Campaigner for Hire Blames IBM for Air Crash

Posted in IBM, Microsoft at 9:09 am by Dr. Roy Schestowitz

Tenerife 747s

Summary: Without any supportive evidence, Florian Müller blames IBM for the Spanair crash, though not without a challenge

MICROSOFT apologist (presumably for a living) Florian Müller continues his endless campaign against IBM — a campaign which even the FFII is publicly denouncing him for. As André Rebentisch puts it, “I am stunned, a top-competition lawyer like Thomas Vinje (who usually restrains himself) claims you worked for Microsoft Corporation in the Oracle case. You don’t refute it. I guess SAP pulled more strings behind the scenes in this case and Monty didn’t just pretend to be mad about the sale. But when Vinje says so the Commission does believe the same.” Read on, it’s worth it.

It has gone too far. Müller is even bringing up World War 2 to serve his cause when he loses the argument over IBM (trying to describe Microsoft is the “lesser evil”).

If that’s not bad enough, last night we spotted Müller sinking to new lows, trying to ascribe a tragic plane crash to IBM’s position in the mainframe market. “Shocking,” Müller states, “mainframe trojan may have contributed to fatal Spanair crash that killed 154 people”

Steven J. Vaughan-Nichols (SJVN) immediately responded to him by saying: “I don’t see the word ‘mainframe’ anywhere in the story or its links. What’s described sounds more like a Windows PC.”

Now watch Müller grasping at straws by saying: “I quoted ZDNet. El País: “el ordenador central de la compañía Spanair” = Spanair’s central computer. Airlines typically use mainframes”

“I suspect a Windows PC used as a mainframe gateway”
      –Steven J. Vaughan-Nichols
SJVN says: “Could be. But, it was the ‘monitor’ computer that was infected with Trojans. I suspect a Windows PC used as a mainframe gateway”

The Müller spin machine does not give up yet. “The mainframe was supposed to raise the alarm => theoretically a frontend can also raise an alarm but usually it’s the central system,” he writes.

SJVN says: “In any case, the system was updated over 24-hours later. Seems more of a policy than a system problem”

Müller’s spin machine is now contracting itself and never retracting the original accusation (Müller is a longtime Windows user). He says: “Security is always a matter of policy as well: failure to install security patches, bad password choices. I didn’t say mainframe bug.”

He said “mainframe trojan”. What a weak spinner. It was probably a Windows Trojan (if anything), but campaigner-for-hire Müller does not let the burden of proof stand in his way.

Microsoft Decides to Embrace and Extend ‘Plugfest’

Posted in Deception, Formats, Marketing, Microsoft, Office Suites, Open XML, OpenDocument at 8:31 am by Dr. Roy Schestowitz


Summary: Microsoft describes its proprietary, binary-only formats in the context of a “plugfest” — a term implicitly reserved for ODF events

THE TERM “plugfest” — at least when it comes to document formats — has a connotation to do with ODF. Last year we showed how those plugfests got ‘infiltrated’ (Microsoft’s term [PDF]) by Microsoft employees and partners, who sought to change the agenda there [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13].

One of the vicious campaigners against ODF, Microsoft’s Mahugh, is now co-opting the term “plugfest” by using it to describe discussion about Microsoft’s proprietary document formats.

Former Open XML evangelist Doug Mahugh announces a “Binary Format Plugfest” for October 18/19

We have given many similar examples where Microsoft hijacks words to paint OOXML, for example, as something “open”, which also sounds a little like “Open Office”. These are not coincidences; these are merciless marketing tricks.

Tadag Complains That Microsoft Stabbed it in the Back While Pretending to be ‘Partners’

Posted in Microsoft at 7:57 am by Dr. Roy Schestowitz

Water balloon meets knife

Summary: Tadag sends a warning signal to anyone else who foolishly believes that Microsoft is a worthy partner to work with

TECHRIGHTS has already gathered many examples for a list of companies betrayed by Microsoft deals which had them abandon GNU/Linux and left broke. David Gale, tadag’s author, told me yesterday that Tadag would be another example of a company which Microsoft destroyed in this way, very much as it destroyed i4i, which subsequently sued Microsoft and won. For this who do not know the history of this dispute, Microsoft pretended to be an i4i partner, then it got a look at their idea, and then nicked it and incorporated that into Office. It was all deliberate and very shameless based on discovery by the court.

