First patent troll ordered to pay “extraordinary case” fees

“Lumen’s motivation in this litigation was to extract a nuisance settlement from FTB on the theory that FTB would rather pay an unjustified license fee than bear the costs of the threatened expensive litigation,” Cote stated in the order she issued on Friday. “Lumen’s threats of ‘full-scale litigation,’ ‘protracted discovery,’ and a settlement demand escalator should FTB file responsive papers, were aimed at convincing FTB that a pay-off was the lesser injustice.”

via Payback time: First patent troll ordered to pay “extraordinary case” fees | Ars Technica.

TrueCrypt Website Says To Switch To BitLocker

I do not know precisely what this means, as I have no contact with the developers anymore: but this is what was agreed upon.

They should no longer be trusted, their binaries should not be executed, their site should be considered compromised, and their key should be treated as revoked. It may be that they have been approached by an aggressive intelligence agency or NSLed, but I don’t know for sure.

While the source of 7.2 does not appear to my eyes to be backdoored, other than obviously not supporting encryption anymore, I have not analysed the binary and distrust it. It shouldn’t be distributed or executed.

via TrueCrypt Website Says To Switch To BitLocker – Slashdot.

From:   TrueCrypt Final Release Repository

TrueCrypt’s formal code audit will continue as planned. Then the code will be forked, the product’s license restructured, and it will evolve. The name will be changed because the developers wish to preserve the integrity of the name they have built. They won’t allow their name to continue without them. But the world will get some future version, that runs on future operating systems, and future mass storage systems.

There will be continuity . . . as an interesting new chapter of Internet lore is born.

How MIT and Caltech’s coding breakthrough could accelerate mobile network speeds

An RLNC transmission can recover from errors with neither sender nor receiver retaining and updating transmission-state information and requesting lost packets to be retransmitted. This is because RLNC can recreate any packet lost on the receiving side from a later sequenced packet. In over-simplified terms, each RLNC encoded packet sent is encoded using the immediately earlier sequenced packet and randomly generated coefficients, using a linear algebra function. The combined packet length is no longer than either of the two packets from which it is composed. When a packet is lost, the missing packet can be mathematically derived from a later-sequenced packet that includes earlier-sequenced packets and the coefficients used to encode the packet.

Since the RLNC encoding sender doesn’t need to listen for acknowledgements of successful transmission and perhaps retransmit, the sender can continuously transmit at near-wire speed optimized for latency and network throughput.

via How MIT and Caltech’s coding breakthrough could accelerate mobile network speeds.

Update:  After posting this I remembered I had read about an algorithm recreating earlier lost packets from future packets.  So I clicked on the mit tag and on 10/25/2012 I posted this blurb:  A Bandwidth Breakthrough

… The technology transforms the way packets of data are sent. Instead of sending packets, it sends algebraic equations that describe series of packets. So if a packet goes missing, instead of asking the network to resend it, the receiving device can solve for the missing one itself. …

That must mean they’re still working on it.

Verizon FiOS claimed public utility status to get government perks

The FCC classifies broadband (such as FiOS) as an information service under Title I of the Communications Act, resulting in less strict rules than the ones applied to common carrier services (such as the traditional phone system) under Title II. But since both services are delivered over the same wire, Verizon FiOS is able to reap the benefits of utility regulation without the downsides.

via Report: Verizon FiOS claimed public utility status to get government perks | Ars Technica.

“The companies’ affiliates have acted together and have taken control of the customer-funded wires and networks, which are Title II, in multiple ways that allow the company to control both the end-user connection—speed, access, and use of the Internet—as well as the competitor side of attaching to the wire and delivering services to the end users,” Kushnick wrote in an e-mail. “We will be asking for the FCC to open the networks to all forms of competition because customers paid for it and they are Title II, and because the affiliate companies have created a bottleneck that controls the wires and blocks competitors.”

Crushing Blow for Copyright Trolls: Appeals Court Halts AF Holdings’ Extortion Scheme

This same coalition has fought for years in courts around the country to explain how the trolls were abusing the legal process to extort settlements from unsuspecting John Does.  While several district courts have agreed, this is the first time a federal appeals court has weighed in.

via Crushing Blow for Copyright Trolls: Appeals Court Halts AF Holdings’ Extortion Scheme | Electronic Frontier Foundation.

“Once a troll gets the names it’s looking for, then it already has what it needs to put its shakedown scheme in motion,” EFF Staff Attorney Mitch Stoltz said.

The threat facing online comments

Thus, according to the ECtHR, a news website should anticipate types of stories that might attract defamatory or insulting comments and be prepared to remove them promptly – or even before the comment has been reported, which might mean websites will be forced to pre-moderate any comment it publishes. One only has to look at the type and volume of comment posted below the line on websites from the FT’s to the Daily Mail’s to see the implications of this ruling. And, as any moderator will tell you, controversial comments can appear in the unlikeliest of places.

via The threat facing online comments – FT.com.

Be a kernel hacker

In this tutorial, we’ll develop a simple kernel module that creates a /dev/reverse device. A string written to this device is read back with the word order reversed (“Hello World” becomes “World Hello”). It is a popular programmer interview puzzle, and you are likely to get some bonus points when you show the ability to implement it at the kernel level as well. A word of warning before we start: a bug in your module may lead to a system crash and (unlikely, but possible) data loss.

via Be a kernel hacker | Linux Voice.

RStudio – About

RStudio provides open source and enterprise-ready professional software for the R statistical computing environment. We started RStudio because we were excited and inspired by R. RStudio products, including RStudio IDE and the web application framework RStudio Shiny, simplify R application creation and web deployment for data scientists and data analysts.

via RStudio – About.