Posted in Uncategorized at 5:20 pm by Dr. Roy Schestowitz
Nicolas Sarkozy with Laura Bush
Summary: Cablegate/Wikileaks material reveals that Business Software Alliance (BSA) employees can be Microsoft employees simultaneously; new French law may tax Linux-powered devices but not Windows-based ones
EARLIER this year we gave many examples of the BSA attacking Free software and we assumed that the BSA was merely a front group for Microsoft. But based on this newly-leaked cable from Spain, one can be IP Development Director at Microsoft and Vice President at the BSA at the same time. Does that explain much? Let’s remember that the BSA delivers a lot of propaganda for political reasons in copyright too, along with IDC (see recent examples in this Wiki page).
France Wants To Extend Private Copying Levy To Tablets… But Not If They Run Microsoft Windows
Kurata points us to the news that French politicians are debating extending the “you must be a criminal” private copying levy to tablet computers — but, oddly, the new levy would not apply to tablets running Windows (Google translation from the original French). The tax would apply to any iPad or Android-based device, but apparently Windows tablets won’t be counted, since they’ll be classified as full computers, while the other tablets are in this new taxable category.
This seems like a pretty major scandal. A few minutes ago I got a pointer to it via the Fsuk-manchester mailing list, where someone wrote: “What does everyone think of this? Basically, the French government seem to be assuming that people buying tablets with a non-Windows OS will pirate it and install it anyway and so are considering charging a tax on all non-Windows tablets in a similar fashion to the tax on CDs. I can see this being the start of a slippery slope if it gets passed, does anyone know if this is likely to happen?”
In addition, Microsoft is trying to collect “Linux tax” for unnamed patents in all Android devices. Shame on them. It’s racketeering [1, 2, 3, 4, 5, 6, 7]. Our reader Wayne wrote to Glyn Moody in Identi.ca: “Sure I saw evidence. The attempt to exempt Windows OS tablets is proof… Rather than Vince Cable or Jeremy Hunt, they should hire you to make the BSkyB decision… Not a circular argument. I’ve read a lot of the Comes documents on Groklaw and this is how Microsoft operates… If there’s one thing I’ve learned about #Microsoft it’s that assuming the worst is your best case scenario… Fool me once, shame on you. Fool me twice, shame on me. The only way to handle Microsoft” (some of these message framed in another context). █
Posted in Uncategorized at 4:56 pm by Dr. Roy Schestowitz
Summary: Microsoft’s faking of Windows sales numbers and abuse of customers who buy a computer with an unwanted operating system lands it in hot legal waters
Microsoft has reportedly just been sued (hard to corroborate with other sources) for the Vista and Vista 7 abuse which we covered here before. To quote the short report from today:
A federal class action claims Microsoft illegally requires consumers to buy a more expensive Windows Vista or Windows 7 program, before they get “downgrade rights” to buy the Windows XP Professional operating system.
Someone from IBM has claimed that those who choose Windows XP (since around 2007) will have their purchase count as two Vista/Vista 7 sales. Not one sale of XP. Not one sale of Vista/Vista 7 but two. He called it “dipping” and it’s one of the tricks Microsoft uses to produce fake numbers, in addition to financial cheats.
Chips B. Malroy has just given us the pointer to it and he adds that he “can’t find any more information on that lawsuit” (if someone can, please alert us in comments/IRC). █
Russian Prime Minister Vladimir Putin [cq] has ordered government agencies there to open-source software by 2015, according to translated documents.
Putin’s order, signed this month, follows news reports from October saying the Russian government was planning to drop Microsoft products in favor of a national open-source operating system based on Linux.
Prime Minister of the Russian Federation, Vladimir Putin, signed a government order for the transition of federal executive bodies and agencies of the federal budget to use free software between 2011 – 2015.
There are not many download accelerators for Linux that integrate well with web browsers and have support for downloading links right from the browser. Command line tools like Axel download accelerator and Aria2 are available for Linux but then you have to download links by copy/pasting them into terminal or in a GUI for it.
Same old story. Budget cuts. PCs growing old. GNU/Linux gives them new life and the school district saved $100K in a year. If that is mainstream, imagine the motivation a school like mine without any budget for IT has to switch…
Further, M$ calls “office workers” demanding and needing better performance. If that were true they would already be using thin clients because with files already cached in the RAM of a powerful server there is no waiting for I/O. Office workers are the least demanding users of PCs that I know. They think IT is just fine if the machine boots quickly and keep ahead of typing. That has been true since P3 and thin clients are more powerful than that these days.
However, the Ubuntu distribution installed on my netbook in about 10 minutes and installed all the necessary drivers. Well, almost all of them. I couldn’t get my Wi-Fi card to work with Ubuntu, but a quick Google search led me to the solution. In under an hour, then, I had an operating system that up and running. In other words, you don’t have to be a software engineer or someone with a ton of time on his hands to install this and get it to work well. Linux has come a long way, indeed.
Buying a PC from any large manufacturer/retailer without a copy of Windows pre-installed is difficult. You have some companies that refuse to sell a machine if you want Windows removed, then there are others that will remove it and reduce the price. Dell offers certain confirgurations without Windows installed, but it’s not clear from the website, and has to be requested either offline or over Live Chat.
Harish Pillay found this out by actually trying to buy a Dell laptop with Ubuntu installed. He had actually done this before, purchasing a Dell Vostro V13-N series laptop with Ubuntu. However, this time the N-series was nowhere to be seen and a Live Chat was required to get a Windows-less laptop.
We’re now free of the Big Kernel Lock (in many configurations – it’s a config option that will hide other not-yet-compatible options when used) and I have been running systems BKL-free for some time now. Arnd Bergman and others have done an excellent job to rid us of this last vestige of truly ancient non-scalable Linux and unless you need a V4L (Video-4-Linux – TV tuner, webcam etc) device, you can probably run BKL-free today too. It is hoped that V4L will be fixed soon, maybe in time for 2.6.37. You probably won’t notice a huge performance benefit of running without the BKL unless you happen to have something more high end than a desktop, but it’s still pretty cool to know that you could get higher performance if only you could afford to have a system with dozens of CPUs to take advantage of it.
With Iveland Alpha 5 arriving earlier today and more information beginning to be released about OpenBenchmarking.org for its February debut with Phoronix Test Suite 3.0, many have become more curious about what this project entails. Last week I posted a few very small screenshots of OpenBenchmarking.org in its current form. I also have already said OpenBenchmarking.org will become bigger than Phoronix itself, so here are a few statistics right now.
Next week Intel is set to roll out their much-anticipated “Sandy Bridge” CPUs during the 2011 Consumer Electronics Show. With these 32nm, LGA-1155 next-generation Intel Core processors will also come the Intel P67 Chipset on a whole selection of new motherboards at launch like the ECS P67H2-A2 and ASRock P67 Pro3. How well though will Intel’s newest hardware play with Linux?
