About this Author
Dana Blankenhorn has been a business journalist for over 25 years and has covered the online world professionally since 1985. He founded the "Interactive Age Daily" for CMP Media, and has written for the Chicago Tribune, Advertising Age, and dozens of other publications over the years.
About this Site
Moores Law defines the history of technology. It held that the number of circuits etched on a given piece of silicon could double every 18 months as far as its author, Intel co-founder Gordon Moore, could see. Moores Law has spawned constant revolutions since then, not just in computing but in communications, in science, in a host of areas. Moores Law applies to radios, and to optical fiber, but there are some areas where it doesnt apply. In this blog well take a daily look at new implications of Moores Law in real time, as it rolls forward to create our future.
February 22, 2006
Generally, political issues involving the Internet are handled by elites.
Voters don't understand things like the "Brand X" decision, or the ICANN mess. All they care about is that the resource is there when they want it, at some price they can afford.
The practical result for the last decade is that a handful of large corporations have determined Internet policy. This is no longer working, because many of those corporations are engaged in a greed-fest aimed at making temporary advantages (often gained through government lobbying) into permanent taxes on Internet users.
The first hint we got that people were starting to pay attention was a few weeks ago, after BellSouth and AT&T said they should be able to charge those with data available, who were paying ISP charges, for access to "their" customers, who were also paying ISP charges. They wanted to hold you hostage, because your customer relationship to them made you "theirs." They actually said those things.
That fight is far from over, and the latest news should tell every Internet user why they need to get involved in the political side of the resource.. After paying a lot of lip service to the idea of network neutrality, a House subcommittee has passed a bill that says nothing about it, and in so doing endorses the Bells' position.
The ironic thing here is that, on Internet issues, activists on the left and right are in wholehearted agreement, as are activists in the center. The only "people" on the other side are giant corporations, which should not be people at all. It's the corporate control of America's government which makes this kind of nonsense possible, and everyone involved in online politics, no matter their views on the issues (or each other) needs to be up in arms about this.
Unfortunately, it turns out this is not what they're up in arms about.
+ TrackBacks (0) | Category: Digital Divide | Economics | Futurism | Internet | Politics | law | personal
Google's Image Search service is illegal.
U.S. District Judge Harold Matz of Los Angeles delivered this stunner in a suit originally filed by a porn firm, Perfect 10.
At issue is the Google Image Search caching and delivery of "thumbnail" images, which is the only way to tell someone what an image hit consists of. Perfect 10 not only sells its images to Web sites, but sells smaller "thumbnails" of those images to people with mobile phones, and those thumbnails, by themselves, represent product it wants money for.
Last March Agence France-Presse also filed suit against Google, claiming its delivery of thumbnails as well as portions of its news stories violated its copyright.
+ TrackBacks (0) | Category: Copyright | Internet | Telecommunications | e-commerce | law | online advertising
February 15, 2006
During Mao's Cultural Revolution, show trials were used to cover-up the evils of the regime. Innocent parties were brought in, tried without justice, then either killed or sent to "re-education" camps.
The U.S. House held its own version of such a trial today, only without the education.
Nominally, the hearings were held to investigate the censorship of the Internet in China, with the connivance of U.S. search companies like Microsoft, Yahoo and Google.
But the hearing was chaired by Rep. Christopher Smith, (right) who has never questioned the Bush Administration’s use of the same firms for the same purposes. To see Smith perform in this role is just like watching Libya heading the UN Human Rights Commission. To hear him fulminating against China on CNBC, as I had to do last night, with absolutely no rebuttal, is to feel like I am indeed living in Mao's China.
Here we have an Administration that claims the absolute right to spy on all its citizens, to record their phone calls and search their Internet files, to imprison American citizens without trial – merely on the assertion they’re an “enemy combatant” – to torture and murder hundreds at secret detention centers all in the name of an amorphous “war” it claims might last generations.
And a chief supporter of that policy is attacking Google on human rights?
Oh, I hear you say, but you’re writing this, and I’m reading this. How can be this be Maoist?
Maybe we’re just not that efficient. Yet.
+ TrackBacks (0) | Category: Copyright | Digital Divide | Futurism | History | Internet | Journalism | Politics | blogging | ethics | law | personal | war
February 14, 2006
Yahoo tried to draw some favorable press coverage today.
(That's actress Charlize Theron, but she's very small, hard to recognize. That's deliberate, as you'll see.)
In the wake of a scandal over the fact its Chinese affiliate cooperated with authorities to silence dissidents, the story Americans were told by Yahoo today was that it will do everything it can to fight Web censorship.
That’s not the way the story was carried in China. An American correspondent to Dave Farber’s list wrote:
“In my Beijing hotel room this morning CNN aired a piece about Yahoo calling for search engines to cooperate to deal with China's ‘search engine rules.’”
As the TV correspondent was about to say the word censorship, this writer added, the sound went blank, so it might have appeared to Chinese that Yahoo was, in fact, continuing to cooperate with its government. The Farber correspondent used asterisks in writing the word censorship, in order, he said, to get it past possible Chinese censorship. It got through.
The use of asterisks, of inference, of badda-boom badda-bing, in discussing subjects like freedom in China is widespread. It’s titillating – as sex was in America under the Hays Office. The level of sex in America didn’t decline under the code, but many Americans who were alive then say it was enjoyed more than it is in today’s era of free Web porn.
Could this be true for freedom as well? Chinese people share the government’s fear of anarchy. Americans, fortunately, have not faced the prospect in centuries, and this generation firmly shied away from it in the 1960s. We still prefer Nixon to Woodstock.
Should the Chinese be any different? Must they be?
+ TrackBacks (0) | Category: Business Strategy | Copyright | Futurism | History | Internet | Journalism | Politics | Security | blogging | ethics | faith | law | personal
February 05, 2006
AOL and Yahoo have begun offering corporations "preferential delivery" of their marketing e-mails to users for prices ranging from .25-1 cent per message.
The scam is being run by Goodmail Systems, whose home page advertises "if it's certified, it's safe." (The illustration, from the Goodmail Web site, is an animated .gif of the company's "partners.")
The claim is that this is "opt-in" only and "not spam." But the incoming lists aren't audited. This is, in fact, a pay-off to let "spam that is not spam" through the company's spam filters.
Here's the real Clue to what is going on, from the New York Times piece found on the International Herald Tribune:
The two companies also stand to earn millions of dollars a year from the system if it is widely adopted.
Get it? They want to charge protection to spammers.
For outfits which have been part of the Internet for a decade and more, Yahoo and AOL don't know much about the Internet, do they?
I run a mailing list which may be subject to the charges, and I can tell you right away it's no sale. No operator of a free e-mail newsletter service is going to pay protection on what is legal opt-in traffic.
Who will? Marketers .
+ TrackBacks (0) | Category: Business Strategy | Internet | e-commerce | ethics | law | online advertising | spam
February 02, 2006
Verisign CEO Stratton Sclavos is a big investor in incumbency. And he gets value for money.
OpenSecrets.Org reports that he gave $84,000 in political contributions during the 2004 cycle, and has (with his wife) given another $24,700 in 2005. The Verisign PAC, meanwhile, has spent another $36,200 this cycle, in hard money contributions.
That’s not all. The same Web site reports Verisign put out $124,000 in “soft money” contributions during 2002, and $88,600 in the 2000 cycle. While some of the money (about 15%) goes to Democratic incumbents, the vast majority goes to Republicans.
That's just the money I found searching OpenSecrets under Verisign and Sclavos. It doesn't count other money that may have been sent from Verisign executives, or their families, or third parties under Verisign's direction.
What does Verisign get for this money? It gets the full legal authority to rob the Internet, to take you, for everything it can grab.
And it's grabbing with both hands.
+ TrackBacks (0) | Category: Business Models | Business Strategy | Internet | Journalism | Politics | e-commerce | ethics | law | online advertising | personal
February 01, 2006
Change is the one business constant. Those who embrace it succeed, those who resist it fail.
But change also dislocates.
Workers threatened by change organize unions and seek protection from government. The Luddite movement was a call by workers to smash the new textile mills that threatened their jobs.
Business calls against change are heeded more often, because they may speak the language of change and back it up with cash. In autocratic societies the cash is called a bribe. In a democracy it’s called a campaign contribution.
History proves that in every case, the public interest governments must follow is to embrace change. This is tough when the threatened industries have enormous political power.
Yet America has done this for 200 years.
- 19th Century Whigs embraced change as “public works,” ports, canals, and (later) railroads and telegraph companies that needed scarce capital.
- Turn of the Century Progressives embraced change as antitrust, worker protection and (perhaps most important) the income tax, which replaced the tariff as the funder of government and made America the world’s business leader.
- Mid-century Europeans forged free trade agreements, starting with Iron and Steel, evolving into the European Community. America embraced this movement through the WTO and such treaties as NAFTA.
Cars replaced railroads, oil replaced coal, suburbs replaced cities, and as the American blackboard was erased, rewritten and erased again, incumbents were allowed to wither away.
Today Google is the face of corporate change. Google has become a corporate stand-in for the changes the Internet makes necessary. Thus the incumbents have their knives out for it:
- Telephone companies threatened by the Internet’s end-to-end principle, in which services are defined at the edge, want government to give them power to define services within their networks that everyone – including Google – will be forced to pay for.
- TV and movie studios threatened by the fact that video can be passed as bits have demanded, and gotten, the power to halt distribution of bits they own.
- Newspapers threatened by the Internet’s power to organize everything and make it available through links want government to make Google (and then the rest of us) pay for “linking rights.”
These forces are made more powerful by the fact that networks, studios, and reporters have no new business models to replace what’s lost as Google and its followers (Level 3, Craigslist, eBay, Amazon) march forward.
+ TrackBacks (0) | Category: Business Strategy | Copyright | Digital Divide | Economics | Futurism | History | Internet | Investment | Politics | Telecommunications | e-commerce | law
January 31, 2006
Info-Tech has a release out that says they analyzed the HIPAA law and found it useless. (The image is from the blog of David Hoffman.)
HIPAA stands for Health Insurance Portability and Accountability Act. It was signed by President Clinton in 1996, when he was trying to triangulate the new Republican majority in Congress with the idea of regulation, but managed by the private sector.
”HIPAA is a toothless tiger,” says Info-Tech analyst Ross Armstrong. “The first problem is that HIPAA is complaint driven, and complaint-driven enforcement doesn’t work. The second problem is that in the one HIPAA-related conviction that has occurred, only the individual was charged, not the organization itself."
“If HIPAA is to be truly protective and useful, healthcare entities and their executives must be held accountable in the same way that Sarbanes-Oxley holds CEOs and CFOs responsible.”
I'll go Armstrong one better. HIPAA is worse-than-useless.
HIPAA isn't entirely to blame for this, but it has driven the bulk of the medical profession into a very expensive case of Luddism. That's because HIPAA:
- Theoretically makes hospitals and insurance companies liable for mistakes; and
- Lets small practices out of this problem by refusing to computerize.
Mistakes in records and their release can happen. They do quite often. By accident. Not on purpose. But because there are automatic penalties (if someone complains) two things happen. The handling of all patient information becomes heavily bureaucratized, and patients are given legal gobbledygook aimed solely at keeping them from pursuing their rights if they arre violated.
It's the small practice exemption that really bites, however.
+ TrackBacks (0) | Category: Business Models | Economics | Internet | Politics | law | medicine
January 30, 2006
A few years ago some wags talked about people having a "right" to Internet service, and they got laughed at.
Let's try it another way.
America's economic future requires every citizen have access to Internet resources, and full freedom to use them.
Everyone needs Internet access, and literacy, to be part of the modern world.
FAST Internet access. Just as it's stupid to tell someone an 8086 machine is equivalent to a modern computer, so it is sheer ignorance to claim the availability of dial-up means everyone has Internet access. It's got to be fast enough so all modern applications run.
In a recent essay Visicalc co-founder Bob Frankston compares the Internet to roads. In a recent piece here at Mooreslore , I offered something similar. What if the railroads had a veto over road development, I asked, even after the car became popular?
But this dramatically underestimates what we're talking about.
The Internet is becoming a universal database, a universal discussion, almost a hive mind for humanity in the 21st century. If you don't have access you can't contribute. And you can't benefit, either.
This is the Century of the Mind. We've already seen business gravitate to those cities with the best connectivity, with the best chances for minds to connect. That's what Silicon Valley is about. That's what Boston is about, what New York is about, what Atlanta and Austin and Washington are about. Connections.
But with the Internet it's not just cities which are judged on their connectivity. It's nations.
And we're falling behind. Already, just in the last few years, we've fallen to 19th in broadband penetration. We're about to be passed by Slovenia, for God's sakes! Slovenia! Slovenia was, in the 1990s, part of Yugoslavia, a country which destroyed itself in civil war. Now Slovenia is passing us in the access its citizens have to the Essential Resource of our Time.
Why is this? Simple.
We've allowed Internet service to be monopolized by two sets of companies - Bell companies and cable operators - who are paying for obsolete infrastructure, who are forcing us to pay for that infrastructure before they deliver more, and who think only in terms of billing for specific services, not selling bits.
The Internet is just bits. Video bits, sound bits, e-mail bits, Web bits, text bits. The meaning of the bits are defined at the edge, on the computers that exchange them. All producers are consumers, all consumers can be producers. But the gatekeepers won't accept that. They see the Internet as services - TV, phone, e-mail - billable events which they define and they control.
And so, with Internet connectivity held hostage to these so-called "service providers," your ability to be part of the future atrophies, disappears, dot by dot, bit by bit. So does America's competitiveness.
Frankston calls the process through which this has happened the Regulatorium. He's talking about a network of political connections, state and federal agencies, think tanks and Bell-sponsored "consumer groups" who push the Bell-Cable duopoly more effectively than Jack Abramoff's K Street Project dreamed of.
Here, he says, is what we need instead. Some simple statements:
- Connectivity is fundamental. The Internet is not a service. The Regulatorium doesn't have the language for this. Giving it the language is the leverage point.
- Speed is useless if you can't communicate. It's easy to speed up the network - what we need is pervasive connectivity. This means that wireless connectivity - be it Wi-Fi or other protocols is our basic right.
- Rather than giving carriers the ability to define our services, connectivity must be infrastructure like roads and power lines and "just be there". We can then create services and solutions.
This is light years from the way the world works today. But we have to get there.
I've written a lot about these issues here, tangentially. Moore's Law drives the world, not just as it relates to chips but as it relates to telecomm technology too. Moore's Law of Fiber shows that optical fiber capacity can grow exponentially, just by changing out hardware. Moore's Law of Radios shows we can have the same capacity increases using the air that we have with fiber.
All the laws and rules we have in place for telecommunications are based on the idea of scarcity. Capital to build networks is scarce, so only a few big companies can play. The frequency spectrum is a scarce good government must distribute.
I don't know of a better way to say this, so I'll just say it.
+ TrackBacks (0) | Category: Business Models | Business Strategy | Digital Divide | Economics | Futurism | History | Internet | Investment | Politics | Telecommunications | law
Google has to obey the law.
Doesn’t matter if the law is oppressive, as in China. If Google wants to do business in China, it must obey the law.
Google can fight stupid laws, as in the EU Google can argue in court against some laws, as it’s doing in the U.S.
But Google must, in the end, obey the law.
I’m sick and tired of sanctimonious claptrap from people who state, baldly, that Google’s stated intent to “do no evil” means it must defy the law. Google is a public company. Google can’t do that. No public company can.
You can complain all you want about Google’s actions within the law. People do. They complain about its cookies, about its tracking usage patterns. They complain about its habit of leaving projects out to dry if they don’t work, about how some projects aren’t worth the spin that’s placed on them. They complain about its lack of lobbying prowess, or how little it has spent lobbying.
But Google has to obey the law.
+ TrackBacks (0) | Category: Business Strategy | Economics | Internet | Politics | e-commerce | ethics | law | marketing | online advertising
January 25, 2006
Everyone hates spam. But there has been no political constituency potent enough to fight the well-organized Direct Marketing Association, which has successfully defended spammers from meaningful regulation for a decade.
Now Matthew Prince, a young Chicago lawyer, thinks he has the answer. Porn. Well, anti-porn.
Using the Christian Right as his political base Prince’s company, Unspam Inc., has gotten laws passed in Utah and Michigan that could both make him rich and make most e-mail disappear. While fighting for the law in a Utah court, he has taken his show on the road to Georgia, Illinois, Wisconsin and Minnesota, trying to get identical laws passed there.
The laws create a “do not porn” registry, run by Unspam, that e-mailers must filter their messages through. Anything in an e-mail deemed “harmful to minors,” even in a link, becomes a felony. Not just porn offers, but alcohol, tobacco, gambling, firearms and illegal drugs are covered. Parents on the list get the right to sue for up to $1,000 per message (Utah) or $5,000 per message (Michigan). There are also criminal penalties, including jail time.
Prince spends money through his “base,” using Susan Zahn’s WDC Media (the same folks used by Christian broadcasters) for his PR, and emphasizing the porn angle in his releases. An Unspam press release sent out via Webwire identifies only the porn industry as fighting the new laws.
But the direct mail industry is now energized as well. WindowsSecrets editor Brian Livingston put out an article on Earthweb last year blasting Prince as essentially a patent troll. (The company has filed U.S. patent application 20040148506 to protect its registry, he says.) Prince claims he wins his registry contracts through competitive bids, but if you got the law through and patented the required technology, well, you figure it out. (I should note here that WindowsSecrets is an e-mail newsletter, so Livingston would have to filter his lists through Unspam if the law holds up in court.)
A recent Wall Street Journal story on Unspam estimates compliance costs this way:
Businesses are charged $7 for every 1,000 email addresses examined each month in Michigan, and $5 per 1,000 in Utah. Companies must have their lists examined once a month. A company with a list of 100,000 emails would pay $14,400 annually to have its list examined by both states. Unspam receives the majority of the revenue to administer the registry, and the rest goes to the state.
Livingston disputes the WSJ conclusions. He says monthly screening won’t protect e-mailers, that 85% of the money goes to the state. He then offers two illustrations of how easy it would be for the law to be abused:
- A conservative activist puts her e-mail address, which is also used by her daughter, on a state registry. The listing takes 30 days to become effective. She then e-mails a health clinic for information about morning-after pills. If the clinic replies with the information, the sender is guilty of a felony.
- A liberal activist registers his and his son's e-mail address. After 30 days, he e-mails a gun dealer, asking for product listings. If the dealer replies with details, he's guilty of a felony.
+ TrackBacks (0) | Category: Business Models | Business Strategy | Politics | Telecommunications | e-commerce | law | marketing | online advertising | spam
January 24, 2006
In his latest diatribe against a la carte cable pricing Capitalist Tool Adam Thierer of the "Progress and Freedom Foundation" claims that arguments by his opponents in this debate represent "a curious theory of conservatism."
I couldn't let that go by without a comment.
- It's a curious theory of conservatism that ignores the 20th century Progressive movement and approves of duopolies from the age of the Robber Barons.
- It's a curious theory of conservatism that rejects the idea of free consumer choice and tells them corporations know what's best for them.
Conservatism, in fact, has gotten curiouser and curiouser over the last few years, especially as regards tech policy.
