> Writing educational books, or other text books for that matter, has > never been a means of making a living for those who actually write them
Welcome to the 21st century! Professors get to select the textbook for their class. So they select . . . ta da . . . their own textbook! They don't necessarily need to have a publisher in a traditional sense, or even have a soft or hardback binding. It could be three ring or spiral bound produced at a local printing shop.
Then, each year, the professor updates the textbook. Primarily to destroy or lower the market value of used textbooks.
Charge high prices for the book, maybe only available in the college bookstore.
Profit!
And who said writing college textbooks wasn't a profitable racket?
It is inconceivable in the US. But some world leaders and legislators might recognize that their future is more tied to the education of their children, the innovation of their high tech industries, than to the greased palm bribes of corrupt foreign mega media companies.
It is necessary to update college textbooks frequently to keep up with the latest changes.
Would you want STEM students using an out of date math textbook that doesn't keep up with the latest changes to how the centuries old Cosine or Square Root functions work? Or changes to the Pythagorean theorem?
What about humanities students not getting all the latest changes to Shakespeare because of outdated textbooks?
Parallel Construction is simply a euphemism for Conspiracy to Commit Perjury. Lying to the Court. Lying to the defense. Lying on the record. And a criminal conspiracy to not only commit this perjury, but to do so in order to cover up other crimes. Such as using Stingray or other illegal techniques to obtain evidence which then must be fraudulently and untruthfully explained with some sanitized fiction to prevent the defense from having the actual facts.
Evidence cannot be used when it is obtained illegally. Parallel Construction is simply a way to commit another illegal act to cover up the first illegal act.
Privacy and Security are more similar than the congress critters and national security buffoons would like to admit.
Consider these issues: * I don't want you to break into my ${thing} * I don't want you to remove items from my ${thing} * I don't want you to add items to my ${thing} * I don't want you to see what is in my ${thing}
Are the above items Privacy issues or are they Security issues?
They seem to be Privacy issues when ${thing} = Computer / Phone
They seem to be Security issues when ${thing} = Home / Car
But why is Computer / Phone so different than Home / Car? Why does Warrant Required and Unreasonable Search And Seizure, and be Secure in Papers and Effects suddenly mean something different for Home / Car / Papers than it does for Computer / Phone?
To make it seem like they are different, the words Security or Privacy are used to categorize them.
It's also amusing that one applies to us while other applies to them: * It's no big deal if we hack you even though it invades your Privacy but doesn't cause any actual harm * It's a major crime for you to hack us and violate our Security even though you didn't cause any actual harm
When it's us, it's just our privacy. When it's them, it's their security.
But he could live off his wife. Or find a new scam. He could pretend to be a lawyer. Losing his license was a detail he simply didn't happen to remember. Become a political consultant.
Or, if he does end up serving time, he could start telling the other inmates "welcome to the big leagues" and explaining his own superiority to them.
One of the primary reasons for developing BitTorrent technology in the first place was to distribute Linux distributions.
Now filthy thieving pirates misuse BitToreent to download copies of Ubuntu without paying for them. :-) Or without paying Hollywood it's fair share. A lost sale of Ubuntu.
The collection racket societies need to get involved. Your organization should have a blanket ASCAP license to cover your use of Ubuntu.
In Hollywood, if the tech, or anything else in the real world isn't working the way you want, then you need a new writer that will make it work the way you want.
The obscenity is not the nudity in the photo. The incidental nudity is unremarkable in relation to the shock of the circumstances surrounding the subjects in the photo.
To censor this photo is to trivialize the events depicted in the photo.
Oh, and as for the "just don't use Facebook". I don't. Never have. Never will. And I don't miss it. I have too great of a life to waste it on a black hole for time that is Facebook.
It's way too late for talking or speeches to fix it. And bean bag chairs are just insulting. The young people the FBI wants to hire are likely not even viewed by the FBI as being professionals.
The very people they want to attract are against violating the constitution and turning the US into a police state. It's not a secret that the FBI and other TLAs objectives are not the same.
These young professionals are likely to be deeply against the FBI's actions. The mention of the name Aaron Swartz conjures up memories of the FBI's role in that.
Finally it is insulting to professional people to ask the impossible, of following contradictory goals and doing the impossible. Assignment: create a secure system that is insecure when we want it to be, but where the security can never be compromised. Good luck with such an assignment! And if you don't believe in this magical fairy dust you are un-American and not patriotic.
Trump: what? You mean I can't recall the nuclear ballistic missiles once launched? I only meant to launch them as a negotiating tactic, and then 'recall' them. Oh, well. Now I'm informed and won't make that mistake again.
This getting informed thing after the fact sure works great!
On the post: Indian Court Says 'Copyright Is Not An Inevitable, Divine, Or Natural Right' And Photocopying Textbooks Is Fair Use
Re: Re:
> never been a means of making a living for those who actually write them
Welcome to the 21st century! Professors get to select the textbook for their class. So they select . . . ta da . . . their own textbook! They don't necessarily need to have a publisher in a traditional sense, or even have a soft or hardback binding. It could be three ring or spiral bound produced at a local printing shop.
Then, each year, the professor updates the textbook. Primarily to destroy or lower the market value of used textbooks.
Charge high prices for the book, maybe only available in the college bookstore.
Profit!
And who said writing college textbooks wasn't a profitable racket?
