Josh in CharlotteNC (profile), 17 Jul 2013 @ 1:41pm
Re: Re: Re:
The key is to consider the performance as a whole
So let's consider the performance as a whole, then. We'll go step-by-step and see where this supposed infringement happens.
1) Fox broadcasts an unencrypted in-the-clear transmission to everyone with a TV antenna in a wide geographical area.
2) Millions of antennas recieve this bradcast transmission. Aereo runs thousands of them that all individually recieve that transmission.
3) Aereo assigns each individual antenna to an idividual user of its service. Aereo assigns these antennas based on the location the user resides (same broadcast footprint as Fox is transmitting to).
4) Aereo transmits the signal received by an individual antenna to the individual user it is assigned to over the internet.
5) Individual user recieves the transmission.
Now, which step is where the infringement occurs?
I think that setup is insane and inefficient. Nearly everyone else does, too. But I'm not the one arguing for insane copyright laws that make that insane setup required to stay within the law. That's all you.
Josh in CharlotteNC (profile), 15 Jul 2013 @ 11:46am
Re: Thanks for obfuscating
What is not functioning is the commentariat's understanding of patent law.
You don't need to know the intracacies of organic chemistry to be able to tell when someone's shit stinks.
And certainly this lawsuit by Myriad stinks.
Maybe I'm the naive one, in thinking that the whole point of patents were to encourage new discoveries and inventions. I'm pretty sure that you won't find any supporting documentation by the writers of the Constitution or the various patent laws that say that patents should be for lawyers and corporations to use to parasitize money from those who are trying to make those discoveries. And I don't think you'll find anything saying that patents should be used to prevent people from getting the medical care they desperately need. And yet that's all that patents seem to be used for now.
Josh in CharlotteNC (profile), 15 Jul 2013 @ 7:10am
Diverting
From a PR perspective, Asiana might be doing a good job for themselves here. It's all about diverting the attention away from the actual crash and changing the story (new cycle) onto this stupid TV studio. It lets Asiana be the victim of racist remarks instead of the company that is responsible for the crash.
Josh in CharlotteNC (profile), 9 Jul 2013 @ 10:24am
Re: Re: Re: Re:
I think you missed this part:
"Despite gathering more information from outside consultants that indicated the malware was neither "persistent" nor a threat to migrate"
Yes, there are some extremely nasty malware variants that are persistant to the (sorta-)hardware level that lodge themselves in the (not-)ROM of a motherboard or other device. But those types were not involved in this incident - it was boring standard malware and email spam. A reimaging of the infected machines would've solved the problem.
Josh in CharlotteNC (profile), 8 Jul 2013 @ 1:05pm
Re: How to explain?
Try this one as a sound bite:
If all this metadata is so useless as far as figuring out what someone is up to, then why does the government have so many multi-million/billion dollar programs designed to capture it all?
Josh in CharlotteNC (profile), 8 Jul 2013 @ 7:43am
Re:
Presumably in that case, the shop owner would be around to say that the recording is accurate. In this case, there was no one to claim that since they couldn't find the teen or get him to cooperate.
My question is when is this authentication rule applied? How does this rule work when there is no one but the suspect present (such as burglary of an unattended shop), or when only the suspect survives (murder)? How would recordings of those be authenticated by someone with personal knowledge of the incident?
Josh in CharlotteNC (profile), 3 Jul 2013 @ 1:38pm
Re: taking/seizing?
They're not taking anything, it still exists where it did originally. They're copying it. Minor distinction? Maybe, but that's the distinction you use when someone says people can't steal data.
I think that's a fair point about copying/taking. The government hasn't "taken" the data away from the telecom/tech companies. But context is everything. I think we could have a decent discussion that in regards to the violations of privacy performed by the government, and the protections of the 4th, that the government simply *having* the data without a warrant specifically for that data is the problem, not the mechanics of how the government got it.
Josh in CharlotteNC (profile), 1 Jul 2013 @ 10:24am
Re: It's taking time
But it at least appears that slowly, over time you are drawing the same conclusions as many others have drawn, and are beginning to question the veracity if the 'so called' leaked documents. It is all very broad, and clearly if anything is 'low level' intelligence.
