Bulletin Issue 22

Total Page:16

File Type:pdf, Size:1020Kb

Bulletin Issue 22 Issue 22 Bulletin June 2013 Contents millions, of people who are interested in GNU/Linux but have never tried it and don’t know where to start when it Friends don’t let friends 1 comes to changing operating systems. use Windows 8 The good news is that we can change Why call it the 2 these curious bystanders into die-hard Swindle? free software users; all we need is your Video streaming at 4 help. LibrePlanet 2013 You can’t make a good 5 software idea patent FSF polo shirts, plus 6 internship opportunities FOSSBangladesh 7 Stop the Hollyweb 8 A short recap of RMS’s 10 recent adventures Licensing & Compliance 11 Lab update Friends don’t let friends use Windows 8 by Libby Reinish Windows 8 was released last fall. Campaigns Manager Right now, a lot of people who’ve been using Windows 7 are wondering s FSF members, you know that if they should switch to its expensive Athere are a million reasons to use new replacement. To many, it seems GNU/Linux. There are the ethical like the only option. What’s worse, reasons along with the practical ones, Microsoft is leading the way in im- and of course there’s the vibrant com- plementing Secure Boot, which makes munity of free software users around it harder to upgrade Windows 8 ma- the world. So why isn’t GNU/Linux chines to free operating systems. And the #1 operating system out there? that’s nothing compared to Restricted Mainly because of a lack of knowledge Boot, which makes certain machines— and a lack of experience. There are like tablets—completely impossible to probably hundreds of thousands, if not upgrade. Restricted boot is not good 1 for software freedom, but it gives us a good opportunity to highlight the The Free Software problems with nonfree operating sys- Supporter tems and get people excited about switching to GNU/Linux. More than 8,500 people receive this Receive our monthly email Bulletin and tens of thousands more newsletter: fsf.org/fss. will read this article on fsf.org. If each of you were to help one person install GNU/Linux for the first time, it would transform the free software Why call it the movement. So this summer, talk to Swindle? that friend who seems fascinated by all by Richard Stallman the mysterious stuff you’re typing into President your terminal. Help a friend who can’t go out of my way to call nasty afford a new computer rejuvenate their Ithings by names that criticize them. current, virus-laden one. Rescue some- I call Apple’s user-subjugating com- one with a Windows 7 computer who is puters the “iThings,” and Amazon’s distraught at the prospect of switching abusive e-reader the “Swindle.” Some- to Windows 8. Better yet, find five of times I refer to Microsoft’s operating these people and host an install party. system as “Losedows”; I referred to Make sure to show these friends our Microsoft’s first operating system as infographic at upgradefromwindows. “MS-Dog.”1 Of course, I do this to org. It’s is a great tool to help get peo- vent my feelings and have fun. But this ple excited about ditching Windows fun is more than personal; it serves an and upgrading to GNU/Linux. important purpose. Mocking our ene- As free software advocates, we can mies recruits the power of humor into write FAQs and pamphlets til the cows our cause. come home, but when it comes to in- Twisting a name is disrespectful. stalling GNU/Linux for the first time, If we respected the makers of these there is no substitute for in-person as- products, we would use the names that sistance from a friend. they chose . and that’s exactly the Friends don’t let friends use Win- point. These noxious products deserve dows 8! Sign our pledge to help our contempt, not our respect. Every someone upgrade to GNU/Linux at proprietary program subjects its users upgradefromwindows.org. Then, to some entity’s power, but nowadays write to [email protected] and tell most of them go beyond that to spy us how it went. We’ll choose a success on users, restrict them and even push story to include in the next Bulletin. them around: the trend is for products Software freedom for all is just an to get nastier. These products deserve install party away. Happy hacking. to be wiped out. Those with DRM ought to be illegal. 