Now, check out Tadag’s front page to see the similarities:

In 2004, tadag’s owners engaged with Microsoft to discuss how tadag intellectual property rights (IPR) could be protected to enable discussions on joint development. The two were already closely involved as strategic partners working in public sector IT. Following the signing of numerous non-disclosure agreements (NDAs) facilitated by Microsoft, as well as a documented partnership mandate, multiple senior Microsoft security personnel, from all over the world, reviewed the new architecture and agreed that tadag represented a new vision for IT security.


In April 2005, at an executive briefing in Redmond, Microsoft shared a confidential security development to a group of development partners that included tadag’s author, David Gale. Unwittingly, a senior Microsoft employee presented the tadag architecture to the audience, under the banner of an ‘exciting, still-under wraps, Microsoft innovation’. A formal complaint was immediately logged, with assurances coming from Microsoft that a full internal investigation would take place. In 2005, three weeks after RamTec’s formal complaint, an exact replica of the disclosed component of the tadag architecture was filed for patent in the U.S. under the name of OpenID.

Following reassurances from senior Microsoft Corp executives that a resolution would be forthcoming, partnership activity continued. David Gale was lead reference presenter at the global launch of BizTalk Server 2006, at the London Stock Exchange and, for two years, a retained consultant to Microsoft, presenting on their behalf at major events across Europe. Despite Microsoft claims of having conducted a thorough internal investigation, by February 2007, Bill Gates was on a podium announcing Microsoft’s ‘sponsorship’ of OpenID. Since then, Microsoft has variously: issued instructions to employees to deny any memory of previous communications (evidenced in an MS lawyer’s internal email), prevented senior executives from pursuing an investigation, denied the originality of the IPR, refused to reveal the outcome of an internal email scan, disputed the existence of NDAs, then finally disputed the validity of the Microsoft originated NDAs copied to them.

This helps us show what happens to companies after signing deals with Microsoft, the sociopath.

The Windows 7 Refund: Microsoft Still Breaks the Law With OEMs, But Somehow Finds Apologists

Posted in Law, Microsoft, Vista 7, Vista 8, Windows at 2:54 am by Dr. Roy Schestowitz

Vista 7

Summary: The 451 Group advertises Microsoft, which continues to force many people to buy Windows even when they clearly don’t want to

A COUPLE of days ago we spotted some more hogwash and unnecessary Vista 8 promotion, which came from an unexpected place — Matthew Aslett from the 451 Group. For a few years we have been unable to find out if Microsoft pays this group (they cannot disclosure this information), but anyway, this piece raises a brow and there an attempt to balance it by dangling Oracle (talking not about software freedom but about “Open Source” instead).

Recently we have heard a great deal about crime in the computer industry, ranging from Dell to HP and to Intel. Microsoft too got an honorary mention for its bundling practices. Pogson writes:

How does a monopoly sustain itself? It can produce better products than anyone else or it can cheat, messing with competition and providing “inducements” to stick with the game-plan.

Obviously, without producing better products, M$ would not be able to maintain exclusivity on retailers’ shelves and OEMs product-lists unless they provided inducements. As we recently saw in SEC v Dell, it is not OK to keep those inducements secret if they are a substantial/material fact that could affect investors’ decisions. We know retailers and OEMs margins are tight so the inducements are material. M$ certainly has not produced better products than any other software house on the planet.

Tim from OpenBytes has been attempting to find a way to get a Vista 7 refund (more on that when we catch up with IRC logs and post them), but this is getting hard to do. Tim is not alone though. Yesterday we found another depressing story:

I placed a call back to Asus (thankfully I had the supervisor’s direct extension this time) and inform them on this. They apologize and inform me there is nothing they can do about this. They again suggest I contact Microsoft for the refund on Windows because “Asus does not process refunds” even though the EULA says they should.

