The Record Industry has changed its tune on personal use of music you own. It used to say that copying songs from your CDs was fine, but now it's pretending it didn't say that.
The Washington Post reports:
Sony BMG's chief of litigation,
Jennifer Pariser, testified that "when an individual makes a copy of
a song for himself, I suppose we can say he stole a song." Copying a
song you bought is "a nice way of saying 'steals just one copy,'"
On Dave Farber's IP mailing list, Dan Gillmor points out that the recording industry used to have a different opinion on personal use. It removed the following statement from its website (but you can still read it on archive.org):
"If you choose to take your own CDs and make copies for yourself on
your computer or portable music player, that's great. It's your music
and we want you to enjoy it at home, at work, in the car and on the
Gillmor adds: "Also, from the Supreme Court oral arguments in the Grokster case,
Donald Virrelli, on behalf of the entertainment companies:"
The record companies, my clients, have said, for some time now, and
it's been on their Website for some time now, that it's perfectly
lawful to take a CD that you've purchased, upload it onto your
computer, put it onto your iPod. There is a very, very significant
lawful commercial use for that device, going forward."
An Australian developer named Mark Watkins painstakingly reverse-engineered the proprietary data generated by Continuous Positive Airway Pressure (CPAP) machines and created Sleepyhead, a free/open piece of software that has become the go-to tool for thousands of sleep apnea sufferers around the world who want to tune their machines to stay healthy.
Denuvo bills itself as the best-of-breed in games DRM, the most uncrackable, tamper-proof wrapper for games companies; but its reputation tells a different story: the company's products are infamous for falling quickly to DRM crackers and for interfering with game-play until you crack the DRM off the products you buy.
Locking bootloaders with trusted computing is an important step towards protecting users from some of the most devastating malware attacks: by allowing the user to verify their computing environment, trusted computing can prevent compromises to operating systems and other low-level parts of their computer's operating environment.
There are two times you never want to just “eyeball” it: Conducting brain surgery and matching shades of paint for your walls. Whether you’re painting or repainting, make sure you’re never just “close enough” to the color you want. Not when the Nix Mini Color Sensor can scan and match any color perfectly. Small enough […]
In photography as in film, all the real artistry is in post-production – increasingly so, with the new possibilities cropping up in digital imaging. If you’re ready to get serious about your photography, may we suggest HDR Projects 2018 Pro. As working photographers can tell you, this imaging software can help you re-imagine even the […]
A picture can be worth a heck of a lot more than just a thousand words. If you’ve squinted for ages trying to get just the right photo, you might have the right passion for a career behind the camera. You might even have the right equipment, but do you have the know-how? The Beginner-To-Expert […]