Remarkably honest reporting by DRM Watch here. The DRM 'Industry' has a vested interest in destroying the free transmission of information over the public internet in favour of closed, restricted networks.
Tuesday, 23 December 2003
DRM 'Industry' hates freedom
Remarkably honest reporting by DRM Watch here. The DRM 'Industry' has a vested interest in destroying the free transmission of information over the public internet in favour of closed, restricted networks.
Saturday, 13 December 2003
Deeper pixels needed
As I worked on the first official release of Ansel Adams images in digital form - the Ansel Adams screensaver - I feel somewhat qualified to pontificate on this.
What everyone is missing is that it is not a question of resolution, but of dynamic range.
With film the issue is blurred by questions of grain, but with digital the problem is which image format to use.
TIFF supports more than 8-bits per channel, but JPEG does not, nor do most computer displays. Most digital cameras only generate 8-bits per channel of dynamic range, and are still competing on resolution.
On the other hand, even the $30 scanners do 12-bits per channel these days, and 14-bits per channel (42-bit) are only about $50.
I expect that digital cameras will pick up on this soon, but we'll need a file-format change (and possibly a better transient storage device than flash memory) and new low-cost software to make it mainstream. Ironically, all the sophisticated exposure calculation that makes many digital cameras too slow to use for action snapshots could be reduced if they upped the dynamic range a few stops.
If you want to see what kinds of dynamic range digital photography is really capable of, have a look at the Hubble images, where every photon is carefully counted.
Tuesday, 9 December 2003
Tasty links
Monday, 8 December 2003
HTTP diffs
Steve, there is an existing HTML RFC for sending diffs that is perfectly suited to this - RFC3229. I mentioned this when it came out in Jan 2002.
Friday, 5 December 2003
The technical argument against DRM
This rests on one of the fundamental pillars of Computer Science - the Church Turing Thesis that states that any computer can emulate any other. When this is combined with the continual improvement in computing power available, it means we will always be able to run old software, or indeed protected software, by emulating the environment it runs within.
Simson Garfinkel describes how emulation saved the BBC Domesday Project, the authors of which I worked with at the BBC and the MMC.
"But that wasn't DRM" I hear the cry, "just obsolete hardware and data formats".
How about a systematic program that defeats the hardware protection for pay per use interactive experiences that works in a general enough way to encompass 25 years worth of hardware design?
It's called MAME and it has just been ported to the Nokia N-Gage cellphone/game gadget. It has emulators for various CPUs (and graphics and sound chips) to run the code directly from the original game ROMs - they look and feel just like the real thing
If Nokia are smart they will license this and the games and use it to promote the gadget - this company has licensed Atari ROMs for sale. After all, those 80s games are smaller than most MMS photos that get sent, and they're lots more fun than ringtones.
I hope Ed Felten and maybe can explain this to the assembled lawyers at the Berkman conference today. Most of them seem to like on compulsory licensing schemes.
I wish I had been able to take the chance offered to join them and present mediAgora to them. I look forward to reading the blogging of the event.
Here's a cartoon I made with the wonderfully silly Bayeux Tapestry Construction Kit
Wednesday, 3 December 2003
99% perspiration
Tim - you're in VC. You should know the difference between a demo and a product.
Commodities are a good thing
If it weren't for commodities, we wouldn't have civilization. Or food.
There's plenty of money to be made in - and on (or choose any other preposition) - commodities. You just have to think smart about the stupid stuff. Is it that hard?
Commodities are great - to paraphrase something Clayton Christensen said - once your business has become commoditized it is simple enough that you can hire some MBAs to run it for you.
Jessica Litman's music idea
It is a great essay until this paragraph::
This aspiration: "It should also be compatible with the current generation of digital playback devices, including CD players." is impossible. CD players play unencrypted, uncompressed digital audio. A drm'd format would require new players.
Monday, 1 December 2003
Hierarchies, webs and emergence
Dave W said: I feel we're at a turning point in the weblog world, either we're going to be like every other hierarchy that's ever been, with secret deals, lots of impediments to progress, eventual stagnation; or we're going to overcome that.
Dave thinks in hierarchies; whether this is because he invented outlining, or why he invented outlining I'm not sure. Along the way he added links into the picture, so his hierarchies can link to other nodes, or other hierarchies to get as complex as you like.
The conventional wisdom is that links beat out hierarchies - Google's link-centric approach beat out Yahoo's hierarchy-centric approach (the HO in Yahoo stood for Hierarchically Oriented).
However, another way of looking at it is top-down versus bottom-up - central design versus emergence.
Dave W wants to build a bottom-up emergent taxonomy, using open debate and open standards.
Steve Gillmor is saying something similar about how we can grow new things.
I have a couple of ideas that I need to write up as spec proposals to try to start such discussions - one about 'vote links', one a new bit of metadata for feeds saying whether they are complete or not.
What am I missing?
However, I look at blogs like this and feel like Ginger in Gary Larson's classic What Dogs Hear.
'squiggle squiggle squiggle Blog squiggle squiggle squiggle Permalink'
Friday, 28 November 2003
iTunes Security blather
"So sue me" stated young Norwegian hacker Jon Lech Johansen last week after he posted a program to crack iTunes air-tight security.
Johansen posted the program called "QTFairUse", with the previously mentioned quote, on his own website. The free software has the uncanny ability to sidestep iTunes anti-copying software, MPEG-4 Advanced Audio Coding that once installed illegally views protected music files in QuickTime without paying a fee or royalty.