This list is compiled based on user feedback and functionalities. If you are looking for a torrent client which is less resource hungry, gives top speed, has lots of speed then rtorrent is the one you are looking for. If you are a newbie and dont want to play with configurations then deluge is the best bet. If you are obsessed with good looks are doesnt have a freesoftware ideology to guide you the vuze suites you. If you are looking for a truly light weight GUI then you have to check out bittornado.
CloudSN (Cloud Services Notifications) is an application you can use to display notifications when you have new emails (POP3 and IMAP), new Identi.ca messages, Google Reader unread items or it can watch any RSS feed for changes (which means you can use it for Facebook too). For a complete review, see our previous post on CloudSN.
Opera 11 shipped Dec. 16 with new extensions, tab stacking and visual navigation aids that put the web browser on a competitive footing with Microsoft’s IE. The features add productivity and conveninece to the Opera experience and could be compelling advantages for web users who need quick access to many different web pages at the flick of a wrist.
In this article, we explore various gaming options available for Tux-lovers.
A common misconception is that gaming and open source can never seem to gel together. Linux users are desktop publishers, programmers and many other things, but mostly hardly gamers. The myth remains that the scene in the open-source diaspora is bleak when it comes to gaming.
Well, it’s high time we broke the myth. This so-called bleak scene has been showing some signs of improvement of late, so it seemed logical to check out the progress of the FOSS world in the gaming sector.
“Thriving on the success of the popular Amarok 1.4, Clementine tries to provide a reminiscent user experience and on par acoustics to the Amarok 1.4.x user base”.
The Kde 4.x and QT 4 desktop changed the way people used the PC. Touted to revolutionist the PC experience, KDE 4 desktop brought some drastic changes. To cope up with the KDE development Amarok team tried to follow the same bandwagon and audited the ever loved Amarok 1.4 to a newly refurbished Amarok 2. Some hated it, while some loved it. However the mixed bag review was much to the downside of Amarok.
YaRock is a new Qt4 music player designed to provide a nice overview of your music by allowing you to browse your music collection based on the album cover art. We love YaRock here at WebUpd8, especially for it’s simplicity and the nice cover art overview it provides, as well as the ability to fetch albums cover art from Last.fm.
A new major release is around the corner and it’s time for all of you to help with KDE release parties around the globe. This is a guest blog by my Google Code-in student Sasu.
It’s been over four months now from previous major release by KDE and it’s time for a new one. 4.6 is about to be released on 26th of January and it is party time again! Release parties are very fun and educational for visitors. If your party has represented KDE well you can even get new local KDE community members.
The Indian KDE community will organize its first conference at Bengaluru in March 2011. The 5 day event will bring together KDE contributors, Qt developers, users and FOSS enthusiasts.
We realise that there are not many KDE/Qt related events that are accessible to Indians. FOSS conferences or meetings are an excellent way to show people the technology first hand and ways to contribute to it. We not only dazzle them with the world of KDE, but show them first hand how simple it is to get involved and make a difference. This is our motivation for conducting this event.
A long anticipated 64-bit version of PCLOS was reported to be in development this past November. And as 2010 draws to a close, some wonder what its current status is. Bill Reynolds, not known for long-winded conversations or laying out rigid development schedules, has given a bit of an update.
Yeah. Yesterday I was so annoyed by my computer that I burned a cd with Fedora and installed it. I also had a 1,5TB disk waiting to be inserted, combining that made the switch pretty easy.
For the last couple years, I ran KDE from trunk from svn. That meant that I only had a need for a basic Linux OS. Debian was fine for that. Combined with Equives I could still use some distro packages while compiling most of it myself. But there were problems. Mostly these were caused by my own lazyness in configuring the right stuff in the right way.
So up to now, big compliments to the Fedora team. Nice job, and that needs to be said too sometimes!
In the last Ubuntu Tweak 0.5.8, I made a mistake. If you disabled the “Use Separated Sources” in the preferences in Ubuntu Tweak, all your Launchpad PPA sources may be “lost”(In fact, they’ve been moved to the separated file).
Ubuntu One a syncing service that Canonical bundles with Ubuntu. I think it’s great that it’s bundled with the OS, but it doesn’t feel like it’s being extended to its full potential (or even most of it). Recognize that I’m talking about the syncing service alone, as opposed to syncing+music store+[insert new feature here].
AriOS is the successor of mFatOS, an Ubuntu remaster we talked about a while back. AriOS 2.0 was released today and it’s based on Ubuntu 10.10 – the new version tries to replicate Unity but as opposed to Unity, it’s customizable thanks to Avant Window Navigator. In AriOS, everything works out of the box and most popular applications are installed by default which I’m sure those with a limited Internet connection will appreciate.
# The Community Website is now running on its own in our Canadian server in Toronto.
# We lost our development and testing server in London.
# A second Cloud Server was allocated to host our public archive (which was previously in London).
Unless GNOME developers can pull a last minute rabbit out of their collective hat, a mixed response for GNOME 3.0 seems inevitable. Even then, a fork to continue development of GNOME 2.0 is probable. A strongly hostile reaction may weaken GNOME’s dominant position on the desktop, increasing the popularity of KDE or opening the way for Ubuntu’s Unity desktop.
This feels like a no-brainer at this point, but Android is clearly going to continue on its upward path throughout 2011. Holding nearly a quarter of the smartphone market in October, it’s widely expected to become the number-one mobile operating platform in the world in the next few years; I predict that will happen sooner rather than later, possibly even by the end of next year.
The Apache Foundation also had a busy year, with Hadoop taking most of the spotlight. The open-source map/reduce implementation was the most popular project at Apache in 2010, whether you’re measuring by code contributions, sub-projects or discussion lists.
So you’re looking for a really easy way to integrate Thunderbird in the Ubuntu Messaging Menu? You can try a package I’ve recently came across (called “xul-ext-indicator”) that is available in a PPA, which adds Thunderbird to the Messaging Menu and provides quick access to your contacts, compose a new mail and unread emails. Using this package, you’ll also get NotifyOSD notifications when new mail arrives.
27 December: The first Release Candidate builds for the FreeBSD-7.4/8.2 release cycles are now available. ISO images for Tier-1 architectures can be downloaded from most of the FreeBSD mirror sites. Please see the official announcement for further details about these releases.
Recently, there have been reports in the news that an unauthorized third party viewed and modified ettercap forums database (hosted on our Project web service). Among other things, this exposed hashed values of ettercap forum user passwords. (In other words, if you have an ettercap account/password and you’re using the same password other places, such as your SourceForge account, it would be in your best interest to change them. And not do that anymore.)
While looking for existing C coding standards I discovered that the GNU and Linux projects officially suggest very different styles. Inside the Linux kernel documentation, Linus Torvalds goes so far as to mock GNU coding standards:
First off, I’d suggest printing out a copy of the GNU coding standards, and NOT read it. Burn them, it’s a great symbolic gesture.