I didn't know conservatism was about supporting only those with the most money, or that government policy should be for sale to the highest bidder. I thought conservatives believed in less government, not more, and less intrusive government by free men, not more intrusive government by Supermen with ears that hear everything, eyes that see everything, and no need to tell the people anything. I certainly don't remember Barry Goldwater writing even once on behalf of monopoly or the police state. In fact, I distinctly remember Goldwater, in his 1964 acceptance speech, castigating as liberal the idea that government should hide facts about wars from the American people. "Enough of it has gone by," he said.
+ TrackBacks (0) | Category: Digital Divide | Economics | Futurism | History | Politics | ethics | law | personal
California spammer Jeanson James Ancheta, who turns out to be a 20-year old kid, has pled guilty to computer misuse and fraud charges which should draw him a four-year sentence.
Ancheta is the first to be convicted of creating a "botnet," a network of infected computers hired-out to spammers and other malware authors.
Now for the big question. We've established that bots are bad. We've established that the people who create this poison deserve prison.
Now what about those who enable the crime? What about the people who bought spam generated by these botnets, or who bought ads sent by that malware? This was an economic crime, after all. It can't exist without both sides of the transaction.
We don't just want to throw the pot producers in jail, the Pedro Escobars and their ilk. Isn't the point of our law enforcement to get at the "street dealers" and "users," those whose dollars enable the crime? I've seen tons and tons and tons of ads along those lines, produced by the federal government, over the last decade and more. The propaganda is accepted. We all agree.
So why not here?
Why isn't it a crime to buy the services of a spammer, or to buy the services of a botnet? Why isn't it a crime to advertise through someone's stolen bandwidth, using their stolen PC?
Spam and malware would be a lot easier to stop if those who paid for it faced hard time, too. And I don't want to hear any garbage about "distribution channels." Don't give me that nonsense that you can't police your distribution channels. Of course you can.
Or you, too, should be going to jail.
+ TrackBacks (0) | Category: e-commerce | ethics | law | online advertising | spam
January 23, 2006
Something occurred to me when reading of how the Justice Department wants a week of Google search records, ostensibly to enforce the failed law against Internet pornography, but with authority under the Patriot Act.
This is getting someone’s rocks off.
We all know that, for many people, fear is part of their sex drive. Whether it’s fear of discovery or the ability to instill fear in others, it’s real. And both these fantasies are threatened in an open sexual environment. It’s like the movie Monsters Inc. – what are you going to do if the kids can’t be scared anymore? (In the end Sulley, pictured, found he could produce a lot more energy with laughter than with fear. That’s an important lesson.)
This aspect of sexuality is, on the whole, far less healthy than an appetite for seeing naked bodies, private parts, even things going into things. Fear can be harnessed in sexual play of many kinds, but its abuse is more physically dangerous than, say, voyeurism is. Abusive voyeurism is a Peeping Tom. Abusive fear junkies become sadists, rapists and murderers.
But it’s obvious, from the history of the last few decades, that many of those advocating the elimination of porn have sexual kinks themselves. For some it’s mere repression, but for others it’s a form of sadism. Keeping others down gets them off.
And this sadism, under the guise of moral certitude, is driving much of our sexual law enforcement. Make it dirty, make it forbidden, make it sordid, make it hidden. Then, in the dark, where no one can see, the sadist can do whatever he wants.
+ TrackBacks (0) | Category: Copyright | History | Internet | Politics | law | personal
January 18, 2006
Video is NOT the future of the Web. (This picture, by the way, comes from a fine student project at the University of North Carolina on Webcasting rights. Go Tar Heels.)
It’s part of the future, no doubt. It’s even part of the present.
But the assumptions that Internet traffic is growing mainly in response to video, that Internet-capable networks must give video 99% of their capacity, or that Internet Law must be changed to accommodate video are fictions.
The Video Fictions are relics of the pre-Internet age. They’re wrong for three reasons:
- Video is passive -- When you’re watching a video you’re watching, you’re not interacting. The Internet is all about interaction. It’s about ideas. It’s about interruptibility. It’s about cutting your attention into as many pieces as you can, multi-tasking in order to do more. Video takes all your attention, and demand for it is limited by audience attention.
- Video is expensive -- A quality blog item, like this one, can be created by one person in a few hours. A quality video takes the work of many people over many days, and bad video takes just as much time to make as good video. You can’t have both good video and interactive video. Good video just takes too long to make.
- Video has plenty of channels – Most of your cable bill is taken up by worthless nonsense already. There isn’t enough quality programming to fill the DirecTv and Dish Network satellites. Broadcasting has worked for almost 90 years. All these deliver more programming at far less cost than the Internet ever could. The Internet, as a video medium, is best served for tiny niches, with low demand, and it already does this.
The assumption that “the future of the Internet is video” is driving just about all the stupidity we see among big companies and policymakers today.
There are video applications which have value on the Internet, but they don’t need the bandwidth or Quality of Service (QoS) up-sells of true video. Videoconferences are of value (sometimes) and video VOIP calls can be of value (to long-separated family members). But the idea that we need the Internet to watch the same TV that comes to us via satellite and cable is nonsense.
There are also some applications that can use QoS standards, and payments. Interactive games can use QoS, especially when players are going against one another in real time. Medical applications can use QoS, although those applications that really need it should be done in clinics or hospitals with ample bandwidth, not the home.
Meanwhile, there is an enormous, and growing bandwidth shortage in the average Internet home. I face it every day. Why?
+ TrackBacks (0) | Category: Always On | Business Strategy | Consumer Electronics | Digital Divide | Economics | Futurism | Internet | Politics | Telecommunications | computer interfaces | law
January 11, 2006
The Media PC ain't gonna happen. The "walled gardens" of the cell companies are going to come down. The telcos' plans in cable are non-starters.
All these huge corporations are subject to the Content Chimera, the idea that networks are pipes for selling content to people, and that it will all "converge" somewhere.
This is nonsense:
- TV standards are moving toward those of movies. None of the "Media PC" offerings at CES took HDTV into account.
- Networks are not pipes for selling content to people. They are two-way bit pipes. The future is
synchronoussymmetrical, not asynchronousassymmetrical.
- It's not all going to "converge" in any particular place. We will seek to consumer entertainment where we are, with whatever attention we can give. But we also create, we communicate, we interact. Different levels of attention require different types of devices.
The Content Chimera goes nowhere. It's the technology version of the Oil Chimera that now drives America's relations with the world. The solutions in both cases are remarkably similar.
The "choke point" for the content market is NOT in production, or distribution, or marketing. It's in each one of us. It's in the time we have to consume, and the attention we can give to creation. Creation of content, by its nature, involves the consumption of older content, and the laws must reflect this, or they're economically non-productive. (Energy creation and consumption must similarly become a two-way street, all of us creating what we can from the Sun or wind or heat around us, and the current grid evolving into something remarkably like the Internet. But that's anoither show.)
So what happens now?
+ TrackBacks (0) | Category: Business Models | Consumer Electronics | Copyright | Economics | Futurism | Internet | Politics | blogging | computer interfaces | law
January 10, 2006
Too bad it's not my government.
The Korean government has jawboned an agreement from that nation's mobile operators to get rid of the walled gardens and make mobile Internet service, well, Internet service.
Mike over at TechDirt picked up this story yesterday and noted that Helio, formerly SK Earthlink, could use the lesson to pick up some market share here. He's right.
But the example shows just how far away we are from rational government policy in the U.S., and how easy it would be to make radical improvements with just minor changes to that policy.
If the Bush Administration would put its foot down and DEMAND network neutrality, the Bells would quickly shut up about violating the policy.
If FCC chairman Kevin Martin were to go to the March CTIA convention and say, for instance, that walled gardens are wrong, and that the industry would be wise to do away with them, it would have a major impact. Especially if he were willing to back up his soft words with a big stick.
+ TrackBacks (0) | Category: Internet | Politics | Telecommunications | cellular | computer interfaces | law | marketing
January 09, 2006
If Congress thought Netizens were angry before, now we're furious.
Declan McCullagh revealed today that buried inside some must-pass legislation from last year is a provision from Sen. Arlen Spector, chairman of the Senate Judiciary Committee, that bans all anonymous Internet speech that "annoys."
Annoys? Excuse me? You may not know this, Arlen, but the Federalist Papers were extremely annoying. So were the anti-federalist papers. (You may not have known such existed, but they did.) All of this debate, which is at the heart of our system (and which predates the Bill of Rights, not coincidentally) was conducted anonymously. The Founders rightfully feared legal harassment from the several states for their annoying speech, and kept their names to themselves as they debated the questions publicly. One thing to emerge from all this, of course, was a promise to cofify specific rights of the people, of which Freedom of Speech would come in the First Amendment.
Since then we've had ample precedent and rhetoric upholding the principle that annoying speech, even anonymous annoying speech, is OK. (The legal problem emerges when you get into deliberate falsehoods, into libel or slander, not annoyance.) Among the most recent such defenses is one from Mr. Justice Thomas, in McIntyre vs. Ohio Election Comm., 1995.
+ TrackBacks (0) | Category: Digital Divide | History | Internet | Journalism | Politics | law | personal
January 04, 2006
The AP had a headline yestoday that Luddites and the RIAA will love. "File-Sharing Barons Face Day of Reckoning."
The story is that old file-sharing sites are closing up shop. The RIAA beat them.
But what really beat these shops was technology.
Systems like BitTorrent don't depend on a central site. Its legitimate uses -- for distributing software, and for breaking international censorship regimes -- are compelling. Many copyright holders, like GE, have found that releasing videos (like CC-Chronicles of Narnia) directly to sites like YouTube is good for business. MySpace (and its imitators) are giving music lovers what they really wanted, community. A host of companies are now working to make file sales online a legitimate business, and some, like Apple, are succeeding.
This is what users wanted. They wanted access to files, they wanted the copyright industries to come to them. Gradually, grudgingly, the industry is obeying the market. But the market won't sit around and wait forever. That's why music sales are declining. (That and things like Sony's Rootkit fiasco, which causes people to distrust all CDs and DVDs they see.)
+ TrackBacks (0) | Category: Business Strategy | Consumer Electronics | Copyright | Economics | Internet | ethics | law
December 29, 2005
There has been some talk on the left calling for the impeachment of President Bush.
That talk should end now.
No competent legal authority has the facts justifying any charge. The Congress is the only such authority, and Congress has not investigated. If Democrats want Congress to investigate they have their whole 2006 campaign.
We'll look into it.
It's all that need be said. When Democrat X stands up to Republican Y, that's all they say. Say, we'll look into it. Does anyone seriously think the present Congress has looked into charges against this President, or that a Republican Congress will? No such promise by any Republican candidate in 2006 has any credibility. So forget everything else this campaign. Just say we'll look into it.
Then, when you're elected, do.
Look into it. Use Congress' power under the Constitution to conduct oversight and investigate all charges against this President and his Administration. Run through the list and look into it.
What will they find? I don't know. Neither do you. Could be simple, honest political disagreements regarding the powers of the President in wartme.
Could be a lot worse.
But Dana, you say, now we're into 2008,. and all we've got is this investigation. Maybe it was stonewalled. Maybe there was no cooperation.
Maybe. Maybe not. But again, the answer is simple. If investigations by a legally constituted Congress can't be made, or if it is found the charges being made today have a basis, then it's clear our system is incompetent to provide justice.
Given the hyper-partisanship that would surround even the words I've written up until now, it is very likely that the American System will prove incapable of finding justice in the case of the People vs. George W. Bush.
So the issue for 2008 (in this theoretical) becomes, what to do?
The answer, transfer it to a competent legal authority. Promise to pass and sign whatever treaties are necessary in order to pass on jurisdiction. Let impartial judges rule. Funding the case should not be a problem.
And if those judges should rule that George W. Bush and all his henchmen have a case to answer for, so be it. Should they find him innocent of all charges, so be it. Should their investigation show there is no case to answer, so be it.
Just look into it and find competent authority to take a case, if there's one to make. Shut up about things you cannot do, or things that wouldn't do any good if you could do them.
And then, at the end of the day, after all sides have been heard, if an international court rules it just...
+ TrackBacks (0) | Category: Journalism | Politics | law | personal | war
December 27, 2005
George Soros (left) has emerged as one of the primary boogeymen of the Right Wing. Not only do the Warbloggers invoke his name in order to justify their continuing to wear Vast Leftwing Conspiracy tinfoil hats, but so do corporate conservatives, who resent his interference in their feeding at the Republican trough, and the scare he helped put into them during 2004.
But in fact Soros has been quiet since Kerry lost. Very quiet. Too quiet. On the whole he's gone back to doing what he did before, make money arbitraging currencies and commodities. This is a noble profession that dates back to the days of George Peabody. (Maybe you heard of the man Peabody left in charge of his enterprises. Junius Morgan. No? How about Junius' son, the one he named for the preacher, J.P.? Getting warmer?)
Anyway, George may be looking for a good, cheap way to turn America into a new, more profitable direction, and here's one right here. Fund TeleTruth.
+ TrackBacks (0) | Category: Business Strategy | Digital Divide | Internet | Investment | Journalism | Politics | Telecommunications | law
December 21, 2005
The patent case concerning the RIM Blackberry has taken a twist that could have come out of the TV show Law & Order. You know, those shows where the fights are over which of two adults killed the mistress and it turns out to be one of the kids?
Anyway, Derek at TechDirt reported yesterday that, just as patent claimant NTP was about to turn off Blackberry service in order to enforce its rights, those patents are about to be tossed by the Patent Office.
The USPTO is worried that NTP is winning the court case based on what they now know to be bad patents, but patents which they mistakenly granted. Not only is this massively unfair to RIM, but the credibility of the entire intellectual property system in the US is in jeopardy.
The case points to a need for reform in the patent system, major reform. But that should not start with changing how we apply for patents, or who should win them. It should start with higher fees for patents, which could perhaps be paid out of future revenues, and an immense expansion of the Patent Office's ability to investigate such things as prior art, originality, and editing the patent to cover only the new stuff -- no more broad claims.
Think it will happen?
+ TrackBacks (0) | Category: Consumer Electronics | Economics | Investment | Politics | Science | law
December 19, 2005
This is an easy call to make.
When you’re terrorized, the terrorists have won. And Americans remain terrorized.
When a democracy is spying on its own people, when it claims the right to do this with impunity, when it’s attacking the right of college students to research history, when it claims the power of the executive is absolute, when it is engaging in torture, you can bet that democracy is terrorized.
When the supporters of a government call the other side “traitor” and mean it they’re scared. That’s the goal of terrorism, to scare you, to force you to become the evil they see in you, to make you unhinged.
Americans today are unhinged.
This has been a natural over-reaction in America since its foundation. We acted like Communists in the name of stopping Communism, engaged in ethnic cleansing in the name of stopping Fascism, we forced people into the Army at the point of a gun to fight slavery. We even, in the earliest years of the Republic, copied the worst excesses of the British system because we hated them so much.
It’s called projection. We copy our enemies thinking they are better, that they might have a point, that they might be right. We punish ourselves, we engage in proxy wars, we burn down the villages in order to save them.
When it’s over we always apologize, and the world always seems to forgive us. But the world never really trusts America. The world does not believe in American Exceptionalism, except as it refers to our exceptional military, with its exceptional soldiers, who will do the impossible or die trying. At this point, only Americans believe American rhetoric anymore, and as the terrorism continues those numbers keep dwinding.
Power corrupts, and absolute power corrupts absolutely. It’s true for politicians. But it’s also true for nations. Corruption isn’t just driven by greed. It’s also a product of fear, and when fear becomes paranoia the corruption does indeed become absolute.
Nations suffer under corruption, regardless of its cause. They lose power. Their economies lose steam. Their people lose faith. Their armies become occupiers, and are treated as such.
In 1946 James Cagney starred in a movie called 13_rue_madeleine, as an OSS agent behind enemy lines in France. What he’s engaged in, primarily, is terrorism – blowing up bridges, harassing the enemy. He wants them to send people behind the lines and worry about him so there will be fewer troops at the front lines.
He is, in other words, a terrorist. And America has always engaged in terrorism as a technique of war. Jimmy Doolittle's raid on Tokyo in 1942 had no military value. It was terrorism, an attack on civilians. And it was glorious.
You can’t really beat terrorism once it’s in your heart. You can only beat it within your heart.
+ TrackBacks (0) | Category: Futurism | History | Journalism | Politics | blogging | law | personal | war
December 16, 2005
This week's issue of A-Clue.Com is my annual Year in Review essay.
You're invited to join the A-Clue.Com community by clicking this link. Always free.
There are many forms of depression.
There's the economic kind.
There's the personal kind.
There's also the political kind. It's this last America is suffering from right now. Left and right are reacting to one another with anger and hatred, while the rest shake their heads and mutter curses on both.
When this era is over, and we're able to get all the facts on it, we may conclude that George W. Bush and his minions were truly alien to the American culture. We may find that he stole both his elections (and others), that he corrupted our entire system -- economic, tax, spending, judicial, media - that he worked systematically all his life to destroy America and replace it with his own warped Theocratic Fascism.
That view will be wrong.
+ TrackBacks (0) | Category: Consulting | Economics | History | Journalism | Politics | ethics | law | personal | war
December 12, 2005
Let's review the results of Wikipedia-gate:
- The perpetrator was found in less than a week.
- The item in question has been changed.
- The change has gotten a lot more publicity than the original mistake -- try getting that out of a daily newspaper.
- The person who falsified the record has lost his job.
The result: someone is trying to use lawsuits to get the site shut down. (Their registration data tells us nothing about who they are.)
So what's the problem?
The problem, Andrew Orlowski of The Register thinks, (that's him to the right) is that Wikipedia dares call itself an encyclopedia. You see, that's -pedia at the end of the word. (That's the only source for the claim I can find.)
But the front of the word is wiki. The origin is supposedly Hawaiian for "quick," but the word itself dates from 1995 -- it is wholly a product of the Web. It means "a collaborative Web site set up to allow user editing and adding of content." (By the way, Andrew, there is no Dictionary.com definition of pedia.)
Is there any claim to great authority or accuracy in that word? No. No more than what the people involved might have both together and separately.
And that's the real problem here.
Not everyone is good. Not all the time.
Sometimes people are nasty. Sometimes people lie. And sometimes (gasp) a wiki can be polluted by this. As can a newspaper.
+ TrackBacks (1) | Category: Digital Divide | Internet | Journalism | ethics | law
December 09, 2005
In this week's issue of A-Clue.Com we take a new look at Moore's Law, the process that stimulated The Blankenhorn Effect: How to Make Moore's Law Work for You. I come to some new conclusions, about this and other things.
You're invited to join the A-Clue.Com community by clicking this link. Always free.
We live in an analog world.
Moons cycle around planets cycling around Suns cycling around the black holes of galactic cores.
Electromagnetic waves cycle in frequencies ranging from visible color and sound through invisible radio frequencies reaching toward infinite speeds.
We live our lives in cycles, from youth and strength to decay and death. Yet DNA assures that death is always replaced by birth. Evolution continues, species cycling through.
