commercial pubs server their commercial masters and so also do political pubs serve also their political masters.
you would not expect to get an honest review of a Widget from a pub. which is taking advert. money from the company that makes Widgets.
today pubs often accept comments and such comments may help to shed the proper light on various subjects. and they do, at times. but at times good comments are flagged as "trolling" and trashed by the sys-admins.
the net bottom line is that each of us needs to "be our own man" -- not a "puppet on a string" -- manipulated by whatever public consensus can be blown up by advertisers and propagandists of the times.
this is the strongest reason for reclassifying the carriers under Title II. Here in Michigan you just tell them to cancel. Then if they bill you again you call the Public Service Commission and that *will* end the problem.
="And we wonder why Hollywood seems to have so much trouble learning how to embrace the internet."
throughout history executives will attempt to preserve cash cows at all costs. they all fail.
digital photograph was developed at Kodak. but Kodak was making a fortune on film and processing and chemicals. Can't have this digital crap around. Now, Kodak ain't around much anymore and the same will happen to other idiots who are attempting to save their precious cash cows.
remember what old Frank Roosevelt told us: "Anytime the government does anything you can bet it was carefully planned".
cui bono?
what changes will result from the Snowden leak? it's a puzzle: spooks always make every effort to be sure their accomplishments are not known. if Snowden was allowed to leak then that means what he has leaked -- was generally known to intelligence organizations around the world and all the uproar is is just part of the show.
we have 2 federal judges conflicting on Section 215 -- setting the stage for a SCOTUS decision
will NSA intelligence become admissible in court? no parallel detective work required to acquire evidence by legal means ? the "writ of assistance" noted in the 30c3 keynote?
i looked up "what is patentable",-- the wickedpedia essay states that the idea may not be abstract and must be non-obvious.
to me, for example, scanning a page to .pdf and then sending the .pdf via e/mail is an obvious use of 2 tools . how long did it take people to figure out they could print a page and then fax it ?
slide to unlock? how long have there been slide locks on barn doors? hmmmmm . any simple migration of an existing process to a computer program -- to me -- is "obvious". back in the Days of the Mainframe that's how we came up with all our COBOL programs .
oth, the math used in PGP to construct the public/private keys, I would say, is non-obvious. I read the description of how that is done and to me it was non-obvious.
in this, as in so many laws though, congress writes the laws, then we have a court case to establish precedent and then court tells us how they will enforce it. ( stare decisis.)
the sad part in all this news this summer is that while we can point out the lies, deception, and greed, in the end Ugly Sam is a MONSTER. and that leaves the question: what we gonna do about it ?
NSA probably rates an F for their stated objective. but what is their actual objective? I suspect it is tracking dissidents, and other collateral benefits such as tax-evaders, dead beat parents, or others who can be grabbed and squeezed for cash
there is no point in discussing encryption until the question of un-authorized programming is settled
i don't think there is any point in discussing un-authorized programming unless we are using open-source software ( I'm using Linux/Mint )
i tend to agree with Snowden -- nothing wrong with encryption that we have -- e.g. GnuPG -- implemented properly
he means on a secure host, and don't use "123456" for you password
the existing x.509 and CA structure is a mess: you are trusting everything your browser sends you -- and everything that mess has signed for
the First Thing a computer user should do is generate his key pair . once that's done he is in a position to vet and sign certificates . he won't need to do many of these -- just those that need to be secured -- e.g. NewEgg, Amazon, Credit Union, TurboTax, -- anyplace money is involved. you don't need https on a blog site. but you DO need GnuPG on your e/mail
I think this comes under the heading "Predatory Litigation".
"Predatory Litigation" would include the article on a_cademic a_dvantage which appears also in today's clips
The crap about a_cademic a_dvantage I am guessing was derived from using a "Reputation Defender" type scan and then processed using a robot.
Ugly
If this sort of process is allowed to continue the New Rules to the Net will become: "Post a comment: Get Sued". It will effectively suppress free speech on the Net. There will be cheering from certain areas
what content protection has been other than "laughable"?
from what I've read every sort of content protection devised thus far has been defeated in a few days if not a few minutes
"and said that as long as the site owner made any attempt whatsoever to block such deep linking, getting around those measures could represent infringement."
the result of which is that the above is an appropriate response
On the post: Did Apple Keep Or Remove Its Warrant Canary Concerning PATRIOT Act Requests?
participate, OR ELSE
anyone thinking the feds are not serious about collecting SIGINT better think again. one way or another: they will take what they want.
On the post: Huffington Post Finally Removes Most Articles About Fake Email Inventor; Meanwhile, Ayyadurai Threatens To Sue His Critics
commercial pubs
you would not expect to get an honest review of a Widget from a pub. which is taking advert. money from the company that makes Widgets.
today pubs often accept comments and such comments may help to shed the proper light on various subjects. and they do, at times. but at times good comments are flagged as "trolling" and trashed by the sys-admins.
the net bottom line is that each of us needs to "be our own man" -- not a "puppet on a string" -- manipulated by whatever public consensus can be blown up by advertisers and propagandists of the times.