1Take action against these products: u.fsf.org/ithings, u.fsf.org/swindle, u.fsf.org/ebookslist, upgradefromwindows.org 2 For instance, DRM refers to building technology products to restrict their users for the benefit of someone else. This inexcusable practice deserves our burning hatred until we wipe it out. Naturally, those responsible gave it a name that frames the issue from their point of view: “Digital Rights Man- agement.” This name is the basis of a public relations campaign that aims to win support from entities ranging from governments to the W3C.2 When we mention them, we should To use their term is to take their show that we condemn them, and side. If that’s not the side you’re on, what easier way than by twisting their why give it your implicit support? names? If we don’t do that, it is all We take the users’ side, and from too easy to mention them and fail to the users’ point of view, what these present the condemnation. When the malfeatures manage are not rights but product comes up in the middle of restrictions. So we call them “Digital some other topic, for instance, explain- Restrictions Management.” ing at greater length that the product Neither of those terms is neutral: is bad might seem like a long digres- choose a term, and you choose a side. sion. Please choose the users’ side and please To mention these products by name let it show. and fail to condemn them has the ef- Once, a man in the audience at my fect of legitimizing them, which is the speech claimed that the name “Digi- opposite of what they call for. tal Rights Management” was the offi- Companies choose names for prod- cial name of “DRM,” the only possi- ucts as part of a marketing plan. They ble correct name, because it was the choose names they think people will be first name. He argued that as a conse- likely to repeat, then invest millions quence it was wrong for us to say “Dig- of dollars in marketing campaigns to ital Restrictions Management.” make people repeat and think about Those who make a product or carry those names — usually these market- out a business practice typically choose ing campaigns are intended to convince a name for it before we even know it ex- people to admire the products based on ists. If their temporal precedence obli- their superficial attractions and over- gated us to use their name, they would look the harm they do. have an additional automatic advan- Every time we call these products tage, on top of their money, their me- by the names the companies use, we dia influence and their technological contribute to their marketing cam- position. We would have to fight them paigns. Repeating those names is ac- with our mouths tied behind our backs. tive support for the products; twisting Some people feel a distaste for them denies the products our support. twisting names and say it sounds “ju- Other terminology besides prod- 2 uct names can raise a similar issue. u.fsf.org/drm 3 venile” or “unprofessional.” What help prepare the system.3 they mean is, it doesn’t sound hu- George brought an Elphel 353 cam- morless and stodgy — and that’s a era to stream video of the sessions in good thing, because we would not have one of the Science Center’s large lec- laughter on our side if we tried to ture halls. Along with it he provided a sound “professional.” Fighting oppres- custom-built case containing a router sion is far more serious than profes- and a computer running gNewSense, sional work, so we’ve got to add comic a free GNU/Linux distribution. The relief. It calls for real maturity, which other lecture hall used George’s Canon includes some childishness, not “acting FS22 camcorder with analog output like an adult.” and a USB adapter called EasyCAP If you don’t like our choice of name 60+, which makes it simple to capture parodies, you can invent your own. video in GNU/Linux. The more, the merrier. Of course, there are other ways to express con- demnation. If you want to sound “pro- fessional,” you can show it in other ways. They can get the point across, but they require more time and ef- fort, especially if you don’t make use of mockery. Take care this does not this lead you to skimp; don’t let the pres- sure against such “digression” push you into insufficiently criticizing the nasty things you mention, because that The conference’s three remaining would have the effect of legitimizing rooms were each equipped with a them. regular webcam and a Lenovo X60 ThinkPad laptop running the free GNU/Linux distribution Trisquel. We Video streaming at had X60s on hand because we are in LibrePlanet 2013 the process of flashing them with core- boot, a free software BIOS replace- by Nico Cesar ment.4 Senior System Administrator GStreamer was the program used bout 150 people came to Cam- for video capture and transmission to Abridge’s Harvard Science Center our streaming server.