You seem confused. You're trying to say that they're faked, yet your next sentence you accept that they're real and say they're unimportant.
No one but you is questioning that these are actual NSA documents. They are not faked - if they were, then Snowden isn't guilty of doing anything illegal enough to cause a global manhunt and diplomatic fallout between countries. The questioning is that these documents are not internally consistent, nor are they consistent with the information stated publicly by NSA officials or with information from the tech companies. What this means is that there is a desperate need for real oversight and transparency - because the picture as to what communications are being illegally captured is very murky.
Josh in CharlotteNC (profile), 27 Jun 2013 @ 12:34pm
Re: missing the point
If you have Pandora, or Spotify, you search for a track, and listen to it. Artist gets 0.0001 of a cent or something.
If you don't have Pandora or Spotify, and you want to listen to music, you search for a torrent of it and download it. Artist gets no money directly.
Pandora significantly lowered my music piracy rate. Spotify has nearly completely killed it. I now spend $120 a year on music - more than I spent when I was buying CDs in the 90s before P2P sharing.
Josh in CharlotteNC (profile), 26 Jun 2013 @ 1:24pm
"The Citizens of each State shall be entitled to all Privileges and Immunities of Citizens in the several States."
Article IV, Section 2
"Article IV's Privileges and Immunities Clause has enjoyed a long association with the rights to travel and migrate interstate. The Clause derives from Art. IV of the Articles of Confederation. The latter expressly recognized a right of "free ingress and regress to and from any other State," in addition to guaranteeing "the free inhabitants of each of these states . . . [the] privileges and immunities of free citizens in the several States.""
Zobel v Williams
On the post: Judge: Aereo Case Was Decided Incorrectly, Because I Don't Like Previous Ruling
Re: Re: Re: Re: Re:
"There really IS Santa Claus! Waaah! There is! There is!"
On the post: Judge: Aereo Case Was Decided Incorrectly, Because I Don't Like Previous Ruling
Re: Re: Re:
So let's consider the performance as a whole, then. We'll go step-by-step and see where this supposed infringement happens.
1) Fox broadcasts an unencrypted in-the-clear transmission to everyone with a TV antenna in a wide geographical area.
2) Millions of antennas recieve this bradcast transmission. Aereo runs thousands of them that all individually recieve that transmission.
3) Aereo assigns each individual antenna to an idividual user of its service. Aereo assigns these antennas based on the location the user resides (same broadcast footprint as Fox is transmitting to).
4) Aereo transmits the signal received by an individual antenna to the individual user it is assigned to over the internet.
5) Individual user recieves the transmission.
Now, which step is where the infringement occurs?
I think that setup is insane and inefficient. Nearly everyone else does, too. But I'm not the one arguing for insane copyright laws that make that insane setup required to stay within the law. That's all you.
On the post: Myriad Mocks Supreme Court's Ruling On Gene Patents; Sues New Competitors Doing Breast Cancer Tests
Re: Thanks for obfuscating
You don't need to know the intracacies of organic chemistry to be able to tell when someone's shit stinks.
And certainly this lawsuit by Myriad stinks.
Maybe I'm the naive one, in thinking that the whole point of patents were to encourage new discoveries and inventions. I'm pretty sure that you won't find any supporting documentation by the writers of the Constitution or the various patent laws that say that patents should be for lawyers and corporations to use to parasitize money from those who are trying to make those discoveries. And I don't think you'll find anything saying that patents should be used to prevent people from getting the medical care they desperately need. And yet that's all that patents seem to be used for now.
On the post: Asiana Air Says It Will Sue Over Stupid News Program Broadcasting Offensive Joke Names Of Crash Pilots
Diverting
On the post: Latest Leak Shows Microsoft Handed The NSA And FBI Unencrypted Access To Outlook, SkyDrive And Skype
Re: Untrustworthy...
"It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics."
-- Bruce Schneier
On the post: Telcos 'Volunteered' To Hand Over Data To NSA... And Got Over $100 Million For It
Re:
They might not have been raking in extra cash for doing various data analysis stuff, but I'm sure the data is still sitting in the NSA's databases.