The EULA is a binding agreement like a contract, if I can get into trouble for breaking it so should they, right? Is it even worth my time to try and sue Asus to get my money back? Maybe next year when I am done with school.

People should make a lot more noise about it. Microsoft continues to disregard the laws and OEMs are helping it, sometimes because Microsoft pays them to do so.

Intel’s Acquisition of McAfee Makes It More of a Freedom Enemy

Posted in DRM, GNU/Linux, Hardware, Microsoft, Security at 2:32 am by Dr. Roy Schestowitz

Intel: criminal inside

Summary: The bribing chipmaker scoops up a firm that is hostile towards Linux and the GPL, which may also mean that future chips from Intel will be more OS-specific and DRM/TC-laden

WHAT does it sound like when one hears about 100 billion vulnerabilities? Well, it turns out that flaws associated with Windows affect many other programs.

An unpatched problem with Windows applications is much worse than first thought, with hundreds of programs, not just 40, vulnerable to attack, a Slovenian security company said today.

As moreover stated in relation to this separate article, “It turns out this is a fundamental flaw in the way almost all apps for that other OS work and how that other OS [Windows] loads programmes, looking in the current working directory first. Oops. The bad guys put some malware in the current working directory and give it a familiar name and voila! the system is owned by the bad guys.”

Here are some new statistics from McAfee, which is hostile towards GNU/Linux by the way.

According to McAfee’s 2010 Q2 Threat Report, the most widely detected threat was the Genericlatr Trojan, AutoRun malware found on nearly 9 percent of machines scanned by the company worldwide. Then there is Stuxnet, Conficker and other malicious threats that have taken advantage of lax policies toward removable devices.

The news is in about Intel buying McAfee, which probably means lock-down or DRM in more future hardware.

Profit is the number one motive for malware these days with espionage close behind. Intel is in the process of buying McAfee for $7.68 billion. You can image what the whole anti-malware industry is worth if McAfee alone is worth that much. Intel is looking at tie-ins to hardware for this industry. Can you spell DRM? Expect locked-down motherboards and filters on top of Ethernet and USB ports and storage devices.

This type of prediction is further validated here:

Paving the way for embedded devices to include more built-in security features, Intel announced it will acquire McAfee for $7.68 billion in cash. Separately, Odyssey Software and Wavelink Corporation both released upgrades to their management frameworks for mobile devices.

There are other ideas about the purpose of the takeover. Either way, however, Intel taking aboard more Linux-hostile DNA is clearly bad news.

Links 21/8/2010: Wine 1.3.1, Urbi Goes AGPLv3

Posted in News Roundup at 2:10 am by Dr. Roy Schestowitz

GNOME bluefish



  • Audiocasts/Shows

    • Podcast Season 2 Episode 15

      In this episode: Ubuntu 10.10 is going to add gesture support and 11.04 is going to be called the Natty Narwhal. Debian 6.0 has been feature frozen while Oracle sets its sights on Google. Discover how we fared with our Nethack challenge and how we filled the Open Ballot section without an Open Ballot.

    • FLOSS Weekly 131: Vyatta
  • IBM

    • IBM: Innovation is the key driver for CIOs, not Cost

      Remember ten years ago, IBM made a $1 billion bet on Linux, and in so doing, helped create the momentum for Linux in the enterprise data center that we all enjoy today. Back then, IBM concentrated on three areas:

      - Making Linux better – providing contributions to help improve Linux with respect to reliability, availability and serviceability

      - Enabling IBM products – both across major server lines and throughout the IBM middleware portfolio

      - Extending Linux into new opportunity areas – Helping to expanding the total addressable market for Linux (e.g. Real-Time, HPC, SoNAS)

  • Kernel Space

    • DisplayLink Is Already Looking Towards Linux 2.6.37

      The Linux 2.6.36-rc1 kernel was released earlier in the week and while it will still be a couple months until the Linux 2.6.36 kernel will be officially released, the developers behind the open-source DisplayLink graphics driver are already looking forward to the Linux 2.6.37 kernel. This next kernel release that will make it out in early 2011 will bring new features and fixes to this driver that supports many graphics products over USB.

