P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 06-06-07, 07:38 AM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,016
Default Peer-To-Peer News - The Week In Review - June 9th, '07

Since 2002


































"The major labels these days are like the dinosaurs sitting around discussing the asteroid." – Paul McCartney quoting David Kahne


"This could replace the entire supply chain that has been in existence since Gutenberg." – Jason Epstein


"If you want to lose weight, turn off the television or watch something boring." – Alan Hirsch


"With Barbie, if you want clothes, it costs money. You can do it on the Internet for free." - Presleigh Montemayor, age 9


"If Macmillan's CEO really thinks that's the same medicine, than someone ought to check what medication he's taking." – Mike Masnick


"We’re the antithesis of MySpace. MySpace is about sharing information. We’re all about not being able to share information." – Lane Merrifield


"This poor guy now faces [the] daunting reality of having to litigate this on appeal against Gateway. By winning, he's lost." – Cliff Palefsky


"The science fiction writer’s job is to survey the future and report back to the rest of us." – Brent Staples


"What happened to Ms. Amero shouldn't happen to anyone — nor should it ever happen again." – The Day


"This internet-is-dangerous resolution was passed…unanimously." – David Cassel































June 9th, 2007








Does Digital File Sharing Render Copyright Obsolete?
Victoria Shannon

When the 1980s pop star Robin Gibb writes a song these days, he says he doesn't think about whether it is copyrighted or licensed - he devotes himself to his art and lets his handlers see to its legal and financial well-being.

But when NoobishPineapple, an 18-year-old from Spearfish, South Dakota, uploads his 36-second rap video about fast food onto YouTube, he has no staff of assistants to make sure his creation is protected or paid for - and he probably doesn't care, anyway.

That makes people like David Ferguson, head of the British Academy of Composers and Authors, nervous about how art will be sustained in the future. And it is giving people like Lawrence Lessig, founder of Creative Commons, an opening to promote alternatives to the world's increasingly maligned copyright systems.

The youth craze for making and posting digitized audio and video on the Internet - their own creations and those of others, without regard to ownership or payment - is driving a wedge between the traditional "commercial" economy and the upstart "sharing" market, analysts say. Likewise, it is paralyzing and polarizing the groups that are supposed to make sure writers and composers get the royalties they are due.

At a self-described summit meeting on copyrights in Brussels last week, the world's major groups representing creative authors - the collecting societies at "the bottom of the food chain," griped one executive - vented, fumed and wrung their collective hands about their future. At the end of the event, Italian authors called for a "strike" to suspend licensing any form of public performance for a week in June to call attention to illegal downloading and authors' rights.

In the absence of a wholesale update of royalty systems, billion-dollar court battles - like the Viacom lawsuit against Google, which owns the YouTube video-sharing site - will most likely be the determinant of the value of digital copyrights, analysts say.

"There are an extraordinary number of people who are creating on their own and doing so for a different reason than money," Lessig, a lawyer who allies himself with Google in copyright positions, said during an interview. "Somehow we've got to find a system that ratifies both kinds of creativity and doesn't try to destroy one in order to preserve the other."

Ben Verwaayen, chief executive of BT Group, the British phone company, laid the blame at the feet of the societies, not technology or authors themselves. "The problems are the institutions," he said. "They have to change."

In Europe, collecting societies have so far dodged a bullet aimed at them last year, after the European Commission started antitrust proceedings against their 150-year-old system of coordinating royalty payments and redistributing them to authors.

Gibb, part of the successful BeeGees band of "Night Fever" fame, testified on behalf of author societies at the hearing last summer on the commission's objections over royalty competitiveness issues. Now, he is adopting a more formal role; on Friday, he took over as president of Cisac, the international collecting-rights umbrella organization that sponsored the meeting.

"I feel strongly that it's a moral right for everybody to get what they deserve if they write a piece of work," Gibb said during an interview, "and they have a right to see that it's not used in a way that they're left out of the loop."

The commission has not closed its investigation. But since Gibb's intervention and other conversations with many of the 217 societies in Cisac, Ferguson said, "they are no longer talking about fining us, and they're not talking about taking money out of the pockets of creators."

But something has to give, most agree. Roger Faxon, chairman and chief executive of EMI Music Publishing, said the rigidity of European licensing had crimped digital music sales in Europe.

"We need to loosen it up," he said. "If we don't, we may well go back to a world in which you need a patron in order to make a living as a songwriter."

Gerd Leonhard, chief executive of a digital music start-up and author of "The End of Control," said he believes that the existing structure has outlived its usefulness, and - at a time when royalty-payment functions can be automated - he gives the collecting societies no more than three or five years of life.

Everyone seemed to have their own new way of going forward. After the European Commission's move against the collecting societies, EMI set up Celas, a one-stop shop for pan-European licensing of online and mobile service rights.

"In many ways it is an experiment, an attempt to find a different approach to try to solve the problem," Faxon said.

In Britain, meanwhile, Ferguson and Gibb are starting a cooperative record label called Academy Recordings that is designed from the ground up for the music writers. Ferguson said Academy had already struck deals with Apple's iTunes and the British start-up We7, the ad-supported British music download service backed by the rock artist Peter Gabriel.

Its first release will include members of the British music writers group like Gibb, Gabriel and the Pretenders. Like others before him, Ferguson envisions "a brand new digital business model."

The more, the merrier, some say. "We can't rely on knowing which business model is the one that is going to work," said Larry Kenswil, executive vice president of business strategy for Universal Music. "As content owners, we're obligated to try everything."

Joe Mohen, chairman and founder of SpiralFrog, which aims to start its advertising-supported free digital music store by the end of the summer, urged radical action, saying he had to cut deals with 38,000 music publishers in the United States alone.

"For new companies starting up, it is impossible to license country by country," he said. "If legitimate businesses are forced to do that, they're never going to be able to compete with the pirates. There's got to be some sort of pan-European licensing, and frankly global licensing is the preferred way."

