Re: Password changes
Someone seems to have hacked your account and copied your post.
22 posts • joined 25 Apr 2008
Someone seems to have hacked your account and copied your post.
"Still, it is not hard to see a practical application for the copyright-conscious printers in environments such as libraries or schools, where administrators would seek to limit the possibility of infringement from users wanting to print out partial or entire works."
Except that in UK schools, for example, there is a blanket licence to print limited extracts from copyrighted works, so the printer would need to know the length of the extract in relation to the length of the whole work.
How's 2016 for forwards and backwards compatibility?
Will previous versions screw up its formatting? (See, for example, the unpatched differences between Word 2007 and Word 2010. The file format was apparently the same, but switching between them had the nasty habit of removing the spaces from between words.)
Harmonisation should make it easier to navigate the legal labyrinth, but there's a hell of a lot to harmonise.
Just to muddy the waters a bit, up until last week, the place of supply for goods delivered over the internet was the supplier's location. Now, for VAT purposes, the place of supply is the customer's location.
If the applicable tax law is that of the customer's country, shouldn't the applicable copyright law also be that of the customer's country?
(Both things would be easier if harmonised.)
... when there's an App that recognises a song when I hum it.
(The "what's this tune going round in my head" app.)
The way that UK financial institutions work is that there is a value threshold (I forget what it is, but it's way over the value of an iPad).
If the deceased's holding in that institution is below the threshold, they will release the holding on the basis of a copy of the death certificate and a copy of the will.
If the value is above threshold, then they require a probate certificate - that is to say, the will must have been proved in court. This is a standard procedure that requires the executor(s) of the will swear an oath that the will is genuine. They then get as many certificates as they need to send to the financial institutions who then act on their instructions.
Why is Apple different? A probate certificate should function in the same way as the court order - it says there is a genuine will which allocated the deceased's property in a particular way.
Isn't the iPad (and code) part of the deceased's property?
... to expect any rational motive for their actions?
Why did they pick on this particular target for their abuse?
You write as if "crude filters" are a thing of the past.
Let me assure you that they are still in place.
The data centre is probably in Gloucester for the convenience of our friends in Cheltenham.
Parody ain't black and white. The grey areas may be in need of clarification (which I don't think the consultation delivers).
If I write lyrics to somebody else's tune, then if I want to do anything public or commercial with that work, I need the permission of the copyright holder of the tune. (Why should it be otherwise?)
On the other hand, if Mitch Ben or the Heebie Jeebies (Angus Deayton, Michael Fenton Stevens, and Philip Pope) write a parody in the style of someone else, they should have the right to create original works for the purpose of taking the piss.
The parody has to come close to the original to do its job, but somewhere there's a crossover point, where melody or lyrics (in the example of a song) move from parody to appropriation. At that boundary we have more jobs for m'learned friends.
[Holmes icon because some wazzacks are still trying to claim copyright for Conan Doyle material.]
A few years back, there was a spate of muggings and thefts of lap-tops from a railway station near Amsterdam which was frequented by the staff of an electronics company, and also by employees of a consultancy company.
The electonics company staff received a corporate memo (along the lines of the Carphone Warehouse one), telling them to look after their personal safety as a first priority.
The consultants received a memo from their parent company telling them to password-protect their hard drives.
When they get to Thunderbird 5, will it be resident in the Cloud?
(Mine's the blue one with the sash.)
It's not just your bank.
I got an Identity Theft sales pitch from Staples this morning. Their solution to Identity Theft? A shredder.
Verb (imperative): Study
I am not the pathologist whose comment Alex requested but....
To have a heart attack in these circumstances, you have to be predisposed to heart attack (otherwise everyone struck by a police baton and pushed to the ground would have a heart attack).
Heart attacks are caused by blockages in blood vessels around the heart. (Predisposition to heart attack usually means that those vessels are constricted and are therefore more vulnerable to blockage by blood clots than vessels in good condition.)
