I heard they are talking about fines of $750 to $10,000 per song put on an iPod. Not clear if this is a fine for the user or Apple for selling the device. Either way, Apple and/or I would be bankrupt!
I am so far along at converting my CD collection into iTunes/ buying from the iTunes store, that I would never go back to using CDs. I would stop purchasing music before going back... > Actually this has even further implications because of its blind garden > hose sprayer approach. > > Keep in mind that Pantone has copyrighted just about every currently > printable color there is. I take a photo of a Pantone color chart and > send it to you, you print it getting the output exactly right > colorwise. Will I and the printer manufacturers be sued under the act > because you can print a color that Pantone has put a name on? > > Jerry > > The example is not that far extreme, the act does go a long way towards > making it easily possible to quickly criminalize large segments of the > population (those that own vcrs, computers, stereos, etc.. > > > On Jul 07, 2004, at 10:04 PM, Andy Arnold wrote: > >> I don't know how much of a threat this proposed legislation really is >> to the >> iPod, but you might want to check it out, it only takes 20 seconds >> >> http://savetheipod.com/index1.php >> >> >> >> | The next meeting of the Louisville Computer Society will >> | be July 27. The LCS Web page is <http://www.kymac.org>. >> | List posting address: <mailto:macgroup at erdos.math.louisville.edu> >> | List Web page: <http://erdos.math.louisville.edu/macgroup> >> >> > > > > > ---------------------------------------------------------------------- > :live data: /n./ 1. Data that is written to be interpreted and takes > over program flow when triggered by some un-obvious operation, such as > viewing it. One use of such hacks is to break security. For example, > some smart terminals have commands that allow one to download strings > to program keys; this can be used to write live data that, when listed > to the terminal, infects it with a security-breaking {virus} that is > triggered the next time a hapless user strikes that key. For another, > there are some well-known bugs in {vi} that allow certain texts to send > arbitrary commands back to the machine when they are simply viewed. > 2. In C code, data that includes pointers to function {hook}s > (executable code). > 3. An object, such as a {trampoline}, that is constructed on the fly by > a program and intended to be executed as code. > ---------------------------------------------------------------------- > > ----------------------------------- > Someday, I will come up with a clever signature line. I am not sure if > I will use it or not, but I will come up with one. > > > > | The next meeting of the Louisville Computer Society will > | be July 27. The LCS Web page is <http://www.kymac.org>. > | List posting address: <mailto:macgroup at erdos.math.louisville.edu> > | List Web page: <http://erdos.math.louisville.edu/macgroup> | The next meeting of the Louisville Computer Society will | be July 27. The LCS Web page is <http://www.kymac.org>. | List posting address: <mailto:macgroup at erdos.math.louisville.edu> | List Web page: <http://erdos.math.louisville.edu/macgroup>