    • Decorate with Linux
    • Graphics Stack

      • Progress On The ATI R600g Gallium3D Driver

        Since our last R600g status report, some of the changes to this driver that will eventually replace the R600 classic Mesa driver include support for new TGSI opcode instructions, segmentation fault fixes, OpenGL occlusion query support, fixed pitch alignment, user-clip plane support, an improved texture format checker, point/sprite rendering support, and various other technical changes. Some of the new instructions supported include POW, COS, SIN, SSG, SEQ, SGT, SNE, FRC, FLR, DDX, DDY, SGE, SLE, TXB, and many more. You get the point.

      • The ATI Evergreen Mesa Code Has Now Landed

        Nearly two hours ago we shared the news that there’s finally open-source 2D/3D/video acceleration for ATI’s Radeon HD 5000 “Evergreen” family of graphics processors, which is currently the newest and best consumer-grade GPUs from AMD’s GPG unit. At the time though only the xf86-video-ati DDX driver code was publicly pushed into a branch of the driver, but now the 3D portion of the code has publicly landed.

      • Notes from the LSF summit storage track

        LWN readers will have seen our reporting from the Linux Storage and Filesystem Summit (day 1, day 2), held on August 8 and 9 in Boston. Your editor was unable to attend the storage-specific sessions, though, so they were not covered in those articles. Fortunately, James Bottomley took detailed notes, which he has now made available to us. Many thanks to James for all of what follows.

      • How To Configure The AIDE (Advanced Intrusion Detection Environment) File Integrity Scanner For Your Website

        A file integrity scanner is something you need to have. Imagine a hacker placing a backdoor on your web site, or changing your order form to email him a copy of everyone’s credit card while leaving it appear to be functionally normally.

  • Applications

    • IBM Lotus Symphony – Weird but good

      Lotus Symphony is an interesting project. Although somewhat archaic and seemingly outdated, it is a very useful office suite, with many new, modern features on top of an older design.

      The 32-bit only version and the Hardy stamp for the Ubuntu version give an impression that IBM does not place too much focus on this program. And yet, lots of cool and modern options are available in the software, making it quite useful and relevant. It’s a confusing mix of old and new, wrapped in unique.

      Overall, Lotus Symphony performed well. If you don’t mind spending some time getting used to new looks and some non-standard features, the office suite will serve you rather well. It has that deep, corporate tinge that only giants can offer. Well, it’s free, so you’re welcome to try and see for yourself.

      Version 3 is coming soon and it will be based on OpenOffice 3, so you should expect a very decent, very modern office suite, with lots of IBM-specific additions. I believe Lotus Symphony 3 will be a very useful software. But only time will tell.

    • Gmail Voice and Video Chat – Too Little too Late?

      After waiting two years for the service, most Linux users that want video chat capabilities are probably already using Skype or something similar by now. The next few weeks will tell for sure, but this service may not be of much interest to Linux users anymore anyway.

    • Guake drop down terminal

      Drop down terminals were originally inspired by in game consoles like ones found in first person shooters like Counterstrike and Quake. Yes, Guake is just Quake starting with a ‘g’ instead of an ‘q’. Drop down terminals run in the background and can generally be toggled on and off by pressing one of the function keys (F12 by default in Guake). This simplifies life for people that make regular or sporadic use of the command line. Instead of starting a new terminal window or navigating to a currently open one, you can toggle the terminal on, execute the necessary commands, and have it out of your way again by just hitting one key. It really simplifies tasks like compiling code while working on a project and routine administration tasks.

    • Instructionals/Technical

    • Wine

      • Wine Announcement

        The Wine development release 1.3.1 is now available.

