So apparently just looking at an (web)article of a newspaper (or any web page containing copyrighted content) could mean you are infringing on that publishers copyright… do newspapers actually want to commit that kind of suicide?
I couldn’t decide whether to put this post under “Copyright” or “Censorship” since it involves the MAFIAA using the DMCA to silence things… in this particular case, it would seem, their members own marketing campaigns… With friends like the MAFIAA, who need enemies?
Portable electronic device, method, and graphical user interface for displaying electronic lists and documents now, how could this not apply to every type smartphone, pad, dumb-phone or, for that matter, laptop, in existence? How can such a patent even be granted?
Censored by copyright for protesting being censored by copyright, somehow I don’t think that this was how laws were intended to be used when humanity first came up with the concept of rule of law…
Who would have thought that filtering the net may affect more than the specific group targeted by the filter? That’s impossible right?
Facebook is being creepy as hell as usual.
Apparently, Microsoft’s SkyDrive comes with some strings attached…
The European Commission intends to make open access all research findings funded by Horizon 2020. This is nice
Dunno if EC or UK was first, but UK is thinking along the same lines.
On the other side of the spectrum, i.e. not so nice, if things really are as dire as President Obama would have people believe, wouldn’t the responsible thing to do then, be to secure the infrastructure the hell up, instead of passing laws which any would-be imaginary-or-real terrorist would ignore?
I mean, one of the most idiotic plots in “24” was that nuclear power plants could be remote controlled over the internet. Or in Die Hard 4, that with a couple of taps on a keyboard, the bad guy could redirect a whole bunch of gas to go to the same place at the same time, building pressure, making big badaboom…
Now, if the infrastructure in fact support doing this, remotely, then those who put that in the specification, and those who produced it, and those who installed it, should all be found and tried for dangerously criminal negligence.
Of course, if the end game is to hollow out personal privacy and spy on your own citizens, then it would be better to nibble away on their rights through more new and ineffective laws, which can always be extended later when proven (through a real enemy, someone just being curious, or a false flag operation) not to work.
Justice Department sues telco for daring to challenge its secret demands for private information.
Targeting Shell with a fake PR campaign. I wonder how long it will be until lobbyists have bought an amendment to some law labeling this sort of activism as terrorism…
Join the Internet Defense League and make sure the internet never loses. Ever. Or, put another way,
Rescue the lolcats from the evil clutches of the internet hate league!
Blooie lets you chat online with people who like what you like I am just a tad bit sceptical about this one…
On the one hand, getting in touch with people who like what I like, Free Software, Programming, vim, etc. etc. Great! Buuuuut, how is this not willfully and intentionally putting yourself inside a filter bubble, and only exposing yourself for the types of opinions you yourself already hold? If two people say the same thing, isn’t one of them redundant? I remain a little unconvinced.
At work this week I needed to get a file from server1 to server3, and the only connection between the two was through an intermediary server, server2. Oh yeah, the only way to communicate between the servers where ssh. Sure, a three step approach was possible (scp file server2: ; ssh server2; scp file server3: ) but the file on server1 could get updated at times, which would mean yet another upload, so a simpler process was needed, a shell script with something along the lines of this:
cat $file | ssh user@server2 "ssh user@server3 \"cat > $file\""
Thanks go to pesa for coming up with the solution.
TMSU is a program which allows you to tag your files, and then perform queries on the tags, filtering out all files not tagged according to the queried constraints. Neat!
ownCloud is getting more interesting with every passing day.
I never really thought about the fact that you could do lots of things with locate such as adding flags, or configuring directories or files to disregard.
I found an expect-like utility named empty. Funnily enough I found it by checking out the examples of the Zenity fork: Yad.
Cuttlefish: Execute actions when specific events are triggered.
I am also currently trying out this vim statusline.
Throught this question I learnt about fold.
Really nice ELI5 article about how flood fill works, using Zombies and Cats, and Python.
Reading this post and seeing the example resume I agree that what catmoon ponders about would be pretty cool.
Of course, the program should know what skills I have, and only select the relevant out of that set, based on the skills extracted from the job listings. At least that’s how I’d design it, as there is no good reason to lie about what you know and don’t know.
And now I finally grasp how two create quines!
When you screw up, and commit sensitive data to a git repository, this seems like a rather good way to handle it.
Oh and of course, if that sensitive data was a password, CONSIDER THE PASSWORD COMPROMISED AND CHANGE IT!
I had heard about the “Rosetta Code” before, but never got around to checking it out until this weekend, which is when I found this rather intriguing piece of Perl code.
And although very cool, I still have yet to find a personal use for PhantomJS :/
Text books used in education should be written like this.
RasPies can now be ordered in bulk.
Here’s to the misfits.
Dunno what it’s good for, but it is pretty.
Stochastic, nerdtastic restaurant bill splitting.
Astronomy Picture of the Day har a pretty sweet image this week.