At this point I wanted to understand the difference between the coding styles of established open source projects.
Who wouldn’t agree that our society is capitalistic, based on competition and selfishness? As it happens, however, huge areas of our lives are also based on gift economies, barter, mutual aid, and giving without hope of return (principles that have little or nothing to do with competition, selfishness, or scarcity economics). Think of the relations between friends, between family members, the activities of volunteers or those who have chosen their vocation on principle rather than for profit.
The original web headline for this article – More than 3m UK children have no internet access at home, warns charity – conflated two figures: 1m children are without computers and 2m are without internet access. This has been corrected.
So familiar are we with its presence in English legal and media life that we perhaps take the existence of defamation law for granted.
In practical terms, the law of defamation provides the means by which legal action can be taken (or threatened) in respect of statements which are unwelcome to the claimant, regardless of any public interest in those statements being made.
The internet is already considered so important in Finland, Spain and Estonia that access is a legal right. And the list of online possibilities keeps on growing. In 2010, the launch of Apple’s iPad and other touchscreen computers made surfing more fun and intuitive, while several smartphone operating systems, especially Google’s Android, took off, extending the mobile net’s reach.
Ugandan pastor Martin Ssempa has been charged with blackmail for allegedly paying a man to falsely accuse another pastor of sexual assault. Ssempa is notorious in Uganda and around the world for his anti-LGBT sentiments and past efforts.
On September 18, 2007, a few dozen neuroscientists, psychiatrists, and drug-company executives gathered in a hotel conference room in Brussels to hear some startling news. It had to do with a class of drugs known as atypical or second-generation antipsychotics, which came on the market in the early nineties. The drugs, sold under brand names such as Abilify, Seroquel, and Zyprexa, had been tested on schizophrenics in several large clinical trials, all of which had demonstrated a dramatic decrease in the subjects’ psychiatric symptoms. As a result, second-generation antipsychotics had become one of the fastest-growing and most profitable pharmaceutical classes. By 2001, Eli Lilly’s Zyprexa was generating more revenue than Prozac. It remains the company’s top-selling drug.
Transfer junkies may be excited for USB 3.0, but Intel’s Light Peak solution promises up to double the speeds of that standard. We’re talking data rates of up to 10 gigabits per second, fast enough to transfer a full 1080p digital copy of No Country for Old Men (about 4GB) in less than 4 seconds (normally a two-hour process). But that’s not all Light Peak can do. To learn more about this exciting technology, we spoke with Victor Krutul, director of the I/O optical team at Intel and a former head Light Peak engineer.
A Tel Aviv University team excavating a cave in central Israel said teeth found in the cave are about 400,000 years old and resemble those of other remains of modern man, known scientifically as Homo sapiens, found in Israel. The earliest Homo sapiens remains found until now are half as old.
Tipster Jb pointed us at a video of a rather startling project: Printing a complete musical instrument. In this case, MIT Media Lab researcher Amit Zoran attempted to print an entire and working flute in one operation.
The British military has been training interrogators in techniques that include threats, sensory deprivation and enforced nakedness in an apparent breach of the Geneva conventions, the Guardian has discovered.
The book makes very depressing reading, and not because it details gruesome atrocities. On the contrary, the editors made it a point not to include incidents of exceptional brutality committed by sadists, which can be found in every army unit in Israel and throughout the world. Rather, they wanted to throw light on the grey routine of the occupation.
One morning, when the storm started shaking the treetops and the dogs howled in terror because of the thunders and the flashes of lightning, fifty children of different ages went out to school in the city of Lod, Israel. During the day most of them worked diligently on their studies, hoping the storm would abate so they could go back safely to the home where they were born and raised. To the sound of the bell announcing the end of the day they all set off running back home. The tempest intensified, and with it the will to find oneself in the warmth of one’s home; in the warmth of the seven homes of their extended family – the Abu Eid family.
Car insurance rates have always been based on risk, and risk has usually been measured by the number of miles driven. So drivers often underreport the miles they travel to keep their rates low — at the expense of other drivers.
But a form of insurance that requires electronic verification of miles driven, in return for a discount, is gaining popularity. These so-called pay-as-you-drive policies — miles are often tracked through a GPS system in the car — are now offered in more than half of the states and are spreading, albeit slowly, despite privacy concerns.
The three independent federal watchdogs created by the Conservative government operate largely behind the closed doors of their own offices and, after one was exposed this fall for having done little in three years, critics are asking questions about the effectiveness of the other two.
According to the post on Boing Boing that references an AOL news investigation, even when an expert endorses the TSA’s scanners they are careful to preface their support with some warnings: the safety of the machines depends heavily on their being properly maintained, regularly tested, and expertly operated.
You may or may not be in favor of the radiation that comes from the Transportation Sex-crime Administration’s scanners, but I think most people would agree that a malfunctioning machine that beams your vital organs with 10,000 or 100,000 times the normal dosage is bad thing.
Say what you will about Julian Assange, but the guy’s smart as a whip. In an interview with MSNBC yesterday, the WIkiLeaks captain eloquently and vehemently defended his First Amendment rights, while decrying the U.S. media’s “digital McCarthyism,” entailing a call for his assassination.
By his own admission, Wired Magazine Senior Editor Kevin Poulsen is withholding a large majority of chat logs that could prove WikiLeaks founder Julian Assange did or did not conspire with the US soldier accused of leaking a cache of diplomatic cables.
THOSE INCITING MURDER UPON JULIAN ASSANGE AND/OR MEMBERS OF HIS FAMILY.
We, among many law abiding citizens of the world deplore and condemn, as applicable, your utterances and writings calling for the extra judicial ie unlawful: kidnapping/assassination/murder/physical harm of Julian Assange, his supporters, Wikileaks workers or members of Assange’s family.
For more than six months, Wired’s Senior Editor Kevin Poulsen has possessed — but refuses to publish — the key evidence in one of the year’s most significant political stories: the arrest of U.S. Army PFC Bradley Manning for allegedly acting as WikiLeaks’ source. In late May, Adrian Lamo — at the same time he was working with the FBI as a government informant against Manning — gave Poulsen what he purported to be the full chat logs between Manning and Lamo in which the Army Private allegedly confessed to having been the source for the various cables, documents and video that WikiLeaks released throughout this year. In interviews with me in June, both Poulsen and Lamo confirmed that Lamo placed no substantive restrictions on Poulsen with regard to the chat logs: Wired was and remains free to publish the logs in their entirety.
From Wikileaks: Two Wikileaks-related senior human rights activists have been assassinated. We ask for your assistance.
On Thursday afternoon March 5, Oscar Kamau Kingara, director of the Kenyan based Oscar legal aid Foundation, and its programme coordinator, John Paul Oulo, were shot at close range in their car less than a mile from President Kibaki’s residence. The two were on their way to a meeting at the Kenyan National Commission on Human Rights.
