Review: A book of deliberately, hilariously, wrong advice—with explainers and diagrams.
Talking about Saturn Vs at on stage at a NASA facility is always appropriate—here's XKCD creator Randall Munroe doing just that in 2015. (credit: Lee Hutchinson)
Any time physicists gets together, one of them will tell a very old joke about a farmer who wants to make their farm more efficient. In the joke, a list of inappropriate professionals offer the farmer reasonable suggestions. The punchline comes from the physicist who responds "Well, let's assume that cows are spheres... "
The actual punchline isn't in the joke itself—it's what happens next: one of the physicists listening to the joke will lecture the rest on how the approximation isn't that bad really. They will end with a list of all the things you can learn about the world from spherical cows. The joke only ends when the bar closes. Physicists: ruining jokes, cows, farming, and most of biology since 1687.
Randall Munroe's new book, How To, is the spherical cows joke relentlessly replicated and explained without—and this is the important part—removing the humor. Munroe has, as the subtitle Absurd Advice for Real-World Problems explains, produced a book of absurd scientific advice. It is, essentially, a "how you shouldn't" manual. With that in mind, you should not read How To as you would an ordinary book.
The Lenovo Yoga C640 is a thin and light laptop with a 13.3 inch touchscreen display, a 360-degree hinge, and optional support for 4G LTE if you want a model with always-connected capabilities. In fact, Lenovo says this is an update to last year’…
The Lenovo Yoga C640 is a thin and light laptop with a 13.3 inch touchscreen display, a 360-degree hinge, and optional support for 4G LTE if you want a model with always-connected capabilities. In fact, Lenovo says this is an update to last year’s Yoga 630 which had a Qualcomm Snapdragon 850 processor and built-in LTE. […]
While it’s common knowledge that anti-piracy companies like to spy on the activities of pirates, ISPs aren’t regularly linked with the same kind of activity. However, with help from ISPs, a UK-based anti-piracy company says it operates a system that monitors consumption of pirate content over broadband networks by providing the ISPs with piracy intelligence.
For as long as peer-to-peer (P2P) networks such as BitTorrent have existed, anti-piracy companies have been monitoring the activities of those who use them.
This is to be expected. Not only do the companies have a vested interest in keeping an eye on what’s going on, by their very nature P2P networks are open and easily trackable.
The rise of streaming piracy – computer servers streaming video directly to end-users – has presented a new problem, however. Unlike P2P systems, there’s no easy way for an anti-piracy company to get in between the user and the server to see what’s going on. Only ISPs can see that data, which is why a recent interview caught our eye.
Friend MTS (FMTS) is an anti-piracy company based in Birmingham, UK. They’re perhaps best known for their live IPTV blocking work carried out on behalf of the Premier League, for which they have to partner to a greater or lesser extent with ISPs in the UK. FMTS tells them which servers to block, and the ISPs carry out it, broadly speaking.
However, in a recent interview, Simon Hanna of FMTS spoke about a different type of collaboration with ISPs, one that has the potential to raise eyebrows among privacy advocates, especially those who hoped all of their Internet traffic would remain completely their business.
Quite soon into the interview, Hanna correctly points out that broad availability of pirated content online tends to give an indication of how popular particular content is but isn’t always a great indicator of how much is actually being consumed.
“Consumption is a much more valuable indicator than pure availability of content and consumption has always been very difficult to monitor. People often throw numbers out but they are guesswork at best and we don’t really put a lot of faith in the numbers that have been made available in the past,” Hanna said.
With this in mind, FMTS say they have developed a system that allows them to work with content owners and ISPs to form a greater understanding of the consumption of media from online ‘pirate’ sources. The company does this by first tracking the servers down from where the content is being streamed and handing this information to the ISPs.
“We can see through our monitoring activities the range of servers that are available globally delivering this pirate content and we can provide that information to an ISP who are monitoring the flows of data requests in and out of the networks all day long,” Hanna explained.
“They can use these lists of IP addresses to really focus on consumption of content from those servers by the broadband subscribers within the ISP network and that will then give information around the scale of the problem.”