Recommended publications
  • The Walled Gardens of Ebook Surveillance: a Brief Set of Arguments Against DRM in Libraries
    City University of New York (CUNY) CUNY Academic Works Publications and Research CUNY Graduate Center 2015 The Walled Gardens of Ebook Surveillance: A Brief Set of Arguments Against DRM in Libraries Alycia Sellie Graduate Center, CUNY How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_pubs/162 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] The Walled Gardens of Ebook Surveillance: A Brief Set of Arguments Against DRM in Libraries There are three claims I will make in this article about including electronic books with DRM restrictions in library collections. These arguments center upon what the presence of restricted ebooks signifies to patrons about libraries. The first argument outlines how providing books with DRM encourages library users to adopt low expectations for how their personal information will be shared and collected. Second, when users encounter DRM within library collections, not only are they frustrated by the ways that these systems restrict their use of a text, but they become more broadly disappointed in their library. Finally, I will show how the current technological landscape that allows third party surveillance via DRM threatens the professional standing of librarians as protectors of patron information. What is DRM? To me, DRM stands for Digital Restrictions Management. But choosing to call it such is a political choice.1 Others refer to DRM as Digital Rights Management. In a nutshell, DRM controls access to digital content and restricts the functionality a devices, such as an ebook reader or computer.
    [Show full text]
  • Jaromil's Research 2009
    Jaromil’s Research 2009 Jaromil’s Journal of Musings November 12, 2010 Almost every day I dedicate 2 good hours to research: nothing in particular, just looking around for inspirations, tools, publications and what not. Thanks go to the NIMk1 employing me in research and development. This diary is still in fieri: some links are scattered and still lacking comments, while it will grow complete over time, you might be also interested to read the research diary 20082. : Mon, 5 Jan 2009 John Maddog Hall: http://www.linux-magazine.com/online/blogs/paw_prints_writings_of_the_ maddog/campus_party_brazil_maddog_s_challenge_multimedia_and_free_software : Wed, 7 Jan 2009 uscito zeitgeist final ??? Not quite in the zone Fri, 9 Jan 2009 http://www.metamute.org/en/content/not_quite_in_the_zone Ben Watson http://www.militantesthetix. co.uk/ Politics in Israel Tue, 13 Jan 2009 Just before the elections in Israel and right after the massacre of civilians in Gaza, which also included bombing of UN headquarters and public incitations to murder peace activists3, it’s maybe time to have a look at how reasonable people are doing over there. One impressive campaign is December 18th4: at the motto of FREE THE SHMINISTIM“ young conscious objectors (among them also the daughter of a former deputy head of Mossad) stepped forward and refused to serve the omnipresent militarization of Israel, the country where they are born and that still forces them to serve IDF for 2 to 3 years. Since 20 years now (and finally) we had abolition of coercive military service for youth in Europe: this is definitely one of the most important political standpoints for Israel to work on, if it intends to get closer to Europe.
    [Show full text]
  • Open Source Software
    Open Source Software Agenda ● Definitions of different “types” of software ● Key characteristics of each type ● Key points of difference ● Cost of free/open source software ● Historical overview ● Licenses ● Examples of free/open source alternatives in a few domains Agenda (cont.) ● Extensions of the “open source” philosophy to other domains ● The anti-open-source brigade ● Reasons for using OSS Open source software ● Software whose source code can be viewed, modified and re-distributed in its modified form after it meets certain licensing restrictions, e.g., – indicating the authorship of various components – requiring that the modified version of the product also be open-sourced Free software ● As defined by Richard Stallman, affords the following freedoms to its users: – Freedom 0: The freedom to run the program for any purpose. – Freedom 1: The freedom to study how the program works, and change it to make it do what you wish. – Freedom 2: The freedom to redistribute copies so you can help your neighbor. – Freedom 3: The freedom to improve the program, and release your improvements (and modified versions in general) to the public, so that the whole community benefits. Source: http://www.gnu.org/philosophy/free-sw.html Differences between open source and free software ● “The term 'open source' software is used by some people to mean more or less the same category as free software. It is not exactly the same class of software: they accept some licenses that we consider too restrictive, and there are free software licenses they have not
