free of scrutiny. They often settle their cases quickly before defendants obtain legal representation and begin to conduct discovery.'"
The Courts

U.of Oregon Says No to RIAA 241

NewYorkCountryLawyer writes "The University of Oregon has filed a motion to quash the RIAA's subpoena for information on student identities in what is believed to be the first such motion made by a university with support from the state Attorney General. The motion (pdf) explains that it is impossible to identify the alleged infringers from the information the RIAA has presented: 'Five of the seventeen John Does accessed the content in question from double occupancy dorm rooms at the University. With regard to these Does, the University is able to identify only the room where the content was accessed and whether or not the computer used was a Macintosh or a PC ... The University cannot determine whether the content in question accessed by one occupant as opposed to another, or whether it was accessed instead by a visitor.' The AG's motion further argues (pdf) that "Plaintiffs' subpoena is unduly burdensome and overbroad. It seeks information that the University does not readily possess. In order to attempt to comply with the subpoena, the University would be forced to undertake an investigation to create discovery for Plaintiffs — an obligation not imposed by Rule 45. As the University is unable to identify the alleged infringers with any accuracy, it cannot comply with its federal obligation to notify students potentially affected by the subpoena. One commentator has likened the AG's argument to saying, in effect, that the RIAA's evidence is 'rubbish'."
Security

Fake Codec is Mac OS X Trojan 473

Kenny A. writes "Multiple news organisations are reporting on an in-the-wild Mac OS X malware attack that uses porn lures to plant phishing Trojans on Mac machines. The attack site attempts to trick users into download a disk image (.dmg) file disguised as a codec that's required for viewing the video. If the Mac machine's browser is set to to open 'Safe' files after downloading, the .dmg gets mounted and the Installer is launched. The target must click through a series of screens to become infected but once the Trojan is installed, it has full control of the machine."

Change Google's Background Color To Save Energy? 519

i_like_spam writes "Recent commentary at Nature Climate Change describes an on-going debate about the energy savings associated with the background colors used by high-traffic websites such as Google and the NYTimes. A back of the envelope calculation has suggested energy savings of 750 Megawatt hours per year if Google switched their background from white to black. In response, a new version of Google called Blackle was created. However, other calculations by the Wall Street Journal suggest minimal energy savings."
Music

Making Old Sound Recordings Audible Again 172

orgelspieler writes "NPR is running a story on a safe way to reproduce sound from ancient phonographs that would otherwise be unplayable. The system, called IRENE, was installed in the Library of Congress last year. It can be used to replay records that are scratched, worn, broken, or just too fragile to play with a needle. It scans the groves optically and processes them into a sound file at speeds approaching real time. IRENE is great at removing pops and skips, but can add some hiss. Researchers are also working on a 3D model that is better at removing hiss."
The Internet

Submission + - RIAA Wins In Court Against U of Wisconsin-Madison

Billosaur writes: "A judge has ordered the University of Wisconsin-Madison to turn over the names and contact information for the 53 UW-M students accused of file sharing over the university's networks by the RIAA. "U.S. District Judge John Shabaz signed an order requiring UW-Madison to relinquish the names, addresses, telephone numbers, e-mail addresses and Media Access Control addresses for each of the 53 individuals." The ruling came as no surprise to the university, which had previously rejected the request of the RIAA to hand out their settlement letters to alleged copyright violators on their campus. The school feels the RIAA will have a hard time tracking down who did the file-sharing anyway, as the IP addresses the RIAA has for the violations may be mapped to computers in common areas, making it difficult to determine just which people may have made the downloads."
Encryption

Submission + - First AACS Blue-Ray/HD-DVD key revocation

Thomas Charron writes: "An update posted for Intervideo WinDVD 8 confirms that it's AACS key has been possibly revoked. WinDVD 8 is the software which had it's device key compromised, allowing unfettered access to Blue-Ray and HD-DVD content, resulting in HD movies being made available via many torrent sites online. This is possibly the first known key revocation which has taken place, and little is known of the actual process used for key revocation. According to the release, "Please be aware that failure to apply the update will result in AACS-protected HD DVD and BD playback being disabled. ", which pretty much confirms that the key revocation has already taken place for all newly released Blu-Ray and HD-DVD discs."

Feed AACS patch for WinDVD, HD DVD and BD players: update or never watch movies again (engadget.com)

Filed under: HDTV, Home Entertainment

In case DRM hasn't caused you -- the honest consumer -- enough pain already. Check it, you've got some required software updating to do now that Corel has introduced a patch to their cracked InterVideo WinDVD software. Best do it pronto too. According to Corel, "failure to apply the update will result in AACS-protected HD DVD and BD playback being disabled." That means no more HD DVD or Blu-ray Disc films for you, Mr. assumed criminal. Thing is, this is no ordinary patch since WinDVD exposed the hardware specific device key to video pirates. So not only are you required to update their janky WinDVD software, you also have to track down and install the paticular AACS patch for the HD DVD or BD player you own. Of course this only patches one flaw in the massively compromised DRM boondoggle. Just think, you can repeat the whole process again after hackers circumvent this latest attempt at "content protection." Isn't DRM nice?

[Via Impress]

Read | Permalink | Email this | Comments

BOLD MOVES: THE FUTURE OF FORD A new documentary series. Be part of the transformation as it happens in real-time

Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!


Slashdot Top Deals

Their idea of an offer you can't refuse is an offer... and you'd better not refuse.

Working...