Our digital age masks this, in our time, by delivering binary on-off, yes-no choices. Most analysts think the Intel microprocessor is the most vital part of our era, but that's wrong. The most vital part is the Texas Instruments Digital Signal Processor (DSP), which let us model the analog world much as calculus lets us model curves into algebraic forms.
Since the 1980s DSPs have worked their magic in real time, compounding the impact of Moore's Law, giving it depth and dimension in the analog realm. Perhaps the biggest mistake I made in my book "The Blankenhorn Effect" (other than the title) was not naming this Kilby's Law, after TI's Jack Kilby.
Now that we can model and even accelerate analog change through Moore's and Kilby's Laws, it's time to take the blinders off the way we've thought of change and the future.
+ TrackBacks (0) | Category: Business Strategy | Economics | Futurism | History | Journalism | Moore's Lore | Politics | law | personal
December 05, 2005
The International Telecommunications Union has released a full report on what I've been calling The World of Always On, which they call The Internet of Things.
The report correctly identifies the biggest problem, user acceptance:
Concerns over privacy and data protection are widespread, particularly as sensors and smart tags can track a user’s movements, habits and preferences on a perpetual basis. Fears related to nanotechnology range from bio medical hazards to robotic control.
None of these are unreasonable fears. Addressing them requires acceptance of some very new, and important societal values:
- Personal control of personal data
These must be enforceable to have meaning. The technology and tools for all this have been around for years now, but the business has not gone anywhere because no country on the face of the Earth has yet accepted the fact that it must give up absolute rights to its citizens' data before people can trust the technology enough to use it.
+ TrackBacks (0) | Category: 802.11 | Always On | Futurism | Moore's Lore | Politics | Security | Semiconductors | Software | Telecommunications | cellular | law | personal
December 02, 2005
The folks at ABI Research have an interesting report examining how application developers might create Always-On applications using cellular.
It's not good.
The "problem" is that an Always-On data appilcation (say a heart monitor which phones the doctor when there are potential problems) won't use the network very often. (ABI calls these applications M2M, for "machine to machine.") As a "user" a heart monitor is a $10/month account (maybe). The distribution channels used for cellular, which depend on people, can't deal with that kind of account. (I'd always thought you piggybacked on your individual account, but never mind...)
The direct route is for the carrier to create a gateway, as Orange has in the UK. The problem with that is the carrier is only going to deal with large-scale developers. They might sign a deal with an ADT (for security) or a Honeywell (for home management), but not with a small, local guy -- too much trouble. The indirect route is to have someone else run a gateway equivalent, allowing the creation of a Movile Virtual Network Operator (MVNO) to handle data services. The trouble with that is that the operator gets cut out of some of the revenue, which they find unacceptable.
The result is nothing. There are no big application developers because there are no small scale successes. And there aren't any small scale successes because the carriers won't do business with them directly.
+ TrackBacks (1) | Category: Always On | Business Models | Futurism | Investment | Telecommunications | law
December 01, 2005
BellSouth has joined AT&T's call to end "network neutrality" and let it charge rents for sites' access to customers.
BellSouth CTO William Smith said he only wanted to charge some sites for "better" access, but he used the exact same rationale as AT&T head Ed Whitacre, that BellSouth's investment in lines justifies its killing the basic principle behind the Internet. .
A House subcommittee has begun auctioning off the end of network neutrality as it considers new broadband legislation. The Bells have all the money in the world, and can win this fight with a corrupt Congress unless you act now.
If you have an AT&T or BellSouth DSL line, you need to seek out an alternative and send those companies a letter saying you will switch unless they back off. A marketplace response to a marketplace threat is the correct alternative here.
+ TrackBacks (2) | Category: Internet | Telecommunications | law
November 24, 2005
I don't know, frankly, whether President Bush sought to bomb Qatar in order to destroy al-Jazeerah TV.
But the way this story has been reported, and not reported, makes me question just how freedom-loving the U.S. and Britain really are.
Let me summarize that:
- The story has been virtually ignored by the U.S. press. It has been left to political blogs to carry it forward.
- The British government is prosecuting those who leaked the story under its Official Secrets Act, and the BBC has given it no coverage, making it appear to be a government propaganda organ.
Clearly there is circumstantial evidence for the charge. The agency's offices in Afghanistan and Baghdad were bombed. Both times the U.S. claimed it was an accident. The U.S.-backed government in Baghdad later kicked Al-jazeerah out of the country. The U.S. said Iraq was acting on its own.
But the direct evidence of a 2004 memo on the subject of bombing Al-Jazeerah's main office in Doha, Qatar, if it's real, shows George W. Bush to be nothing more than Saddam Hussein in a business suit. Add the use of white phosphorous (it's a chemical weapon), the horrors of Abu Ghraib, the Cheney fight to maintain torture as an option, and impartial observers will draw their own conclusion.
The point is, simply, that this was an important story.
+ TrackBacks (0) | Category: History | Internet | Journalism | Politics | blogging | ethics | law | war
November 18, 2005
The year 2006 is shaping up to be a bad political year for incumbents, a good one for challengers of all sorts.
It may be the best opportunity ever to end the Copyright Wars and gain political neutrality (at least) for issues like unlicensed spectrum (WiFi) and open source.
Challengers may have Karl Rove's K Street Project to thank for this chance. As soon as Bush took office, Rove began pressing lobbyists to end their even-handed treatment of the parties and put all their eggs in the Republican basket. The result is most corporate lobbies are locked-in to supporting GOP incumbents, which until now let them write their own tickets.
But in a democracy political winds shift. Democrats are not interested in doing lobbyists any favors, even with the wind at their backs.
And Democratic challengers may be downright antagonistic, especially if they come to office as so-called "netroots" candidates. That's because one of the main policy differences between Washington and the netroots involves technology policy, such issues as copyright, network neutrality, and competition for broadband.
But that's not all.
+ TrackBacks (0) | Category: Copyright | Digital Divide | Futurism | Internet | Politics | blogging | law
November 15, 2005
Sony says it's (sort of) sorry. They say they'll take the CDs back (although they don't say how they will find the things). They say they won't do that again, exactly, but might do something close to it.
Wired estimates the "rootkit" (a virus kernel) distributed without notice by Sony's BMG Music now affects a half-million networks. Microsoft says it will have its security software disable the virus.
Not enough. Because by this action Sony has done more to encourage the piracy of intellectual property than a million real pirates could have. Sony has also poisoned its entire sales channel, and for years to come. How many small used CD stores are going to go out of business over this?
A CD is not like most products. CDs have an active after-market. Since you can't tell which CDs have the virus, all CDs are suspect. So Sony hasn't just ruined its own business, but the businesses of its competitors. It has destroyed their goodwill, and made the entire industry out to be a bunch of crooks who don't care about their customers. (And by the way, why haven't we heard from the RIAA on this issue?)
This is not an honorable company right now. Sony's honored ancestor and great founder, Akio Morita, is spinning in his grave over this.
At the very minimum Sony CEO Howard Stringer MUST BE FIRED. NOW. If he's not then some district attorney somewhere is going to come up with a piracy charge that will throw top executives in jail. And deservedly so. If anyone else had mass produced a virus precursor and infected CDs with it, they would be in jail. Just because Sony claims a clean motive doesn't change the facts of the case.
Unless Stringer is fired, and restitution is paid, this scandal is going to destroy the company. They're still behind the curve, and they will remain behind it until they make a clean break with the policies that got them into trouble in the first place.
+ TrackBacks (0) | Category: Consumer Electronics | Copyright | ethics | law | marketing
John Robb, at his Global Guerillas site, today has one of his most fascinating posts yet, a comparison between terrorism networks and phishing networks.
He starts with an analysis of the phishing business from Chris Abad of Cloudmark, which found that its vertical integration is very loose. Instead it consists of specialists in various horizontal skills -- mass e-mail, templates, chat rooms, fences - which individual gangs then put together. Then he notes this is just the way the IED market is run in Iraq.
The result is intense competition at each stage of the supply chain, and incredibly low prices for phishers and terrorists. A terrorist can get an IED to blow up an American convoy for just $50.
The bazaar for such transactions is the key. It's virtual.
+ TrackBacks (1) | Category: Digital Divide | Internet | Politics | Security | law | spam | war
November 12, 2005
There are two salient points about the Sony scandal you will only read at Mooreslore. (Or at least you'll read them here first.)
The first point you've already gotten. Who's behind the scandal? It's not a Japanese.
It's a U.S.-based executive, Howard Stringer. He became chairman and CEO in March, after heading up the company's film and TV units. (He was pictured in my previous note on this topic.) Before joining Sony Stringer was at another American company, CBS.
Stringer is the key to the motive. Go back to that first link again.
As manager of the U.S. Operations, Stringer cut back a total of $700 million a year since 2001, and overhauled the studio operation by cutting TV producer deals and sharing costs on films.
Stringer reached his position of eminence by cutting budgets and cutting deals. Previous Sony chairmen were Japanese gadget heads. Stringer is a card carrying member of the American Copyright Autocracy.
The motive, then, is a simple truth about DRM systems.
DRM systems aren't about software. DRM systems are about hardware.
+ TrackBacks (0) | Category: Business Strategy | Consumer Electronics | Copyright | Economics | Software | computer interfaces | law
November 11, 2005
eBay is going down.
The collapse of its stock price may be followed by the collapse of the entire company. Certainly a fire sale is in the offing.
I can say this with some certainty because eBay has bought itself an enormous political problem with Skype, a fight it can't win because of its diminishing goodwill.
+ TrackBacks (0) | Category: Business Strategy | Internet | e-commerce | law
November 08, 2005
Americans idolize democracy. It is, as Winston Churchill observed, the worst political system possible, except for all others.
In a democracy forging a majority gives you power. The system is stable because majorities shift. People change their minds over time and give power to other leaders. Coalitions are flexible.
But democracy is not the only way to run a free system. Consensus is the alternative.
With consensus a mere majority won't create action. Minority groups must agree to accept a solution as well.
The United Nations runs based on consensus. To Americans this explains its general inaction and irrelevance. But the UN actually does a lot of good work. Blue-helmeted UN troops are familiar scenes in world trouble spots, once both sides in a conflict agree to their appearance. UN agencies do a lot of good work in health and global development. It's not "world government" -- far from it -- but it's not irrelevant.
The Internet also runs based on consensus. The "governing entity" -- ICANN -- is nearly powerless. Every country agrees to use the same DNS, the same IP addressing systems (IPv6 is backward-compatible with IPv4), and the same economic model. The "threat" of WSIS is that the consensus may be broken leaving us, in time, with multiple Internets that don't communicate.
Open source is also driven by consensus. You don't have majority rule in an open source project, that's a recipe for a fork. What you have is either a dictatorship, in which one company or developer group exercises control of the whole, or true consensus, in which developers get together (usually online) and agree on priorities, and on how to divvy up the work.
This is at the heart of a great deal of misunderstanding. Some Americans confuse consensus with Communism. Some of that confusion comes from proprietary software FUD, some from a raw ideology that rivals Leninism (in my view). Some is simply honest head-scratching.
Tim O'Reilly has spent much of his career fighting the misunderstanding. He's fighting it today in a BBC interview. He describes it in terms of the evolution of capital, of value moving from hardware (the IBM era) to software (the Microsoft era) to services (the Google era).
What really separates open source from proprietary models, however, lies in how it harnesses altruism. "I believe that the human motive to share is very powerful," O'Reilly told the BBC's Bill Thompson. "The human motive to profit is also very powerful and I think that the profit motive and the sharing motive are not exclusive." The idea that they are is the FUD O'Reilly fights every day.
The battles over open source, and the lessons from that battle, are now spilling into the common political sphere.
+ TrackBacks (0) | Category: Digital Divide | Futurism | History | Journalism | Politics | law | war
November 07, 2005
The failure of the Online Freedom of Speech Act has provoked intense anger in Left Blogistan (pictured), directed mainly at its own representatives in Congress, and those interest groups supporting "government reform."
It's easily dismissed as a left-wing copy of the right's anger over the Miers nomination, except that while Bush eventually pulled Miers and gave the right what it wanted, liberal bloggers are not going to get what they want, which is an exemption from the demands of the McCain-Feingold Act.
The rage is especially acute against the Pew Charitable Trusts, which worked with other liberal foundations to pass campaign reform and then beat back the Online Freedom of Speech Act. For the first time, liberal bloggers are comparing Pew with the right-wing Scaife, Olin and Heritage Foundations, and not in a good way either.
Regulations for the Internet under McCain-Feingold have not yet been finailized, and while the left rages, let me offer another view..
+ TrackBacks (0) | Category: Consulting | Digital Divide | Internet | Journalism | Politics | blogging | law
November 04, 2005
Guy Kewney reports that Westchester County in New York is seeking to force all "public" WiFi hotspots to register in the name of security.
The intent is to force those who operate hotspots in coffehouses, etc. to install firewalls. But security is available through just about any router you can name. And what do they mean by firewall? Do they mean preventing any ports from activating other than those the authorities want? No, not now, but it easily could come to that.
The basic rationale leading to the claimed requirement, Kewney writes, is entirely bogus. Apparently someone went "wardriving" and found a bunch of "open" hotspots. Well, just because something is open doesn't mean you can just walk-in (although sometimes it does mean that). My new $80 NetGear wireless router doesn't have a firewall, but it does require the use of a password for access, and thus is "security enabled,." Does that meet the law's requirements?
+ TrackBacks (1) | Category: 802.11 | Security | law
November 02, 2005
Worldcom was a classic “roll-up” which hid the truth behind accounting tricks, clever lies meant to create the appearance of profits where there were none.
Now TeleTruth charges SBC with doing the same thing (PDF warning on that link), except this time the lies were told to government regulators across the nation.
Writes analyst Bruce Kushnick, “It cut the fiber optic deployments in 13 states, California, Texas, SNET Ohio, Illinois, Michigan, Wisconsin, etc. and in all all of the states, the companies got billions extra in higher phone rates, higher USF (Universal Service Fees), tax breaks, etc. And they all promised fiber to the home, 45mps, 500+ hannels. And when SBC merged, every fiber optic service was cancelled.” (Boldface is mine.)
Is this actionable? Were any of these promises made in contracts, or under oath? Is there a state attorney general willing to take this on as a case of fraud? And if they do, what can they turn up in discovery?
+ TrackBacks (0) | Category: Digital Divide | Economics | Internet | Journalism | Telecommunications | law
November 01, 2005
Some recent posts at Techdirt have me thinking of some basic questions, about the pace of change and the continuing battle between cops and robbers.
In successive entries, we have dismissal of new anti-crime ideas from the banking industry, copyright cops taking on tricks of online robbers, and the same industry trying to push DRM technology onto analog devices. (I know, the order should be reversed, because the last item was written first, and the first last, but what can you do?)
In many ways robbers have natural advantages over cops in technology crime. Cops have to stop everything. Robbers only have to succeed once. But that's misleading, because once a robber is caught they're "in the system" -- you only have to be caught a few times to have your life ruined.
Robbers can also use many open source advantages, sharing tips freely while cops obsess over secrecy, engaging in innovation while cops have to maintain standards.
These are some of the concepts John Robb deals with in his Global Guerillas blog. How popular must an uprising become before it becomes impossible to take down? Put in terms of more ordinary crime, how many must oppose a law before it becomes virtually unenforceable?
What cops, and civilization, fear more than anything else is that the answer to that question drops as technological sophistication rises. They see civilization as digital, either existing or not existing.
This is the great false assumption of our time. It's false in two ways.
First, technology does increase the need for consensus, rather than narrow majorities, in order to hold society together, because the percentage of "objectors" needed to threaten society does go down as technological sophistication increases. This is not a bad thing. In fact, consensus is far more stable than democracy. Consensus is what keeps the Internet together.
Second, civilization is analog, not digital. The alternative to the absolute triumph of law and order is not chaos. We're talking about a much more complex structure. A certain amount of chaos must be acceptable in order for progress to continue. Shrinkage is natural. We work to balance shrinkage with costs in all our enforcement efforts. It's the only rational way to go.
+ TrackBacks (0) | Category: Copyright | Digital Divide | Futurism | Internet | Moore's Lore | Politics | Security | law | war
October 30, 2005
Since its passage the CAN-SPAM act has done more to enable spam than any other act by anyone. It legalized specific forms of spam, it overturned stiffer state laws, and it has gone unenforced.
The primary enforcement of this "law" has come from private parties. Microsoft, which urged the act's passage, has been the most aggressive. And they're making one more attempt to make it work, suing 13 spam gangs that use malware to turn ordinary PCs into "spam zombies."
The lawsuits should make clear a dirty little secret of the spam wars. It's homegrown. Much of the spam supposedly coming from Korea, Russia or China is actually being bounced off servers there to mask its origins.
The likelihood of this being effective in stopping spam is nil. I also disagree on the need for new laws. Instead of going after spammers, go after the people who pay for spam to be sent.
A lot of spam represents fraudulent offers and those who make those offers should be prosecuted. Shaming corporations into policing their distribution channels and re-sellers would get rid of another hunk. Illegal offes should be prosecuted under fraud statutes. Attorney General Gonzalez might enjoy prosecuting porn spammers under obscenity statutes.
Shaming can work. There is little political spam for that very reason. Candidates and causes who spam lose support. When this happens to corporations, they will take the appropriate action.
+ TrackBacks (0) | Category: Internet | law | spam
October 21, 2005
When Craig Newmark sold 25% of his Craigslist to eBay last year, there was some skepticism. "This is a mistake. eBay bad and robotic, Craig's List human and good. And now on the way to selling out."
Well, that writer need not have worried. Craigslist can be robotic, too.
Before, and since, eBay bought an early executive's stake in his company, Newmark has been busy trying to control what the Internet says you can't control -- links.
Techdirt has a summary of the latest. Just as eBay blocked out people who tried to link its auctions with those of other companies, Craigslist has forbidden aggregation, even searches across multiple Craigslist sites.
Had Craigslist not sold its stake to eBay it might be difficult for it to get away with this. But lawyers are wonderfully useful creatures, able to stop even obviously-legal things, like linking into the site, by firing papers and money over the bow.
The queston isn't, is this right. (It's not.) The question is, is this helpful to Craigslist?
The simple fact is that, in the short term, it's not, but in the long term, it may be.
+ TrackBacks (0) | Category: Business Models | Business Strategy | Copyright | Internet | e-commerce | law
I have been reluctant to dive into the Google Print controversy because all the rhetoric is phony.
The rhetoric is about principles, fair use vs. copyright.
The reality is this is about money, about monetizing something that had no previous value and the obligation that places on the person doing the monetizing.
The plain fact is that everything Google has done, and everything Yahoo did before it, is based on monetizing fair use. The concept of fair use arose based on the idea it had no economic meaning, that it represented a necessary intermediate step on the way to meaning (and money).
But now we find, 10 years after the Web was spun, that fair use has enormous economic value. Through the magic of databasing, finding is now more valuable than having.
What then is the obligation of those who extracted this value to the holders of the data providing the raw material? The legal question has been answered, there is none. If publishers can stop Google from offering books online without payment, they can stop Google from linking to books without payment, because Google is only going to offer extracts that represent fair use free. It's the physical equivalent of the "deep linking" proposition we dealt with in the 1990s. If a book isn't read because it can't be located it makes no sound.