Lessig, whose Creative Commons alternative licenses have been almost as abhorrent as online music theft to the societies, has nevertheless gained a grass-roots following as well as limited adoption by companies like Microsoft and the BBC. The licenses let the author determine whether to apply commercial rights and how much. They are available in 34 countries and were applied an estimated 145 million times last year.

Many collecting societies in Australia, Finland, France, Germany, Luxembourg, Spain, Taiwan and the Netherlands manage authors' rights for them, so individuals cannot apply a Creative Commons license. Lessig, a Stanford University law professor who is on a teaching fellowship at the American University in Berlin, said he hoped to announce a breakthrough agreement with a collecting society at the time of a Creative Commons conference in Croatia on June 15.

The author groups themselves are obviously conflicted, trying to balance supporting the audio and visual arts and making sure their creators get a portion of the royalty pie, when no one knows what the pie will look like.

Last year, more than half of all music acquired by consumers was unpaid, according to NPD Group, a market research company. Social "sharing" of CDs by friends accounted for 37 percent of all music consumption, NPD said.

"The CD is dying at a rate that is predictable at this point," Kenswil said. "It will someday level off into a niche market the way vinyl has. In five years, it will be of very little consequence.

"The problem is there is no physical medium to replace it. It's digital, but digital is in its infancy."

And many of those who would abolish copyrights in the digital age also are young, influenced by Internet social movements like free software code, blogging and file-sharing.

"A lot of people under 30 are 'can't pay, won't pay,' " Mohen said. "Many of them have never purchased a CD, and many never will. They have more time than they have money."

Ferguson can imagine the music distribution business disrupted so much in a few years that the entire world's catalog of music may be prepackaged and prepaid on some kind of key chain sold at gas stations. But he does not see the end of authors' rights groups.

"We're still going to need to license the hairdresser, the restaurant, the small radio station, national broadcasters," he said, noting that digital downloading may well represent an unsustainable business bubble.

But Alex Callier, songwriter and bass player with Hooverphonic, the Belgian pop band, bemoans the focus on business models and digital sleights of hand around "user-generated content."

"It used to be you had to know how to play the guitar and have some talent to make it in the music business," he said. "Some of the mystery and magic is gone."

Gibb, who said he never thought of his work as "intellectual property" but rather the result of an overwhelming need to write and perform, nonetheless was hopeful. "We're chipping away at the stone," he said.

Peter Jenner, chairman of the International Music Managers Forum, suggested a different approach. "I'd lock all the societies in a room until they get their act together," he said.
http://www.iht.com/articles/2007/06/...s/rights04.php





Is EMI the Chink in the RIAA Armor?
Marc Wagner

Does anyone really believe the RIAA when they tell us that ‘the sky is falling’ from rampant piracy?

Just last year, the recording industry, was trying to strong-arm Apple into raising its base price for it’s entire DRM-protected music library. Apple held firm on its 99 cent pricing model and drew much criticism — not only from the recording industry but also from those who object to Apple’s considerably market influence — even when that influence helps keep consumer prices low.

Sure, there are other legitimate music services offering a variety of pricing models which permit some users to enjoy more aggressive per-song pricing on some titles. Still, Apple’s combination of iTunes, premium iPod products and interface options, an extensive library from a broad segment of the recording industry, and a consistent pricing model — absent ongoing subscription requirements, has provided Apple a winning combination which makes them the clear market leader. (Much to the chagrin of the EU.)

So what happened this year? EMI announced that they will offer their extensive music library DRM-free through the iTunes music service. The catch? A 30-cent premium price for DRM-free music. The hope? That consumers will pay that premium to have DRM-free music. The carrot? This DRM-free music is provided in a higher bit-rate than the DRM-protected alternative.

Will this strategy work? We won’t know for awhile yet but one has to wonder why EMI would distribute any of its on-line music DRM-free if the situation were as dire as the RIAA would have us believe.

To be sure, piracy is a legitimate concern for the music industry. But what is the extent of that threat? My guess is that bootlegged CD’s (distributed for profit) represent a much larger threat to the music industry’s bottom line than the ‘casual piracy’ taking place on college campuses all over America (dare I say, the world?) Chris Dawson’s recent article “Can RIAA really make a case against students/schools?” only reinforces my perception.

The premise of RIAA claims is that piracy costs the recording industry money due to lost music sales but that premise assumes that those participating in the piracy would otherwise purchase the music if they couldn’t ’steal’ it. I believe this is a false assumption.

Today, 90% of the music industry’s music sales is still in the form of CD’s. Only 10% is on-line music sales. The assumption is that the decline in CD sales year-over-year is attributable to on-line piracy. Maybe — but then again, maybe not.

As Chris so aptly points out, ripping CD’s is the most common source of ‘casual piracy’. In my college days, the mode of piracy was limited to blank cassette tape and LP’s but the result was the same. Multiple people shared a single copy of an album. As cash-strapped students, if we couldn’t share, we would have had to do without the music. Plain and simple. And today, my peers and I (who were once among those “casual pirates”) are consumers who are buying CD’s because we value the superior quality of the medium. Did the music industry lose any money off of our piracy? Not a penny! (most of the music I pirated off of LP’s in the 1970’s has long since been replaced with CD’s of the same material.)

This is not to say that students who are targeted by the RIAA should ignore the attention they have drawn. Anyone whose on-line piracy has drawn the attention of the RIAA could find themselves in serious trouble with federal authorities — should the RIAA decide to prosecute (as ill-advised as that might be).

So what does EMI know that the RIAA (representing that recording industry as a whole) does not know? They know that suing customers (or even potential customers) is bad for business!

Will their strategy work? Maybe not! But if it fails, EMI has cost itself no customers and it has at least endeared itself to a few for the courage to buck the trend and offer DRM-free music.

Ultimately, piracy only becomes a problem for the music industry when a third-party makes money off of that piracy instead of the rightful owner of the material. There is no convincing evidence that those who are being targetted by the RIAA (predominantly, college students) are making any money off of on-line piracy.

