What Bruce (Perens) did next (contd.)

What Bruce (Perens) did next (contd.)
Register story.

” One thing you have to admire about Bruce Perens: he has lots of ideas and he’s not afraid to implement them. Before the door was fully closed behind him at HP, he started Sincere Choice to counter Microsoft’s “Software Choice” initiative. Now he’s heading up a new non-profit: the Global Technology Policy Institute.”…

Boosting the disruptive signal

Boosting the disruptive signal

According to the “NYT”, a start-up in California has found a way of harnessing phased-array antennae technology greatly to extend the range of WiFi coverage. The formal launch of the technology is scheduled for next week, but there won’t be products until Q1 2003. That’s assuming it’s not vapourware, of course.

Saddam’s inbox

Saddam’s inbox

Thanks to Gerard de Vries for a link to an International Herald Tribune article about how a journalist from Wired hacked into Saddam’s inbox. How did he do it? Why by the old trick of guessing that the password for press@uruklink.net (Saddam’s email handle) would be — wait for it — ‘press’. Lots of interesting stuff in there, including messages from Western companies offering their assistance to the Butcher of Baghdad. But it seems that he doesn’t check his email all that often — the box had reached its quota and begun bouncing messages! Sigh. Poor ol’ Dubya will just have to pick up the phone. Or send his opposite number a message by cruise missile.

Microsoft’s er, ‘generosity’ spurned by Namibia

Microsoft’s er, ‘generosity’ spurned by Namibia
Register story.

“The African nation of Namibia is large in area and small in population with considerable distances between communities. Imagine the challenges of getting its schools wired to the Net. SchoolNet Namibia, a chiefly volunteer organization, struggles to do precisely that with a free ISP and numerous other initiatives to get the nation’s schools, many of which lack any library resources at all, on-line.

Imagine the pleasure with which SchoolNet would initially have confronted a charitable overture from Microsoft involving free software. Now imagine the disappointment of learning that accepting the ‘gift’ would entail outlays of money in the range of fifteen times the value of the M$ Trojan horse….”

The weakest link in computer security — as ever

The weakest link in computer security — as ever
Economist piece.

No — it’s not your Microsoft operating system (though of course that also figures in the calculation). It’s humans. In one survey, carried out by PentaSafe Security, two-thirds of commuters at London’s Victoria Station were happy to reveal their computer password in return for a ballpoint pen.

Jeffrey Rosen on the Eldred case

Jeffrey Rosen on the Eldred case

Interesting and insightful commentary on Larry Lessig’s case against the CTEA. “In Congress, defenders of the CTEA came up with only one argument for how the act might promote creativity. They testified that the act could encourage major studios to digitize hit films from the ’20s and ’30s by extending their economic value. But this argument is not convincing. As the head of The Hal Roach Studio–the leading restorer of Laurel and Hardy and other films from the ’20s and ’30s–argued in a principled brief that clashed with his financial interests, the CTEA extends the copyright for 19,000 films made between 1923 and 1942. Of these, only 5,000 continue to earn royalties, which means that the remaining 14,000 have little economic value but are of great historical interest. Many of these are “orphan” films whose copyright holders are very difficult to track down today. The CTEA makes restorations of such films economically prohibitive by requiring nonprofit restorers to hire private detectives to track down the lost copyright holders for the music, the credits, and so forth. As a result, the orphan films will continue to rot unwatched in the Library of Congress. And even if the CTEA actually did increase the incentive to restore these films, as Congress unconvincingly concluded, the preservation of 14,000 films hardly justifies the removal of more than 400,000 other creative works–books, poems, songs, and photographs–from the public domain. ”

Meshing the future

Meshing the future

I’ve been reading an advance copy of a DEMOS paper, “The Politics of Bandwidth”, and pondering the phenomenon of disruptive technologies. For me, WiFi (or 802.11b networking) is a classic example. But its true disruptive potential has yet to be revealed — which is why mesh networking is so interesting. The neatest thing about the mesh idea is that the more devices there are, the better the service gets. Much better than 3G.

Daft corporate names department

Daft corporate names department

After Accenture, here comes KPMG Consulting’s new moniker: “Bearing Point”. Eh? It’s a post-Enron byproduct of the scramble to disengage KPMG’s consulting arm from its auditing wing. But you’d have thought that an outfit which is supposed to have a high collective IQ could come up with something more inspired.