Julius Rosenberg was arrested in July 1950 a few weeks after the Korean War began. He was executed, along with his wife, Ethel, on June 19, 1953, a few weeks before it ended. The charge against the Rosenbergs was vague – “Conspiracy to Commit Espionage.” But they really were tried and sentenced for giving the secret of the atomic bomb to the USSR. Their co-defendant Morton Sobell also was convicted and received a 30-year prison sentence.
The contentious whistle-blowing site WikiLeaks has ruffled so many feathers that it’s been shut down not just in the countries we think of as repressive, but in those we like to think are open. Because of that, mirror sites have proliferated. But accompanying the mirrors are clones. Clone sites reproduce access to some or all of the material available on the home site or serve a similar function as WikiLeaks but independently of that group. All of them add value by focusing on a specific concern or geography.
“A breakthrough in journalism research,” the director of the National Library of Israel, Oren Weinberg, called the institution’s project to scan and upload to the Internet hundreds of thousands of pages from Jewish newspapers from the 19th century to the present.
Historical Jewish Press, whose official launch was on Monday, is a joint initiative of the national library and Tel Aviv University “that will give researchers, teachers, students and the general public rapid, easy and unprecedented access to periodicals,” Weinberg said.
The task was made all the more challenging by the fact that most of those conflicting stories were being told by one person, the principle source for almost all media stories regarding Bradley Manning: the recently institutionalized hacker Adrian Lamo, who turned his alleged chat logs with Manning over to authorities.
In recent weeks, NPR hosts, reporters and guests have incorrectly said or implied that WikiLeaks recently has disclosed or released roughly 250,000 U.S. diplomatic cables. Although the website has vowed to publish “251,287 leaked United States embassy cables,” as of Dec. 28, 2010, only 1,942 of the cables had been released.
The response has been absolutely amazing to the call we put out last night for transcription help. So far we have:
* CBC Radio Interview, transcribed by SteveNS AND nedits
* Glenn Greenwald Interviews Lamo Pt. 1, transcribed by bmull
* Glenn Greenwald Interviews Lamo Pt. 2, transcribed by calamar
* Adrian Lamo at The Next HOPE Informants panel, Pt. 1 of 5, transcribed by LC
* John Draper interviews Lamo at The Next Hope, pt. 1 of 4, transcribed by nedits and KF
* John Draper interviews Lamo at The Next Hope, pt. 1 of 4, transcribed by Michele in PDX
* LocalFrequencies Extended audio, transcribed by Duncan
Since the Rio Earth Summit in 1992, the media and many organisations have pursued as separate narratives the issues of climate, biodiversity and sustainable development. One of the changes this year, at a UN level, has been recognition that this does not make sense.
Without protecting and enhancing biodiversity in forests and other systems we are losing our biggest ally. These living systems can lock away carbon at a fraction of the price that technical solutions for carbon storage could only do at huge cost and by expending even more energy.
Climate change is affecting the cultivation of Assam tea, with rising temperatures reducing yields and altering the distinctive flavour of India’s most popular drink, researchers say.
High hills and abundant rainfall make the north-eastern state of Assam an ideal place to grow tea, with 850 gardens over 320,000 hectares (593,000 acres) producing the majority of the country’s harvest. But in the last 60 years, rainfall has fallen by more than a fifth and minimum temperature has risen by a degree to 19.5C.
As Scotland has endured its second extreme cold weather event of the winter it is hard to accept that overall the climate is warming. But the evidence is that despite human doubts, the natural world north of the border is responding to an increase in average temperatures.
Flying insects, particularly noticeable ones like butterflies, are the first to take advantage of more favourable conditions and colonise new areas. Perhaps the most dramatic expansion is that of the orange tip. Thirty years ago it would have been rare to see one in Scotland but now the species is common as far north as Easter Ross and Sutherland. Only Caithness, Orkney and Shetland have yet to report sightings.
With as few as 3200 tigers in the wilds of the world as many as thirteen tiger-range countries met in November 2010 in Tiger Summit in St. Petersburg in an effort to save the species. They committed around $300 million during the next five years towards doubling the current world population of the species by 2022. Hosted by Russian Prime Minister Vladimir Putin, governments concerned capped a year-long political process with new funding to support the plan, known as the Global Tiger Recovery Programme
“The war on climate science and scientists that’s going on now makes the Bush Administration look moderate,” we said to Science for their December 17 news article “Climatologists Feel the Heat As Science Meets Politics.” Bush can’t be rehabilitated on climate change, but during the past two years the global warming denial machine has launched a nihilistic war on climate science and climate scientists that makes Bush officials seem tactically subtle and rhetorically nuanced in comparison.
Slashdot points us to a recent story about a guy who lost his lawsuit against a bank, over a variation on a classic Nigerian email scam. The scam is one we’ve discussed many times in the past: somehow the victim gets a big check, which they’re expected to deposit in a bank. After the check “clears,” the victim/recipient is supposed to transfer a large chunk of that money to the scammer, on the belief that they get to keep whatever is left over. What really happens is a few days after the check “clears,” the bank finds out it’s fraudulent, and tries to void the transaction. But, by then, the victim has already transferred out a big chunk of money (and the scammer has already taken all that cash out of the bank and disappeared) — leaving the victim footing the bill, with the bank expecting them to come up with the missing cash.
Canada’s economy faces subdued growth in the new year as an initial strong rebound from the recession shifts into a more sluggish expansion, a prominent business group says.
In its outlook for 2011, the Canadian Chamber of Commerce said “more prudent spending” by Canadians is a factor in the country’s slowing economic growth. Gross domestic product expanded by 2.3 per cent in the second quarter of 2010 and only one per cent in the third quarter.
Last month RapidShare discovered that they had been reported by the MPAA and RIAA to the US Government for being one of the world’s “most notorious pirate markets”. Now, on the heels of reports that the entertainment industries spent a small fortune lobbying for domain seizures in the last quarter, RapidShare has hired a Washington based lobbying firm to represent its interests in the US and to start correcting misconceptions.
The last time American leaders were this ecstatic about the power of information was at the end of the Cold War, when illicit fax machines and photocopiers and the work of broadcasters like Radio Free Europe were presumed to have been a leading cause of the collapse of the Soviet Union. (In 1990, Albert Wohlstetter—the ur-technocrat who was one of the inspirations for Dr. Strangelove—told an audience of perplexed eastern Europeans that “the fax shall make you free.”) Today, most historians reject such views as reductionist, but they are still extremely popular among US politicians (probably because celebrating smuggled technology allows them to celebrate the politicians who made the smuggling possible—particularly Ronald Reagan). Such Cold War thinking showed in Clinton’s speech: “Virtual walls,” she said, are “cropping up in place of visible walls,” and viral videos and blogging are “becoming the samizdat of our day.”
But not all blogs are revolutionary. China, Iran, and Russia all have bloggers who are more authoritarian in their views than their governments are.
If you want to remain anonymous on the Web, then Tor is a very good solution. Our identity is governed by the IP we use, which your ISP knows, and which can be shared with the authorities if requested.