The moral question is something different entirely. If Google extracts a profit from Google Print, I think it does have a moral obligation to spend some of that money on activities that benefit writers and other content creators.
+ TrackBacks (1) | Category: Copyright | Internet | e-commerce | ethics | law | online advertising
October 03, 2005
The big news in the recording industry's results today are not the growth of digital sales, or the continued fall in CD sales.
It is that the industry has become addicted to lawyers in order to maintain its business model. And those lawyers will bleed the industry dry long before pirates can.
Here is the money quote from John Kennedy (no relation), who chairs the International Federation of the Phonographic Industries (IFPI):
"Without the legal crackdown, it would be a different situation. You certainly have to have the legal services to make it all work."
In other words the industry assumes that without the terror of lawyers its current success would be unsustainable.
Which is precisely why it is unsustainable.
+ TrackBacks (0) | Category: Consumer Electronics | Copyright | Economics | law | marketing
October 02, 2005
I'm about to go off on the Bush Administration again, but at least this time it's on a subject near to this blog's stated purpose.
Some days I think George W. Bush was imposed on us by our enemies. If there were a Manchurian Candidate, he is doing that candidate's bidding.
Our brave armies have been destroyed in Iraq. Our budget has gone from surplus to unrecoverable deficit, and our currency is heading south. The Gulf Coast lies in ruins while a system of kleptocracy that would make Vladimir Putin blush rules in Washington.
And now the Internet's gone.
What follows is from Milton Mueller of Internet Governance:
+ TrackBacks (0) | Category: Digital Divide | Futurism | Internet | Politics | Telecommunications | law | personal | war
September 30, 2005
The Internet War we've warned about here for years has begun, but in a most unexpected way.
While most attention was being placed on the UN and ITU, which were making noises about seizing control of Internet resources, perhaps by building their own DNS root servers, a private U.S. company just went up and did it.
The company is Neustar, and they have created a root DNS server for their .gprs domain, which will serve the mobile phone industry. (Warning -- that link above is to a PDF file.)
NOTE: As reader Jesse Kopelman has correctly noted, this action was taken on behalf of the GSM Association, a trade group of mobile operators based in London. Here's their press release. Essentially, the GSM Association has created its own private Internet. And no one has done anything about it.
Tne Neustar move is a direct challenge to ICANN, which previously approved a domain for mobile phone services called .mobi. But carriers may prefer the Neustar "solution," as it might enable them to control what users have access to on "their" Internet, and to shakedown information providers wishing to be accessed. A private Internet with private gatekeepers. Is this what the government meant when it said it preferred private control to government?
Meanwhile, the U.S. government (a Mack Sennett production) was attacking EU proposals to even consider obsoleting ICANN. "Some countries want that. We think that's unacceptable," said Ambassador David Gross, the US coordinator for international communications and information policy at the State Department.
+ TrackBacks (0) | Category: Digital Divide | Economics | Internet | Politics | Telecommunications | cellular | law | war
September 26, 2005
The movement of network boundaries ties together all the trends of the present time.
By the network boundary I mean the point where your client, which you control, ends and a network which is beyond your control begins.
Crossing the network boundary requires more than a cost-benefit analysis. It also requires a trust-benefit analysis. You have to trust the network, and the network owner, before you make the jump. (The illustration of the word Trust is from Professor Myoung Lee of the University of Missouri.)
So trust is a vital asset to any company seeking to lure people across the boundary. This is why Google's credibility is so vital, and why CEO Eric Schmidt has to go, because he doesn't understand that and his actions threaten Google's credibility.
The frontier in computing today is the placing of personal data and applications on the other side of the network boundary. GMail represents both data and applications. That's what makes it an important product.
But there are many other appications that could be handled on the other side of the network boundary. All the things we consider desktop applications could be handled on the other side of that boundary. Trust,. or the lack of it, is what keeps those assets on our side of the boundary.
We have known for years there are many benefits in placing our data and applications on the network side of the boundary. Our clients can become simpler, for one thing. Our costs can be reduced, for another thing. Our stuff is more accessible, especially if we build access to it into all our clients.
But there are risks to doing this, trust risks. Government could get into our stuff if it's on the other side of hte boundary. So could private actors -- bosses, competitors, hackers. And then there's the question of how fast and reliable the network connection is, which now separates us from our stuff and our applications.
This is why the U.S. technology lead is threatened by politics today. Our lack of trust in the government keeps us from moving our stuff and our appilications across. And the government's asinine policy on networks -- private unregulated duopolies of cable and phone giants -- means the cost benefits of moving these things across is lower for Americans than for people in other countries, in Asia and Europe.
The speed of networks determines our technical ability to cross the network boundary.
But that's just one of many questions.
+ TrackBacks (0) | Category: Always On | Business Models | Consulting | Copyright | Digital Divide | Economics | Futurism | Internet | Telecommunications | ethics | law
September 19, 2005
The winds of change are blowing hurricane-force in Washington. Every politician in town knows it. So the natural inclination is to push the envelope as far as possible, knowing that it will be pulled back fairly quickly.
This is as true regarding the Internet as anywhere else. The Bell-cable duopoly hangs by a thread. Wireless ISPs have Moore's Law on their side. The incumbents need something very strong to counter.
This is precisely what they're going for with a bill in the House that would raise entry barriers to the sky and prevent independent ISPs from ever gaining a market toehold. (That's the chairman of the committee proposing the legislation, Joe Barton, up above.)
Naturally they call it "pro-competitive," but in the Orwellian Washington of today those with a Clue should never listen to what they say but look at what they do.
The bill is also filled with goodies for broadcasters and TV networks, such as:
+ TrackBacks (0) | Category: Business Strategy | Internet | Politics | Telecommunications | law
September 16, 2005
Here is a surprising story.
Three times more money is lost to identity theft where the thieves just make up an identity than when they use someone else's.
Gartner Group figures $50 billion is lost from such "victimless fraud" every year, against $15 billion from identity theft.
The problem is U.S. banks don't check identities closely. Crooks can get a pay-as-you-go mobile phone with no credit check, open up a bank account in the name of that "person," pay bills on that account for a while, then use the account to get credit cards.
Banks in Europe share identity information and aren't subject to the same fraud to the same degree. Gartner said.
+ TrackBacks (0) | Category: Politics | law
August 27, 2005
+ TrackBacks (0) | Category: Digital Divide | Internet | Politics | law | war
Thanks to Moore's Second Law (complexity causes costs to scale exponentially) competition in the semiconductor business is held in an ever-thickening mud, which represents the cost of building new capacity.
The number of company-owned fabrication plants, or fabs, must decline over time, as their cost rises above even corporate affordability. The decision to build one must be taken with increasing care, with an eye toward a far-off future. It's the opposite of what happens in the product cycle, at the other end of the factory floor, where things are constantly accelerating.
While Intel has played its hand in Asia, AMD has chosen Europe, specifically the former East Germany. More specifically Dresden, firebombed during World War II, left for dead during the Cold War.
In 2003 AMD broke ground for its second Dresden Fab, AMD 36. The plant goes into volume production next year, at a point where AMD's designs seem to be excelling those of Intel.
Market share, in other words, could make a big swing next year.
At the very same time, AMD is advancing in court, forcing Intel to defend an already-fading monopoly. A few years ago Intel had knocked AMD practically out of the ballpark. With the Dresden Fab 36 that won't be true, but AMD figures Intel must still have a case to answer for, because its hyper-competitive marketing department never changed tactics.
Evidence will likely show that Intel did have a near-monopoly under Craig Barrett, and that it did abuse its position in its dealing with big customers. But a court finding for AMD would still be a mistake.
+ TrackBacks (0) | Category: Business Strategy | Investment | Moore's Lore | Semiconductors | law
August 16, 2005
Cindy Sheehan has been able to demonstrate just how naked the Emperor is, and thus demonstrate the lie of Empire.
No one else could, because everyone else was afraid. Howard Dean said "we broke it, we own it." John Kerry supported it and couldn't back away from it.
This is how Democrats felt forced to respond, because they'd been stuck into a political wilderness for a generation by Vietnam. They were afraid to equate Iraq with Vietnam, fearing that political wilderness, and its chains, which bound liberalism and the cause of human rights for a generation.
Well, Cindy Sheehan broke through that fear. She lost her son. It transformed her. (It didn't transform her husband , but everyone's journey is different.)
By putting that transformation in our face, and in the face of George W. Bush, Cindy Sheehan is also making a change in us. Damn the past, damn the present, our kids are dying. Scales fall from the eyes.
There is no way at this point for the Emperor to appear clothed again, and his supporters know it.
That's why they're acting as they are toward Sheehan. It's like the crowd in the story, at first. Of course the Emperor's New Clothes are beautiful. You're just a stupid little boy. You just can't see the big picture.
Stupid. Little. Boy.
Stupid Little Boy, says Cindy Sheehan? Look at him, look at the Little Boy. Look at Casey. You call him Stupid, you call me Stupid?
Maybe we were. We were stupid because we believed in you. And look at what it's gotten us. My son is dead! And this is no fairy tale.
+ TrackBacks (0) | Category: History | Journalism | Politics | Security | law | personal
The Computer Science and Telecommunication Board has released a fairly Clueful report on the Domain Name System that manages the Internet.
Unfortunately the Bush Administration has, on the very day the report came out, moved to undercut its key recommendation.
Here's the key bit:
Before completing the transfer of its stewardship to ICANN (or any other organization), the Department of Commerce should seek ways to protect that organization from undue commercial or governmental pressures and to provide some form of oversight of performance.
The report, in other words, supports ICANN under the U.S. government because it sees this as keeping ICANN independent of government or commercial interests. Moving toward ICANN's independence is desireable, the report says, in order to minimize the perception that the U.S. government is controlling the Internet.
So far, so good.
+ TrackBacks (0) | Category: Digital Divide | Internet | Politics | Telecommunications | law
August 15, 2005
The recent contretemps over Google's Digital Library plan proves that the essential conflict between copyright and connectivity has not been resolved.
I was chilled by this comment from Karl Auerbach, (right, the cartoon featured on his home page) former ICANN governor and certified "good guy" of Internet governance, to Dave Farber's list:
I've become concerned with how search engine companies are making a buck off of web-based works without letting the authors share in the wealth.
I've looked at my web logs and noticed the intense degree to which search engine companies dredge through my writings - which are explicitly marked as copyrighted and published subject to a clearly articulated license.
The search engine companies take my works and from those they create derivative works.
+ TrackBacks (0) | Category: Business Models | Copyright | Digital Divide | Futurism | Internet | ethics | law | personal
August 09, 2005
Like many protective laws, the HIPAA law covering the protection of your medical records comes with a small business exemption.
The exemption works both ways. Small businesses who fund their own plans don't have to comply. Neither do medical providers who don't computerize. As an NFIB alert on the law states, "Health-care providers -- such as doctors, nurses, on-site clinics, etc. -- are exempt from these regulations if they do not transmit electronically, but this exemption applies only to providers, not to group health plans." (Boldface is mine.)
The result of this is that small practices now have a major incentive not to computerize, and not to transmit anything electronically. Thus, they don't.
+ TrackBacks (0) | Category: B2B | Business Strategy | Internet | law | medicine
August 08, 2005
Intel holds the telecommunications balance of power in its hand.
Here's how The Register puts it, with its usual hyperbole:
Intel is throwing its financial, technical and lobbying weight behind the rising tide of municipally run broadband wireless networks, seeing these as a way to stimulate uptake of Wi-Fi and WiMAX and so sell more of its chips and increase its influence over the communications world.
And Intel is not going to back down. As ZDNet notes today, there's money to be made.
+ TrackBacks (0) | Category: 802.11 | Always On | Business Strategy | Internet | Investment | Politics | Telecommunications | law | marketing
August 07, 2005
Coke and Pepsi do not represent competition. It's a shared monopoly, the Drinks Trust.
The same is true for Wal-Mart and Target, Home Depot and Lowe's, and, to cut to the chase, your phone and cable companies.
By endorsing duopoly calling "competition" what is in fact a Trust, new FCC chair Kevin Martin has shown us clearly where the Bushies stand. Those who believe in competitive markets that can compete in the world need to digest this.
And Martin's model for the Internet policy? China.
So, do you want to be an ISP?
There is only one way to do it now. You have to be a WISP. You have to connect WiFi to WiMax, and reach competitive fiber.
Otherwise you're officially dead.
The FCC ruled, over Friday and Saturday, that Bell companies no longer have to wholesale their lines to competitive ISPs. They don't even have to charge competitive prices for backhaul to the Internet. They essentially repealed the 1996 Telecommunications Act.
Those phonr lines that were built with government-controlled monopoly powers over decades? They're now the sole property of four corporate entities. And they can do with this monopoly power whatever they want.
+ TrackBacks (0) | Category: Internet | Politics | Telecommunications | law
August 02, 2005
Today's politics is cultural.
Even economic and foreign policy issues are, in the end, defined in terms of social issues. This creates identification, and coalitions among people who might not otherwise find common ground -- hedonistic Wall Street investment bankers and small town Kansas preachers, for instance.
I am coming to believe the next political divide will be technological. That is, your politics will be defined by your attitude toward technology.
On one side you will find open source technophiles. On the other you will find proprietary technophobes.
It's a process that will take time to work itself out, just as millions of Southern Democrats initially resisted the pull of Nixon. Because there are are divisions within each grand coalition we have today, on this subject.
- On the right you see many people who work in open source, or who worry about their privacy, asking hard questions of security buffs and corporate insiders.
- On the left you see many people who consider themselves cyber-libertarians facing off against Hollywood types and those who create proprietary software.
This latter split gets most of the publicity, because more writers are in the cyber-libertarian school than anywhere else.
Initially, the proprietary, security-oriented side of this new political divide has the initiative. It has the government and, if a poll were taken, it probably has a majority on most issues.
But open source advocates have something more powerful on their side, history. You might call it the Moore's Law Dialectic.
+ TrackBacks (0) | Category: Consulting | Copyright | Digital Divide | Economics | Futurism | Internet | Moore's Lore | Politics | blogging | law | personal
July 31, 2005
As previously noted, I became an un-person last week as the Social Security decided to waste my time over a "mistake" some one made back in 1970. (Image from Mindfully.Org.)
Either my wonderful mother (who still walks among us, to my great joy) failed to check the box indicating I was a citizen on my Social Security application, or some clerk failed to do so when the data was entered because there were separate forms then for citizens and non-citizens.
The clerk who put me through this hell blamed "Homeland Security." But I think he was really responding to the reality of how this number is used.
As I've noted many times before, the Social Security Number is an index term. Everybody has one. Everyone's number is different. By indexing databases based on Social Security Numbers (SSNs), government and businesses alike can make certain there's a one-to-one correspondence between records and people.
Stories like this AP feature don't really address this need, this fact about how data is stored. Without the SSN we'd have to create one. Some companies like Acxiom do just that. Every business and individual in their database has their own unique identifier, created by the company. Which also means that the Acxiom indexing scheme is proprietary. The only way toward a non-proprietary indexing scheme, in other words, is for government to provide one. Which gets us back to the need for an SSN.
+ TrackBacks (0) | Category: Economics | Futurism | Internet | Moore's Lore | Security | law
July 27, 2005
A lot has been written about identity theft, data leaks and how to fix them. A lot has been written about identity technology, and how all of it is bad.
But the bottom line is simpler. Our identification system is broken.
It's no longer a question of this system or some other system. There is no system.
What that means, in real terms, if your own identity hangs by a thread, a very thin thread that can break anywhere, and leave you an un-person.
+ TrackBacks (0) | Category: Digital Divide | Futurism | Journalism | Moore's Lore | blogging | ethics | law
July 20, 2005
I was giving more thought to a recent item, based on Joi Ito's brilliant piece on The Internets, and it occurred to me that the fight for "One Internet" has, in many ways, already been lost.
(The term Balkanize, or Balkanization, is often used in English to refer to this splitting up, which often (as in the 1990s) is accompanied by enormous violence. This picture of the Balkans as they are today is from Theodora.com.)
Think about it. How often do you use a Web site outside your own country? If you're an American, the answer is not very often. This is true for most people.
A lot more follows.
+ TrackBacks (0) | Category: Digital Divide | Futurism | Internet | Telecommunications | law | war
July 16, 2005
That's the title of the most "popular" spam in my inbox right now, and maybe in your inbox as well.
It represents a new form of brazenness by U.S. spammers against the Net, because when you input the phone number in the message into Google you find the same message, as comment spam, attached to a host of different topics.
When you publicize a phone number like that, and get away with it, it's pretty obvious that the authorities are simply not interested in pursuing you. The CAN-SPAM act has gone from sick joke to tissue paper, a dead letter, and the entire Internet is now under attack from American spammers.
So am I.
+ TrackBacks (0) | Category: Internet | Journalism | Politics | law | spam
July 15, 2005
If I had my druthers, every issue of A-Clue.Com would be chock-full of stories concerning e-commerce, Moore's Law, and mobile technology.
But as a human being, I sometimes feel compelled to state what I feel, and whatever happens as a result, happens.
For the first time in my career I've been afraid this week, afraid to write what I feel.
+ TrackBacks (0) | Category: Politics | ethics | law | personal | war
July 13, 2005
E-mail service here may experience some delays as I undergo a personal trial by spam.
In this case it's a Joe Jobber, most likely a spam gang, that has grabbed both my e-mail address and my server's IP address to illegally sell prescription drugs without prescription.
For the last few days I've been firing off myriad alerts to firstname.lastname@example.org, the government's address dedicated to fighting fraudulent spam, with no response.
A domain registrar called Yesnic is apparently cooperating with this spam gang. They're the registrar of record on every Joe Job in this bunch. Most of the registrations, on investigation by me, seem to be made-up, but two carry the actual name, and a legal address, fo someone in Columbia, SC. This criminal should be easy to find if someone is interested.
Meanwhile, we learned today that the most popular anti-spam technique, like the so-called CAN SPAM Act that enables spam in the U.S., is in fact becoming a spammer favorite.
+ TrackBacks (0) | Category: Internet | ethics | law | marketing | medicine | spam
When four bombs went off in London during the G-8 summit my first thought (like yours) was Al Qaeda.
I didn't blog it. I'm glad of that now.
It turns out, according to British police, that the four suicidie bombers here were British citizens, natives. Three from Leeds, one from Luton. True, their parents were Pakistani immigrants, but the people who carried this out were local. The British police, who have done wonderful work on the case so far, are now trying to find out who put them up to this.
Again, let's not pre-judge. This might be an Al Qaeda "sleeper cell." But they could have been working under a British-based Islamic radical. Their targets may not have been Englishmen, but Muslims, since all four bombs went off in areas where many Muslims live.
I don't know. Neither do you. Let the system work.
But the face of this attack is looking less like Osama Bin Laden....
+ TrackBacks (0) | Category: Politics | law | war
July 08, 2005
Americans pay more for less broadband service than citizens of any other industrial country, and our take-up rate for fast Internet service is approaching Third World levels.
The reason? Lack of competition. Phone and cable networks, created under government control, have been made the private monopolies of corporate interests whose lobbyists dominate all capitals against the public interest.