    [Show full text]
  • The Ethical Visions of Copyright Law
    GRIMMELMANN FINAL 3/30/2009 10:08:14 PM View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Digital Commons @ UM Law THE ETHICAL VISIONS OF COPYRIGHT LAW James Grimmelmann* INTRODUCTION All of intellectual property law is an act of imagination. If a tree falls in a forest and no one is around to call it “property,” the tree still exists. But the objects of intellectual property have no existence apart from what we give them. You can’t copyright an unwritten novel; you have no trademark rights in a word the consuming public has never heard of. We must imagine these things into being before we can make them the subject of legal rights and obligations. Nor is the work of imagination done at the moment of creation. We must constantly play a game of practical metaphysics to grant legal rights over things that can’t be seen or touched. When the legal system says that this assembly of gears and levers infringes on that set of marks on a piece of paper, it’s calling an abstraction into being. The “invention” that connects the two is itself a creation of the legal mind no less than the arrangement of parts is a creation of the engineering mind. Lawyers must decide whether a given abstraction is an invention at all (most of us would agree that a short story isn’t one); whether it has attributes like “new,” “useful,” “obvious,” and so on; and what exactly its limits are. None of these distinctions come ready-made in nature; they require continuous, purposeful, collective imagination.
    [Show full text]
  • Visión General Del Sistema GNU
    Traducciones de esta página Historia Filosofía Licencias Descargas Ayude a GNU ¡Únase a la FSF! Why GNU/Linux? Buscar Visión general del sistema GNU The GNU operating system is a complete free software system, upward­compatible with Unix. GNU stands for “GNU's Not Unix”. Richard Stallman made the Initial Announcement of the GNU Project in September 1983. A longer version called the GNU Manifesto was published in March 1985. It has been translated into several other languages. The name “GNU” was chosen because it met a few requirements; first, it was a recursive acronym for “GNU's Not Unix”, second, because it was a real word, and third, it was fun to say (or Sing). La palabra «libre» se refiere a libertad, no a precio [N. del T.: en inglés se usa la misma palabra para libre y gratuito]. Puedes o no pagar un precio por obtener software de GNU. De cualquier manera, una vez que obtienes el software, tienes tres libertades específicas para usarlo. La primera, la libertad de copiar el programa y darlo a tus amigos o compañeros de trabajo. La segunda la libertad de cambiar el programa como desees, por tener acceso completo al código fuente. La tercera, la libertad de distribuir una versión mejorada ayudando así a construir la comunidad (si redistribuye software de GNU, puede cobrar una tarifa por el acto físico de efectuar la copia, o bien puede regalar copias.). El proyecto para desarrollar el sistema GNU se denomina «Proyecto GNU». El Proyecto GNU se concibió en 1983 como una forma de devolver el espíritu cooperativo que prevalecía en la comunidad computacional en sus primeros días; hacer la cooperación posible al eliminar los obstáculos impuestos por los dueños de software privativo.
    [Show full text]
  • When You're Windows Are Broken Don't Be Surprised If You Feel The
    ecolonomics Paul Mobbs' newsletter of thoughts, ideas and observations on energy, economics and human ecology http://www.fraw.org.uk/mei/ecolonomics/ [email protected] When You're Windows are Broken don't be Surprised if you Feel the Cold Draught of Distress The phone rings; against the background noise of a call centre a young man says, “I am phoning about your Windows computer”. I reply casually, “I don't have a Windoze com- puter” (I always make an effort to nasally sound the 'z' consonant). He apologises and rings off. Later his simple statement begins to bother me; why would anyone assume an automatic connection between the concepts “Windows” and “computer” when clearly Windoze is one of the worst operating systems that you can load onto a computer in order to use it creatively? Banbury, Thursday 23rd December 2010. I'm sitting in my office below the skylight. This I don't want to be here. There are so many oth- pretty much typifies my existence for the last few er more interesting things I could be doing months. However, whilst usually I'm labouring here today; as I sit looking through my window on the on behalf of someone else today I'm labouring here snowy-white world I'd certainly rather be out- for myself. It's nearly Christmas and, as usual (it's side. I'm here for one simple reason – it's neces- the quiet point in the year), I'm conducting my annu- sary. Whether I like it or not, I need computers to al systems back-up, re-stall and reload pantomime.