That’s probably a bit of a “wow” moment for many Internet subscribers who believed that once their traffic entered their ISP’s network it wouldn’t be closely monitored until it left to access a BitTorrent swarm, for example.
If FMTS’ statement is what it seems, some ISPs might be following their customers’ broadband usage habits a little bit more intimately than previously thought.
On the plus side, at least as far as individual subscribers are concerned, FMTS say they don’t look at or care about “the individuals themselves”. They’re not looking for any personally identifiable information and are just trying to get a handle on the volume of content being consumed.
Whether dual broadband/TV supplying companies are more interested in this data remains open to question, however.
“Because inevitably, if a large proportion of the ISP’s broadband subscribers are actually consuming content, they are not paying for the associated operator’s TV services,” Hanna added.
In many cases, of course, the broadband provider/ISP is also a supplier of TV content to the same customers – Sky, Virgin Media, and BT in the UK, for example. There’s no claim that these ISPs are indeed teaming up with FMTS in this project but any and all might be interested in the information it reportedly makes available.
“We work with content owners to basically go out and find pirate sources of the content. We can then real-time update these lists, feed this information into the ISPs and the ISPs can then use this information to generate the reporting real-time but with the flow monitoring, more in-depth reports of three-months plus worth of data, to actually get a real picture of consumption habits, both of TV channels but also specific events and pieces of content,” Hanna revealed.
FMTS says that monitoring consumption is important because it allows action previously taken to reduce availability to be measured at the end where it really matters.
“If you can then reduce the availability, then inevitably you should be able to reduce the consumption but you keep monitoring to observe that you do actually have this effect. If you can reduce the availability and reduce the consumption, chances are you would expect you would then preserve and reinforce your pay-TV revenues,” Hanna concluded.
The full interview, which covers many aspects of anti-piracy activity, from general enforcement to fingerprinting and watermarking, can be viewed here.
Kickstarter ist auch eine Plattform für sonderbare Produkte. Die Beatbox ist beispielsweise ein programmierbares MIDI-Mischpult, das von Nutzern zusammengebaut wird. Das Chassis ist aus Pappe konstruiert. Die Buttons stammen von Arcade-Automaten. (Kick…
Kickstarter ist auch eine Plattform für sonderbare Produkte. Die Beatbox ist beispielsweise ein programmierbares MIDI-Mischpult, das von Nutzern zusammengebaut wird. Das Chassis ist aus Pappe konstruiert. Die Buttons stammen von Arcade-Automaten. (Kickstarter, Eingabegerät)
Auch beim iPhone 11 Pro Max lässt sich iFixit eine komplette Demontage nicht entgehen: Das Gerät nutzt wohl tatsächlich 4 GByte RAM. Außerdem waren die Bastler vom wesentlich größeren Akku und gleich zwei Ladekabeln überrascht. (iPhone, Apple)
Auch beim iPhone 11 Pro Max lässt sich iFixit eine komplette Demontage nicht entgehen: Das Gerät nutzt wohl tatsächlich 4 GByte RAM. Außerdem waren die Bastler vom wesentlich größeren Akku und gleich zwei Ladekabeln überrascht. (iPhone, Apple)
Mehr Transparenz, mehr Entscheidungsrecht und eine Anlaufstelle: Fairtube fordert von Googles Videoplattform Youtube bessere Arbeitsbedingungen für Inhalteersteller. Die Parteien werden im Oktober miteinander sprechen. Beide Seiten sind in ihren Ansich…
Mehr Transparenz, mehr Entscheidungsrecht und eine Anlaufstelle: Fairtube fordert von Googles Videoplattform Youtube bessere Arbeitsbedingungen für Inhalteersteller. Die Parteien werden im Oktober miteinander sprechen. Beide Seiten sind in ihren Ansichten recht weit voneinander entfernt. (Youtube, Google)
Dem Nachrichtenmagazin Spiegel hat Rui Pinto Millionen an Dokumenten der Fußballbranche zugespielt. In seiner Heimat Portugal wartet er auf den Prozess. In 147 Fällen soll er beschuldigt werden, darunter auch der Erpressung. (Whistleblower, Rechtsstrei…
Dem Nachrichtenmagazin Spiegel hat Rui Pinto Millionen an Dokumenten der Fußballbranche zugespielt. In seiner Heimat Portugal wartet er auf den Prozess. In 147 Fällen soll er beschuldigt werden, darunter auch der Erpressung. (Whistleblower, Rechtsstreitigkeiten)