Does new FCC chairman Kevin Martin see any of this? No. Just the opposite, in fact.
The Supreme Court affirmed the FCC's decision to refrain from regulating cable companies' provision of broadband services. This was an important victory for broadband providers and consumers. Cable companies will continue to have incentives to invest in broadband networks without fear of having to provide their rivals access at unfair discounts. The decision also paves the way for the FCC to place telephone companies on equal footing with cable providers. We can now move forward and remove the legacy regulation that reduces telephone companies' incentives to provide broadband.
This is Orwell's FCC. Monopoly is called competition. Martin claims there is intense competition from Wireless ISPs and satellite providers, when in fact those companies are being driven out of the market. The vast majority of consumers and businesses today have just two choices for broadband -- their local phone monopoly and local cable monopoly, who together enjoy a duopoly and monopoly profits that lets them write-down their 30-year property in a world best served by three-year write-offs.
There's more spin after the break.
+ TrackBacks (0) | Category: Digital Divide | Internet | Investment | Telecommunications | law | personal
July 05, 2005
Given the direction of antitrust law recently I was surprised to see the recent suits by AMD and (more recently) Broadcom. They left me scratching my head.
But there is an answer to my quandary.
Antitrust has become a process. It's not a goal, but a weapon in the business war.
The idea that Qualcomm has a monopoly in the mobile phone industry is laughable. It may abuse what position it has, charging chip makers like Broadcom the equivalent of an "intellectual property tax" in areas which use CDMA (and its variants). But GSM is the major world standard. It would be like calling the Apple Macintosh a monopoly.
The Broadcom antitrust suit comes right after it filed a patent suit against Qualcomm, accusing it of violating Broadcom patents regarding delivery of content to mobile phones.
The first shot didn't open up the Qualcomm ship, maybe the second will. All lawyers on deck!
+ TrackBacks (0) | Category: Business Strategy | Consumer Electronics | Economics | Futurism | Moore's Lore | cellular | law
July 01, 2005
Don't like fiction? I understand.
But you still need your summer reading. The season is upon us.
So might I offer you the latest from my new friend J.D. Lasica, Darknet
I've been covering the Copyright Wars for nearly a decade, and wish I had looked up from the day-to-day to try something like this book. Its subtitle is Hollywood's War Against the Digital Generation, and it covers a ton of ground.
If you're not familiar with the digital underground, or what digital editing is capable of, then Lasica's book will be a revelation to you. Even for old hands like me it's good sometimes to get it all down so you can ponder it as a whole.
+ TrackBacks (0) | Category: Consulting | Copyright | Economics | Futurism | Internet | Journalism | e-commerce | law
The U.S. government has announced it will continue to control the DNS root structure, indefinitely.
Is this how the Internet War starts?
Until today the U.S. position was that it wanted to transition control of the root over to ICANN, a private entity, and several extensions were given.
Earlier this year, ICANN hesitated in extending Verisign's control of the .Net registry, following the SiteFinder scandal, where Verisign redirected "page not found" errors to a site it controlled (and sold ads against). Control was finally given, through 2011, but Verisign's ethical attitudes have not changed. As we noted earlier this week, it is Verisign that is behind the Crazy Frog Scandal.
Some felt that ICANN caved under U.S. government pressure. What you have here is assurance that such pressure will continue to be effective, and on behalf of a very corrupt company. If that is not seen as a provocation by the ITU I will be very surprised.
So how can that result in Internet War?
The problem, as former ICANN board member Karl Auerbach noted to Dave Farber's list today, "the only reason that the NTIA root zone is 'authoritative' is because a lot of people adhere to it voluntarily." Security expert Richard Forno (top) noted, to the same list, that "the timing is weird, coming as it does only a short time before the forthcoming meeting of the UN-sponsored World Summit on the Information Society (WSIS)."
I would assert that the timing is not weird at all. The U.S. government has told the U.N. that it can shove any thoughts of international control over the DNS where the sun don't shine. It has, in effect, thrown down a gauntlet and dared the international community to challenge it.
More after the break.
+ TrackBacks (0) | Category: Internet | Politics | law | war
June 30, 2005
I just got my first piece of franked spam.
It came from Rep. Madilyn Musgrave of Colorado. (That's her, from a Congressional Web site.)
I don't know how, but my Mindspring address somehow landed on her Congressional e-mail list. The spam is filled with news of her efforts on behalf of Colorado's Fourth Congressional District, about 2,000 miles from my home in Atlanta.
You know what I can do about this spam? Absolutely nothing. That's because the federal CAN-SPAM Act (wonderful name, since it means you can spam all you want) states that I must opt-out of this spam, by hitting a link inside the letter.
The law she passed says her spam is not spam.
+ TrackBacks (0) | Category: Internet | ethics | law | spam
Politically I think Senator Russ Feingold is one of the Good Guys. So, to be perfectly bipartisan about it, is Senator John McCain. (You know what McCain looks like, so here's Feingold.)
This is especally true regarding campaign finance. Proponents of reform have been pushing uphill with scant success ever since the 1976 decision in Buckley v. Vallejo, which basically said money is speech, and those with more money can out-shout the rest of us.
McCain and Feingold tried to fit that decision inside their eponymous campaign finance act, and while on most counts the Supreme Court ruled they did, that act also covered the Internet, and both men have insisted to this day that's true.
Now that the blogosphere has pushed-back on this, pushed back hard, from both sides of the aisle, the good guys have not been heard from.
+ TrackBacks (0) | Category: Consulting | History | Internet | Politics | blogging | law
June 29, 2005
Cellular operators love to go on about how much better their walled data gardens are than that nasty Internet, because consumers are safer.
Jamster and mBlox created the Crazy Frog phenomenon with a very addictive, and heavily advertised ringtone that topped the British pop charts for five weeks.
But there was a sting in the tail. People (mostly kids, but at least one BBC reporter as well) found they didn't just buy a 3 pound ringtone, but a "premium SMS" service that charged them as much as 3 pounds more for each add Jamster then sent them.
The two companies are being investigated but according to the BBC the maximum penalty could be a mere 100,000 pounds to mBlox, plus loss of its British business license. It's estimated the scam has earned over 10 million pounds so far.
But do you want to know the rest of the story, the bit the Brits don't know (yet)?
+ TrackBacks (0) | Category: Business Strategy | cellular | e-commerce | ethics | law | marketing
June 28, 2005
The Supreme Court has decided that cable networks, created under government franchises, under monopoly conditions, are entirely the property of their corporate owners who don't have to wholesale. (That's the BrandX rocket ship -- they lost the case. What follows is directed to them as much as anyone else.)
Some ISPs bemoaned this bitterly. In the near term it means most of us have two choices for broadband service, the local Bell and the local Cable Head-End, both known for poor service, high prices, and loaded with equipment it will take decades to write off.
Smart folks, however, should be celebrating.
+ TrackBacks (0) | Category: 802.11 | Always On | Business Strategy | Internet | Telecommunications | law
June 27, 2005
By a 9-0 count the Supreme Court has held that Grokster (and its ilk) can be sued.
The decision was written by David Souter (right, in an old picture from Wikipedia), a conservative-turned-liberal appointed by the first President Bush.
Here's the key bit:
"We hold that one who distributes a device with the object of promoting its use to infringe copyright, as shown by the clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties."
I've highlighted the most relevant portion. To me it looks like they wouldn't hold against BitTorrent, but that Grokster's business model, which did sell the service as a way to infringe, crossed a legal line.
As written I find it hard to argue against the language, but I guarantee I'll disagree with the interpretation, especially the spin being placed on this by the copyright industries.
As I see it the decision puts a limit on the "non-infringing uses" language of the Betamax decision, but does not overturn it. Grokster falls because its business model is based on infringement. BitTorrent has no business model, and thus may be exempt.
Trouble is that is an assertion that will be tested in courts that will twist this result just as the DMCA was twisted to reach this decision. Congress was told by the Copyright industries in 1998 that the DMCA would not overturn Betamax, that it would protect fair use, that it would not be extended in that direction and should not be interpreted as going there.
With this decision -- a unanimous decision as opposed to the 6-3 Betamax ruling -- I guarantee you the industry's lawyers will try and turn this into open season on the Internet.
But can they?
+ TrackBacks (0) | Category: Business Models | Copyright | Internet | Politics | law
Former RIAA president Hilary Rosen finally gets it about copyright.
This volume needs to be embraced and managed becasue it cannot be vanquished. And a tone must be set that allows future innovation to stimulate negotiation and not just confrontation.
Her column at the Huffington Post (she apparently chose not to take feedback on it) is filled with honesty about both the tech and copyright industries, honesty she never admitted to (in my memory) while shilling for the RIAA.
But is it possible that this honesty is what finally caused her to leave? (Or did her life, and its imperatives for action, take precedence?)
That would be a shame, because the fact is, as she writes, that the answers here must lie in the market, not the law courts. For every step the copyright industries take in court, technologists take two steps away from them. This will continue until the copyright industries really engage consumers with offerings that are worth what they charge, and which aren't burdened with DRMs that restrict fair use.
+ TrackBacks (0) | Category: Business Models | Consumer Electronics | Copyright | Economics | Internet | e-commerce | law
June 10, 2005
This is a note to the nice people at the Pew Charitable Trusts.
Some of your money has gone astray. Specifically, it has gone to George Washington University for something called the Institute for Politics, Democracy and the Internet, formerly the Democracy Online Project.
GWU put a woman named Carol Darr (right, from the Center for National Policy) in charge of this group, and she has proven to be, well, not to put too fine a point on it, an idiot. Clueless, in the parlance of this blog. To be blunt about it, she is using money given for promoting democracy on the Internet in order to destroy it.
+ TrackBacks (0) | Category: Consulting | Internet | Journalism | Politics | law | marketing | online advertising
June 07, 2005
For my ZDNet blog this morning I interviewed Milton Mueller of the Internet Governance Project asking how the Internet should be governed.
The real problem is that most users, especially most Americans, don't believe it should be governed at all.
But it is governed.
The Internet is governed by the U.S. government, through ICANN, so anything the U.S. wants goes, and everyone else can go scratch. If the U.S. wants to violate the privacy of foreigners it does so. If it wants servers shut down -- even in other countries -- they're shut down. And all the "taxes" earned from site registration goes to those favored by the U.S. security apparatus.
In the 1990s there was a bit of whispering about this. But now those whispers have become a roar, because this government's obsessions with its own security (at the expense of everyone else's) and "intellectual property" (a phrase that does not appear in its Constitution) are becoming too much to bear.
That's why the ITU and the UN are sniffing around the issues involved in taking control of the root DNS away from ICANN. The coup would occur by these groups simply rolling their own, turning them on, and having member states point to them, instead of those offered by ICANN.
At first you wouldn't notice. But very shortly, as ITU and U.S. policies began to diverge there would be two Internets. Americans wouldn't be able to reach ITU pointers not recognized by ICANN roots, and vice versa for everyone else.
In a way it's already happening.
+ TrackBacks (0) | Category: Digital Divide | Futurism | Internet | Telecommunications | law
June 03, 2005
+ TrackBacks (0) | Category: Business Strategy | Economics | law
June 01, 2005
When we count the costs of spam we usually think in terms of bandwidth, the hours spent clearing it out of our systems, and (sometimes) the cost of our anti-spam solution sets.
But there are other, uncounted costs to spam which dwarf those.
One is the loss in productivity we get from being unable to get in touch with people when we need to. On my ZDNet blog for instance I did a piece today on EFF chairman Brad Templeton (right), based on something he'd written on Dave Farber's list.
I e-mailed him as a courtesy. I had no questions. I just wanted to thank him for his wisdom and let him know I would use it.
What I wound up facing was Brad's spam filter, a double opt-in system dubbed Viking. Apparently I didn't respond quickly enough to Viking's commands, because its response to my opting-in again was to send me a second message demanding an opt-in. (All this was done with the laudable goal of proving I'm a man and not a machine.)
The bottom line. We never connected. I had a deadline, and used Brad's words. Perhaps there was no harm done.
But frequently there is harm done in these situations. I've had occasion to accidentally delete someone's note in my Mailwasher system, and then call the person in question asking for a re-send.
What if they're not in on that call? What if they sent something I needed? What if I were disagreeing with Brad in my Open Source post, or he decided after publication I was twisting his words?
The point is this sort of thing happens every day. People can't be reached in the way e-mail promised they would be, due to spam. This raises the cost of doing business for everyone, and the mistakes that result can be catastrophic -- to people, to companies, to relationships.
Now, in honor of the man formerly known as Deep Throat, I'm going to offer yet-another anti-spam solution.
+ TrackBacks (0) | Category: Internet | Journalism | ethics | law | marketing | online advertising | spam
May 26, 2005
When will we get effective political pushback against Hollywood's absolutism on copyright?
I once thought it would happen when people were jailed for linking.
I was wrong.
The filing of criminal charges against the people who ran Elite Torrents, a BitTorrent "tracking site," and the complete take-down of the site, has caused few ripples. Washington remains as absolutist as ever.
Instead, it's technology that retains our confidence. BitTorrent is now becoming trackerless. No trackers, no tracking sites to take down, no track linkers to toss in jail.
But that's not good enough for me. This is like depending on super weapons to defend us in an atomic age. Without peace, soon, between copyright owners and copyright users, the Internet will be effectively destroyed.
It doesn't take much imagination to see Al Qaeda propaganda, or even terrorist plans, being distributed via a Torrent. Especially a trackerless torrent.
From there it is a very quick move to seeing politicians equate file sharing with terrorism, Torrent users with Al Qaeda, and demands for a complete shut-down on any technology that can benefit the enemy.
+ TrackBacks (0) | Category: Copyright | Politics | law | war
May 25, 2005
Are you an American in e-mail contact with your doctor?
I didn't think so. (This fine bronze of a cadeusus, the medical profession's symbol, is by James Nathan Muir, who wants patrons for putting copies on all the world's continents.)
There are two reasons why you're probably not in e-mail touch with any of your physicians:
- Many doctors are afraid to put anything down, in writing, which might come back to bite them. This is often recommended to them by their peers and professions.
- Many doctors use a loophole in the HIPAA statute which makes them exempt from its requirements so long as they don't computerize.
As a result most doctors remain in the Land of Lud. And the cost to their patients is immense. I just spitballed a few:
+ TrackBacks (0) | Category: Consulting | Economics | Internet | law | medicine
May 18, 2005
Some time in the next month the copyright world may (or may not) reel from the Supreme Court's decision in the Grokster case.
The facts on their face are as favorable as the plaintiffs can make them. Grokster is all about making money for itself off the property of others. Its business model is to sell ads, including adware (sometimes a polite word for spyware and malware). It hoses both sides of every transaction. And the software really does little more than a good FTP server (with an automated database) would.
The vast majority of Grokster's use is driven by hoarding. People fear losing access to the music they love (or might love). So they load up, until they have gigs-and-gigs of it they have to haul around. (Thanks to Moore's Law of storage this gets lighter and less expensive over time, but it still has to be kept.)
The hoarding in turn is driven by the industry's threats. Threats of rising prices. Threats of lawsuits. Threats of copy-protected CDs.
The market solution to the facts is already in the pipeline. Many have proposed the idea of taxing people for unlimited access to the industry's wares and in fact schemes like Yahoo's Music Unlimited work just that way. Pay the "tax" (which starts at $5/month but could go up subject to negotiations with the industry) and download all you want. No need to hoard. Stop paying and all your files magically disappear. (The genie is found in Microsoft's DRM.)
More on the jump.
+ TrackBacks (0) | Category: Consumer Electronics | Copyright | Internet | Software | e-commerce | law | online advertising
May 17, 2005
Now that high-tech corporations are being held up (by smaller companies) there's a move afoot to reform the patent system.
Here is a simpler proposal, one in keeping with the intent of the Founders.
+ TrackBacks (0) | Category: Copyright | Economics | Politics | law
May 16, 2005
...no giant leap for wino-kind.
The Supreme Court decision legalizing cross-state wine shipments is limited.
First it applies only to states where delivery of wines to homes is legal in the first place. Georgia is not one of those states. (Although that law is not always enforced -- once I got some Michelob in a press packet.)
"If a state chooses to allow direct shipments of wine, it must do so on even-handed terms," Justice Anthony Kennedy said. If it doesn't you still got tough luck.
Second the case applies only to direct from-the-vineyard sales of U.S. wine. Imported wines aren't included. Importers can't ship to consumers, only vintners can.
But let's make this sporting, shall we?
+ TrackBacks (0) | Category: Internet | e-commerce | fun stuff | law | personal
May 14, 2005
By and large publishers do not share journalism's ethical sense.
Instead they apply business ethics.
While a journalist's ethics, like that of any other claimed profession, may hold them well short of what's illegal, businessmen must go right up to the legal line, even risk crossing it, to stay ahead of the competition. Businessmen who don't think that way are easily crushed by those who do.
In journalism, business ethics often push journalists over lines they should not cross. Robert Novak practices business ethics. The National Enquirer practices business ethics. Those who choose to believe Novak or the Enquirer accept it.
And Fuat Kircaali (right), CEO of Sys-Con Media, has apparently chosen to apply business ethics in the Maureen O'Gara scandal. (He has hinted at this before.)
This weekend this blog was told that Kircaali accepted the resignations of three senior LinuxWorld editors -- James Turner, Dee-Ann LeBlanc, and Steve Suehring, rather than personally release and renounce O'Gara.
UPDATE: "We were unpaid editors but we devoted a lot of time and energy to it," according to Suehring's blog. This makes sense given Kircaali's business model, as we will discuss later on.
Apparently, Kircaali even approved O'Gara's assault on Pamela Jones of Groklaw in advance. Here's what he told Free Software Magazine.
"The language of the story is in the typical style of Ms. OGara, generally entertaining and easy to read, and sometimes it could be regarded as offensive, depending on how you look at it. I decided to publish the article. It was published because it was an accurate news story."
More after the break.
+ TrackBacks (0) | Category: Business Strategy | Internet | Journalism | Linux | e-commerce | ethics | law | marketing | personal
May 13, 2005
Times vs. Sullivan , as anyone who has taken law or journalism knows, holds that public figures have a much higher burden in libel actions than other people. (That's L.B. Sullivan, then police chief of Montgomery, Alabama to the right. From the University of Missouri in Kansas City.)
To win at trial, public figures must show that a story about them showed "a reckless disregard for the truth" or that a lie was deliberate. This makes it very hard for public figures to win libel awards, although to this day some do.
The question comes up because I was chatting via e-mail with Steve Ross, a journalism professor at Columbia, who said Markos Moulitsas had over-reacted to a question on his annual journalism survey. The survey asked how people felt about campaigns "buying" journalists, citing a deal between the Dean campaign and "bloggers" in 2003.
Readers here know I covered that story, that the bloggers weren't bought but hired as consultants, that they didn't act bought, and that their righteous recommendations were then ignored, so Moulitsas to this day fills a role now DNC chair Howard Dean should by rights be filling. But what brought me up short was Steve's statement that Moulitsas, alias Daily Kos, should know better, since he is "a public figure."
A public figure, eh? A blogger a public figure?