    [Show full text]
  • The Intel Management Engine: an Attack on Computer Users' Freedom by Denis Gnutoo Carikli
    A statement by FSF President Richard Stallman on the Intel Management Engine (ME): "Meltdown and Spectre are errors. Grave errors, to be sure, but not evidently malicious. Everyone makes mistakes. Intel has done far worse with its CPUs than make a mistake. It has built in an intentional back door called the Management Engine. Important as these bugs are, don©t let Intel©s mistakes distract you from Intel©s deliberate attack!" The Intel Management Engine: an attack on computer users© freedom By Denis GNUtoo Carikli With security issues like the Spectre and Meltdown vulnerabilities (https://www.cnet.com/news/meltdown-spectre-intel-ceo-no-recall-chip-processor/) discovered in Intel chips in early 2018, it became more important than ever to talk about the necessity of software freedom in these deeply embedded technologies. Serious as though these bugs may be, we cannot let them distract us from the broader issues: Intel considers the Intel Management Engine a feature, while it©s nothing more than a threat to user freedom. Thanks to Denis GNUtoo Carikli, we have a new basis for that conversation in this article. The Intel Management Engine is a tool that ships with Intel chipsets, purportedly to ease the job of system administrators. But in reality, it is another restriction on user freedoms, imposed by a company, and used to control your computing. Carikli offers a moderately technical explanation of what©s happening with Management Engine, the ways in which it restricts rather than empowers users, and how it violates the four freedoms of free software. Carikli may be best known for his work on the Replicant project (https://www.replicant.us/), which he co-founded with Aaron Williamson, Bradley Kuhn, and Grazlano Sorbaioli.
    [Show full text]
  • Volume 160 May, 2020
    Volume 160 May, 2020 Short Topix: Zoombombing Is A Crime, Not A Prank GIMP Tutorial: Photo Editing, Part 3 PCLinuxOS Magazine Friends & Family - jzakiya Champions Of Regnum On PCLinuxOS EBCDIC Handling Library, Part 2 PCLinuxOS Recipe Corner: Lemon Pepper Chicken ms_meme's Nook: The Linux Bounce Wallpaper Roundup, Revisited Finally! ShotCut Running On PCLinuxOS And more inside! PCLinuxOS Magazine Page 1 In This Issue... 3 From The Chief Editor's Desk... 5 Staying "Safe" While You Stream: DBD's Tips On Living DRM-Free During Quarantine The PCLinuxOS name, logo and colors are the trademark of 6 Screenshot Showcase Texstar. 7 PCLinuxOS Recipe Corner: Lemon Pepper Chicken The PCLinuxOS Magazine is a monthly online publication containing PCLinuxOS-related materials. It is published 8 Wallpaper Roundup, Revisited primarily for members of the PCLinuxOS community. The magazine staff is comprised of volunteers from the 13 Screenshot Showcase PCLinuxOS community. 14 ms_meme's Nook: I Want It That Way Visit us online at http://www.pclosmag.com 15 Short Topix: Zoombombing Is A Crime, Not A Prank This release was made possible by the following volunteers: 19 Screenshot Showcase Chief Editor: Paul Arnote (parnote) 20 GIMP Tutorial: Photo Editing, Part 3 Assistant Editor: Meemaw Artwork: Sproggy, Timeth, ms_meme, Meemaw 22 Better than Zoom: Magazine Layout: Paul Arnote, Meemaw, ms_meme HTML Layout: YouCanToo Try These Free Software Tools For Staying In Touch Staff: 25 PCLinuxOS Family Member Spotlight: jzakiya ms_meme CgBoy Meemaw YouCanToo 26 Screenshot Showcase Gary L. Ratliff, Sr. Pete Kelly Daniel Meiß-Wilhelm phorneker 27 Champions Of Regnum On PCLinuxOS daiashi Khadis Thok 32 Screenshot Showcase Alessandro Ebersol Smileeb 33 EBCDIC Handling Library, Part 2 Contributors: 44 PCLinuxOS Bonus Recipe Corner: jzakiya Mashed Potato Mac & Cheese Bake 45 Screenshot Showcase The PCLinuxOS Magazine is released under the Creative 46 Finally! ShotCut Running On PCLinuxOS! Commons Attribution-NonCommercial-Share-Alike 3.0 Unported license.