1) 'air-tight' security is remarkably meaningless. In fact, oscillating air is the primary security 'hole' in iTunes, followed closely by the built-in CD-burning code.
2) 'uncanny' is an odd thing to say about source code. It's pretty clear what he is doing if you can read C, and if you can't why not talk to someone who can first?
3) MPEG-4 Advanced Audio Coding is not anti-copying software, it is a compression format. The anti-copying stuff is called FairPlay.
4) That last sentence manages to call AAC illegal.
5) You can already listen to (not view, unless you count the tiny spectrum display) the protected music files in QT Player, as long as you know the username/password.
6) You have to have already paid for the music for this to work. All it does it replace the 'burn to CD' option with a less convenient way to extract the audio (It only works on one song at a time as it is played).
7) It's highly arguable that this is illegal, given that transferring music to other forms is explicitly legal - indeed were it not, the CD to MP3/AAC part of iTunes would be illegal. There may be a DMCA case on circumvention grounds here, but it isn't a good one, given the fact that iTunes will let you make CDs from the same file. In any case the DMCA is not Norwegian law.
Still, I'm surprised it took this long for someone to start the arms race in this instance. I hope my old friends in Apple don't get dragged into it.
Wednesday, 26 November 2003
Donate to Rupert - the True Survivor
Donate to Rupert - the True Survivor
Andrew drew the picture.
He made a t-shirt too.
Sunday, 23 November 2003
Co-opting the Future By�John C. Mahler
Let's start with abandoned trolls. Thanks to busy debunkers trolling has got harder.
The most obvious reason for abandonment is simple boredom. Writing is tiresome. Why anyone would do it voluntarily on a troll mystifies a lot of professional writers. This is compounded by a lack of feedback, positive or otherwise. Perseus thinks that most trolls have an audience of about 12 readers. Leaflets posted on the corkboard at Albertsons attract a larger readership than many trolls. Some people must feel the futility.
The problem is further compounded by professional writers who promote trolling, with the thought that they are increasing their own readership. It's no coincidence that the most-read trolls are created by professional writers. They have essentially suckered thousands of newbies, mavens, and just plain folk into trolling, solely to get return links in the form of the blogrolls and citations. This is, in fact, a remarkably slick grassroots marketing scheme that is in many ways awesome, albeit insincere.
Unfortunately, at some point, people will realize they've been used. This will happen sooner rather than later, since many mainstream publishers now see the opportunity for exploitation. Thus you find professionally written and edited faux trolls appearing on MSNBC's site, the Washington Post site, and elsewhere. This seems to be where trolling is headed�Big Media. So much for the independent thinking and reporting that are supposed to earmark blog journalism.
So now we have the emergence of the professional troll working for large media conglomerates and spewing the same measured news and opinions we've always had�except for fake edginess, which suggests some sort of independent, counterculture, free-thinking observers. But who signs the checks? The faux troll will replace the old personality columns that were once the rage in newspaperdom. Can you spell retro? These are not the hard-hitting independent voices we were promised. They are just a new breed of columnist with a gimmick and a stern corporate editor.
By� John C. Mahler
Previously by this author: Deconstructing the Troll
Thursday, 20 November 2003
A third morality?
Information - Spread Innovation | Commercial - Improve the Status Quo | Guardian - Maintain the Status Quo |
Imagine a programmer working at 2 AM to add a feature to an Open Source program he didn't write. The programmer is not paid for this work; he does it because he wants the program to be more usable and more popular; he has been working for ten hours without a break. At 2:30 AM he adds his name to the list of authors, uploads the improved program to a web site for free distribution, then spends the next hour reading free articles on-line. | Imagine a small neighborhood shop. The employees should be ready to do business with anyone who walks in, and must maintain a reputation of honesty with both suppliers and customers. The store must continually improve, or the other stores will lure away its customers. A small business owner does not have a lot of free time and must work efficiently. | Imagine a fortress guarding a frontier. The soldiers must always be prepared to fight, but most of the time they are training or relaxing. Strict discipline is necessary to make them a unified fighting force. One traitor, or paid spy, can get them all killed. Visiting merchants are a distraction and a security problem; too much money floating around can weaken their dedication to the task. |
Shun force | Shun force | [Rely on force] |
Shun trading | [Rely on trading] | Shun trading |
Use intelligence | Use initiative and enterprise | Exert prowess |
Publish all information | Be honest | Deceive for the sake of the task |
Be idealistic | Be optimistic | Be fatalistic |
Ignore comfort | Promote comfort and convenience | Make rich use of leisure |
Respect authorship; Ignore ownership | Respect contracts | [Defend your territory] |
Demonstrate the superiority of your own ideal | Dissent for the sake of the task | Be obedient and disciplined |
Invent and create | Be open to inventiveness and novelty | Adhere to tradition |
Shun authority | [Adapt to the system] | Respect hierarchy |
Collaborate easily with strangers and aliens | Collaborate easily with strangers and aliens | Be exclusive |
Accept largesse | Be thrifty | Dispense largesse |
Be unique; Develop a reputation | Be industrious | Be ostentatious |
Be productive | Invest for productive purposes | Take vengeance |
Cooperate | Compete | [Fight, when necessary] |
Be skillful | Be efficient | Be loyal |
Gain mindshare | Come to voluntary agreements | Show fortitude |
Treasure reputation | [Treasure financial success] | Treasure honor |