Well that's interesting. I assume, then, that Glenn Reynolds is a public figure, and any suit he might file for libel is going to have a very difficult time. (Lucky me.) We can't very well have anonymous public figures and thus the "outing" of Atrios as Duncan Black, a Philadelphia economics teacher (left), last year becomes just a public service.
And if that's true, then, is Pamela Jones, a public figure? Would that mitigate any possibility of a successful legal action against Maureen O'Gara? (I don't know if anything has been filed or might be -- I'm just spitballing here.)
Wait, there's more.
+ TrackBacks (0) | Category: Futurism | Internet | Journalism | blogging | ethics | law | personal
May 04, 2005
I will be in Nashville this weekend, attending the meeting of the Media Bloggers Association. (The image is from a cool Brazilian blog I found, apparently written by a 16-year old.)
Before I could pack, leader Robert Cox sent me a list of new applicants for membership. Given the fact I felt my own journalistic credentials were under a microscope for months, waiting for his yea-or-nay (turned out I was lost in the shuffle) and given my own recent mistakes here, I was loathe to pass on the qualifications of others.
Generally, my opinion in the past was that the market decided who should be a journalist, and who was "just" a blogger. But that may not be right. After all, bloggers can go on-and-on until they exhaust themselves, and much journalism is subsidized by politicians, so that the requirement to lie becomes a lifestyle, and the liars become institutions whose credentials no one can question. Robert Novak is a journalist only because he's paid to play one on TV.
But then came news from Reporters Without Borders that 53 journalists died last year trying to report the news. That's paid journalists, real journalists, reporters, editors and publishers.
+ TrackBacks (0) | Category: Copyright | Internet | Journalism | Politics | blogging | ethics | law
May 02, 2005
The political battle over WiFi shapes up as a classic match between private interests and the commons.
But it is in fact a battle over real estate. (Thus, the balloon, which is the logo of a very innovative real estate brokerage.)
Verizon pulled a bait-and-switch on New York phone booths. It installed 802.11 equipment based on the promise of free WiFi service on adjoining streets, then pulled them all back into its paid network.
Politically this makes no sense. In real estate terms it makes perfect sense.
The challenge to this looks technological, but it's really political. You can see this challenge by simply turning on your WiFi equipped laptop.
+ TrackBacks (0) | Category: 802.11 | Always On | Business Strategy | Internet | Telecommunications | law
April 27, 2005
A few weeks ago we were bombarded with news items claiming spam isn't all that bad, that we don't care about it anymore.
Not everyone has given up the fight. In fact some have escalated it. One such is Andrew Ferguson, a technically-gifted blogger out of Colorado. (That's him, above, from his blog.)
Ferguson is using SkypeOut. He calls the spammer's contact number using SkypeOut and leverages Skype's inherent cost advantage to keep that phone busy, so victims can't get through. No victims, no money to the spammer.
Ferguson can go even further, automating his SkypeOut calling so each call takes just three seconds, barely long enough for the spammer's phone to ring. That line is continually tied-down and Ferguson's SkypeOut charges remain minimal.
+ TrackBacks (0) | Category: ethics | law | spam
April 25, 2005
In politics a committed minority usually wins. (The lobbyist image originally appeared in New York's Gotham Gazzette, but I found it at Italy's e-laser.)
That's because, on most issues, there is no majority view. Most people don't care.
Learning an issue, and becoming committed to it, teaches you the source code of politics.
If your organization is tightly-knit, if your issues are driven by corporate interests, then your politics is closed source. On issues that mainly interest businesses this is determinative. Lobbyists and financial contributions fight and often come to settlements that aren't half bad. Traditionally most issues before regulators, from the EPA and FTC to the FDA and FCC, have been closed-source arguments.
If your organization is loosely knit, and if your issues are driven by personal feeling, then your politics is open source. Open source politics defines social issues, and the numbers involved in turn drive American politics as a whole. Politicians can win with only committed minorities on their side, if those minorities stand united.
What happens when closed source and open source politics collide? It depends on how much real interest those on the open source end can manage.
This collision is now apparent in telecommunications.
+ TrackBacks (0) | Category: 802.11 | Digital Divide | Internet | Politics | Telecommunications | law
April 19, 2005
The key benefit of open source is transparency. (That's a transparent Mozambique garnet, from CLDJewelry in Tucson, Arizona. Transparency doesn't have to be perfect to be beautiful.)
The key benefit is not that the software is free. It's not that you can edit it. It has nothing to do with the obligations of the General Public License. It's inherent in every open source license out there.
The key advantage of open source is you can see the code. You can see how it works. You can take it apart. You can fix it. You can improve it. Most people do none of these things, but all benefit from this transparency.
The benefit became clear when I got responses to a ZDNet post called Is Linux Becoming Windows? The news hook was a Peter Galli story about how some folks were getting upset over the feature bloat now taking place in the Linux 2.6 kernel.
Those who responded said simply that the complainents, and I, had lost our minds. Kernel features aren't mandatory. Just because something is supported doesn't mean you have to do it. You can pick and choose among features, because you can see the whole code base -- it's transparent. You can look at the various builds out there and, if there's something you don't like, something you can do better, you can fork it, and maintain your own enhanced code base.
When Microsoft changes its software it makes things incompatible. When Linux software changes this doesn't happen, because the change is transparent. New builds are transparent, and if you come to a fork in your operating system road you can take it.
Transparency is the key term. And it doesn't just apply to software:
+ TrackBacks (0) | Category: Business Models | Consulting | Economics | History | Investment | Linux | Politics | law
April 18, 2005
Having done this work for a few years now, I do sometimes ask myself what the best bloggers have that I might lack.
The answer comes down to one thing. The best stay on one thing. They know their beats, know their limits, they do the research, and they don't flit around outside those subjects (the way I often do).
The most important blogger of our time is probably Pamela Jones of Groklaw. Groklaw is more a community than a blog (but so is DailyKos). Despite the extensive help her audience gives her, Jones still gives her beat rigid attention, tons of supporting materials, and she gives her enemies plenty of rope for hanging themselves so that, when she does speak her mind, she has both authority and supporters.
+ TrackBacks (0) | Category: Internet | Journalism | Politics | blogging | ethics | law
A Cachelogic study claims two-thirds of Internet traffic is now P2P, by implication the trading of copyrighted files. (That's a Cachelogic product there to the left.)
But is this just another Marty Rimm study?
Rimm, you may or may not remember, wrote a paper at Georgetown Law in 1995 claiming 85% of Web traffic was dirty pictures. This was later disproved, but the damage was done and Congress passed the ill-fated Communications Decency Act.
Mike Godwin, the former EFF counsel who fought the Rimm study and is now senior counsel at Public Knowledge, remains skeptical, noting that the Cachelogic study hasn't gone through peer review. He also notes that, since Cachelogic sells systems to control P2P traffic, it has a natural bias.
The Cachelogic claims may have logic behind them, however. Many ISPs do report that over half their traffic is on ports commonly used by P2P applications. Brett Glass of Lariat.Net, near the University of Wyoming, says the claim seems accurate, noting that unless ISPs cut-back capacity to those ports (a process called P2P Mitigation), the applications quickly discover the fat pipe and divert everyone's traffic to it, filling it at the cost of thousands per month.
And that is at the heart of the problem.
+ TrackBacks (0) | Category: Business Strategy | Copyright | Digital Divide | Economics | Internet | Investment | Moore's Lore | Telecommunications | law
April 14, 2005
Criminals have discovered blogging.
The BBC reports this quite breathlessly, but there's no need to be either surprised or unduly alarmed.
There are two types of scams going on, according to Websense, which was the BBC's source for the story:
- Blog addresses loaded with malware, advertised via e-mail or IM spam.
- Blog addresses loaded with malware waiting to be tripped by zombie machines.
In both these cases you can substitute the words "Web site" for "blog" and pre-date the release to 1997. Free Web page companies found this problem fairly early-on in their evolution, and now those offering space to bloggers need to be aware as well.
+ TrackBacks (0) | Category: Internet | blogging | ethics | law | spam
Sun's plan to release Solaris under its CDDL open source license got a boost yesterday with an endorsement by...The SCO Group? (This cute Linux penguin keychain from Promotion Potion doubles as a stress ball.)
"We have seen what Sun plans to do with OpenSolaris and we have no problem with it," is the way eWeek's Steven Vaughan-Nichols quoted SCO's Darl McBride in a conference call yesterday.
The question is, with friends like these, does Sun need enemies?
+ TrackBacks (0) | Category: Business Strategy | Linux | Software | law | marketing
April 11, 2005
Today's big lie is a misinterpretation of the latest Pew Internet Survey. We think spam is no big deal.
(The great-tasting pork-shoulder-and-ham concoction from Hormel pictured to the left is still a very big deal in Alaska and Hawaii. They love the stuff.)
"Email users are starting to get comfy with the spamvertisers" claims Silicon.com. Internet Users Unruffled by Spam, says TopTechNews. Internet users more accepting of spam, says Forbes.
Well, nonsense. (I would use stronger language, but I want everyone to get the point.)
Here are some facts from the same study. Barely half of us now trust e-mail, down 11% from a year ago. Over one-fifth of us have cut down our e-mail use because of spam, just in the last year.
As for the rest...users have learned to deal. We have spam filters. I use Mailwasher. We don't get as much as before because more of it is being stopped at the server level.
That doesn't mean we like it. And it's deliberately misleading to say it is. It's like the battered wife syndrome. Why doesn't she leave the jerk? Why don't you just go offline?
It's the same question with the same answer. You find ways.
But if someone would finally arrest the batterer and throw his butt in the slammer for a good long time she'd learn to be grateful.
Which reminds me...
+ TrackBacks (0) | Category: Internet | Politics | ethics | law | personal | spam
April 10, 2005
If your company runs all its Internet traffic through an internal server, and that server runs Microsoft Windows, then you're vulnerable to a new type of hack known as DNS Cache Poisoning. (The illustration here comes from a Brazilian blog, marketinghacker.br.)
The alert went out about a month ago. The idea has been around for a decade, but it's now being adopted by sophisticated criminal gangs.
Here's how it works.
Criminals break into a Windows server caching DNS requests for an Intranet, then insert instructions redirecting users to poisoned pages. The 12-digit IP address chosen by the criminal is thus linked to a chosen Internet address, and requests for Google.Com (for instance) could go to a site that downloads spyware or key-logging software in the background.
What can be done about it?
+ TrackBacks (0) | Category: Internet | Security | Telecommunications | computer interfaces | law
+ TrackBacks (0) | Category: Internet | e-commerce | law
April 07, 2005
I've seen the TV ads and maybe you have, too. "Get a free ringtone. Simply text (whatever) and get (name of hit song) as a ringtone!"
Well, it's a scam. It's not free. In fact, writes Stephen Lawson for The Industry Standard, it's a lot more costly than a regular ringtone. This is because you get multiple texts in reply, with directions for the download, and these texts cost money -- $1.99 plus call charges each. It's an easy case to make, it's simple consumer fraud, it's aimed at teenagers. A state attorney general who wants to make a name for himself (or herself) can have a field day with this.
Want to know the best part?
+ TrackBacks (0) | Category: Business Models | Business Strategy | Consumer Electronics | cellular | ethics | law
April 04, 2005
It's beginning to look like the SCO-IBM case won't make it to the finish line, an end to discovery and summary judgement.
SCO's sponsors are blowing up. Literally.
Maureen O'Gara (left), whose name is like fingers rubbing a balloon to most in the open source community, and is regularly accused by them of being an SCO shill, reported last month that both Ray Noorda's daughter and another executive with Canopy Group, SCO's largest owner, committed suicide.
More telling, perhaps, was her reference to SCO itself, a company she has regularly defended on teleconferences. She called it "the infamous SCO Group."
When your shark-jumper jumps ship, who's left?
The real news from last month is that Canopy's position in SCO has transferred to former Canopy CEO Ralph Yarro, who chairs the SCO board. When the former VC leaves his firm and becomes your CEO, you've got no net below you and (most likely) no new money coming in the door.
SCO could use new money, because when it finally delivered its financial results for fiscal 2004 (on April Fool's Day no less) it had a net loss of $23.3 million on revenue of $42.8 million, against profits of $5.4 million and $79.2 million in revenue. Why? Because sales of licenses to Linux users totaled just $809,000, down from $25.8 million in 2003.
How can this be bad news for open source?
Simple. If SCO fails to make it to the end of discovery, the judge in the case can't set a precedent that will keep others from trying the same con.
+ TrackBacks (0) | Category: Copyright | Linux | Software | law
April 01, 2005
The following appeared today in my free weekly e-mail newsletter, A-Clue.Com, now into its 9th year of publication.
You can get it free any time.
Science is the political issue of our time.
It will surprise many to hear it's controversial. But to those with an historical perspective it's no surprise at all.
+ TrackBacks (0) | Category: Futurism | History | Politics | Science | law | personal
Over the years I've been critical of Vint Cerf, one of the original gearheads credited with TCP/IP.
(One look at the hairline, of course, and one must admit he's a Truly Handsome Man. The picture is from Computerhistory.org, a page describing his early work.)
When Cert looks into the future today, he gets it. He understands where we should be going, and perhaps more importantly where we should not be going, in regards to the Internet.
He shared some of that wisdom Wednesday at a dinner called Freedom to Connect.
Following are some of the high points:
+ TrackBacks (0) | Category: Futurism | Internet | Politics | Telecommunications | law
March 31, 2005
Now that youve read my latest dismissive screed against the government, the question may have occurred to you.
What might a proper telecommunications policy consist of? (Very pretty flower, I know. Here's where I got it. The picture is called Simplicity.)
Its really quite simple.
Click below and I'll tell you.
+ TrackBacks (0) | Category: Consulting | Economics | Internet | Investment | Moore's Lore | Politics | Telecommunications | law
March 28, 2005
At the heart of the First Amendment is the idea that you don't need a license to do journalism. (Take a close look at the Wikipedia picture -- there will be a test later.)
Now, in the name of fighting competition from a new technology, some journalists are calling for just such a license.
The bleating is seen best in today's column by David Shaw of the LA Times. Shaw feels that privileges his industry worked hard to create will be threatened if bloggers can avail themselves of the same protections.
I hope I'm getting the best of his argument in the following quote:
+ TrackBacks (0) | Category: History | Journalism | Politics | blogging | law
As the Supremes prepare to take on the Grokster case, with commenters predicting terrible doom whichever way the wind blows, let me offer a dissenting view.
The Grokster case is irrelevant. The studios have already lost.
The court cannot make file transfers illegal. There are too many ways to transfer them. They can be transferred in e-mail attachments. They can be transferred through Instant Messaging. They can be transferred via MMS.
File transfers are basic to networking. Without the ability to transfer files we're down to typing.
Here's a compromise that rings true to me.
+ TrackBacks (0) | Category: Consumer Electronics | Copyright | Internet | law
March 25, 2005
In all the arguments over copyright and patents the interests of the middle class creator are constantly invoked, then discarded.
The fact is that, while most western countries are middle class, the structure of their creative classes is pre-Marxist. That is there are a few writers, artists, musicians and actors who get rich from it, and a lot who get virtually nothing.
Unless you have business acumen, or constant success in your field, you're very likely to end up poor. And without a big hit, you're nearly certain to end up relatively poor from your work in the content industries.
At the same time, those who manage the industry, whether or not they have any talent, nearly all wind up rich.
Thus there's a difference between what we find in society as a whole and the content society.
+ TrackBacks (0) | Category: Business Models | Consumer Electronics | Copyright | Futurism | History | Politics | law | personal
A Santa Clark court has ordered Toshiba to pay Lexar $465 million essentially for violating a non disclosure agreement (NDA).
Some accuse me of not caring about copyright or patent rights. This is neither. It's a trade secrets case. But this is a righteous bust.
The individual responsible for all this, according to the court, was Toshiba employee Hideo Ito. Ito joined the board of Lexar, then a raw start-up, in 1997, and leaked its trade secrets for flash memory not only to his employers but also to SanDisk, the leader in the flash memory field.
Why is this a righteous bust? Because small outfits like Lexar have to align with big outfits like Toshiba in order to take on large rivals like SanDisk. It's the only way they can reach the market. If that confidence is not secured then small companies never have a chance.
+ TrackBacks (0) | Category: Consumer Electronics | Copyright | law
March 23, 2005
+ TrackBacks (0) | Category: Internet | law
March 22, 2005
Thats what Republicans called it, when they were campaigning for power a few years ago.
The Gore Tax was their name for the E-Rate program. Its aim was to help poor schools cross the digital divide by subsidizing their access costs.
It has been a bipartisan disaster. In practice its nothing more than a subsidy for the Bells, who had the law written in such a way so that they got the money automatically unless they refused it for some reason.
This means, in practice, that the subsidized rate schools pay may in fact be higher than the alternative market rate. Bells are charging hundreds of dollars per month for T-1 customers who could easily be supplied by WISP DSL service at a fraction of the cost.
It gets worse. The E-Rate was also used for hardware, so schools stuck themselves with obsolete PC technology to boot. Youve got obsolete PCs held by captive customers who cant upgrade.
Now Declan McCullagh reports that Rep. Joe Barton wants to put the E-Rate out of its misery and Ive got to applaud it.
+ TrackBacks (0) | Category: Digital Divide | Internet | Telecommunications | law
March 21, 2005
I am a supporter of the U.N. I want it to have real power and influence.
This makes me a minority among my countrymen. So be it.
But I found myself troubled in reading this definition of terrorism today from U.N. Secretary-General Kofi Annan:
"any action constitutes terrorism if it is intended to cause death or serious bodily harm to civilians or non-combatants with the purpose of intimidating a population or compelling a government or an international organisation to do or abstain from doing any act".
In effect this prohibits any violent action against any tyrannical government, and puts the U.N. on record supporting that tyranny.
+ TrackBacks (0) | Category: Politics | Security | law | personal | war
As we reported over the weekend Agence France-Presse is suing Google for $17.5 million. We reported that Agence France-Presse doesn't know how to write a robots.txt file.
We were wrong on that. Carl Malamud (no picture, sorry -- he's shy) found a reference to a robots.txt file on the Agence France-Presse site at http://www.afp.com/robots.txt
While AFP stories are not directly linked to Google News as of March 21, affiliates' publishing of those stories are.
+ TrackBacks (0) | Category: Copyright | Internet | Journalism | Telecommunications | law
March 20, 2005
As I noted yesterday Agence France-Presse's suit against Google News is silly.
But just because it's silly doesn't mean it can't be won.
Come along after the break and see how that might happen.
+ TrackBacks (0) | Category: Copyright | Internet | Journalism | blogging | law
March 19, 2005
Agence France-Presse is suing Google for $17.5 million, apparently, because Agence France-Presse doesn't know how to write a robots.txt file. (The image of the faux-French cartoon character, Pepe LePew, is linked from a German site.)
The Agence suit, filed in the U.S. District Court in Washington, D.C., alleges Google News "stole" its content by linkig to it, with headlines and inserting thumbnails of photos. No claim is made that Google cached whole copies of the news agency's stories.
A U.S. court ruled in 2000 that it's perfectly legal to link deep into another site. But it is also legal to write a program that prevents robots from linking to any page.