    [Show full text]
  • Free Software, Free Society: Selected Essays of Richard M
    Free Software, Free Society Selected Essays of Richard M. Stallman Third Edition Richard M. Stallman This is the third edition of Free Software, Free Society: Selected Essays of Richard M. Stallman. Free Software Foundation 51 Franklin Street, Fifth Floor Boston, MA 02110-1335 Copyright c 2002, 2010, 2015 Free Software Foundation, Inc. Verbatim copying and distribution of this entire book are permitted worldwide, without royalty, in any medium, provided this notice is preserved. Permission is granted to copy and distribute translations of this book from the original English into another language provided the translation has been approved by the Free Software Foundation and the copyright notice and this permission notice are preserved on all copies. ISBN 978-0-9831592-5-4 Cover design and photograph by Kyle Winfree. iii Table of Contents Foreword to the Third Edition ::::::::::::::::::::::::::::::::::::::: iv Foreword to the First Edition :::::::::::::::::::::::::::::::::::::::: vi Preface ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: x Part I: The GNU Project and Free Software 1 What Is Free Software? :::::::::::::::::::::::::::::::::::::::::::: 3 2 The GNU Project :::::::::::::::::::::::::::::::::::::::::::::::::: 9 3 The Initial Announcement of the GNU Operating System ::: 26 4 Free Software Is Even More Important Now ::::::::::::::::::: 28 5 Why Schools Should Exclusively Use Free Software::::::::::: 34 6 Measures Governments Can Use to Promote Free Software :: 36 7 Why Free Software Needs Free Documentation::::::::::::::::
    [Show full text]
  • Hacker Bits, June 2016
    hacker bits June 2016 new bits Hello from sunny (finally!) Redmond! Can it really be June already?! Time does indeed fly…just ask Adrian Kosmaczewski who shows us how to navigate an industry littered with forgotten technologies and has-beens. Find out more in his blast-through-the-past account of “Life as a developer after 40.” Curious about Progressive Web Apps? Then don’t miss this issue’s interview with Henrik Joreteg, expert on all things PWA, who gives us the lowdown on this exciting new mobile technology. As always, our objective at Hacker Bits is to help readers like you learn and grow, and that’s why we are rolling out a new feature called Spotlight where we get tech experts to reveal their professional secrets. Lastly, congratulations to the winners of our giveaway! Time is precious so let's dive into another wonderful issue of Hacker Bits! Peace and plenty of ice cream! — Maureen and Ray [email protected] content bits June 2016 Fingerprints are usernames, not Are Progressive Web Apps the 06 passwords 34 future of the Internet? Am I really a developer or just a 08 good Googler? 38 19 tips for everyday git use Develop the three great virtues of a programmer: laziness, It takes all kinds 10 impatience, and hubris 48 When to rewrite from scratch: 16 Being a developer after 40 52 autopsy of a failed software Implementers, solvers, and Clojure, the good parts 26 finders 56 20 lines of code that will beat A/B 30 testing every time hacker bits 3 contributor bits Dustin Kirkland Scott Hanselman Reginald Braithwaite Adrian Kosmaczewski Dustin is an Ubun- Scott is a web develop- Reg is the author of Adrian is a writer, tu dev and product er and has blogged at JavaScript Allongé, software developer manager at Canoni- hanselman.com for over CoffeeScript Ristretto and teacher.