To get around that identification and tracking problem, Tor offers a solution by routing your requests through multiple servers. All your ISP, or anyone else looking will see is a repeated request to a non-descript Tor server rather than the actual destination you are heading to.
A few days ago, we reported on the defeat of web censorship in Spain where ISPs would be mandated to block websites if the government ordered them to block them over copyright infringement. The law was brought forth due to US industry threats, lobbying and pressure. Now, news is surfacing that the defeat won’t be enough to deter site blocking in Spain.
There was no shortage of Spanish celebration when site blocking was defeated. Spanish copyright observers noted the celebrations on Spanish sites that a law the Spanish people fought so hard to defeat was finally shot down. For many Spanish, the Sinde Bill represented one of the very symbols of foreign industry intervention on the domestic marketplace and the very country itself. It’s no surprise many in Spain were happy to see foreign interference defeated by a vote.
It’s been a hell of a year for consumer privacy, or the lack thereof. From Facebook leaking personally identifiable information to advertisers, to data brokers harvesting reams of user information on social nets, to Google’s Wi-Fi slurping, 2010 may be remembered as the year the privacy chickens came home to roost — and quickly got roasted.
As we also expected, IP rightsholders and global policy-makers have realized that Three Strikes automatic disconnection laws and policies are a short-term measure, and are now focusing their efforts on Internet intermediary obligations to block webpages.
There is an assumption that consumers are unsuspecting in what they’re buying, that somehow they don’t know that a video game bought for £5 from a flea market on a domestically burned DVD with the name scribbled in marker pen and maybe a cheap inkjet photocopy of the cover badly sliced to fit is not in fact the real deal. They know it’s a copy. They see the difference in being able to play a DRM free version of a video game for £5 is a vast difference from buying a DRM infested version of the same thing for £40+. This is not what I’d call “counterfeit” as it’s obvious to both buyer and seller that it’s not legit. Counterfeit is about passing something off as legit when it’s not.
Earlier this year, we wrote about Kevin Kelly’s fascinating look at the movie industries of India, Nigeria and China, which represent the three largest film industries in the world. Yes, all three are larger than the US. And all three are places known for extremely widespread “piracy.” Given that Hollywood insists that “piracy” kills the movie industry, it certainly seemed worth noting that these three countries had hugely thriving movie industries despite (or perhaps because of) widespread infringement.
Reading through the details of the “ad campaign,” we’re not surprised to see the driving force behind it is our old friend, Rick Cotton, the General Counsel at NBC Universal, who often seems to have no shame in saying stuff that makes absolutely no sense concerning movie piracy. Cotton, most famously, is the guy who once made a filing with the FCC where he tried to claim that movie piracy was killing the American corn farmer. This ignored two rather important points: (1) people who watch unauthorized copies of movies can also eat popcorn and (2) corn — one of the most subsidized crops in the US — continues to grow as a market. Oh yeah, speaking of growing markets, have we mentioned how the movie industry keeps breaking records at the box office, despite all of this file sharing.
There’s absolutely nothing surprising at all about the following, but Christian Engstrom (one of the two European Parliament Members from The Pirate Party*) highlights yet another leaked State Department cable that shows that many of the copyright enforcement efforts of the Swedish government were in response to a six point checklist given to the Swedish government by the US Embassy (English translation from the original Swedish — though at the end of the Swedish post the original cable is available in English). The six point check list passed on by the embassy was almost certainly originally from US industry lobbyists. There’s nothing in this that is even remotely surprising (and hints of this had already leaked previously).
A comprehensive article published last week on Il Venerdì, a weekly magazine of the Italian daily la Repubblica, is focused on various international authors whose works are now entering the public domain and the upcoming publications of many new translations (in Italian). Under the title “Copyright expired, everybody free. 2011 will be the year of Gatsby and Margarita” (full pdf here), Brunella Schisa explains that right after the 1st January 2011 deadline — also known as Public Domain Day — several Italian publishers will launch new translations of such masterpieces as “The Master and Margarita” by Mikhail Bulgakov and Francis Scott Fitzgerald’s best novels (“The Great Gatsby”, “Tender Is the Night”).
SinkDeep alerts us to the news that a bunch of DJs are upset after discovering that SoundCloud took down a bunch of the mixes they had hosted on the service. If you’re not familiar with SoundCloud, in the last few years, it has become one of the most popular tools for musicians and DJs to host their music. It offers a really nice toolset for anyone looking to promote their music online (and for others to build apps on top of it). SoundCloud has also been a pretty big supporter of open culture, supporting things like Creative Commons along the way.
I contacted SoundCloud to find out what was going on, and the response was pretty much as I expected. Due to the nature of the copyright world we live in today, the company recently implemented a fingerprinting-type technology, similar to those used by YouTube (ContentID) and MySpace (Audible Magic), which lets copyright holders designate their own works, and which SoundCloud then automatically blocks. While the original link above “blames” SoundCloud for becoming a “walled garden,” that’s not really fair nor accurate. The real problem is the nature of our copyright laws today, that assume infringement over fair use. As we’ve discussed before, copyright law is effectively broken when it sets up fair use as a defense, rather than a proactive right. Fair use should be seen as the default until proven otherwise, if fair use is really (as is claimed) designed to be a pressure valve on copyright law to allow free speech.
What crime do you have to commit where you live to be forbidden use of electricity (not just disconnected)? To be forbidden use of a phone? To be forbidden to walk on the streets? To have your family punished along with you? Yes, the lack of due process in these bad laws promoted covertly by USTR is an enormous worry, but much more of a concern is its calculation that the infringement of a copyright justifies the removal of the main conduit of social engagement from a citizen. Removal of basic rights is a matter of criminal not civil law so moves to make “internet bans” easy are an unacceptable expansion into criminal law for something that was never even meant to affect ordinary citizens in civil law.
This is not a matter for a “voluntary code of conduct” either. As use of the Internet becomes more complex and more fundamental, it’s becoming clear that groups like the Internet Watch Foundation – a group set up by ISPs so they wouldn’t be regulated over every politician’s excuse for bad legislation, “protecting children” – is harmful to us all, cracking small nuts with pile drivers and lacking transparency and accountability. Development of a voluntary code of conduct so citizens rights can be repeatably infringed in support of media business models is as unacceptable as a hard law because it still agrees that citizen access to the internet is worth less than media business models. On the contrary, if we need new laws at all, they should be to prevent businesses from terminating service without a court order.
Taking a closer look at the Stockholm 09-141 cable, we find that the United States was the driving force behind the IPRED legislation, that it was the driving force behind threats to Swedish ISPs in 2008, and that it is currently the driving force behind the so-called “step two of the data retention”, which was presented by the Justice Minister last Thursday. This legislation will give police at-will access to all and any collected records under Data Retention in the proposed Police Methods Report (polismetodutredningen, PMU). Ordinarily, prison sentences of more than two years would have been required to collect IP addresses, but the PMU changes this before the Data Retention is even in place.