On the next page is the code Agence France-Presse could easily insert into a file, robots.txt, linked to its home page, preventing all links from its site:
+ TrackBacks (0) | Category: Copyright | Internet | Journalism | law
March 18, 2005
Note: The following was published today in my free weekly e-mail newsletter, A-Clue.Com, now in its 9th year. Join us -- always free.
The great financial Curse is to have money coming out of the ground.
I didn't believe this when I started in journalism. I started in Houston, whose economy was based entirely on the concept of money coming out of the ground - Black Gold, Texas Tea.
For most of history, money has mainly come out of the ground. Assets were what you could drill for, what you could mine, or what you could grow. The exceptions to this rule were those of trade. If you sat astride a trade route, if you had a deep water port, if the railroads decided that your location would work for a station, then your land had value.
Moore's Law has changed all that. The Internet has changed that for all time.
+ TrackBacks (0) | Category: Economics | Futurism | History | Investment | Moore's Lore | Politics | law | personal
Cellular companies used to be the small, scrappy, second-tier telecomm carriers.
They're now morphing into ILECs, like the Bells. The two largest cellcos -- Cingular and Verizon Wireless -- are in fact owned by Bells. The other big guys -- T-Mobile, Sprint -- also have local coverage areas. (T-Mobile's is in Germany.)
But I'm talking about more than a superficial resemblance. At CTIA, CEO (and former Congressman) Steve Largent (right) announced MyWireless, the beginnings of an effort to use all forms of manipulation -- including Astroturf , to protect the industry's position and stall change through the courts and legislatures.
This is not how Largent (who was also a record-setting wide receiver for Seattle in a past life) put it.
+ TrackBacks (0) | Category: Politics | cellular | law
March 14, 2005
Reporting on the judge's decision in the Apple lawsuit against three Web sites has been about as bad as it gets. (Celebrate the stupidity with this lovely vase of a wormy apple, from the Seekers Glass Gallery.)
Let me tackle, as an example, the outlet with the best reputation, the BBC. Apple makes blogs reveal sources is the headline.
While the company won the initial court ruling, the fight is far from won. And the decision wasn't germane to bloggers, as the actual story made clear. "Judge Kleinberg said the question of whether the bloggers were journalists or not did not apply because laws governing the right to keep trade secrets confidential covered journalists, too."
Trade secrecy, in other words, gets more protection than national security.
More after the break.
+ TrackBacks (0) | Category: Consumer Electronics | Copyright | Journalism | law
When John W. Berresford speaks, the Bush Administration listens.
Berresford is the FCC's senior antitrust lawyer and a professor at the right's favorite school, George Mason. He has power and the connections to turn his statements into policy.
So when he came out with a paper today about spectrum policy, it was bound to be read avidly.
In his paper Berresford favorably compares the law of land property to that of spectrum. He notes how property rights and spectrum rights are limited under the law, often in the same ways, and states that "efficiency" should be the watchword in spectrum policy.
We should know what we're in for when, in his first paragraph, he mischaracterizes the debate:
Debate rages about whether the allocation and management of the radio frequency spectrum should be mostly a political process, treating it as The Peoples Airwaves, or mostly market-driven, treating it as private property.
That's not the debate. The debate boils down to science and markets. What treatment of spectrum best serves the market, that of a government-owned monopoly or a carefully-managed resource?
We haven't just "discovered" how to use vast new areas of spectrum in the last 20 years. We've learned a lot about how such spectrum can be re-used, again-and-again.
Thus the argument of property vs. commons isn't a left-right argument (as Berresford supposes in his introduction). It's an argument over science and efficiency.
And the plain fact is that the spectrum which is most efficiently used in this country, which makes the most money per hertz, by far, is the unlicensed spectrum.
Berresford ignores both the science and market forces behind this fact.
+ TrackBacks (0) | Category: 802.11 | Always On | Economics | Futurism | Politics | Telecommunications | law
Digital Rights Management is a conspiracy.
Once someone breaks it, it's broken.
That's the view of Cory Doctorow, a short version of what he told TheFeature recently.
There was a similar conspiracy against TV in the 1950s, he noted. None of the studios would produce programming for TV, and anyone who worked in TV was blacklisted.
Then one brave company broke the chain. Disney. Walt Disney needed money to open his amusement park, TV offered it. The move gave him an enormous competitive advantage, as big as Ted Turner's advantage in using satellites 20 years later.
+ TrackBacks (0) | Category: Copyright | Futurism | ethics | law | marketing
March 10, 2005
+ TrackBacks (0) | Category: History | Journalism | Politics | law | personal
March 07, 2005
When Canadian Michael Geist started his "Law Bytes" column some years ago, I didn't think much of it, or him. It was conventional, and usually took the side of industry.
Either he grew, or I did, because lately he has been rocking. He's loosened up, his writing has gotten better, and increasingly he's on the side of the angels. (Special Mooreslore game now. Guess the headline reference. No peeking.)
Here's an example. In one column he goes after attempts by the Canadian government to wiretap Internet conversations, ISPs' cutting off Vonage ports, efforts to extort money from Canadian schools just-in-case some content they view is copyrighted, and the music industry's incredible ability to get content taken-down on just a say-so.
There's a theme here. And the theme is right-on. It is that the Internet is threatened as never before, by cops, by greed, and by fear. If we allow these to dominate the conversation we lose. And we must not let that happen.
There's something else.
+ TrackBacks (0) | Category: Copyright | Internet | ethics | law
March 01, 2005
As the Grokster case approaches the Supreme Court the "friends" of the court briefs (called amicus curiae) are flying.
The best is the technical brief, from a host of distinguished computer scientists including Dave Farber of Carnegie-Mellon (and the Interesting People list).
The Electronic Frontier Foundation has posted a PDF copy.
The short version. If a law against software is strong enough to do good it will do harm. And if it's weak enough not to do harm it can't possibly do any good. Thus the Sony vs. Betamax "test," that technology is legal if it can be used for legal purposes, should be upheld.
A few details after the break:
+ TrackBacks (0) | Category: Consumer Electronics | Copyright | Internet | law
February 23, 2005
As of now, all class action lawsuits must go through the federal courts.
The Bushies may be sorry they made this change, because a very big class action is likely to head their way very soon.
The action will be against ChoicePoint, which managed to sell 145,000 credit dossiers to criminal gangs.
That's a big class. Every single victim may have had their identity stolen, either now or sometime later. At minimum, each victim faces a daunting task to re-establish their identity, and the impact of this theft is likely to follow them for years.
That's what lawyers call an actionable tort.
So far only one lawsuit has been filed, an individual suit in California. Expect many more.
The press coverage of this scandal has, so far, been horrendous. Most stories, like CNN's, act like the victims here somehow did something wrong.
They didn't. This was a deliberate act by a company too greedy to take proper care. They deserve whatever the legal system can dish out -- which right now is a lot less than it was a few weeks ago.
And that's the problem.
+ TrackBacks (0) | Category: Internet | Investment | Politics | e-commerce | law
What does the FBI have in common with Paris Hilton?
They're both making news this week as victims of hackers. (The image is from a conservative humor site. Some of the stuff is pretty good.)
We wrote about Paris earlier this week. (Here's a poem for the occasion. Ahem. I've seen Paris, I've seen France, girl pull on some underpants.)
Now ZDNet reports a new virus comes in the form of an e-mail claiming to be from the FBI. (Not to be undone, Ms. Hilton herself is the subject of a new e-mail virus, called Sober.K.)
As Matt Hines writes, "The mail is disguised as correspondence warning people that their Internet use has been monitored by the FBI's Internet Fraud Complaint Center and that they have 'accessed illegal Web sites.' The e-mails then direct recipients to open the virus-laden attachment to answer a series of questions."
+ TrackBacks (0) | Category: Internet | Security | fun stuff | law | spam
February 22, 2005
There's nothing journalists like better than a good old fashioned catfight. (The animated gif catfight is from Supah.Com. I guess you can send it to friends as a postcard.)
And in tech journalism today it doesn't get any better than Pamela Jones vs. Maureen O'Gara.
Jones edits Groklaw, the free community blog which has covered the open source revolution's legal defense so expertly. Her stuff is so good that SCO talked about putting together a rival site, called Prosco.Net, last year. (As of this writing that site is still empty.) Jones is so ethical she actually quit a really good job to stay on the beat, writing "money is nice, but integrity is everything." (I think I'm in love.)
O'Gara edits the $195/year LinuxGram newsletter. She writes fast, tight, "insider-type" stuff, with tabloid headlines like "Ray Noorda's Competence in Question." She learned her trade at CMP, and calls her company G2 Computer Intelligence.
Conflict was natural because of their differing styles. Jones is careful and shy to the point of near-invisibility. She writes like a lawyer. O'Gara is brassy and bold and uses the rest of the press as her PR machine. She writes like a journalist.
What got the feud rolling was a stunt O'Gara pulled before the court in the case of SCO vs. IBM. She filed her own motion to unseal the records, then did a story on her heroic act.
Newspaper companies do this all the time. They fight to unseal records of criminal trials or government decisions, writing a series of stories on the filings and the reaction. But Jones didn't like O'Gara's headline, nor the attitude in her story which was (to say the least) self-congratulatory.
Jones let O'Gara have it.
No hostility there. Maybe a little around the edges, oozing out? Leapin' Lizards, Batman, the heroine action figure who apparently wishes to Take the Open Source Movement Down singlehandedly is none other than Maureen O'Gara, who is asking the Utah court to unseal all the sealed records:
+ TrackBacks (0) | Category: Business Models | Copyright | Journalism | Linux | Software | blogging | law
February 21, 2005
As the legislative season swings into high gear, spyware is high on the agenda.
Some 14 states are looking at bills specifically aimed at spyware. Utah is on its second go-round, having had an earlier bill tossed by the courts.
But speakers at the VJOLT Symposium last weekend agreed that spyware bills are wrong. Instead of going after the means by which privacy is stolen, strengthen the privacy laws so they cover what bad spyware does.
In stating this they all referenced a seminal 1996 talk by Frank Easterbrook of the University of Chicago (right), titled "Cyberspace and the Law of the Horse."
In it he argued against any specific laws for cyberspace, saying standards of "meat space" law should be sufficient to deal with problems that look unique.
+ TrackBacks (0) | Category: Internet | Software | law
As mentioned in the previous item, I was honored last weekend to speak at the Virginia Journal on Law and Technology (VJOLT) Symposium, "Real Law and Online Rights."
I'd expected an argument. The vast majority of copyright lawyers today are employed by copyright holders. Instead, I was given the lead-off slot, the small congregation nodded in time to my music, and the speakers all advocated a balanced view of copyright and patent law.
One of the best (in my opinion), was Geraldine Moohr, who teaches at the University of Houston Law School, a short bike ride from my old stomping grounds at Rice. She based her talk on a paper she wrote last year on copyright criminal law.
The short version. It doesn't work. "There is a lack of a social norm that would condemn personal use infringement," she said. "Civil penalties may be good enough. They have a a punitive quality to them."
+ TrackBacks (0) | Category: Consulting | Copyright | Politics | law
While Susan Crawford was asking whether Ben Franklin would blog, (and Donna Wentworth was pointing the world to her piece) I was being asked a similar question "would Jefferson file share" at a VJOLT conference in Charlottesville.
The answer, in both cases, would depend on which Franklin or Jefferson you were talking about.
Franklin was desperate to publish as a young man, and the 1721 Franklin would doubtless have blogged. As a printer, Franklin routinely used copyrighted material without payment, and as a raconteur/diplomat he was far more often on the receiving end, so if he had blogged then he would have done it very carefully, judiciously, with an eye toward public opinion.
Jefferson was the first consumer, and doubtless would have used Grokster in his dorm at William & Mary. But later, as he became a public figure, he would have been far more conscious of the need for anonymity. As a politician, he would have no more admitted to copyright violation than George W. Bush would admit to smoking pot.
Both men, however, learned to live as though their private lives were public. Franklin used his fame to win an alliance with France, even letting himself be pictured in a beaver hat. Jefferson dealt with the Sally Hemings affair throughout the 1800 campaign, not to mention his lifelong reputation as a spendthrift, a wastral and, in the end, a bankrupt.
A better question might be this. Could you, or I, have done as well, then or now?
I doubt it. But we all should try.
+ TrackBacks (0) | Category: Consulting | History | Politics | blogging | ethics | law
February 16, 2005
There is much commentary emerging from a court ruling stating that reporters (like the one at right) must testify to a grand jury or go to jail.
Editor & Publisher wants a federal shield law. I have been a journalist for 25 years, and had the kant of a "journalist's privilege" drilled into me from the start. A shield law would be a good thing, but only if it protected all reporters, not just those few with jobs at major corporations.
But do you know what the reporter's privilege really is?
You have the right to go to jail. You also have the right to be killed in the line of duty, as dozens were in Iraq, some by U.S. soldiers. You have the right to be tortured in many countries around the world, and to rot in jail hoping someone can get you out.
These are your rights. No, these are your responsibilities as a journalist. You have the right to fight for the right to do your job. This is why journalists, the ones willing to accept these rights and responsibilities, are among the most important people on Earth. We know why the caged bird sings, because often it's us.
So if I quote you anonymously, and I promise you anonymity in exchange for your statements, I will protect that. I will risk jail for you, I will risk torture for you, I will risk death for you. If I decide your statements are that vital, and your anonymity that valuable, that's what I will do for you as a journalist. That's my job.
+ TrackBacks (0) | Category: Journalism | ethics | law | personal | war
February 15, 2005
The Copyright Police keep coming up against stubborn facts, some of their own making, that throw their arguments into the dumper.
Two are making headlines today.
First is a joint study by Harvard and University of North Carolina researchers indicating "Downloads have an effect on sales which is statistically
indistinguishable from zero." Felix Oberholzer (Harvard) and Koleman Strumpf (UNC) matched a set of downloads to record sales in coming to this conclusion. "Even in the most pessimistic specification, five thousand downloads are needed to displace a single album sale," they write.
The second piece of news comes from the industry itself.
It is, simply, the launch of Napster's "rental" service. For $15/month, you can download all you want. It all disappears when you stop paying, but the industry approved this business model, which estimates the actual value of unlimited downloads at $180/year. Spread that over 10 years, give Napster 15%, and you get an actual industry-estimated "loss" from unlimited downloading of $1,500. Not much.
This will make for some fun when I speak this weekend at the University of Virginia's VJOLT Symposium.
+ TrackBacks (0) | Category: Consumer Electronics | Copyright | Economics | Internet | law
February 11, 2005
+ TrackBacks (0) | Category: Internet | Journalism | blogging | law | personal
February 05, 2005
MCI grossed an estimated $5 million/year violating the law in its home state of Virginia, by knowingly hosting sales of a Russian virus used to turn PCs into spam zombies.
The full story, by Spamhaus' Steve Linford (below) was distributed online today. It charges that MCI knowingly hosts Send-Safe.Com, which sells a spam virus that takes over innocent computers and turns them into spam-sending proxies. Linford tracked Send-Safe to a Russian, Ruslan Ibragimov. Linford estimates MCI earns $5 million/year from its work supporting spammers.
The theft of broadband-connected PCs by viruses, mainly Send Safe and another Russian-made program, Alexey Panov's Direct Mail Sender ("DMS"), is responsible for 90% of the spam coming into AOL and other major ISPs, Linford charged.
Here's the nut graph:
MCI Worldcom not only knows very well they are hosting the Send Safe spam operation, MCI's executives know send-safe.com uses the MCI network to sell and distribute the illegal Send Safe proxy hijacking bulk mailer, yet MCI has been providing service to send-safe.com for more than a year.
Want this made a little more explicit? Read on.
+ TrackBacks (0) | Category: B2B | Copyright | Internet | Journalism | Politics | Security | Software | blogging | ethics | law | online advertising | spam
February 04, 2005
The final destruction of e-mail as an Internet service has begun. (This is as serious as Comic Book Guy's heart attack, right.)
Mainline spam software publishers have added a new worm to their product that not only turns PCs into spam zombies, but runs that spam through the zombies' e-mail server. This on top of an "industry" that already costs legitimate businesses $22 billion.
The result is spam that looks like it's coming from a legitimate address, and despite all the warnings most people still don't update their anti-virals so as to prevent this kind of infection.
+ TrackBacks (0) | Category: Internet | Journalism | Security | Software | ethics | law | spam
February 03, 2005
I agree with President Bush on something.
Lawyers represent a major threat to our economy.
But I'm not worried about defense lawyers, or plaintiff's lawyers. I'm worried about the newer scourge of so-called "intellectual property" lawyers.
You won't find the phrase "intellectual property" in the Constitution. (It's often credited mainly to James Madison, left.) There, patents and copyrights are covered by a subsection of Article I, Section 8, whcih gives to the Congress power "To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries."
For limited times. To promote progress.
Because economic power has shifted, in our time, from our hands to our heads, and because technology is now able to move the product of our minds around the world at the speed of thought, American lawyers have done just what their British counterparts did two centuries ago. They've tried to make our economic leadership permanent through the language of law.
+ TrackBacks (0) | Category: Copyright | Economics | Futurism | History | Journalism | Politics | law | personal
February 01, 2005
Over at The Scotsman, lawyer Alison Bryce is featured in one of those stories that doubtless led to Shakespeare having Dick the Butcher say "First thing we do, let's kill all the lawyers."
Her headline is "Don't believe the software scaremongers" but in fact the article is a classic bit of scaremongering.
She's repeating the Microsoft line that Linux is scary. She calls the GPL "the most restrictive license" and states quite baldly that having the source code published is dangerous. No evidence is offered.
There are also some outright howlers, like this one. "Software released under the GPL, such as the popular Linux operating system," never apparently realizing that not all Linux distros are GPL. Fine misunderstanding for an amateur, but this lady claims to be a highly-paid professional, and an expert on software law to boot.
This bit of garbage could easily have been written by Microsoft itself (and he probably cribbed off their stuff), but here's where I get angry:
+ TrackBacks (0) | Category: Copyright | Linux | law
January 28, 2005
+ TrackBacks (0) | Category: law
January 27, 2005
The Elliott Wave people ask, "Is the Greater Fool Era Ending?"
Here is proof. Strategy Analytics has recently published another of those truly loony market studies, this one claiming that mobile phone operators will lose $12 billion from broadband wireless over the next several years.
It's nonsense because its premise is false, namely that those profits are out there to lose.
Yes, it's possible that if WiFi and WiMax didn't exist that all broadband revenues would go to cellular. It's also true that if freeways didn't exist all inter-city traffic would be by railroad. But that does not mean I impute a loss of billions to the railroads.
+ TrackBacks (0) | Category: 802.11 | Economics | Investment | Journalism | Politics | Telecommunications | law
In the U.S., the only excuse for regulating TV content is based on spectrum scarcity. Spectrum is scarce, it's licensed, and because of that there is a public interest test, which the agency sometimes uses to crack down on content.
Absent the excuse of spectrum scarcity, the only grounds for regulating TV content are based on the First Amendment. (The Hayes Office, which kept movies chaste for decades, was private regulation, not public.) This is not an absolute. Any conservative will tell you "obscenity is not protected," citing chapter and verse, calling in Ashcroft's Dogs of War.