So who is? The people making money off of on-line piracy are peer-to-peer service providers. Peer-to-peer services have many legitimate uses but some of those vendors are targetting those who would use their services to pirate music. Others provide free software designed to quietly share music without the user’s knowledge. These deceptive practices endanger their users in far more deceptive ways than anything the RIAA is doing.

The actions of the RIAA are heavy-handed and intended to intimidate users but they are direct. These peer-to-peer vendors are preying on the innocent. If the RIAA had the courage of its convictions, they wold be pursuing these vendors — not students.
http://education.zdnet.com/?p=1090





Major Webcasters to Face Billions in New Fees?
Anne Broache

We already know that Webcasters small and large are outraged at the prospect of having to pay higher royalty fees to the music industry, particularly when compared with what is required of their satellite and terrestrial radio counterparts.

But the heightened royalty rates enacted by the U.S. Copyright Royalty Board earlier this year and scheduled to take effect July 15 are not the only thing that's firing up leading Internet radio industry companies like RealNetworks, Yahoo, Pandora and Live365.

In letters distributed to various Capitol Hill offices on Thursday morning, the four companies' CEOs argue that the music industry will also be forcing collection of more than $1 billion per year from three services alone--Yahoo, RealNetworks and Pandora--in the name of covering so-called administrative costs.

Here's how they say they derived that figure: When the CRB decided earlier this year to change the rules for Internet broadcasters, it also decided to levy a $500 minimum annual fee per Internet radio "channel." SoundExchange, the non-profit music industry entity that collects the royalty and other fees on behalf of record labels, says that minimum payment is supposed to cover administrative costs.

But since some of the larger Internet radio services potentially offer their listeners hundreds of thousands of unique "channels" (RealNetworks' Rhapsody offered more than 400,000 in 2006 alone, according to a company spokesman), the companies view the ruling as forcing them to multiply that mandatory minimum payment accordingly (for Real, that would amount to $200 million).

Such an amount would far outpace the $20 million in total royalty fees collected by SoundExchange from the Internet radio industry last year, the CEOs note in their letter. And besides, it's not even clear that those payments would go to artists, as royalty payments do, the companies argue.

"While we don't imagine SoundExchange would keep this $1 billion all to itself, this lack of clarity is absurd," RealNetworks spokesman Matt Graves told CNET News.com.

SoundExchange did not respond to requests for comment.

Thursday's letter is just the latest step by the Internet radio industry to combat the CRB ruling. An alliance of commercial Webcasters and National Public Radio has already asked a federal appeals court for an emergency halt to the CRB's decision, which is currently scheduled to take effect July 15. They're hoping politicians will move quickly to enact legislation that would overturn the new requirements and level Internet radio royalty rates with those required of satellite radio providers.
http://news.com.com/8301-10784_3-972...=2547-1_3-0-20





The Internets, They Can Be Cruel
Noam Cohen

THE Internet can sometimes seem overrun with versions of Simon, the alpha male tech guy from the BBC series “The Office.”

When the show’s protagonist, Tim, asks Simon what he is doing to his computer, Simon at first answers, “You don’t need to know,” and then allows that he is installing a firewall for Tim.

“O.K. What’s that?”

“It protects your computer against script kiddies, data collectors, viruses, worms and Trojan horses, and it limits your outbound Internet communications. Any more questions?”

“Yes. How long will it take?”

“Why? Do you want to do it yourself?”

“No, I can’t do it myself. How long will it take you, out of interest?”

“It will take as long as it takes.”

“Right, er, how long did it take last time when — ”

“It’s done.”

Any modern office worker quickly learns that professing complete inadequacy is usually the best move in the presence of such a character. The same rules, however, don’t apply in public life.

The latest example of the danger of revealing technological weakness is Judge Peter Openshaw of the High Court, Queen’s Branch Division, in London. While presiding over the trial of three men charged under antiterrorism laws, he was quoted by Reuters last month as saying in open court: “The trouble is, I don’t understand the language. I don’t really understand what a Web site is.”

The pillorying of the judge — and Wikipedia entry — came nearly instantly (en.wikipedia.org/wiki/Peter_Openshaw). Not since Senator Ted Stevens, Republican of Alaska, referred to the Internet as “a bunch of tubes,” or President Bush spoke of the “Internets,” had the Web grinned so widely.

The next day, the Judiciary of England and Wales issued an extraordinary statement asserting that Judge Openshaw’s comments had been taken out of context. (Reuters, while reporting on that statement, said it “stands by its story.”)

“Trial judges always seek to ensure that everyone in court is able to follow all of the proceedings,” the statement said, adding that Judge Openshaw was acting not for himself but “on behalf of all those following a case, in the interests of justice.”

In case anyone was curious, the statement concluded that “Mr. Justice Openshaw is entirely computer literate and indeed has taken notes on his own computer in court for many years.”

Some in the British press parsed that official explanation, wondering why the judge hadn’t said explicitly that he was asking on behalf of the jury, if that is what he meant. Others came to his defense.

Alex Carlile, a member of the House of Lords, wrote in The Independent that he could attest that Judge Openshaw had a “sharp, incisive brain often well ahead of the barristers before him. He is at ease with a computer; I have seen him taking notes on it in court, as habitually he does.”

When I spoke by phone with the judiciary’s press office, I suggested that the judge use e-mail to send me his thoughts on the controversy and let the medium be the message. A spokeswoman there cast doubt on that idea, saying that the judicial e-mail system worked only internally — but she said that she would relay my request.

I suppose she may have sent him an electronic message with the details, but I’d like to think a clerk wrapped the note in a ribbon and rode by carriage to the courthouse. I never heard back, but I haven’t checked with Western Union for several days.

Such tales of technological cluelessness can serve as entertainment, or even provide a common folklore for the online world. But surely there is also an aspect of marking turf against “the technologically ignorant masses,” an instinct Simon the tech guy would surely recognize. Silence, while the master works.

Edward W. Felten, a professor of computer science and public affairs at Princeton, says it is hardly a coincidence that Internet commentators seize on slips by public officials. “There is a widespread belief online that many politicians and policy makers don’t understand the Internet well enough to regulate it,” he said.