The United States Government is driving the creation of a Big Brother state in Sweden, including draconian data retention measures, in order to have it combat simple and everyday petty copyright infringements on behalf of American interests.
I’m still working on the Comes v. Microsoft exhibits project, and I swore I’d finish first, so it will take me a while to get to this to explain in detail, but in the meantime, I just want to say to the community stakeholders in the OpenSUSE Project, here’s what I think you should do:
Hire your own lawyer.
Don’t rely on Novell’s lawyers to represent the community’s interests in the foundation.
I’m as serious as a heart attack.
The same should probably go for Novell employees. Microsoft sucked the patents out of Novell and Singer threw the carcass at some tiny company that has no history in “open source”. Meanwhile, one longtime supporter of Novell got in touch (via IRC) and told us yesterday that this news article states: “Utah County Job Club, which meets on Wednesdays at 8 a.m. at the Novell cafeteria conference room, 1800 S. Novell Place.” The person then asked, “is that Novell trying to help its people find jobs?”
Maybe there are layoffs coming. It’s unlikely that AttachMSFT will keep all of Novell’s projects alive, so redundancies seem imminent. This also makes Mono and Moonlight very risky, so someone should pay attention to more of the same Banshee boosting from OMG!Ubuntu. Should we allow poisoning of Canonical/Ubuntu now? Microsoft has quite the reputation for company assassination and OpenSUSE was somewhat of a Trojan horse through which a team led by Microsoft MVP Miguel de Icaza tainted all the rest of the distributions (OpenSUSE was usually first to adopt these packages) and as someone from India put it yesterday:
@schestowitz I think #Microsoft is doing the same with openSUSE that #FBI did with BSD. They put backdoors and they are putting licensing..
Given Groklaw’s new analysis which says to Henne “listen to your inner voice [...] I share your concerns,” OpenSUSE should be forked immediately or its contributors moved to distributions which are not a vehicle for Microsoft et al. OpenSUSE falls into the same trap which Microsoft’s Codeplex sank into by design. To quote Groklaw, “Outercurve’s by-laws are here. Outercurve is what they call the Microsoft-organized and funded Codeplex Foundation now. Note that the by-laws were revised in November, and that Andy Updegrove was hired by them to help them out. They likely picked him because he trashed their original by-laws, and do read what he wrote, because it will show you the shadows behind the wording in bylaws.”
“It’s a shame that it takes people several years (after the Microsoft deal) to grasp the seriousness of this new situation.”For those who consider “Boycott Novell” to be insidious (I’ve just uploaded 9 parts of Jono Bacon’s 2009 attack on “Boycott Novell”), please bear in mind that in 2005/6 I was promoting Novell in a very major way in newsgroups, mailing lists, and my blog. It’s a shame that it takes people several years (after the Microsoft deal) to grasp the seriousness of this new situation. Groklaw is one of those who took over 4 years to wake up and smell the coffee. We, however, saw that coming years in advance. If we learn no lessons from Novell, then another company can have Microsoft ‘pull a Novell’ on it. Thankfully, Jono Bacon is becoming aware of it based on last night’s IRC conversation (in logs which we’ll post shortly).
Does anyone remember Novell’s pro-GNU/Linux ads? Like the “I’m Linux” ad where Linux is the attractive girl? That was just before the Microsoft deal, which had Novell tear down criticism of Microsoft (Novell changed/censored its Web pages). Now we’re left without the most major advertiser of GNU/Linux (at that time) while YouTube receives just more videos with lots of FUD in them (also embedded below). Just watch the following FUDfest where the man pretends it’s counter-culture (or used by nerds only) and about cost/cheapness. Microsoft suspended Novell’s pro-GNU/Linux marketing and if we ignore this, then other victims will fall into Microsoft’s assassination/exploitation pipeline. █
When a user does not have a Facebook account, there is no cookie and no user ID available. In this case, a visit to Techcrunch.com includes an HTTP GET request for the Like button. However, when the button is provided there is no cookie issued. Thus, it seems that the Like button itself is not used to issue cookies. However, when a site is visited which includes Facebook Connect (for instance Gizmodo.com) this application issues a cookie (fig. 2). From that moment on, visits to other websites which display the Like button result in a request for the Like button from the Facebook server including the cookie.
As indicated, after visiting a web site on which Facebook Connect has been implemented, the request for the Like button includes a cookie. This cookie has an expiration date two years from the moment it was issued. However, by browsing across web sites, additional cookies can be placed on the user‟s computer and these can be added later on in new requests.
Based on the cookie, the entire web behavior of an individual user can be followed. Every site that includes some kind of Facebook content will initiate an interaction with the Facebook servers, therewith disclosing information about the visited web site together with the cookie.
Facebook is partly owned by Microsoft and it also shares its data with Microsoft, as we covered before (more in the Wiki page about Facebook). Microsoft compiles dossiers on people by misusing data it collects and that too we have covered before using extensive evidence. █
“Privacy protects us from abuses by those in power, even if we’re doing nothing wrong at the time of surveillance.”
The fact that Putin has signed the order for this project could be critical: there have been several previous plans for moving parts of the Russian government to using free software, notably in the educational sector, but in practice they have mostly failed to materialise because there has been insufficient political weight behind them. But if Putin says: “make it so”, I suspect that a lot of people will jump pretty fast to make sure that it *is* so. And once that happens, other plans to roll out free software might well suddenly look rather more attractive.
Without a doubt, this award must go to the KDE desktop environment. When KDE 4.0 was released it looked like it was going bomb miserably. It was slow, buggy, and far from ready for public consumption. But 2010 saw more improvement in KDE 4 than it seemed in the whole of software. And because of that epic push towards stability and usability, KDE has finally been able to stand back up in the front lines with the likes of GNOME.
No longer are we being held down by proprietary software companies, “big media” or those who support this way of doing things. An unregulated (for the most part) Internet along with plenty of the free software available with open source friendly licensing means that anyone with something to say can express themselves and share it with the world.
I was at a Linux Meetup a couple of months ago and I ran into another former employee of Digital Equipment Corporation (“They are everywhere, everywhere!”) named Larry Camilli. We started talking and somehow the conversation came around to a program called “AXE” (vaX Archictecture Exerciser). Larry looked at me with a strange look on his face and said “That was my program! That is what I did for Digital!” Larry went on to say that few people he met, even those who worked for Digital, knew about the AXE (or its equivalent for the MicroVAX, the “MAX”) program. I replied that I worked in an operating system group, so we often delt with new CPUs, and we knew the *AXE programs and their capabilities very well.
Earlier this month we delivered our annual performance look at NVIDIA’s 2010 Linux graphics drivers and now the tables have turned to do our annual examination of the ATI/AMD Catalyst graphics drivers for the Radeon graphics processors. This was certainly an interesting year — both good and bad — for AMD with their Catalyst Linux driver.