The point is this is not the case outside the U.S. In England, for instance, TV content is regulated because, well, it's powerful. Thus dangerous. And so Oftel, the U.K's new "super-regulator," is sniffing around regulating the Internet.
Fortunately some there have a Clue.
+ TrackBacks (0) | Category: Consumer Electronics | Internet | Journalism | Telecommunications | law
January 22, 2005
Guillaume Tena of Harvard is being threatened with the charms of a French jail cell for having written-up a list of flaws in a French anti-viral product three years ago.
Tegam International, which makes something called Viguard, called Tena a "terrorist" after he published his analysis of their product in March 2002 and a French court is apparently dumb enough to take the claim seriously.
Now, Tena's no angel. Tegam says he was once a virus writer himself, credited with (among other things) Happy99, the first e-mail virus. But, they admit, he went straight and is now on the side of the angels. (This assumes, of course, that there are angels at Harvard.)
UPDATE: Tena writes to say that reports he's a virus writer are false, that they were started by Tegem and picked up by the media without questioning it. "Cite a credible source if you have one," Tena writes. "This article is now on the web for eternity. Please do something about it."
I have no independent source, other than press reports, to indicate Tena has so much as a parking ticket to his name. Absent evidence, I shouldn't spread rumors, so this is being reposted with my apologies.
So why should angels (or Yalies) support him?
+ TrackBacks (0) | Category: Security | Software | law
January 17, 2005
Verizon, the second-largest phone network in the U.S., and the second-largest wireless operator, has decided it will no longer offer Internet service.
The question is what the Internet and its users will do in response (if anything).
The company's decision was made public this week in the form of a unilateral halt to all deliveries of e-mail from Europe by default based on a claim this is an anti-spam measure.
The claim is laughable since far more spam traffic moves from the U.S. to Europe than the other way around, thanks to real European statutes requiring opt-in and the U.S. CAN-SPAM Act, which legalized many types of spam.
But there is a larger point.
An Internet Service Provider, by definition, provides service to the entire Internet. This is usually put in the fine print of Internet service contracts. Will Verizon now modify its contracts, or simply ignore them?
+ TrackBacks (0) | Category: Business Strategy | Internet | law
January 16, 2005
Panix.Com has apparently had its domain hijacked.
Panix, a 16-year old ISP in New York, told its users that ownership of the domain was apparently moved to Australia, the DNS records were moved to the United Kingdom, and its e-mail was directed to Canada.
This should be a matter for criminal prosecution.
+ TrackBacks (0) | Category: Internet | Security | blogging | law
January 14, 2005
The Bee Watcher-Watcher watched the Bee Watcher.
He didnt watch well. So another Hawtch-Hawtcher
had to come in as a Watch-Watcher-Watcher!
And today all the Hawtchers who live in Hawtch-Hawtch
are watching on Watch-Watcher-Watchering-Watch,
Watch-Watching the Watcher whos watching that bee.
Youre not a Hawtch-Watcher. Youre lucky, you see!!!
Dr. Seuss's "Did I Ever Tell You How Lucky You Are?" is as subversive now as it ever was, and always finds a new context.
Today the context lies in the proliferation of cameras, which seem to be watching us, all the time, and whether our "privacy" means we should turn them off.
With every Hawtch-Hawtcher out watching each other, does privacy really exist?
The answer may surprise you.
+ TrackBacks (0) | Category: Internet | Journalism | Politics | law | personal
December 21, 2004
That's the question asked at Copyfutures recently, speculating on what might happen in the Copyright Wars next year.
The highlight should be the Supreme Court's pending Grokster decision, which might establish a right to technology that might infringe on copyright, or might overturn the old Betamax case.
But John Amone is asking a deeper question.
Namely, does it matter what the court holds at all?
+ TrackBacks (0) | Category: Copyright | Internet | Journalism | law
December 15, 2004
I am a big Lauren Weinstein fan. But his reasoning for being suspicious of Google leaves me thinking of two words -- Ned Lud.
But let's be fair, and offer his entire post to Dave Farber, in full:
+ TrackBacks (0) | Category: Futurism | Internet | Journalism | law | personal
December 08, 2004
With many companies now substituting WiFi for wired networks, it's natural that those with multiple locations would want to tie them all together.
Bluesocket Inc. of Burlington, Mass. (right, from their home page) is among those getting into this game. Their home page describes them as "building an enterprise-class WLAN" and they claim their new WG-400 Wireless Gateway can handle as many as 50 users at the same time, which is pretty nifty.
But is there a general problem here? Perhaps there is.
+ TrackBacks (0) | Category: 802.11 | Business Models | Consulting | Internet | law
I have a confession to make.
The one thing I would really love to have for Christmas, the one thing I'm least likely to get, is a bottle of the old family wine.
It turns out that a distant branch of my family tree runs a winery in Baden, in Germany, barely a draft notice's toss away from the Swiss border. Weingut Blankenhorn (I think it translates to good wine by the Blankenhorns) is run by Rosemarie Blankenhorn (known as Roy), who is about my age. In addition to the usual German varieties they also make a Chardonnay and a Merlot and a Cab.
But unless I can scrape up airfare and meet Ms. Blankenhorn in person (another life ambition), my chances of trying her wines are slim and none. This is because the winery is fairly small, so that only a big importer would be able to do a deal with her, and also because state laws in the U.S. keep big out-of-state importers from serving Georgia, even by mail or Web.
But that may be about to change.
+ TrackBacks (0) | Category: e-commerce | law | personal
December 07, 2004
Back in the 1990s one of the bigger stories I covered concerned an outfit called TotalNews.
TotalNews tried to make a living for itself by putting its trade dress around others' news stories, even covering the original ads with its own. After a legal fight it backed off, but it did not disappear.
Fast-forward nearly a decade. Since getting access to an RSS feed I've seen a lot of links from something called BigNewsNetwork. Here's one. It looks like a story from Israel, a panel complaining about regulators.
+ TrackBacks (0) | Category: Business Models | Business Strategy | Internet | Journalism | ethics | law
December 01, 2004
Philadelphians are celebrating an agreement with Verizon which, they say, allows them to offer a citywide Wi-Fi network despite a law, signed (shamefully) by Governor Ed Rendell yesterday, aimed at stopping the municipal WiFi movement.
But they need to read the fine print.
Wetmachine has the story:
HB 30 prohibits the state or any municipality (or any municipally owned or operated entity) from providing any sort of telecom or broadband service for any kind of remuneration. The bill grandfathers any existing systems, tho, so no one will get cut off.
Sound good? Read on:
+ TrackBacks (0) | Category: 802.11 | Always On | Economics | Futurism | History | Internet | Investment | Politics | law
November 17, 2004
Thanks to those lovely folks at Newsgator, I've been enjoying an RSS feed on topics of interest, sent to my e-mail box, for the last month.
It's useful. It gives me great stories. But here's a dirty little secret. It's also filled with spam.
Want some examples? Let's go to my inbox today and find a few:
+ TrackBacks (0) | Category: Copyright | Internet | Journalism | blogging | law | spam
November 12, 2004
The first true Trojan Horse program targeting mobile phones has been sighted. (The image, by the way, comes from a page that is relevant to this discussion, at a Texas high school.)
There have been several claims on the title of "first mobile virus" during the year. Our first contestant turned out to be a copy protection feature. The second, it turned out, was harmless.
Now we have a "winner," a Russian trojan aimed at phones called Delf-HA. This claim, too, may be open to dispute. The payload itself goes to PCs, which then call Russian mobile numbers and send those phones SMS spam.
But it is becoming clear that firms like Symantec, which are readying versions of their anti-viral tools for mobiles, are no longer just playing on false fears. Whether their stuff works or not will, of course, remain open to testing.
+ TrackBacks (0) | Category: Software | Telecommunications | cellular | law | spam
November 08, 2004
A big highlight of the Accelerating Change conference at Stanford last weekend was a demonstration by Linden Labs of Second Life. (The image is from Second Life's Web site, meant to explain the game.) It is, as its home page notes, "a 3D digital world imagined, created and owned by its Residents."
Second Life lives in a server rack somewhere in San Francisco. Each server represents 16 acres of virtual space, where users' avatars can live, work and play. So far there are about 500, but 10 more are added each week. Think of it as Everquest without the plot.
In Second Life the users own what they create. It's a simple concept, but one that is extremely hard to implement. For instance, the demonstrator couldn't pass around any of the work done in Second Life because Second Life doesn't own it. Thus, he couldn't sign the conference's standard release form, which lets the organizers have rights to what's shown.
+ TrackBacks (0) | Category: Business Strategy | Copyright | Futurism | Internet | Software | law
November 01, 2004
The folks over at BoingBoing remind me that, just as there are both top-down and bottom-up models of politics, there are top-down and bottom-up models of technology.
Apple represents a top-down model that masquerades as bottom-up. Its advertising has always been egalitarian, even liberal, but when push comes to shove it's the most controlling outfit out there. This is built into its DNA and corporate history. People forget that the years in which Apple allowed Macintosh clones were among its darkest.
So when Apple decides to, in Cory Doctorow's words, "remove features from your iPod and presenting it to you as an 'update'" I just nod my head and ask, "So what else is new?"
+ TrackBacks (0) | Category: Business Strategy | Copyright | law
August 25, 2004
Despite a regulatory regime that is impossible to obey (isolating data traffic that's to be turned into voice on a network with trillions of transactions going through it each second) hardware makers are going ahead with the production of Voice Over IP (VOIP) hardware.
Linksys and Netgear are the latest to say that voice support will become part of their residential gateways Real Soon Now. (For more on VOIP, buy O'Reilly's VOIP book, right.)
In this case, however, the Feds will be glad to know there's actually less here than meets the eye.
+ TrackBacks (0) | Category: Futurism | Internet | Investment | Moore's Lore | Security | Telecommunications | law
If every nation enjoys remote jurisdiction on the worldwide network, then the only functions available are those legal in every jurisdiction. (Tipped justice scales from Glad.Org.)
Yet that's apparently what the U.S. Court of Appeals thinks should happen. The court ruled that Yahoo.Com, a U.S. site, cannot be protected against French enforcement of French rules regarding what can-and-can't-be-sold.
+ TrackBacks (0) | Category: law
New confirmation that the U.S. remains the world spamming leader comes from Sophos. Sophos, which gets its data from spam-attracting "honeypots," said 43% of the world's spam comes from the U.S., 27% combined comes from China and Korea. (The caricature is from Sophos' French site.)
Earlier this month, readers of this blog will remember, we reported on a CipherTrust study that 86% of the spam it collects at client sites comes from U.S. addresses, although many spoof foreign addresses.
+ TrackBacks (0) | Category: Internet | ethics | law | spam
August 23, 2004
+ TrackBacks (0) | Category: Business Models | Internet | law
August 18, 2004
Spam's dirtiest secret is that so-called "legitimate" businesses are footing the bills. (That's CipherTrust's Paul Judge, one of the "good guys" in the anti-spam fight, at right. Read more on him here. And if you see him, buy him a beer, or whatever he wants.)
They seldom do this directly. Mostly it's through "affiliate marketing" agreements, often created by re-sellers. The legitimate companies put stuff into their channel. The re-sellers are part of the channel. If the affiliate gets busted for spam it's "Mission Impossible" -- the secretary disavows any knowledge of their actions.
This is why, not that spam has swallowed the legitimate business of e-mail marketing, it's becoming seasonal. You get sex spam in the summer, financial scams in the fall.
This could, if someone were clever, create a way in which to reduce the spam problem.
+ TrackBacks (0) | Category: Consulting | law | spam
I'm on my own blacklist.
My e-mail address has been falsified or "spoofed" on so many spams and viruses over the years that when I get e-mail from myself I automatically set it to be deleted.
This is not uncommon. Anyone who has had their address for some time, especially if they're written articles against spam, faces the same problem.
But now there's hope.
+ TrackBacks (0) | Category: law | spam
August 15, 2004
+ TrackBacks (0) | Category: Business Strategy | History | Moore's Lore | Telecommunications | cellular | law
August 13, 2004
A new study from CipherTrust gives new support to the theory that spam could be greatly reduced by finding, and jailing, a few hundred Americans. (Picture from USA Today.)
Gregg Keizer writes for Information Week that, rather than put up a "honeypot" aimed at attracting spam, CipherTrust measured the actual spam it intercepted for its clients.
Dmitri Alperovitch, a research engineer at CipherTrust, explained that "some spammers are actually targeting specific companies with messages that the honey pots wouldn't see."
+ TrackBacks (0) | Category: law | spam
Jeffrey Lee Parson pled guilty yesterday to creating a variant of the Blaster worm and now faces up to three years in prison. (Picture from the Sydney Morning Herald.)
The reaction of many in the computing world is he got off lightly. Hang him high, they say. Make an example of him.
+ TrackBacks (0) | Category: law
August 06, 2004
What began as an attempt to de-fang the wolves of Wall Street has descended into a Silicon Valley farce.
The problem with Google's IPO delay does not lie in the technical glitches of the system. And it doesn't lie in the really silly price being quoted -- $110 per share.
It lies in the great scandal of the 1990s -- stock options.
+ TrackBacks (0) | Category: Business Models | Business Strategy | Economics | Internet | Investment | law
August 03, 2004
A very important political story snuck by us last week. I blame John Kerry for it.
The story is the new push by Intel for 802.16 WiMax spectrum.
While there are lots of high frequency bands in which WiMax could live, the inescapable fact is that the lower your frequency the farther your waves can travel. That's why AM stations can be heard across the country (when conditions are right) while FM stations have trouble being heard across town.
Intel executive vice president Sean Maloney (above, from the Intel site) is lobbying China, the UK and the U.S. to open up space in the 700 MHz band, frequencies UHF TV stations will be abandoning as they move to digital broadcasting, for unlicensed use as WiMax transmission bands.
+ TrackBacks (0) | Category: 802.11 | Always On | Business Strategy | Economics | Futurism | Politics | Telecommunications | law
July 26, 2004
As the Senate Judiciary Committee prepares to vote on the so-called INDUCE Act, which would hold technology's creators liable for what's done with their creations, there are some who are calling this an attack on our rights, and an attack on technology.
It's worse than that.
It's an attack on America. What chairman Orrin Hatch (left, from Internet Weekly) and his colleagues are plotting is nothing less than a 9-11 attack on the American economy.
+ TrackBacks (0) | Category: Copyright | History | law
July 22, 2004
Russian and British authorities have cooperated in smashing a ring that was organizing denial of service attacks against Internet gambling sites. The people arrested were mostly in their early 20s.
A nasty person might ask some nasty questions, however.
+ TrackBacks (0) | Category: law
July 07, 2004
I deliberately waited before writing about the atrocious, god-awful "Councilman" decision, in which a U.S. Appeals Court panel ruled, 2-1, that your e-mail isn't private when it's in transit, on someone else's server.
To arrive at this decision, executive director Marc Rotenberg of the Electronic Privacy Information Center wrote, the court basically had to twist the 1986 Wiretap Act into a pretzel. It's one more example of how important judges are in the American judicial system. (That's Rotenberg, left, as he appeared on the PBS NewsHour in 2000.)
+ TrackBacks (0) | Category: Internet | Journalism | Politics | Security | Telecommunications | law
July 05, 2004
+ TrackBacks (0) | Category: law
June 23, 2004
In an item earlier today, I wondered what problems may develop from recent attempts by MasterCard and NameProtect to stop "phishing," phony solicitations for personal information using the stolen trade dress of banks and other institutions.
Brad Hutchings (pictured) responds:
+ TrackBacks (0) | Category: law
+ TrackBacks (0) | Category: Business Strategy | Internet | Journalism | Telecommunications | law | spam
June 01, 2004
I'm for growth and change. It's the only way to stay ahead of population and pollution without engaging the Four Horsemen of the Apocalypse full-time.
The success of the 1990s, and the technology industry failures of our own time, have brought me to some political principles that need to be embraced by everyone -- and which are opposed by politicians of every type -- in order to bring back growth.
All these were seen as important in the 1990s. All have been discarded in our time. And we have paid the price for that.
+ TrackBacks (0) | Category: Futurism | Politics | law
April 25, 2004
The decision by Microsoft to accept (and pay for) others' patent claims was designed to create peace in the technology world. Pay 'em off and move forward.
But peace is not at hand. New patent claimants pop up every day. Now Forgent Networks is suing everyone in sight, claiming it owns JPEG, and its rights expire in 2006.
+ TrackBacks (0) | Category: law
April 21, 2004
Had it not been for Enron, and Arthur Andersen, then I really doubt Sanjay Kumar and Computer Associates would be in the dock today. (Photo from The Inquirer.)
But the Enron scandal did happen, so what looked like normal business practice came to be seen as a scandal. The standard practices of the last decade, like gaming revenues to keep stock analysts happy, are now seen as morally reprehensible.
That, at least, seems the great lesson from the fall of Sanjay Kumar, who stepped down as CEO of Computer Associates today.
More shoes have yet to drop.
+ TrackBacks (0) | Category: law
April 19, 2004
+ TrackBacks (0) | Category: law
March 23, 2004
You may remember a few notes ago I wrote about how the spam flood has shifted since January, from "real spam" (phony offers with forged addresses) to "spam that is not spam" (real offers from real addresses). The volume hasn't declined, if anything it's gone up.
But my lovely bride found out exactly why the law is worthless. She looked at one of the "opt-outs" on a "spam that is not spam" message.
It only opts you out on that client.
+ TrackBacks (0) | Category: law
March 22, 2004
I had to spend the afternoon cleaning out my son's inbox. He has over 2,000 messages, dating back to September.
It was very educational. (Image from ABC News.)
In the course of the afternoon I learned the real impact of the CAN-SPAM Act. For every sex spammer, viagra spammer or scam spammer who has backed away, two "spam that is not spam" 'ers have come to take their place.
I noticed this as soon as the date on the messages changed from 2003 to 2004.
+ TrackBacks (0) | Category: law
March 13, 2004
The paranoid have been having a field day with the latest news coming out of the SCO vs. IBM suit. (The postcard is available through GoMail.)
I'll admit that just because you're paranoid doesn't mean they are not out to get you.
Just as many figure John Kerry as a proxy for the Kennedys, press reports are indicating that SCO is really just a proxy for Microsoft, on a FUD attack against an operating system it can't fight in conventional ways.
It the paranoid are right, Microsoft is simply Clueless. Or, perhaps, there's a point it wants to prove, namely that there should be no such thing as "public property" when it comes to the world of ideas.
If that is indeed the point, I disagree. Here's why.
+ TrackBacks (0) | Category: law
March 09, 2004
Fear, Uncertainty and Doubt (FUD) are unhealthy for economies and any living business. (The slightly edited Gary Larson cartoon here is from David Weinberger's Joho the Blog. In the original, the word Linux is replaced by Fud, a "dog's spelling" of food.)
So it is that businesses, especially large businesses, work hard to reduce FUD as much as possible.
That's why I don't automatically condemn companies like Computer Associates for choosing to sign a license for something they may not need a license for, namely Linux.
They're doing the rational thing. Whether it's the right thing is for a court to decide.
+ TrackBacks (0) | Category: law