Senator Stevens offered his description of the Internet last summer, as chairman of the committee responsible for telecommunications, commenting on the issue known as Net neutrality. “The Internet,” he said, “is not something that you just dump something on. It’s not a big truck. It’s, it’s a series of tubes.”

To the online activists who favor Net neutrality — the principle that high-speed Internet companies not be allowed to charge content providers for priority access — Mr. Stevens is the enemy, and an unworthy one at that. Hardly a day goes by on liberal sites like Daily Kos or Eschaton that “bunch of tubes” won’t appear. On Thursday, it was prominently displayed on both. (A Google search of “bunch of tubes” and “Stevens” brings in 8,310 results.)

Professor Felten, using his authority as a computer expert, defended the senator.

“I felt the criticism had gone too far,” he said, “had gone to the point of unfairness. It seemed to me that talking about the Internet as ‘tubes’ wasn’t too far from what even some of the experts do — talking about ‘pipes.’ ”

Professor Felten describes himself on the Net neutrality issue as believing “there is a problem, but I don’t think government can solve it.” But he said his sympathy for the senator had nothing to do with a shared outlook. Instead, he preached humility.

“The Internet is pretty complicated,” he said. “Nobody understands everything about how the Internet works.” He then spoke about the complexity of “emergent behavior” and some other ideas I hadn’t heard before.

When I told him that, of course the Internet wasn’t a bunch of tubes, it was a “bunch of wires,” he laughed. “Saying the Internet is a ‘bunch of wires’ is like saying your body is a bunch of meat.”

Know-it-all.
http://www.nytimes.com/2007/06/04/te...gy/04link.html





P2P Breaking Internode's Bank
Andrew Colley

INTERNODE says skyrocketing peer-to-peer traffic would have threatened its viability within a year if it hadn't brought on broadband price hikes announce today.

Internode says customers are abusing its download 'shaping' policy

Internode product manager Jim Kellett said that the business could no longer endure massive increases in its subscribers' appetite for bandwidth while decreases in prices for traffic to the US began were starting to bottom out.

“It’s not currently threatening the business in any way, but if it had carried on for another 12 months I think it would start to,” Mr Kellett said.

Mr Kellett said peer-to-peer accounted for a “ridiculously high” proportion of bandwidth used by its broadband subscribers.

Internode subscribers using plans that offer high download quota were to be hit hardest by the price increases, which ranged from $5 to $40 per month and affected most of its regular commercial services.

Internode customers on home and small business power plans face increases of $40 per month.

Charges for its basic service HOME-512-Value has been retained but the download quota attached to the plan has been scaled back from 8GB to 5GB per month.

The company said it may also introduce “additional access constraints” against customers who accrue large downloads after exceeding their quotas.

The Adelaide-based internet service provider said the customers were abusing its ‘shaping’ policy, which sees connections throttled after reaching their download allowance rather than have customers charged for additional bandwidth.

“Again, shaping is intended to be a gentle alternative to excess download fees, for customers who inadvertently exceed their download quota. It is not intended to be used as an additional unpaid download allocation," Internode said in a statement posted on its website.

“Unfortunately a small percentage of customers are exploiting the current shaped excess traffic scheme to download a very large additional quantity of data beyond the quota level in their selected plan."

Mr Kellett said that customers who had signed up to ISP recently would be able to cancel their service without incurring a $65 cancellation fee the company normally levies against customers who terminate their service within 6 months.
http://australianit.news.com.au/stor...-15306,00.html





UCLA Disputes Position on Congressional Piracy List
Paul McCloskey

Administrators from the University of California at Los Angeles are disputing the validity of data used by two congressional committees to identify universities that allowed the most illegal downloading of movie and music content on their campuses.

The House Committee on the Judiciary and the House Committee on Education and Labor recently sent letters to19 universities, asking them to complete a survey about actions they have taken to curb illegal file sharing. The universities had been identified by movie and music industry lobbies based on the number of copyright violation notices they issued to the schools.

But UCLA university officials said last week they believe the data used to determine the prevalence of the piracy on their campus are misleading.

Kenn Heller, assistant dean of students at UCLA, said the school has records for only 200 Digital Millennium Copyright Act violation notices, instead of the 889 notices claimed by the movie and recording industries.

"Our data is far, far less [than the industry's]," Heller told the Daily Bruin campus newspaper. "[We're] in the process of reconciling the data and [figuring out] why there is such a large gap." He said he believes the information was taken out of context by industry officials because they do not factor in how many students attend the university when looking at the number of offenses.

Heller said UCLA does not block peer to peer software because there are legal and academic purposes for file sharing. "It's not an option the university has considered," he said.
http://campustechnology.com/articles/48371/





Congress, RIAA and Universities Prepare for P2P "Arms Race"
Ken Fisher

The heated debate over file sharing and the role that American colleges and universities should take in response to it ratcheted up a notch Tuesday as industry players and college and university reps gathered in DC to discuss the problem and potential solutions in a hearing before the House Committee on Science and Technology.

Universities are clear on their position: they do not see themselves as extensions of either the RIAA or the MPAA and are reluctant to get into the game of chasing down students and disciplining them at the behest of such organizations. Congress, however, is making it clear that they expect schools to do something, and the RIAA is waiting in the wings, promising to increase their use of pre-litigation letters.

House Committee members suggested that technological "solutions" should be tested more extensively at schools across the country. Chairman Bart Gordon (D-TN) said that laws will not be enough to curb piracy. "Technology will be the first line of defense," he said. Thus, network monitoring services and traffic shaping tools are being discussed as the solution to this problem, but there are simultaneous warnings that schools could end up spending hundreds of thousands of dollars on technology that will only be circumvented by determined students.

Dr. Charles Wight, associate VP for academic affairs and undergraduate studies at the University of Utah, said that his institution has benefited greatly from technological measures and has seen a 90% reduction in complaints from the RIAA and MPAA. Not only have students backed off file sharing, but he said that the school has saved more than $1.2 million in bandwidth fees and thousands on personnel costs.