AMD has allowed their Radeon GPUs to be overclocked on Linux since 2008 when using their Catalyst driver with OverDrive support. Previous to that there was Rovclock for overclocking select ATI Radeon ASICs using an open-source program along with support for tuning the video memory timings and other options, which was a program written via reverse engineering. The Catalyst Linux driver supports OverDrive manipulation of the core and memory clocks, which is enough for most enthusiasts, but if you’ve been looking for more extensive features there is a new option.
It’s a testament to how far Linux has come that users today don’t typically have to use the command line if they don’t want to. Such is the quality of the graphical user interfaces in many modern Linux distributions that there’s simply no need, in general.
Popular Linux game Nexuiz was forked into a new game Xonotic earlier this year as there was some disagreement between Nexuiz developers and community. Now Xonotic developers have released first preview version playable on Linux, Windows and Mac.
The Linux winner for my desktop was arrived at in an unlikely manner. Puppy garned a slice of my hard drive because it is such an amazing little distro and such a small foot print. As much as I wanted VectorLinux on my laptop, I could not get VectorLinux to multi boot with more than Windows.
Former Red Hat CEO Matthew Szulik, his wife, father and other family members have filed a federal suit against a St. Thomas-based investment advisory firm, claiming the family lost $60 million in high risk and illiquid investments they did not approve.
KNOPPIX 6.4.3 has been released bringing several updated packages along with the usual bug fixes. This is also the first release to bring support for the open-source nouveau driver for Nvidia video cards. KMS is now also included in the kernel shipped with the latest KNOPPIX release.
“The current version has been completely updated from Debian ‘Lenny’, ‘Testing’ and ‘Unstable’ and uses Linux kernel 220.127.116.11, X.Org 7.5 for supporting current computer hardware,” the release notes of KNOPPIX 6.4.3 read.
I’m on holiday for the next week, yeah! I’ve started filling some of my free time by resurrecting Photobomb (again). There have been some technical improvements to the APIs I’ve been using, and also, I’ve learned some ways to do a few things better. I’m hoping that by spending a few hours a day, I can pretty much complete Photobomb by the end of this week, and then work on getting it into Universe for Natty.
Despite some premature reports on the net, Canonical isn’t moving to a rolling release schedule for Ubuntu. However, the organisation is open to making some changes to the way that some software packages are updated. It’s seems likely that a mechanism that supports the adding of up to date application packages outside of the normal software repository updates is probably on the cards, and I’d say that it’s about time.
In an attempt to gain some stability and speed in my life without having a different distro on my desktop and netbook, I’ve decided to install XUbuntu on both. XUbuntu is community driven and based on XFCE, thus no need to worry about Unity vs GNOME. However after installing XUbuntu on my desktop, I came across a strange issue. When ever I attempted to sudo inside of the gui, it would fail. However, it would work at the command line level.
In a follow-up post last week, Ext4 developer Ted T’so commented on the transition and offered some further clarification regarding concerns about fsync data loss issues, which he says pose minimal risk on Android due to the higher level of quality assurance testing.
This domination is pushing into other areas. Open source content management systems like web.py, phpBB, CakePHP, Lift, Drupal, Joomla, and probably hundreds of other open source CMS frameworks are packaging up most of the information you read today. It is rare to find a website that depends on just Apache to deliver the content.
According to data of Circle.am Armenian ranking system, website visitors, who are registered on Circle.am, mostly use Firefox (41.05%) browser, as well as Chrome (27.36%). Safari rounds out the top five browsers in Armenia – 0.29%, while the share of other browsers makes – 0.25%.
Drupal 7 Module Development has been published by Packt, just in time for the release of Drupal 7. This book provides in-depth coverage of key elements of Drupal 7 and is designed for professional developers. Every chapter provides fully functional code samples illustrating the APIs and strategies discussed in the chapter. With this foundation, developers can quickly build sophisticated tools on their own by making use of the strategies and techniques exemplified in this book.
Here’s a little summary again of what I found noteworthy in the field of Free Software in education in the last few months of this year in no particular order:
* After Sam Tuke informed the edu-eu mailinglist about (k)mando recently, it was quickly put into a debian paket by Georges Khaznadar from OFSET. I’m still looking for people who have actually used that software.
* I stumbled on a blog post in kde-edu planet that describes how to report a bug. I think this touches an important point. When we encourage educational institutions to use Free Software, we should not forget to teach them how to contribute and make them part of the community.
The best thing about Linux training in education is that there are already people doing it. There are establishments up and down the UK that have decided to include Linux on their syllabus and make a concerted effort to provide their students with the choice.
So if you’re a parent frustrated with the lack of options for your child, or you’re maybe a student who wants to learn Linux skills from the outset, there are places to go and people to speak to. They may be able to help you make the difference. But even if you can’t influence the training regime at your local establishment, Linux can still play a part.
Unlike in schools, Linux and open source software isn’t badly served by professional training. It’s this kind of training that pits Linux against Microsoft’s certification, and it’s the kind that prepares IT people for the real tasks they face while dealing with Linux systems.
The Linux Professional Institute, for example, has been dishing out qualifications for over 10 years, and its LPI certification levels have become something of a standard for Linux system administrators.
First reported by All Facebook, Donette Warren from Andover, Minnesota used Facebook to find a kidney donor for her 10-year-old sick daughter. The little girl, named Vivica Loyd, was born with six holes in her heart and has had five strokes and over forty surgeries, according to kare11.com.
One of the reasons I like the Digistan definition of “Free and Open Standard” is that this is a new term, and thus the meaning of the term has been decided by Digistan. The term “Open Standard” has become so misunderstood that it is no longer very useful when talking about standards. One end up discussing which definition is the best one and with such frame the only one gaining are the proponents of de-facto standards and proprietary solutions.
From San Francisco Superior Court small claims court to the 9th U.S. Circuit Court of Appeals, Balsam, based in San Francisco, has filed many lawsuits, including dozens before he graduated law school in 2008, against e-mail marketers he says violate anti-spamming laws.
His many victories are mere rain drops in the ocean considering that Cisco Systems Inc. estimates that there are 200 billion spam messages circulating a day, accounting for 90 percent of all e-mail.
The arrest and detention of Algeria’s most prominent anti-corruption campaigner last month attracted wide media attention inside the country, but it received little or no attention internationally in the English-language media.
The reporting silence may be due to linguistic barriers: much of the relevant documentation is in French and Arabic. Perhaps reporting on Algeria’s opaque political system is not seen as newsworthy (no matter the international relevance), or maybe there is simply a lack of interest in the plight of anti-corruption activists outside the developed world.
There is now widespread recognition that pervasive corruption is a violation of basic human rights and a severe impediment to development.
While Vice President Dick Cheney and other prominent conservatives have faulted President Barack Obama for slacking in the war on terror, two top Bush administration intelligence officials are arguing that the White House has been just as tough – if not tougher.