Moderne Windturbinen sind viel leistungsfähiger als alte Anlagen. Doch nicht immer kann man Alt gegen Neu tauschen. Mit ein paar einfachen Techniktricks oder Umbaumaßnahmen lässt sich der Ertrag von bestehenden Windkraft-Anlagen dennoch steigern. Von D…
Moderne Windturbinen sind viel leistungsfähiger als alte Anlagen. Doch nicht immer kann man Alt gegen Neu tauschen. Mit ein paar einfachen Techniktricks oder Umbaumaßnahmen lässt sich der Ertrag von bestehenden Windkraft-Anlagen dennoch steigern. Von Daniel Hautmann (Windkraft, Internet)
The House Judiciary Committee is concerned that including DMCA-style safe harbors in new trade agreements could become problematic. The Copyright Office is evaluating the effectiveness of the DMCA and may soon propose changes. That will be much more complex if the 20-year-old language is included in new trade deals, as is the case with the proposed United States-Mexico-Canada Agreement.
When President Clinton signed the Digital Millenium Copyright Act (DMCA) into law in 1998, its goal was to ready copyright law for the digital age.
The law introduced safe harbors for Internet services (DMCA Section 512), meaning that they can’t be held liable for their pirating users as long as they properly process takedown notices and deal with repeat infringers.
Today the four-letter acronym is known around the world and the United States appears keen to export it in future trade agreements. Most recently, a DMCA-style provision was added to the United States-Mexico-Canada Agreement (USMCA), which covers a wide variety of trade issues including copyright-related topics.
While this would have been welcomed by rightsholders twenty years ago, the situation looks quite different today. The music industry, in particular, believes that the DMCA is obsolete, dysfunctional, and even harmful. For these reasons, major industry groups would like to see it replaced with something ‘better.’
When the first draft of the USMCA was published, the RIAA made this clear in no uncertain terms. “Modern trade treaties should advance the policy priority of encouraging more accountability on public platforms, not less,” RIAA President Mitch Glazier said.
The issue was crucial enough to be specifically mentioned in the RIAA’s lobbying disclosures at the U.S. House and Senate. This may have had an effect, as this week the concerns were picked up by the House Judiciary Committee.
In a letter to the U.S. Trade Representative (USTR), the Judiciary Committee points out that Section 512 of the DMCA is widely debated and that “some” have called on Congress to update it.
The Committee notes that the U.S. Government conducted an in-depth review over the past years of which the results are expected soon. This may in part be impacted by the European Union’s new Copyright Directive which hints at potential upload filters and increases in liability for online service providers.
“The U.S. Copyright Office is expected to produce a report on Section 512 around the end of this year, the result of a multi-year process that started in 2015. Moreover, the European Union has recently issued a copyright directive that includes reforms to its analogous safe harbor for online platforms, which may have an impact on the U.S. domestic policy debate,” the letter reads.
The Judiciary Committee doesn’t take a position in this debate but it stresses that adding the widely contested safe harbor language to the USMCA and other trade agreements, would not be wise at this point.
“[W]e find it problematic for the United States to export language mirroring this provision while such serious policy discussions are ongoing,” the letter, signed by House Judiciary Committee Chairman Jerrold Nadler and Ranking Member Doug Collins reads.
“For that reason, we do not believe a provision requiring parties to adopt a Section 512-style safe harbor system of the type mandated by Article 20.89 should continue to be included in future trade agreements,” the letter adds.
The Committee urges the USTR to take the matter seriously and consider the possible changes that are coming. This largely reflects the position of several major copyright industry groups, including the RIAA.
If the language is indeed removed or changed it will be a major setback for Internet services and various digital rights groups. This includes the Re:Create Coalition, which welcomed the inclusion of these protections last year.
—
A copy of the letter sent by the House of Representatives Committee on the Judiciary to the USTR is available here (pdf).
You must be logged in to post a comment.