I can speculate on two contributions to heart attack in this case:
Firstly, stress contributes to heart attacks (apparently by increasing blood pressure - a process in which the body "deliberately" constricts blood vessels. Where blood vessels are already constricted, recovery from stress tends to take longer than it would do in someone in "normal" physical condition). I would contend that being attacked by the police was a stressful experience.
Secondly, blood clots are formed by platelets which can form in response to damage to blood vessels - clotting is part of the process of repair to damaged caused by contusion - for example, being struck by a baton. So where there is bruising, there is increased formation of clots. It may be possible that some of the clotting agents are swept along in the blood stream to areas where they are not needed - and in the case of already constricted blood vessels, to places where they do damage. Clotting is not an instant process (otherwise all wounds would heal instantly.)
So, I can imagine a chain of events from assault to heart attack.
For a more informed view, a pathologist and a coroner are required.
The problem that BT got into with the forum threads was that they deliberately restricted threads, and, by way of a sweetener, they created a limited number of threads (eventually one) in which they invited questions about Webwise.
Since Webwise had not been implemented, all the questions were about how it was going to work, and the only people who could answer those questions were BT.
BT did not answer the questions. (And they steadfastly did not answer the questions about when they would answer the questions.)
Furthermore, since the people who were asking questions were the ones who knew about Phorm and were therefore convinced that it was a thoroughly bad idea, all of the questions were hostile.
As BT did not answer the questions, the questions became progressively more hostile.
BT had two ways out: they could have made the honest admission that spying on their customers was a bad idea. Instead, they took the Stalinist approach.
Mine's the MAC.
It is unlike ATOS Origin to be so careless with data.
A few years ago, there was a spate of violent muggings, some involving the theft of laptop computers, from a railway station frequented by personnel from ATOS Origin and one of its clients. Employees of the client company received a memo giving them advice about personal safety. Employees of ATOS Origin received a memo reminding them of the steps they needed to take to keep their data secure.
Mine's the one with the encription keys on the same ring as the car keys.
In the full text of the ICO response on the cable forum, they say "BT’s view is that as the 2007 trial was small scale and technical in nature and no adverts were served, it would have been difficult to frame any advice for customers about the operation of cookies, and obtain any relevant consents for the processing of traffic data"
In other words, "we don't have to tell customers that we're sharing every detail of their browsing habits with a third party because we're not using it to generate adverts".
That bit of BT sophistry should have been given a good mauling by the ICO, instead, the toothless tiger didn't even attempt a gummy suck.
Paris, on the grounds that she'd appreciate the last comment.
Note the quote from Virgin Media's Webwise page: "Webwise is a technically complex application which could be implemented in a number of different ways and it will be some months before we can confirm if the service will be made available to our customers and if so, how and when it would be deployed."
That could be read as "We're going to keep quiet until the fuss dies down, then make our move".
Don't let up the pressure - it still stinks!
It should be noted that Phorm say that they will not include porn in their profiling.
I believe them.
It should also be noted - and emphasised over and over again when this business comes to court - that the profiling is done in software.
So whilst I believe Phorm now in this respect, I also know that their software can be updated, and that in future they will come under commercial pressure to make more money by looking for opportunities to expand their profiling. Because it is software, they can adapt it to scruitinising anything they wish.
For me, the big issue with Phorm is that it is the thin end of a wedge. I do not want to have to wait for the abuse to happen before a legal challenge is mounted, I want the potential for abuse to be prevented.
Amongst many others, there is an interesting difference between the level of detail between the Home Office assessment and Bohm's with respect to the presumed consent of Webmasters to access by Phorm.
The Home Office makes the assumption that "because it's on the web, then a search engine can get to it, therefore it's open to anyone, including Phorm".
As Bohm points out, that ain't so. In common with many others, my web site has some private areas. The private areas do not have links from anywhere else on the web, so search engines cannot find them. However, because Phorm follows the user, not a spider, if I've told anyone how to get to the private area, then Phorm can follow them there - and it does not give me, as webmaster a way of preventing this (aside from restructuring the pages by encryiption).
Phorm is presuming a consent which I do not grant!
sudo killall -9 Autopilot