The University of Utah uses Audible Magic's CopySense appliance on its campus residence network to thwart the sharing of files recognized by the service. Because that's not a complete solution and can easily be overcome by encryption, the school also monitors the throughput of students' machines and disables their networking capabilities if they exceed 2GB of outgoing traffic in a single day. When this happens, the university contacts the students affected and informs them about what's going on. Students who were engaging in P2P are then asked to sign a letter promising not to do it again, and Wight says there are very few repeat offenders. However, Wight did admit that their system has cut off users who were doing nothing wrong, such as using VoIP.

The entire hearing turned upon the fact that no solution is 100 percent effective and that students can get around "almost any technology solutions to this problem," as Dr. Wight noted. This problem is best addressed by throwing multiple solutions at the problem, including personalized investigation of issues when they arise.

But others warned of a costly "arms race" with students who are technically savvy and already capable of defeating many of the technological solutions on the market. Dr. Greg Jackson, VP and CIO of the University of Chicago, said that his school focuses on educational approaches to curbing piracy, and they have also seen successes that, when described, sound quite similar to that at the University of Utah.

In Jackson's view, technological solutions are not capable of truly dealing with high-traffic networks like those at major universities, because even if they are effective today, students are already finding ways around them, and P2P itself is becoming an increasingly popular approach to networking for things other than illicit file sharing. Jackson questions how something like Audible Magic will continue to work once DRM-free music sales take off, and networks are full of legitimate music files that lack DRM but look "pirated" to commercial systems.

"The only successful, robust way to address problems that involve personal responsibility and behavior is with social rather than technological tools," he said. "If we instead try and restrict behavior technologically... the only result will be an arms race that nobody wins."

The question boils down to money. How much are schools willing to pay to see this problem go away? Educational programs cost money; technological solutions cost even more. In the latter case, there's an emerging sense that making it difficult for Joe User may be worth the money, even if more savvy users can still step around such costly measures. Congress may not wait for such matters to be weighed, however. Rep. Tom Feeney (R-FL) said that schools may have to adopt antipiracy technology "whether you like it or not" if the situation does not improve. "The Judiciary Committee is not going to be patient for very long," he warned.

Addendum: For those keeping score, here are some of the failed approaches that have led to the current impasse between schools and the RIAA.

• Lawsuits! The original "solution" is still the most common one. It's not enough though, so they've also tried:
• Free music! MIT trials LAMP to get students free access to music in a reasonable manner. "Scratch the itch" was the idea. Music industry flips out, says no way. They need money.
• Free music (not really)! MIT didn't think about the RIAA's revenue concerns. Now music downloads are tested by forcing students into commercial music subscription services. Some schools are still using this, but by and large it's going nowhere. The lesson? There doesn't seem to be an easy way for the RIAA to monetize their problems.
• Propaganda! Scare the bejeebus out of students by telling them that file sharing is a felonious offense. High-profile lawsuits continue, MPAA gets in on the game. This is where we are at now: the threat of legal onslaught.
• A new file sharing overlord! New technological approaches to making file sharing difficult or impossible on school-owned networks. Ohio U made the jump, and others are watching. Schools can point to technological solutions and say, "hey, we're paying big bucks for the AntiPirazyZon2000+++, don't come after us!"
http://arstechnica.com/news.ars/post...arms-race.html





TorrentSpy Ordered By Federal Judge to Become MPAA Spy
Enigmax

TorrentSpy, one of the world’s largest torrent dump sites, has been ordered by a federal judge to monitor its users in order to create detailed logs of their activities which must then be handed over to the MPAA.

On May 29, TorrentSpy - one of the web’s most famous .torrent dump sites was told by federal judge Jacqueline Chooljian in the Central District of California that despite the site’s privacy policy which states they will never monitor their visitors without consent, they must start creating logs detailing their user’s activities.

Understandably, this is a worrying move by the court - even more so when one considers these logs must then be turned over to the MPAA. This is believed to be the first time a judge has ordered a defendant to log visitor activity and then hand over the information to the plaintiff. The decision - arrived at last month but under seal - could force sites that are defendants in a law suit to track the actions of their visitors.

The owners have been granted a stay of the order in order to make an appeal, which must be filed by June 12, says Ira Rothken, TorrentSpy’s attorney.

“It is likely that TorrentSpy would turn off access to the U.S. before tracking its users,” said Rothken. “If this order were allowed to stand, it would mean that Web sites can be required by discovery judges to track what their users do even if their privacy policy says otherwise.”

This action follows MPAA action in 2006 against several BitTorrent sites, TorrentSpy included. According to the MPAA, Torrentspy helps others commit copyright infringement by directing people to sites which enable them to download copyright material, an offense claims the MPAA, of secondary copyright infringement.

At the time, Rothken said “It [TorrentSpy] cannot be held ‘tertiary’ liable for visitors’ conduct that occurs away from its web search engine”. TorrentSpy claims it did nothing illegal and suggested the MPAA should sue Google.

An attorney with the Electronic Frontier Foundation referred to the order to demand a defendant log visitor activity and then hand over the information to the plaintiff as “unprecedented.” He continued “In general, a defendant is not required to create new records to hand over in discovery. We shouldn’t let Web site logging policies be set by litigation”

One way or another, it seems that the MPAA is determined to obtain information about TorrentSpy and its users. A complaint issued by TorrentSpy suggests the MPAA paid a hacker $15,000 to steal e-mail correspondence and trade secrets. The hacker admitted that this was true.
http://torrentfreak.com/torrentspy-o...f-of-the-mpaa/





New Marvell Chipset Gets a BitTorrent Boost

Marvell has announced that it's new 88F5182 system-on-chip (SoC) platform will be BitTorrent capable, it will allow consumer electronics manufacturers who make products such as set top boxes, NAS (Network attached storage) and other devices to utilize BitTorrent for high speed content delivery. Manufacturers using the BitTorrent-certified 88F5182 chipset can provide a complete media solution featuring compatibility with BitTorrent. With an installed base of over 150 million users worldwide the next generation of Internet-connected devices are integrating BitTorrent to ensure a simple and seamless digital entertainment experience for consumers.