    [Show full text]
  • Title Stuff Here
    Pixel Nation 80 Weeks of World Wide Wade by Wade Roush Xconomy.com Pixel Nation: 80 Weeks of World Wide Wade by Wade Roush Copyright © 2008-2010 Xconomy Inc. All Rights Reserved Published by Xconomy (www.xconomy.com). No part of this book may be used or reproduced in any manner whatsoever without written permission except in the case of brief quotations embodied in critical articles or reviews. To inquire about reproduction or to report errors, please e-mail: [email protected]. All product names and registered trademarks used in this book are the property of their respective owners. Cover photo by Wade Roush. Contents Introduction 1: Reinventing Our Visual World, Pixel By Pixel 2: The Coolest Tools for Trawling & Tracking the Web 3: Google Earth Grows a New Crop of 3-D Buildings, and Other Web Morsels to Savor 4: Turn Your HDTV into a Digital Art Canvas 5: Unbuilt Boston: The Ghost Cloverleaf of Canton 6: An Elegy for the Multimedia CD-ROM Stars 7: The Future‘s So Bright, I Gotta Wear Screens 8: Science Below the Surface 9: Gazing Through Microsoft‘s WorldWide Telescope 10: Megapixels, Shmegapixels: How to Make Great Gigapixel Images With Your Humble Digital Camera 11: You Say Staccato, I Say Sfumato: A Reply to Nicholas Carr 12: Space Needle Envy: A Bostonian‘s Ode to Seattle 13: You‘re Listening to Radio Lab—Or You Should Be 14: Can Evernote Make You into a Digital Leonardo? 15: Are You Ready to Give Up Cable TV for Internet Video? 16: Turn your iPhone or iPod into a Portable University 17: In Defense of the Endangered Tree Octopus, and Other Web Myths 18: Pogue on the iPhone 3G: A Product Manual You Won‘t Be Able to Put Down 19: Photographing Spaces, Not Scenes, with Microsoft‘s Photosynth 20: What Web Journalists Can Learn from Comics 21: ZvBox‘s Unhappy Marriage of PC and HDTV 22: GPS Treasure Hunting with Your iPhone 3G 23: Boston Unblurred: Debunking the Google Maps Censorship Myth 24: Four Ways Amazon Could Make Kindle 2.0 a Best Seller 25: Playful vs.
    [Show full text]
  • This Work Is Protected by Copyright and Other Intellectual Property Rights
    This work is protected by copyright and other intellectual property rights and duplication or sale of all or part is not permitted, except that material may be duplicated by you for research, private study, criticism/review or educational purposes. Electronic or print copies are for your own personal, non- commercial use and shall not be passed to any other individual. No quotation may be published without proper acknowledgement. For any other use, or to quote extensively from the work, permission must be obtained from the copyright holder/s. ‘Lowering your standards’?: assessing the procedural legitimacy of the World Wide Web Consortium (W3C) Scott Mason Ph.D. Politics and International Relations June 2019 Keele University Abstract Today technical web standards have become one of the most important mechanisms of internet governance, impinging on a wide range of areas of public policy from privacy and to freedom of speech. Despite their importance, however, the processes through which web standards are developed are not well understood, and to date, very little empirical research has been conducted to examine the procedural legitimacy of web standards consortia. To address this gap in the literature, this thesis develops and applies an analytical framework inspired by deliberative democratic theory to assess the procedural legitimacy of the World Wide Web Consortium in the context of its development of the highly controversial Encrypted Media Extension specification. In doing so, the thesis argues that the W3C is characterised by a lack of procedural legitimacy. Specifically, it will be shown how the framing of the W3C as a purely coordinative and technical organisation acted to marginalise principle based objections to the EME proposal and undermine participant’s attempts to engage fully with the public policy questions raised by the specification.
    [Show full text]