        What’s new in this release (see below for details):
        – Support for drag & drop between X11 and OLE.
        – New ipconfig.exe builtin tool.
        – Support for favorites in builtin Internet Explorer.
        – Beginnings of a shell Explorer control.
        – A number of DirectDraw code cleanups.
        – Improvements to the calendar control.
        – Various bug fixes.

  • Desktop Environments

    • Xfce

      • Lightweight Linux Desktop Alternative: Xfce

        GNOME and KDE may be the first desktops that come to mind when you think of the Linux desktop, but they’re not the only ones. From the overly minimalistic Rat Poison window manager to the eye candy of the Enlightenment E17 desktop, Linux has just about every type of desktop you can imagine. Want a desktop that’s lean and resource friendly without giving up features? It’s time to take a look at Xfce.

        For many users, the major desktops feel a little bloated. Fast hardware is cheaper than ever, but performance is still king on the Linux desktop. The ideal desktop is somewhere in the middle ground, between overly minimalistic and overly bloated. Xfce is right at the center of the Venn Diagram of features vs. speed. It’s lightning fast and still offers most of the features users have grown accustomed to. The problem? Most new users, and even some experienced Linux users, aren’t familiar with Xfce.

  • Distributions

  • Devices/Embedded

    • ASRock Core 100HT NetTop

      Last summer we reviewed the ASRock NetTop ION 330, which was the first Atom-powered NetTop computer that had come out of this vendor known for their affordable motherboards. The NetTop ION 330 combined an Intel Atom 330 CPU with NVIDIA’s ION platform to provide a low-power PC while offering modest computing and graphics capabilities.

    • Hardware manufacturers and the proprietary problem

      This is why I get so frustrated when people quickly dismiss Linux. I don’t have a problem with them preferring Windows, or even passing up the idea of giving Linux a try. But I do find it quite depressing that there’s no appreciation of what’s going on under the surface. I’m not talking about a sudo command, or lines of code. I’m talking about an ethos that standards are there to help consumers, to provide a level playing field for us all.

      Instead, it seems the legwork is being done, and then greedy manufacturers are rubbing their hands with glee as they mess around with said standard in a bid to line their own pockets. It can and should be stopped. But sadly, I fear that not enough people – aside from a quick grumble in a pub – really care that much. For what it’s worth? I do.

    • Mini PC includes dual-core Atom, Ion 2 graphics
    • Video-focused ARM/DSP SoC gains Linux development kit

      ChipWrights announced a Linux application development kit (ADK) for its CW5631 SoC, aimed at low-cost IPTV STBs and IP cameras. Like ChipWrights’ Linux-based CW5631 SDK announced earlier this year, the H264-ready ADK supports the CW5631, which combines a 400MHz ARM9 core, a DSP, and a RISC core.

    • Low-cost PowerQUICC chips offer flexible interconnect options

      A Linux-ready evaluation kit called the MPC830x-KIT is available, containing a single MPC830x carrier card. There are also system-on-modules available for each of the MPC830x devices, and Freescale also offers an MPC8308-RDB reference design board.

      All the evaluation boards and modules are provided with a Linux 2.6 board support package (BSP) that includes optimized drivers to support peripherals, says the company. The BSP is also said to include a quick-start guide and a six-month evaluation license for CodeWarrior development tools.

    • Phones

      • Android

        • Exclusive: Dell Thunder prototype preview (video)

          Christmas came early at Engadget HQ this year, as evidenced by the picture above — you’re looking at two Dell Thunder prototype smartphones, each with some surprising quirks, and hints that they might include global HSPA, AWS for the likes of T-Mobile, and maybe even a dash of CDMA support. We’ll warn you ahead of time that these are labeled EVT1 for “engineering verification test” and date back to the April leak, so they’re about as early as you can get — don’t expect the final handset to arrive without some significant differences. Good? Then peek the gallery below, hit the break, and let’s get on with the show.

        • Exclusive: T-Mobile G2 in the wild!