This is an important additional step in integrating the BitTorrent protocol for use in consumer electronic devices, especially those that are designed for home entertainment usage and data storage. It's one more progression towards consumers being able to watch and retrieve content quickly and seamlessly from their comfort of their living rooms.

"Optimizing BitTorrent to work with Marvell silicon at the component-level not only provides manufacturers high-performance and quick time-to-market, but takes full advantage of the entertainment content and commercial content delivery services offered by BitTorrent." says Ashwin Navin, president of BitTorrent, Inc.
http://www.newlaunches.com/archives/...rent_boost.php





Download Any MP3 From MySpace Bands
Aniscartujo

Forget about complex methods to download MP3s from MySpace, just enter the Band Name and get a list of MP3s to download. Its 100% Free!!
http://www.digg.com/music/Download_A..._MySpace_Bands





Anubis P2P 1.2

Downloads: 0 Requirements: Windows 95/98/Me/NT/2000/XP/2003 Server/Vista
Publisher: CitrixWire License: Free
Date added: 03-JUN-07 File Size: 2.58MB

Anubis P2P (peer-to-peer) is a new file sharing program that includes all the recent p2p optimizations, helping users to search and download over some several networks (including eD2K and Kad) around the internet. All in one features like file manager, download statistics, chat and IP filters make this p2p a complete tool for all kind of users. You can monitor all your activity in statistics area viewing download/upload reports gathered by Anubis. Version 1.2 is a bug fixing release.

Note: This software comes with Dealio toolbar for Internet Explorer, that can be installed or uninstalled at the user's choice.
http://asia.cnet.com/downloads/pc/sw...265110s,00.htm





FM Radio Waves are Stopped at the Border
Doreen Carvajal

When the music died one gloomy morning in April, residents of Brighton, England, who had been happily listening to illegally transmitted French radio for almost 10 years, were first stunned and then angered.

There was defiant talk of anchoring a clandestine FM transmitter on a boat off the coast of Brighton to bring back France Inter Paris, or FIP, which broadcasts a quirky blend of jazz, pop and rock, Dizzy Gillespie and Jimmy Hendrix. Someone started surreptitiously putting up posters along local streets. "Missing FIP," the poster said. "Can you help?"

A wistful Web site quickly appeared online with ardent testimonials to the advertising-free station.

"It's just one of those cool stations," said David Mounfield, a loyal listener and organizer of the ongoing British rebellion who does not speak French. "There wasn't much talking except a sexy female French voice, and it wasn't some inane English DJ yammering on in Britain, where it's all done by demographics and key markets to push and sell music."

The British listeners managed to tune in to the French radio for about 10 years through the aid of a radio engineer who set up illegal FM transmitters in well-placed houses.

In April, the British media regulator, Ofcom, silenced the station by confiscating the transmitters.

In the European Union, the borders for traditional radio stations remain firmly barricaded despite local demand for choice.

The walls remain high in France, too, where in May the government regulator, the Conseil Supérieur de l'Audiovisuel, or CSA, rejected three English-language channels, including the BBC, which sought precious FM frequencies on the crowded band in Paris. There are no English-language FM radio stations in the capital although there are FM stations broadcasting in Armenian, Portuguese, Yiddish, Russian and Serbo-Croatian, among other languages.

But the French regulator granted one open frequency in Paris to Tropique, a Creole-language station, because it argued that it reached a French Antilles audience similar to that of an outgoing station, Média Tropical. Critics remain skeptical of that logic. They note that the French international broadcaster RFI has not been allowed to offer radio programming in Britain.

"The back story is indeed a sort of tit for tat, but both countries are guilty of obtaining FM coverage in other countries and then refusing access to either Paris or London," said Jonathan Marks, a radio consultant in the Netherlands. "Kenya is arguing with the BBC about why they can't get access on FM to Kenyans in the U.K. when the BBC has FM outlets in Nairobi."

The barriers between countries have long existed, with national regulators, rather than the European Union, presiding over the airwaves. But rapidly evolving forms of new media will soon start offering ways to circumvent international barriers, particularly with many radio stations now accessible over the Internet.

"If you're an expat living in Paris, the best way to hear foreign radio in your kitchen is to install a Wi-Fi network at home and use one of the Wi-Fi radios now appearing in U.K. retail outlets," Marks said. He added that, as fixed-fee Internet service becomes more popular for portable telephones, "the alternative to FM for niche channels will be in the palm of your hand."

For now, though, that is small comfort for the British pining for their French radio or for the three English-language applicants that sought FM frequencies in Paris. One of them was Paris Live, which has broadcast on cable and satellite and was founded by Ian de Renzie Duncan, an Australian lawyer.

"It says to me that they have no respect for the million English-speaking people who have houses in France. Or they just don't care," Duncan said.

He said the impact on his own fledging business has been devastating, since he had counted on access to the more profitable FM band.

"I spent a half million euros and five years of my life working on this. And my family life is completely destroyed," Duncan said. "But I'm going to fight this with an appeal."

That rebellious spirit is also shared in Brighton, where on Thursday about 150 people gathered for a fund-raiser in the Hope Pub to savor music played regularly on the French radio station FIP. The aim was to finance a campaign to bring FIP back.

Mounfield, the listener who helped organize the "Vive le FIP" night, said regular listeners were weighing alternatives. He said they could take the more cumbersome legal approach, seeking a special community license to rebroadcast FIP in Britain. Or they could take a defiant approach by setting up a transmitter system timed to start broadcasting on Bastille Day.
http://www.iht.com/articles/2007/06/...ss/radio04.php





Guitartabs.com down ftm

NMPA Letter

Today I received a certified letter from Moses & Singer LLP, a law firm in New York City which asserts that they are acting as counsel for the National Music Publishers Association and The Music Publishers Association of America. They have stated that guitar tablature hosted on my site violates the copyrights of several of their clients.