“The new administration has been as aggressive, if not more aggressive, in pursing these issues because they’re real,” former National Intelligence Director and retired Navy Vice Admiral Michael McConnell said Sunday on CNN’s “State of the Union.”
“You commend them for that?” host Candy Crowley asked.
I heard last night from a reader who shares the physicist’s skepticism of the TSA but challenges his explanation of the underlying science. After the jump, because they’re so long, are this second reader’s message, and then a response from the original physics professor.
Remember when countries all over the world were free to choose whether or not they adopted genetically modified organisms (GMOs)? Well, if the U.S. State Department (who is controlled by big agriculture) has its way, the whole world will be pimping GMOs before long.
Yet another important Wikileaks revelation, this time involving the world’s food supply, has been swept under the rug by the establishment media. Thankfully Rodale News has the guts to report on the issue and bring some much needed attention to it.
“I greatly appreciate everyone’s support and well wishes during this time. I am also thankful for everything that has been done to aid in my defense. I ask that everyone takes the time to remember those who are separated from their loved ones at this time due to deployment and important missions. Specifically, I am thinking of those that I deployed with and have not seen for the last seven months, and of the staff here at the Quantico Confinement Facility who will be spending their Christmas without their family.”
Crimes committed by the big banks helped crash our economy — and WikiLeaks is saying that a whistle-blower has sent them enough evidence to take down Bank of America. So now the big banks are fighting back by trying to get the government to muzzle future whistle-blowers.
On Monday, Bank of America’s web site suffered sporadic downtimes, apparently as a result of DDoS attacks–the same kind of attacks that also plagued Visa, Master Card and Paypal, each of which also recently halted its financial services to Wikileaks.
The infographic summarizing our research for The Future of Money project is now complete! Thanks to Patrizia Kommerell for the design work, and Gabriel Shalom & Jay Cousins for concept work. You can check out Pati’s post and download the infographic in A1 or A4 size PDF over at emergence.cc.
The bankers’ trade association has written to Cambridge University asking for the MPhil thesis of one of our research students, Omar Choudary, to be taken offline. They complain it contains too much detail of our No-PIN attack on Chip-and-PIN and thus “breaches the boundary of responsible disclosure”; they also complain about Omar’s post on the subject to this blog.
Needless to say, we’re not very impressed by this, and I made this clear in my response to the bankers. (I am embarrassed to see I accidentally left Mike Bond off the list of authors of the No-PIN vulnerability. Sorry, Mike!) There is one piece of Christmas cheer, though: the No-PIN attack no longer works against Barclays’ cards at a Barclays merchant. So at least they’ve started to fix the bug – even if it’s taken them a year. We’ll check and report on other banks later.
At the joint European Parliament and European Commission net neutrality summit in Brussels on 11 November there was a clear political message – that interference with Internet traffic is permissible as long as companies tell their consumers that it is happening.
The Commission will “wait and see” if such interferences cause problems for the market and will consider taking action if this is the case. In a whole day of discussions, the fundamental rights aspects of the interference by private companies with citizens’ communications were only questioned by Jeremie Zimmermann from La Quadrature du Net and Jan Albrecht MEP (Greens/EFA, Germany).
We’re still looking at the actual rules, which were released publicly several days after the ratifying vote, and we’ll comment more when we’ve completed our review. But from what we’ve gleaned from FCC statements, and despite some rumors otherwise, the FCC’s current theory for jurisdiction seems to be somewhat new. On the other hand, the substantive principles laid out in the final rules appear to be largely the same as those discussed by policymakers and other stakeholders throughout the year, and which we have repeatedly warned about for their loopholes and exemptions. We’ve also warned about the Trojan horse we may find on our hands if the FCC’s authority to regulate is approved in the courts.
We’ll be watching to see what 2011 holds; it seems likely that the new Congress will have something to say as well.
It is impossible to be entirely devoid of influence, it is in our nature to imitate. This is how children learn to speak, form a sense of moral responsibility, and develop their interpretations of societal norms; by copying their elders. Litigating against imitation shares the futility of attempts to outlaw sex.
Copyright laws have never stopped copying, they’ve just distorted our culture to favour that which can be legally reproduced. For example, while Oasis did not infringe the copyright of the The Beatles, they copied just about everything that was legally copyable about them, with healthy profits. Yet if they had sampled even a brief section of any one of their songs, they would have needed to clear it and pay large royalties. I would argue with anyone who claimed the insipid dirge of Oasis was more relevant to nineties music than the inventiveness of hip-hop (a genre built on sampling), yet we have a system that levies financial penalties against the latter rather than the former.
But if Hollywood and Big Music get their way, net neutrality will be dead, and the links which bind the World Wide Web will be broken.
The entertainment cartels are using the claim that linking equals publishing to have sites closed down without any kind of due process, and with the Obama administration looking on with approval.
The internet isn’t a new communications phenomenon: it’s a shining new communications paradigm. Some of the brightest people on the planet have created this amazing network linking music, art, different cultures, information, ideas, data.
Now, Vivendi Universal, EMI, Warner Music and Sony Music; and, Disney, News Corp, Time Warner, Viacom, NBC Universal and Sony Pictures want it torn down, using file sharing as the wrecking ball.
Las Vegas newspaper copyright enforcement company Righthaven LLC is disputing arguments that one of its lawsuits should be dismissed on fair use and other grounds.
Righthaven, a partnership between Las Vegas attorney Steven Gibson and an affiliate of newspaper chain owner Stephens Media LLC, since March has filed at least 192 copyright infringement lawsuits against website operators.
A Parliamentary Standing Committee recommendation that music composers and lyricists are to get an equal share of all revenues that flow from the commercialisation of film music has stirred a hornet’s nest.
Bollywood producers are now threatening to strike against this provision and apprehend that if this provision converts to law, they will be forced to shut down! As we debate the pros and cons of this historical provision, we need to ask ourselves a fundamental question. What is the “law” really about? Isn’t it about fairness? About justice?
Copyright is about creativity..indeed, it aims to foster the creativity of the content creator, and not line up the pockets of the funder/packager at the cost of the content creator. To my mind, even a 50% split seems unduly skewed in favour of someone who merely pumps in the moolah. However, the standing committee decided, in its infinite wisdom, that if film music were to be exploited in any other form other than as part of the “film”, the proceeds of such exploitation were to be split equally between the lyricist, music composer and the film producer. In other words, a 50:50 split of the profits between the content creator and the content funder/packager. Seems like more than a fair provision to me. In fact, similar provisions ought to be transposed to other contexts such as book publishing, where authors are often at the receiving end of a paltry single digit royalty sharing percentage!
DMCA takedown notices are sent in large numbers to dozens of organizations on the Internet every month. The ChillingEffects clearing house has been receiving copies of these from some of the Internet’s biggest players including Google, Yahoo, Digg and more recently Twitter. It will come as no surprise that the music and movie industries are some of the biggest complainers, but there are also some unexpected entrants.