          These shots of a real, live G2 confirm what we’d already suspected from renders: this is basically an Americanized version of the upcoming HTC Vision.

        • Next Version of Android to be Called “Honeycomb”?
        • Android 3.2 Honeycomb to Follow Gingerbread 3?

          Android 2.2, or Froyo, is just now rolling out to smartphones including the Droid 2 and HTC Evo 4G, but the blog TechRadar today is citing “multiple sources” as confirming that the next version of Android will be called Honeycomb, following the dessert-themed monikers of the mobile OS. Prior versions of Android were codenamed Cupcake, Donut, Eclair and Froyo.

        • Droid X upgrade to Android 2.2 leaks out

          What we’re looking at here is allegedly the leaked over-the-air update to Froyo that Verizon plans on deploying to Droid X customers in the next few weeks, which means two critical things for customers: it should generally be faster all the way around, and — of course — you’ve got support for Flash, which was a big topic of interest at Motorola’s launch event for the phone a couple months back.

        • Ubuntu ported on Galaxy S
        • Ubuntu ported on Samsung Galaxy S

          It was merely a week back when Coralic, through his blog enlightened how to develop a chroot environment for ARM architecture based processors and run Ubuntu Linux OS.

          A week back Armin Coralic, posted on his blog details on how to create chroot environment for ARM architecture based processors and run Ubuntu Linux OS. However this Ubuntu Linux version is a stripped down form of the same. Later, Coralic posted a step-by-step method of porting Ubuntu on Galaxy S.

        • 7 Best Android Apps for System Administrators

          System Administrators are always in need of applications to remotely monitor their networks, administer the servers, and get stats. The Android smart phone comes to the rescue with an enormous number of such remote apps to help the administrator remotely access his system. Seven of the best android apps for system administrators follow.

        • Will Google Drop a Chromlet on Black Friday?

          If true, the move will fulfill Google’s announcement earlier this year that it would launch Chrome OS tablets in time for the holiday season.

          However, it’s not yet clear how Chrome OS tablets will coexist with those running the Android operating system, which is also offered by Google. Will they be targeted at different markets?

          Also, could Oracle’s (Nasdaq: ORCL) lawsuit against Google hamper sales of Chrome tablets?

        • 75 Awesome Android Apps
        • Adobe AIR to arrive on Android later this year

          Adobe has confirmed that it will deliver its cross-platform Adobe Integrated Runtime (AIR) environment for Google’s open source Android mobile operating system by the end of this year.

    • Tablets

Free Software/Open Source

  • The Urbi Robotic Software Platform Goes Open Source

    Urbi is an advanced robotics operating system, already available for a large number of robots like Aldebaran® Nao, Segway® RMP or Lego® Mindstorm, among 15 other different robots. One of its main innovations lies in a new orchestration script language called urbiscript, which natively integrates parallelism and event-based programming. Next to Urbi, Gostai also offers the Gostai Studio graphical programming tools, and compatibility with various simulators, making the Urbi framework one of the most advanced and complete solution for robot and complex system programming available today.

  • Urbi robotics software open sourced

    Urbi source code is licensed under version 3 of the GNU Affero General Public License (AGPLv3).

  • The State of Open Source System Automation

    The number of servers (both physical and virtual) is becoming uncountable. Automation of system administration is a must to handle the deluge; else swarms of sysadmins would be needed to handle all these systems.

  • Events

  • Web Browsers

  • Healthcare

  • Project Releases

    • Phoronix Test Suite 2.8 Beta 2 Is Shining
    • The OpenSolaris-Based Nexenta Core Platform 3.0 Released

      Nexenta Core Platform 3.0 is derived from OpenSolaris Build 134, which is roughly what was supposed to be released as OpenSolaris 2010.02, then OpenSolaris 2010.03, and lastly prior to its slow death was just referred to as OpenSolaris 2010.1H. Nexenta CP 3.0 is also carrying various back-ports and other fixes onto the b134 stack.