I have long been of the understanding that an original, by-ear transcription of a song, which is a duplicate of no copyrighted work and which generally deviates substantially from the work on which it is based is the property of its transcriber, and not the original composer of the song. The NMPA and MPA clearly disagree, and are threatening to send a DMCA letter to my host, as well as pursue other undisclosed legal actions in the event that I were to fall short of full cooperation with their demands.

I have not yet decided what response is appropriate. This site has been a part of my life for ten years now, and I honestly believe that what I'm doing is neither illegal nor harmful to the music publishing industry. My site generates interest in playing music, which can only lead to more purchases of licensed sheet music. In addition, I have referred tens of thousands of dollars in licensed sheet music sales to my affiliates over the years. The notion that a musician serious enough to spend $30 on a sheet music book would instead settle for a by-ear tablature interpretation seems unlikely to me. Whlie highly paid laywers may easily be able to use corrupt, recently-manipulated and poorly-tested copyright law to suggest that I am violating the law, the argument that I have actually damaged their industry in the process seems ludicrous.

I have not had a chance to scan the letter yet, but I have typed it out. Please excuse any typoes I have made in haste.

Moses & Singer LLP
Via Certified Mail (Return Receipt Requested) and Electronic Mail

Peter J. Allen
(Address withheld for online version)

Re: Guitartabs.com

Dar Mr. Allen:

We are counsel to the National Music Publishers' Association ("NMPA") and The Music Publishers' Association of the United States, Inc. ("MPA"), not-for-profit trade associations of music publishers. Many NMPA and MPA member publishers create and distribute printed sheet music and guitar tablature products for educational, concert and recreational purposes. These products often account for a significant portion of the publishers' revenues, revenues which are shared with composers and songwriters.

It has come to our attention that your website, Guitartabs.com, makes available tablature versions of copyrighted musical compositions owned or controlled by members of the NMPA and MPA, without permission from the publishers. A representative listing of those compositions and the publishers who control the copyrights is attached as Schedule A. Examples of the compositions infringed include "Beautiful Day" written by Clayton/Evans/Mullen/Hewson and administered by Universal Music Publishing, and "I Want To Hold Your Hand" written by Lennon/McCarthy and administered by Sony/ATV Tunes LLC.

The versions of these publishers' musical works that you post on your website are not exempt under copyright law. In fact, U.S. copyright law specifically provides that the right to make and distribute arrangements, adaptations, abridgements, or transcriptions of copyrighted musical works, including lyrics, belongs exclusively to the copyright owner of that work. Many, if not all, of the compositions on your website, including the works listed on Schedule A, are protected by copyright. Therefore, you needed, but did not obtain, permission from the copyright owners to make a tablature version of those songs and to post them on your site. Under the circumstances, both the transcriber of the compositions and you as the owner of the website are copyright infringers.

We have been asked by the members of the NMPA and MPA to take all appropriate steps to remove unauthorized sheet music and tablature versions of the publishers' copyrighted works from the Internet.

In so enforcing the rights of the creators and publishers of music, it is our intent to ensure that composers and songwriters will continue to have incentive to create new music for generations to come.

Enclosed herewith is a copy of a notice we intend to send to your service provider, EV1Servers, unless you remove all infringing material from your site voluntarily within ten (10) days from the date of this notice. In accordance with the provisions of the Digital Milllennium Copyright Act ("DMCA), 17 U.S.C. 512, the notice details your infringing activities and demands that EV1Servers take down your website because you have not removed the infringing material, or itself face liability for copyright infringement.

IN short, we ask that you promptly remove all unauthorized copyrighted material from your website and confirm its removal to us in writing. We anticipate and expect your cooperation in this matter. However, in the event that you choose to ignore this request, we shall press our demand that EV1Servers take down your site. The NMPA and MPA, and their respective members, also hereby reserve all of their rights and rememdies under the copyright law with regard to your infringing activities.

We hope that you will choose to respect the rights of the creators of musical works and that no further action will be necessary. Please do not hesitate to contact me at (number withheld) or my associate, Michelle Zarr, at (number withheld) if you have any questions.

Sincerely,

Ross J. Charap

http://www.guitartabs.com/nmpa.php





RIAA: Trying to 'Herd' Victims
p2pnet.net

Warner Music, EMI, Vivendi Universal and Sony BMG's RIAA has come up with a shameful and derisive, even for the Big 4, new tactic, says Recording Industry vs The People's Ray Beckerman.

They want to 'herd' cases together, and that's exactly what they're trying to do with three of his cases, all of which are completely unrelated.

You can almost hear the whips cracking.

The RIAA (Recording Industry Association of America) is trying to to get magistrate judge Robert M. Levy to agree to a "joint settlement conference" in Elektra v Schwartz, Maverick v Chowdhury, and Elektra v Torres, all in Brooklyn, New York, says Beckerman, going on:

I've also learned the RIAA is attempting to stage a massive 'group' settlement conference for many other of its Brooklyn cases.

As the attorney for the defendants in these three cases, I find this latest tactic to be outrageous and offensive.

The RIAA has been improperly designating all of its cases in Brooklyn federal court as "related" cases, in order to remove the random assignment system and make sure that every case winds up being administered by Magistrate Judge Levy. Neither Magistrate Levy nor District Judge Trager have done anything to stop this practice.

As a result, because most of the cases are pro se cases in which the defendant has defaulted altogether, or has simply forgotten to show up in court, for the past 4 years, the RIAA lawyers have been spending an enormous amount of time talking to Magistrate Judge Levy alone - with no defendant's lawyer present.

Now they want to herd the defendants together and lead them like sheep to the slaughter, to so-called "settlement conferences", hoping the prestige of the judge's position will browbeat and coerce those defendants not inclined to pay the RIAA's extortion demands into submission.

Also they're hoping to achieve the massive economy of scale which is available to them, but which isn't available to the defendants, to further increase the economic imbalance.