On the post: Indian Court Says 'Copyright Is Not An Inevitable, Divine, Or Natural Right' And Photocopying Textbooks Is Fair Use
Re:
On the post: Indian Court Says 'Copyright Is Not An Inevitable, Divine, Or Natural Right' And Photocopying Textbooks Is Fair Use
Re:
On the post: Indian Court Says 'Copyright Is Not An Inevitable, Divine, Or Natural Right' And Photocopying Textbooks Is Fair Use
Re: Re:
Would you want STEM students using an out of date math textbook that doesn't keep up with the latest changes to how the centuries old Cosine or Square Root functions work? Or changes to the Pythagorean theorem?
What about humanities students not getting all the latest changes to Shakespeare because of outdated textbooks?
/sarcasm
On the post: Inspector General Says FBI Probably Shouldn't Impersonate Journalists; FBI Says It Would Rather Impersonate Companies Anyway
Good Faith exceptions
On the post: Congressman In Charge Of OPM Hacking Report Announces Plan To Investigate Stingray Use Next
Next: investigate Parallel Construction
Evidence cannot be used when it is obtained illegally. Parallel Construction is simply a way to commit another illegal act to cover up the first illegal act.
Your honorable law enforcement folks at work.
On the post: National Security Officials Offer Hedged Support For Strong Encryption
Privacy and Security
Consider these issues:
* I don't want you to break into my ${thing}
* I don't want you to remove items from my ${thing}
* I don't want you to add items to my ${thing}
* I don't want you to see what is in my ${thing}
Are the above items Privacy issues or are they Security issues?
They seem to be Privacy issues when ${thing} = Computer / Phone
They seem to be Security issues when ${thing} = Home / Car
But why is Computer / Phone so different than Home / Car? Why does Warrant Required and Unreasonable Search And Seizure, and be Secure in Papers and Effects suddenly mean something different for Home / Car / Papers than it does for Computer / Phone?
To make it seem like they are different, the words Security or Privacy are used to categorize them.
It's also amusing that one applies to us while other applies to them:
* It's no big deal if we hack you even though it invades your Privacy but doesn't cause any actual harm
* It's a major crime for you to hack us and violate our Security even though you didn't cause any actual harm
When it's us, it's just our privacy. When it's them, it's their security.
On the post: Prenda's Paul Hansmeier Loses His Law License; Won't Be Filing Bogus ADA Lawsuits For Now
Re: Hansmeir should welcome prosecution
Or, if he does end up serving time, he could start telling the other inmates "welcome to the big leagues" and explaining his own superiority to them.
On the post: Prenda's Paul Hansmeier Loses His Law License; Won't Be Filing Bogus ADA Lawsuits For Now
Re:
Perhaps it would be wise to make money by some kind of honest means? (I don't know if that completely excludes working as a lawyer or politician.)
On the post: Another Day, Another Anomaly: Paramount Issues DMCA Takedown On Ubuntu Linux Torrent
It is worth mentioning
Now filthy thieving pirates misuse BitToreent to download copies of Ubuntu without paying for them. :-) Or without paying Hollywood it's fair share. A lost sale of Ubuntu.
The collection racket societies need to get involved. Your organization should have a blanket ASCAP license to cover your use of Ubuntu.
On the post: Hollywood Keeps Insisting Tech Is Easy, Yet Can't Secure Its Own Screeners
Re:
On the post: Hollywood Keeps Insisting Tech Is Easy, Yet Can't Secure Its Own Screeners
Re: The solution to screener leaks
On the post: Facebook's Arbitrary Censors Strike Again; Ban Norwegian Newspaper From Posting Iconic Vietnam War Photo
Censoring this photo is OBSCENE
To censor this photo is to trivialize the events depicted in the photo.
Oh, and as for the "just don't use Facebook". I don't. Never have. Never will. And I don't miss it. I have too great of a life to waste it on a black hole for time that is Facebook.
On the post: Holy Crap: Wells Fargo Has To Fire 5,300 Employees For Scam Billing
Tough break for those 5,300 people
On the post: The FBI Wants To Hire Young Tech Savants, Has No Idea How To Attract Them
Re:
Booz Allen probably got a black eye over Snowden.
On the post: The FBI Wants To Hire Young Tech Savants, Has No Idea How To Attract Them
Re: Tech savants are tricky...
On the post: The FBI Wants To Hire Young Tech Savants, Has No Idea How To Attract Them
Re: Re:
On the post: The FBI Wants To Hire Young Tech Savants, Has No Idea How To Attract Them
The FBI and other TLAs brought this on
The very people they want to attract are against violating the constitution and turning the US into a police state. It's not a secret that the FBI and other TLAs objectives are not the same.
These young professionals are likely to be deeply against the FBI's actions. The mention of the name Aaron Swartz conjures up memories of the FBI's role in that.
Finally it is insulting to professional people to ask the impossible, of following contradictory goals and doing the impossible. Assignment: create a secure system that is insecure when we want it to be, but where the security can never be compromised. Good luck with such an assignment! And if you don't believe in this magical fairy dust you are un-American and not patriotic.
On the post: Trump's 'Cyber' Policy Against ISIS Is... 'Hey Look At This New Poll!'
Re: Trump Navigation System v1.0a
This getting informed thing after the fact sure works great!
On the post: Trump's 'Cyber' Policy Against ISIS Is... 'Hey Look At This New Poll!'
Cyber policy for ISIS
Here is a simple cyber policy for ISIS.
Make them have to use Comcast.
Next >>