    • Javascript server Node.js moves to 0.2.0

      Inspired by frameworks such as Ruby’s Event Machine or Python’s Twisted, Node.js avoids thread based networking and moves to an event driven model, where one thread executes all the code as demanded by events, such as the opening of network connections, or the completion of I / O operations. This has the advantage of being memory efficient and avoiding dead-lock issues, as there are no locks. Within Node.js code, HTTP is a first class protocol, with a library designed to allow for the handing of streamed data through the framework.

    • Clojure 1.2: A combination of scripts and functional programming

      The Clojure developers have released version 1.2 of their dynamic programming language. Clojure is one of the youngest programming languages executable on the Java Virtual Machine (JVM) and has recently been competing for public attention with the increasingly popular Scala language. The Lisp dialect is dynamically “typed” and was developed specifically for the JVM. A general-purpose language, it aims at combining the advantages of script languages with those of multi-threaded programs.

  • Licensing

    • Which Licence is Best for the Future?

      The GNU GPL might seem the obvious answer. After all, the GPL was drawn up specifically to make collaboration work and to create a community based on sharing code. But the experience of the last ten years of open source business has shown that, ironically, the GNU GPL actually allows companies that adopt it to act more, not less, like a traditional closed-source company.

  • Openness/Sharing

    • Open-source’s roots in the 19th century

      Wired states that the first instance of open-sourcing occurred in 1839, which is much earlier that most people might think. This progenitive incident also has some basic principles in common with more recent events in the computer field of somewhat dubious distinctions. I will leave those particulars out, but it shouldn’t be hard to figure out which companies I’m talking about in the events to follow.

      Try to guess which modern examples follow the example set by Louis Daguerre if you want.

      Before Daguerre came along, a permanent photo would take about eight hours to make. At the time, photographers could only make a negative image on a pewter plate. Daguerre worked out a chemical process that reduced this time to mere minutes, and etched out a positive image. Without that process, a significant step in the history of photography might never have happened. So what tips can we glean from Daguerre’s example


  • My Favorite 10 xkcd Comics Part-1
  • Five billionth device about to plug into Internet

    Sometime this month, the 5 billionth device will plug into the Internet. And in 10 years, that number will grow by more than a factor of four, according to IMS Research, which tracks the installed base of equipment that can access the Internet.

  • Security/Aggression

  • Censorship/Privacy/Civil Rights

  • Internet/Net Neutrality/DRM

    • Tech industry holds closed door talks on open internet

      Last week a crowd of about 100 people marched to Google’s headquarters in California to present boxes that they said contained 300,000 signatures upholding the values of net neutrality, a founding principle of the net that states that all web data is treated equally no matter where it comes from.

  • Intellectual Monopolies

    • Copyrights

      • Should you be able to copyright a shirt?

        On Aug. 5, Sen. Chuck Schumer (D-N.Y.) introduced S.3728: the Innovative Design Protection and Piracy Prevention Act. He’s got 10 co-sponsors — including three Republicans — and a big idea: to extend copyright protections to the fashion industry, where none currently exist. That’s right: none. I — well, not I, but someone who can sew — can copy Vera Wang’s (extremely expensive) dress and sell it to you right now (for much less), and Wang can’t do a thing about it.

        We’re used to the logic of copyright. Movies, music and pharmaceuticals all use some form of patent or copyright protection. The idea is simple: If people can’t profit from innovation, they won’t innovate. So to encourage the development of stuff we want, we give the innovators something very valuable — exclusive access to the profit from their innovations. We’ve so bought into the logic that we allow companies to patent human genes.

      • 7 Sources of Free Sounds for Multimedia Projects

        In my posts 11 Techy Things for Teachers to Try This Year and How To Do 11 Techy Things In the New School Year I mentioned podcasting and video creation. When creating podcasts and videos adding music and other sounds can enhance your students’ presentations. Here are seven tools that your students can use find and or create sounds for their multimedia presentations.

Clip of the Day

Richard M. Stallman Speech DebconfII Indonesia

« Previous Page « Previous Page Next entries »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts