Feeds

Guns N' Roses blogger to walk

Noises in head punishment enough?

Intelligent flash storage arrays

The US blogger arrested for uploading tracks from Chinese Democracy, the long-awaited Guns N'Roses/Axl Rose album, is not likely to serve prison time.

Kevin Coghill, 27, from Culver City, California, was originally charged with a felony carrying a possible five-year jail term but this has been reduced to a misdemeanour for which he will cop a plea. He admits putting the tracks onto his music blog Antiquiet.

Coghill's lawyer told Wired: "We're looking at straight probation as a result of taking this deal."

The blogger was arrested by the FBI, aided by the Recording Industry Ass. of America.

The world has been waiting for the album for 15 years. To put that in perspective, just try and remember if you even had a modem back then, never mind wasting your time downloading music from the web. Axl and the boys' hardwork is due for release at the end of November, but is already attracting abuse from file sharers who have listened to it.

Coghill remains out of prison until the hearing on 8 December. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.