- Why YouTube Buffers (ArsTechnica) — When asked if ISPs are degrading Netflix and YouTube traffic to steer users toward their own video services, Crawford told Ars that “the very powerful eyeball networks in the US (and particularly Comcast and Time Warner Cable) have ample incentive and ability to protect the IP services in which they have economic interests. Their real goal, however, is simpler and richer. They have enormous incentives to build a moat around their high-speed data networks and charge for entry because data is a very high-margin (north of 95 percent for the cable companies), addictive, utility product over which they have local monopoly control. They have told Wall Street they will do this. Yes, charging for entry serves the same purposes as discrimination in favor of their own VOD [video-on-demand], but it is a richer and blunter proposition for them.”
- Ink — MIT-licensed interface kit for quick development of web interfaces, simple to use and expand on.
- Licensing in a Post-Copyright World — This article is opening up a bit of the history of Open Source software licensing, how it seems to change and what we could do to improve it. Caught my eye: Oracle that relicensed Berkeley DB from BSD to APGLv3 [... effectively changing] the effective license for 106 other packages to AGPLv3 as well.
- RC Cockroaches (Vine) — video from Dale Dougherty of Backyard Brains Bluetooth RoboRoach. (via Dale Dougherty)
ENTRIES TAGGED "copyright"
Transit and Peering, Quick Web Interfaces, Open Source Licensing, and RC Roach
Quantum Programming, Quantum Again, Copyright Vanishes Media, and Email Metadata Analysis
- QCL: A Language for Quantum Computing — QCL is a high level, architecture independent programming language for quantum computers, with a syntax derived from classical procedural languages like C or Pascal. This allows for the complete implementation and simulation of quantum algorithms (including classical components) in one consistent formalism.. (Will not run on D-Wave, which is annealing rather a general purpose quantum computer)
- Quipper — a functional quantum programming language.
- How Copyright Makes Books Disappear — Amazon and YouTube data showing exponential growth in available content until copyright term is entered, at which point there’s a massive drop-off in availability. Graph is stunning. (via BoingBoing)
- Immersion — a people-centric view of your email life using only your metadata. Horrifyingly revealing.
Repurposing Dead Retail Space, Open Standards, Space Copyright, and Bridging Lessons
- Ubiquity — Sears Holdings has formed a new unit to market space from former Sears and Kmart retail stores as a home for data centers, disaster recovery space and wireless towers.
- Google Abandons Open Standards for Instant Messaging (EFF) — it has to be a sign of the value to users of open standards that small companies embrace them and large companies reject them.
- How Does Copyright Work in Space? (The Economist) — amazingly complex rights trail for the International Space Station-recorded cover of “Space Oddity”. Sample: Commander Hadfield and his son Evan spent several months hammering out details with Mr Bowie’s representatives, and with NASA, Russia’s space agency ROSCOSMOS and the CSA. That’s the SIMPLE HAPPY ENDING.
- Great Lessons: Evan Weinberg’s “Do You Know Blue?” (Dan Meyer) — It’s a bridge from math to computer science. Students get a chance to write algorithms in a language understood by both mathematicians and the computer scientists. It’s analogous to the Netflix Prize for grown-up computer scientists.
Positive Copyright Coalition, Programmable World, Clever Inventors Interviewed, and Weighty Words
- Our Fair Deal — international coalition (EFF, InternetNZ, Demand Progress, Creative Freedom Foundation, many others) raising awareness and petitioning lawmakers to reject copyright proposals that restrict the open Internet, access to knowledge, economic opportunity and our fundamental rights. (via Susan Chalmers)
- Welcome to the Programmable World (Wired) — For the Programmable World to reach its full potential, we need to pass through three stages. The first is simply the act of getting more devices onto the network—more sensors, more processors in everyday objects, more wireless hookups to extract data from the processors that already exist. The second is to make those devices rely on one another, coordinating their actions to carry out simple tasks without any human intervention. The third and final stage, once connected things become ubiquitous, is to understand them as a system to be programmed, a bona fide platform that can run software in much the same manner that a computer or smartphone can. (via Sacha Judd)
- Inventables On The Road (YouTube) — new series where the Inventables folks interview their customers to show awesome projects. We’re trying to demystify the process of digital fabrication, give some visibility to people working on interesting things, and have some fun.
- Psychological Pitfalls and Lessons of a Designer Founder (Aza Raskin) — You are a founder, which means each word you say lands like an anvil. Even in a very small company, and especially in a larger one, it takes fortitude and courage for a team member to honestly critique your work. The courage required isn’t a one-time cost. It’s incurred every single time. By nature of being a founder, you are used to saying things with charisma and force and you will undoubtedly be excited by your solution and argue for it. This just makes it worse. A final note: it doesn’t matter how nice you are, or how close you are to your team. As a founder, your words are always more powerful than you think.
Massive Security Problems, Hardware Locks, Closed Libraries, and Entrepreneurial Chaos in Detroit
- Information Security Breaches 2013 Report (UK Gov) — over 80% of small UK firms reported a breach, and over 90% of large. (via The Register)
- Google Glass Forbids Resales (Wired) — leaving aside the braying naysayers with their “GLASS WILL DESTROY THE SOCIAL FABRIC AND OUR ESSENTIAL HUMANITY”, there’s a valid point about software being used to control what users do with their devices. Given that this run of Glass is limited edition and they’ve hand-picked to whom they go and for what reason, Ed from Philadelphia is both greedy and naive if he believes Google’s letting him buy a pair to resell on eBay.
- Locked Stacks — As the British Library makes a glacially paced transition from being an analog behemoth to being a digitized one, an opportunity arises to lower the institution’s ivory tower-like walls and to create extensive access to its impressive catalog. The only problems, of course, are a lack of money and the currently insurmountable problem of UK copyright law.
- Young Community Entrepreneurs Rebuilding Detroit (Fast Company) — from information-sharing real estate ventures to transportation startups and doomsday clocks to see how close the city is to bankruptcy, it’s a crazy world out there. Should be easy for them: Detroit comes pre-disrupted.
Engagement Cliff, SSL Best Practices, Public Domain Numbers, and GitHub License Sniffing
- The Engagement Cliff — Gallup surveyed nearly 500,000 students in grades five through 12 from more than 1,700 public schools in 37 states in 2012 and found that by the time students get to high school only about 4 in 10 qualify as engaged.
- SSL/TLS Deployment Best Practices — clear and concise instructions to help overworked administrators and programmers spend the minimum time possible to obtain a secure site or web application. In pursue of clarity, we sacrifice completeness, foregoing certain advanced topics. The focus is on advice that is practical and easy to understand.
- Do Bad Things Happen When Works Enter The Public Domain? — research to answer that question. Spoiler: no. (via Surprisingly Free)
- Most GitHub Projects Not Open-Source Licensed (The Register) — 1,692,135 code repositories scanned, 219,326 (14.9%) percent had a file in their top-level directories that identified any kind of license at all. Of those, 28 per cent only announced their licenses in a README file, as opposed to recommended filenames such as LICENSE or COPYING. MIT license overwhelmingly popular compared to the different reciprocal (GPL-like) ones.
Aereo's backward architecture could be the thing that keeps it in business.
At first glance, it would seem the service has to violate copyright. Aereo is grabbing TV content without paying for it and then passing it along to Aereo’s paying subscribers.
So how is Aereo pulling it off? Over at Ars Technica, Timothy B. Lee deconstructs the service’s blend of tech and legal precedent:
Aereo’s technology was designed from the ground up to take advantage of a landmark 2008 ruling holding that a “remote” DVR product offered by Cablevision was consistent with copyright law. Key to that ruling was Cablevision’s decision to create a separate copy of recorded TV programs for each user. While creating thousands of redundant copies makes little sense from a technical perspective, it turned out to be crucial from a legal point of view …
… When a user wants to view or record a television program, Aereo assigns him an antenna exclusively for his own use. And like Cablevision, when 1,000 users record the same program, Aereo creates 1,000 redundant copies. [Links included in original text; emphasis added.]
Creating lots of copies of the exact same content is inefficient. No one can argue that point. But if you can get past the absurdity, you have to admit Aereo’s architecture is quite clever. Take thousands of tiny antennas, combine them with abundant storage, and now you’ve got a disruptive service that might survive the onslaught of litigation.
Note: Aereo’s recent win only applies to a request for a preliminary injunction. Further court proceedings are likely, and you can bet there will be a long and winding appeals process.
- Digital Music Consumption on the Internet: Evidence from Clickstream Data (Scribd) — The goal of this paper is to analyze the behavior of digital music consumers on the Internet. Using clickstream data on a panel of more than 16,000 European consumers, we estimate the effects of illegal downloading and legal streaming on the legal purchases of digital music. Our results suggest that Internet users do not view illegal downloading as a substitute to legal digital music. Although positive and signiﬁcant, our estimated elasticities are essentially zero: a 10% increase in clicks on illegal downloading websites leads to a 0.2% increase in clicks on legal purchases websites. Online music streaming services are found to have a somewhat larger (but still small) effect on the purchases of digital sound recordings, suggesting complementarities between these two modes of music consumption. According to our results, a 10% increase in clicks on legal streaming websites lead to up to a 0.7% increase in clicks on legal digital purchases websites. We ﬁnd important cross country difference in these eﬀects. A paper from the EU commission’s in-house science service. (via Don Christie)
- Six Degrees of Francis Bacon — data-driven research into “the early-modern social network”. (via Jonathan Gray)
- Internet Census 2012 — scanning the net via botnet. Appalling how many unsecured devices are directly connected to the net. Also appalling how underused the address space is.
On Anonymous, Information Rights, RSS Readers, and CDN Sec
- Our Weirdness is Free (Gabriella Coleman) — Often lacking an overarching strategy, Anonymous operates tactically, along the lines proposed by the French Jesuit thinker Michel de Certeau. “Because it does not have a place, a tactic depends on time—it is always on the watch for opportunities that must be seized ‘on the wing,’” he writes in The Practice of Everyday Life (1980). “Whatever it wins, it does not keep. It must constantly manipulate events in order to turn them into ‘opportunities.’ The weak must continually turn to their own ends forces alien to them.” (via Jonas Kubilius)
- Information Rights and Copy Rights (YouTube) — Justice David Harvey’s keynote at Australian Digital Alliance forum, proposing balance of rights. (via Alastair Thompson)
- NewsBlur (GitHub) — one of the many trending repos in the wake of the announcement of Google Reader’s case of terminal lack of relevance to Google+. See also Tiny Tiny RSS, FastLadder, and a million repos empty but for “TODO” files listing the almighty RSS reading features yet to be added to the empty file. Also found: this obsessive guide to Reader’s history.
- The Pentester’s Guide to Akamai (PDF) — This paper summarizes the findings from NCC’s research into Akamai while providing advice to
companies wish to gain the maximum security when leveraging their solutions.