I heard they are talking about fines of $750 to $10,000 per song put on an
iPod. Not clear if this is a fine for the user or Apple for selling the
device. Either way, Apple and/or I would be bankrupt!

I am so far along at converting my CD collection into iTunes/ buying from
the iTunes store, that I would never go back to using CDs. I would stop
purchasing music before going back...


> Actually this has even further implications because of its blind garden
> hose sprayer approach.
> 
> Keep in mind that Pantone has copyrighted just about every currently
> printable color there is. I take a photo of a Pantone color chart and
> send it to you, you print it getting the output exactly right
> colorwise. Will I and the printer manufacturers be sued under the act
> because you can print a color that Pantone has put a name on?
> 
> Jerry
> 
> The example is not that far extreme, the act does go a long way towards
> making it easily possible to quickly criminalize large segments of the
> population (those that own vcrs, computers, stereos, etc..
> 
> 
> On Jul 07, 2004, at 10:04 PM, Andy Arnold wrote:
> 
>> I don't know how much of a threat this proposed legislation really is
>> to the
>> iPod, but you might want to check it out, it only takes 20 seconds
>> 
>> http://savetheipod.com/index1.php
>> 
>> 
>> 
>> | The next meeting of the Louisville Computer Society will
>> | be July 27. The LCS Web page is <http://www.kymac.org>.
>> | List posting address: <mailto:macgroup at erdos.math.louisville.edu>
>> | List Web page: <http://erdos.math.louisville.edu/macgroup>
>> 
>> 
> 
> 
> 
> 
> ----------------------------------------------------------------------
> :live data: /n./  1. Data that is written to be interpreted and takes
> over program flow when triggered by some un-obvious operation, such as
> viewing it. One use of such hacks is to break security. For example,
> some smart terminals have commands that allow one to download strings
> to program keys; this can be used to write live data that, when listed
> to the terminal, infects it with a security-breaking {virus} that is
> triggered the next time a hapless user strikes that key. For another,
> there are some well-known bugs in {vi} that allow certain texts to send
> arbitrary commands back to the machine when they are simply viewed.
> 2. In C code, data that includes pointers to function {hook}s
> (executable code).
> 3. An object, such as a {trampoline}, that is constructed on the fly by
> a program and intended to be executed as code.
> ----------------------------------------------------------------------
> 
> -----------------------------------
> Someday, I will come up with a clever signature line. I am not sure if
> I will use it or not, but I will come up with one.
> 
> 
> 
> | The next meeting of the Louisville Computer Society will
> | be July 27. The LCS Web page is <http://www.kymac.org>.
> | List posting address: <mailto:macgroup at erdos.math.louisville.edu>
> | List Web page: <http://erdos.math.louisville.edu/macgroup>



| The next meeting of the Louisville Computer Society will
| be July 27. The LCS Web page is <http://www.kymac.org>.
| List posting address: <mailto:macgroup at erdos.math.louisville.edu>
| List Web page: <http://erdos.math.louisville.edu/macgroup>


Reply via email to