Other Posts

ISP Cannot Be Forced To Block Copyright Infringing Files

An advisor to the European Court of Justice has said that an ISP involved in a long-running file-sharing dispute cannot be forced to block or filter copyright-infringing files at the behest of copyright holders. Such an action would amount to an invasion of customers’ privacy and violate rights guaranteed under EU law. The dispute between music rights group SABAM and […]

April 15, 2011 · 0 comments · Commentary

File-Sharers Await Official Recognition of New Religion

A group of self-confessed radical pirates are pinning their hopes on gaining official recognition of their own unique belief system. The founders of the Missionary Church of Kopimism – who hold CTRL+C and CTRL+V as sacred symbols – hope that along with this acceptance will come harmony, not just with each other, but also with the police. ‘Thou shall not […]

April 10, 2011 · 0 comments · Commentary

Building a Distributed, Decentralized Internet – A Roadmap

I know that I’m not Patrick, and I don’t pretend to speak for anyone but myself here. I just want to say that I share Patrick’s belief in the radical necessity of humanity’s co-owning the physical layer. As I see it, this is the only path to freedom. To that end, I *have* a roadmap. It has five stages, and […]

April 9, 2011 · 0 comments · Commentary

Proposal Suggests Browsers Should Block Users From BitTorrent Sites

As the United States heads off firmly down the domain seizures route, other countries around the world are also considering how best to deal with the issue of online piracy. Blocking sites via the web’s DNS system has been high on the agenda but doubts exist over its effectiveness. A suggestion coming out of Europe this week would mean that […]

April 8, 2011 · 1 comment · Commentary

Off the Hook: Who Gets Phished and Why

Communication researchers at four major universities have found that if you receive a lot of email, habitually respond to a good portion of it, maintain a lot of online relationships and conduct a large number of transactions online, you are more susceptible to email phishing expeditions than those who limit their online activity. The study, “Why Do People Get Phished?” […]

April 6, 2011 · 0 comments · comparative reviews

[How to] Be Confident Storing Information in the Cloud

Over the past few years, information explosion has inhibited organizations’ ability to effectively secure, manage and recover data. This complexity is only increasing as organizations try to manage the data growth by moving it to the cloud. It’s clear that storage administrators must regain control of information to reduce costs and recovery times while complying with regulatory compliance standards, including […]

March 29, 2011 · 0 comments · Commentary