Why I’m not paying the Troll Toll

Lodsys is seeking a percentage of revenue from the time they sent me the letter to the time their patent expired. Usually they request around 1% of your in-app-purchases. My company made about $500 with in-app-purchase during this time period and 1% of that is $5. What? I’m getting sued for $5? Given it cost Lodsys $350 to file the lawsuit I assumed they would ask for more than that. And they did.

Lodsys offered to settle with my company for $3,500. If I pay them off, what is stopping the next troll from knocking on my door? Nothing. And I’ve heard that if you pay a troll to go away it can lead to more trolls showing up.

via Why I’m not paying the Troll Toll | Todd Moore.

This passage seems like an appropriate response.

It is always a temptation to an armed and agile nation
To call upon a neighbour and to say: –
“We invaded you last night–we are quite prepared to fight,
Unless you pay us cash to go away.”

And that is called asking for Dane-geld,
And the people who ask it explain
That you’ve only to pay ‘em the Dane-geld
And then you’ll get rid of the Dane!

It is always a temptation for a rich and lazy nation,
To puff and look important and to say: –
“Though we know we should defeat you, we have not the time to meet you.
We will therefore pay you cash to go away.”

And that is called paying the Dane-geld;
But we’ve proved it again and again,
That if once you have paid him the Dane-geld
You never get rid of the Dane.

It is wrong to put temptation in the path of any nation,
For fear they should succumb and go astray;
So when you are requested to pay up or be molested,
You will find it better policy to say: –

“We never pay any-one Dane-geld,
No matter how trifling the cost;
For the end of that game is oppression and shame,
And the nation that pays it is lost!”

–Rudyard Kipling

Serval Mesh

Serval Mesh is an Android app that provides voice calls, text messaging and file sharing between mobile phones using WiFi, without the need for a SIM or any other infrastructure like mobile cell towers, WiFi hotspots or Internet access.

Via The Serval Project Wiki

The Enron E-mails’ Immortal Life

This research has had widespread applications: computer scientists have used the corpus to train systems that automatically prioritize certain messages in an in-box and alert users that they may have forgotten about an important message. Other researchers use the Enron corpus to develop systems that automatically organize or summarize messages. Much of today’s software for fraud detection, counterterrorism operations, and mining workplace behavioral patterns over e-mail has been somehow touched by the data set.

via The Enron E-mails’ Immortal Life | MIT Technology Review.

How Facebook threatens HP, Cisco, and more with its “vanity free” servers

Facebook, Amazon, and Google are all very picky about their server hardware, and these tech giants mostly build it themselves from commodity components. Frank Frankovsky, VP of hardware design and supply chain operations at Facebook, was instrumental in launching the Open Compute Project because he saw the waste in big cloud players reinventing things they could share. Frankovsky felt that bringing the open-source approach Facebook has followed for software to the hardware side could save the company and others millions—both in direct hardware costs and in maintenance and power costs.

via How Facebook threatens HP, Cisco, and more with its “vanity free” servers | Ars Technica.

The OCP hardware designs are “open” at a higher level. This way anyone can use standards-based components to create the motherboards, the chassis, the rack-mountings, the racks, and the other components that make up servers.

Motorola Is Listening

Most subsequent connectivity to both services (other than downloading images) is proxied through Motorola’s system on the internet using unencrypted HTTP, so Motorola and anyone running a network capture can easily see who your friends/contacts are (including your friends’ email addresses), what posts you’re reading and writing, and so on. They’ll also get a list of which images you’re viewing, even though the actual image download comes directly from the source.

via Motorola Is Listening – Projects – Beneath the Waves.

The Underhanded C Contest

The goal of the contest is to write code that is as readable, clear, innocent and straightforward as possible, and yet it must fail to perform at its apparent function. To be more specific, it should do something subtly evil. Every year, we will propose a challenge to coders to solve a simple data processing problem, but with covert malicious behavior. Examples include miscounting votes, shaving money from financial transactions, or leaking information to an eavesdropper. The main goal, however, is to write source code that easily passes visual inspection by other programmers.

via The Underhanded C Contest.

XenServer 6.2 is now fully open source!

It’s an exciting day for Citrix, our customers and the open source community as we announce some BIG news for Citrix XenServer. Today we cross another major milestone as XenServer moves to a full open source model beginning with the new XenServer 6.2. Cutting right to the chase, here are the highlights that I’ll go into more detail on:

  • XenServer 6.2 is available as a free open source virtualization platform for all users
  • Citrix is also introducing a new XenServer.org community portal
  • Citrix provides a paid version of XenServer that includes support and maintenance
  • New CPU socket licensing
  • New simplified packaging and pricing

via XenServer 6.2 is now fully open source! | Citrix Blogs.

MIT researchers can see through walls using ‘Wi-Vi’

Every time a Wi-Fi signal is reflected off an object, the shape and makeup of that object affects the signal that comes back. But when Wi-Fi hits a wall, most of the signal gets reflected off the wall and only a faint bit of it reflects off the people on the other side.

To get around this, Wi-Vi transmits two Wi-Fi signals, one of which is the inverse of the other. When one signal hits a stationary object, the other cancels it out. But because of the way the signals are encoded, they don’t cancel each other out for moving objects. That makes the reflections from a moving person visible despite the wall between that person and the Wi-Vi device. Wi-Vi can translate those faint reflections into a real-time display of the person’s movements.

via MIT researchers can see through walls using ‘Wi-Vi’ | ITworld.