On the post: Your Tax Dollars At Work: How Commerce Dept. Spent $2.7 Million Cleaning Out Two Malware-Infected Computers
Re: Re:
On the post: Your Tax Dollars At Work: How Commerce Dept. Spent $2.7 Million Cleaning Out Two Malware-Infected Computers
Re: Re: Re: Re:
"Despite gathering more information from outside consultants that indicated the malware was neither "persistent" nor a threat to migrate"
Yes, there are some extremely nasty malware variants that are persistant to the (sorta-)hardware level that lodge themselves in the (not-)ROM of a motherboard or other device. But those types were not involved in this incident - it was boring standard malware and email spam. A reimaging of the infected machines would've solved the problem.
On the post: Way To Go Florida: Governor Signs Law That Accidentally Bans All Computers & Smartphones
Re: Game of Chance
On the post: Way To Go Florida: Governor Signs Law That Accidentally Bans All Computers & Smartphones
Re:
No, they're really not.
On the post: Anyone Brushing Off NSA Surveillance Because It's 'Just Metadata' Doesn't Know What Metadata Is
Re: How to explain?
If all this metadata is so useless as far as figuring out what someone is up to, then why does the government have so many multi-million/billion dollar programs designed to capture it all?
On the post: Cops And Union Rep Lie About What Video Shows Because Judge Never Allowed Recording As Evidence
Re:
My question is when is this authentication rule applied? How does this rule work when there is no one but the suspect present (such as burglary of an unattended shop), or when only the suspect survives (murder)? How would recordings of those be authenticated by someone with personal knowledge of the incident?
On the post: Snowden's Constitution vs Obama's Constitution
Re: taking/seizing?
I think that's a fair point about copying/taking. The government hasn't "taken" the data away from the telecom/tech companies. But context is everything. I think we could have a decent discussion that in regards to the violations of privacy performed by the government, and the protections of the 4th, that the government simply *having* the data without a warrant specifically for that data is the problem, not the mechanics of how the government got it.
On the post: Snowden's Constitution vs Obama's Constitution
Re: Re: Re: taking/seizing?
Second paragraph is all about the difference between the two: "Whether or not the state ever chooses to "search" the seized information," and so on.
On the post: Newly Leaked NSA Slides On PRISM Add To Confusion, Rather Than Clear It Up
Re: Re: Re: The first slide
That isn't how investigations are started.
I'll refer you to every public statement where a police spokesperson says "We have no suspects at this time."
They say that, not something like "All 7 billion people on the planet are suspects."
On the post: Newly Leaked NSA Slides On PRISM Add To Confusion, Rather Than Clear It Up
Re: It's taking time
You seem confused. You're trying to say that they're faked, yet your next sentence you accept that they're real and say they're unimportant.
No one but you is questioning that these are actual NSA documents. They are not faked - if they were, then Snowden isn't guilty of doing anything illegal enough to cause a global manhunt and diplomatic fallout between countries. The questioning is that these documents are not internally consistent, nor are they consistent with the information stated publicly by NSA officials or with information from the tech companies. What this means is that there is a desperate need for real oversight and transparency - because the picture as to what communications are being illegally captured is very murky.
On the post: Pandora's Fed Up With The Lies The RIAA Has Been Spreading About It: Presents Some Facts
Re: missing the point
If you don't have Pandora or Spotify, and you want to listen to music, you search for a torrent of it and download it. Artist gets no money directly.
Pandora significantly lowered my music piracy rate. Spotify has nearly completely killed it. I now spend $120 a year on music - more than I spent when I was buying CDs in the 90s before P2P sharing.
On the post: Latest Leak: NSA Collects Bulk Email Metadata On Americans
Re:
Ethics.
On the post: Federal Judge None Too Impressed With Government's Defense Of Its 'No Fly' List
Article IV, Section 2
"Article IV's Privileges and Immunities Clause has enjoyed a long association with the rights to travel and migrate interstate. The Clause derives from Art. IV of the Articles of Confederation. The latter expressly recognized a right of "free ingress and regress to and from any other State," in addition to guaranteeing "the free inhabitants of each of these states . . . [the] privileges and immunities of free citizens in the several States.""
Zobel v Williams
On the post: Internet Catches Texas Senate Fudging Time-Stamps On Abortion Bill
Re:
Everything's bigger in Texas, even the stupidity and hubris.
Next >>