On the post: Huffington Post And The View From Bogustan: Standing Behind Blatantly False Claims Isn't Journalism
Cold Day in a Hot Place
On the post: Comcast 'Cares' About Not Listening To Customers, Being Obnoxious And Refusing To Cancel Service
strongest reason for Title II
On the post: This Week In Techdirt History
Cash Cows
throughout history executives will attempt to preserve cash cows at all costs. they all fail.
digital photograph was developed at Kodak. but Kodak was making a fortune on film and processing and chemicals. Can't have this digital crap around. Now, Kodak ain't around much anymore and the same will happen to other idiots who are attempting to save their precious cash cows.
On the post: NSA Admits Lots Of People Could Have Done What Snowden Did
THINK
cui bono?
what changes will result from the Snowden leak? it's a puzzle: spooks always make every effort to be sure their accomplishments are not known. if Snowden was allowed to leak then that means what he has leaked -- was generally known to intelligence organizations around the world and all the uproar is is just part of the show.
we have 2 federal judges conflicting on Section 215 -- setting the stage for a SCOTUS decision
will NSA intelligence become admissible in court? no parallel detective work required to acquire evidence by legal means ? the "writ of assistance" noted in the 30c3 keynote?
who are they after, anyhow?
On the post: Malibu Media Sanctioned Again For Bogus Copyright Abuse & Intimidation
RICO
On the post: Supreme Court To Hear Key Case On Software Patents That Appeals Court Couldn't Figure Out
Re: SW patents
to me, for example, scanning a page to .pdf and then sending the .pdf via e/mail is an obvious use of 2 tools . how long did it take people to figure out they could print a page and then fax it ?
slide to unlock? how long have there been slide locks on barn doors? hmmmmm . any simple migration of an existing process to a computer program -- to me -- is "obvious". back in the Days of the Mainframe that's how we came up with all our COBOL programs .
oth, the math used in PGP to construct the public/private keys, I would say, is non-obvious. I read the description of how that is done and to me it was non-obvious.
in this, as in so many laws though, congress writes the laws, then we have a court case to establish precedent and then court tells us how they will enforce it. ( stare decisis.)
On the post: Apparently James Clapper And The NSA Don't See Eye-To-Eye On Transparency
what are we gonna do about it
On the post: Dianne Feinstein's Bragging About NSA Surveillance Program May Finally Result In It Being Declared Unconstitutional
lettn the cat outta the bag
Sorry, Di :-(
On the post: Even By Its Own Ridiculous Metric, The NSA Gets A Failing Grade
WHAT OBJECTIVE
On the post: John Gilmore On How The NSA Sabotaged A Key Security Standard
Security starts a home
i don't think there is any point in discussing un-authorized programming unless we are using open-source software ( I'm using Linux/Mint )
i tend to agree with Snowden -- nothing wrong with encryption that we have -- e.g. GnuPG -- implemented properly
he means on a secure host, and don't use "123456" for you password
the existing x.509 and CA structure is a mess: you are trusting everything your browser sends you -- and everything that mess has signed for
the First Thing a computer user should do is generate his key pair . once that's done he is in a position to vet and sign certificates . he won't need to do many of these -- just those that need to be secured -- e.g. NewEgg, Amazon, Credit Union, TurboTax, -- anyplace money is involved. you don't need https on a blog site. but you DO need GnuPG on your e/mail
Thunderbird/ENIGMAIL is one solution.
On the post: Latest Leak Shows NSA Engaging In Economic Espionage -- Not Fighting Terrorism
Dissidents
On the post: Facebook Says Some of Your Personal Data Is Its 'Trade Secrets or Intellectual Property'
Re: meh
someplace last week i read that 30% of the time people spend online goes to FB. and suckerberg ain't happy. like AOL of the past: he want's it all.
AOL's model stagnated. it can't happen soon enough for fools' book
On the post: Facebook Says Some of Your Personal Data Is Its 'Trade Secrets or Intellectual Property'
Re:
Their "business model" is similar to TV. In Television what is sold is audience and it is sold to the advertisers
in FoolsBook it's the same: you are being sold.
everytime you see something for "free" it is good to ask: who is selling what to whom.
On the post: Facebook Says Some of Your Personal Data Is Its 'Trade Secrets or Intellectual Property'
Re: Re: Re: The real trade secret
off all those "Friend" links plus a monster AI program
On the post: Facebook Says Some of Your Personal Data Is Its 'Trade Secrets or Intellectual Property'
Re: Re: Follow me @glynmoody ... on Google+
That would be why they created Buzz and now G+
On the post: Facebook Says Some of Your Personal Data Is Its 'Trade Secrets or Intellectual Property'
Re: Facebook == evil
On the post: Righthaven Moves On To Suing Message Board Posters, Rather Than Just Site Operators
Predatory Litigation
"Predatory Litigation" would include the article on a_cademic a_dvantage which appears also in today's clips
The crap about a_cademic a_dvantage I am guessing was derived from using a "Reputation Defender" type scan and then processed using a robot.
Ugly
If this sort of process is allowed to continue the New Rules to the Net will become: "Post a comment: Get Sued". It will effectively suppress free speech on the Net. There will be cheering from certain areas
On the post: Deep Linking Could Be Infringement In Germany If Website Puts Even Ridiculous Weak Attempts To Block It
laughable protection
from what I've read every sort of content protection devised thus far has been defeated in a few days if not a few minutes
"and said that as long as the site owner made any attempt whatsoever to block such deep linking, getting around those measures could represent infringement."
the result of which is that the above is an appropriate response
Next >>