If they can have a herded mass settlement conference like this, they can have one lawyer handling dozens and dozens of cases, while the defendants are for the most part represented by many different lawyers, if they're lucky enough to have a lawyer at all.

The whole tone of the proceeding would be offensive suggesting, as it would, that these greedy, law-breaking, private litigants are some sort of quasi-public agency, and have a special seat at the table in this courthouse - which apparently they do.

What makes matters even worse is the RIAA doesn't even know what the word "settle" means.

It means, basically, compromise. But my experience with the RIAA has been that everything is non-negotiable, and everyone either has to pay them the extorted money, or turn in someone else who may have committed a copyright infringement. It's extortion + investigation and has nothing to do with what lawyers traditionally mean when they say "settlement".
http://p2pnet.net/story/12420





Piracy in China is Smart, Hilarious, Critics Say
Michael Kanellos

"We Dine in Hell!"

If that were a real battle cry uttered in the Persian War, just think how much different Western Civilization would be today.

Instead, it's the slogan emblazoned in large letters across a pirated copy of the movie 300 that some guy in downtown Beijing wanted to sell to me. He wanted 20 RMB (China Yuan Renminbi), but the price quickly went down to 10 RMB, or about $1.30. He didn't realize the comic gem he was holding. The four or so other guys who pestered me tried to sell 300, too. Their copies had the same movie poster art on the cover, but with the more appropriate "We Die in Hell."

Although the Chinese government is trying to crack down on piracy, illegal software and movies continue to thrive. An estimated 86 percent of software here is illegal. In fact, in some ways it seems a little worse.

Five years ago when I was last here, you had to go into the store and ask for DVD movies. The clerk would then lazily tilt his thumb toward a cardboard box full of titles.

Now they're offered on the street more than in the past. Plus, the selection of movies is getting closer to the time they are playing in the theaters. It used to be you were mostly offered movies that had just been released on DVD or older films, like The Wild Geese and Planes, Trains and Automobiles.

Not now. The first guy who ran up when I got out of my cab tried to pawn off Spiderman 3 on me. (In fact, every vendor led with Spiderman 3). Then he whipped out Shrek 3. Both are in theaters and neither is on disc yet. Then he started in with the movies that just came out on DVD: Casino Royale, The Queen, and so on. There was hardly anything more than 11 months old.

"Do you have Harry Potter...the new one?" I asked.

No, but his friend standing next to him did--an unreleased movie and for the same $1.30 price as The Queen and Bernie Mac's The Cleaner.

As an experiment, I bought three: Harry Potter and the Order of the Phoenix (not due in theaters for several weeks), Shrek 3 (in theaters) and Children of Men (on DVD).

What were the takeaways from my shopping spree?
The desire to see the real versions doesn't justify piracy, but you can see why this makes it tough to eliminate.

1. Piracy is a not just a bunch of random individuals. In a mile walk (admittedly, in an area known for touts), I got hit up at least five times for DVDs, once when a policeman was passing by. If everyone has the same movies, and in the same general area, there's some organization involved. And the government, while trying to crack down, seems to see this as a nuisance, at least on the street level.

Russia figures in here. Children of Men is in Russian. Shrek 3, meanwhile, is in English, but the credits are in Russian, so the cross-border trade is running smoothly.

2. On the other hand, we may not be dealing with a group of super criminals--or super consumers. If people were hawking copies of the Order of the Phoenix--a movie that's being kept under tight lock in a vault--on the street, the studios would clearly have some serious security issues. But no. It turns out that the disc is for Bibi Blocksberg, a German rip-off of Sweden's Pippi Longstocking dubbed in Mandarin with English subtitles. It's a multicultural fraud!

Shrek 3, the in-theater movie, was filmed by someone sitting in a theater. It's fuzzy and the light goes in and out, judging from the scenes I looked at. Pirated copies of this sort aren't going to put a huge dent in theater revenues, just as Rolex probably doesn't lose that many likely buyers to street vendors in Juarez, Mexico. In a sense, these guys are the best advertisers for the studios.

3. Still, you can see why DRM (digital rights management) is necessary. By contrast, Children of Men was pristine (except, of course, the Russian part). I also visited a "legitimate" DVD and CD store. They were selling Babel, a movie that came out last year, for 20 RMB. At around $2.60, that's nearly $18 off the normal retail price. Casino Royale cost 30 RMB. Both worked fine in a store demo. The store even had the original packaging.

4. There is a sociopolitical angle to this. An expatriate I was speaking to said that many of his Asian colleagues buy legitimate discs most of the time. But if the censors cut out profanity or sex, they will buy a pirated version copied from a U.S. disc. Sex and the City is bought this way. The desire to see the real versions doesn't justify piracy, but you can see why this makes it tough to eliminate.

5. The packaging on these things is a work of art. A few years ago, you'd get a disc in a sleeve--on one side there was the movie art poster. On the other, credits from another movie. In short, they looked somewhat hillbilly.

The pirates have upped their marketing and are aiming for a classier clientele. The Shrek 3 disc comes in a folding envelope that contains art from the same movie on both sides of the envelope. It even contains a blurb from David Ansen at Newsweek. "Smart and Hilarious," he said.

But if you read closely, you'll see that the director is listed as Joe Ptkya and it stars Michael Jordan. The sleeve of Children of Men lists as a bonus feature "all new deleted scenes" and a short on the making of Carlito's Way. Spencer Breslin is listed as the star. The typos alone make the packaging worth more than the sales price.

Anna Silk is the star of Order of the Phoenix. But the "Order" envelope also includes an ad on one of the inside panels for the pirated version of Spiderman 3 that the guy was selling, an interesting twist on cross-promotion. And the envelope may display an accurate version of what the legitimate movie art will look like. There's an ominous shot of Voldemort and his followers marching off somewhere in a scene that I don't recognize from the last movie.

Maybe they are all off to dine with the Spartans.
http://news.com.com/Piracy+in+China+...3-6187305.html





Florida Defendant Goes After RIAA for Fraud, Conspiracy, and Extortion
Eric Bangeman

As the RIAA has continued its legal assault on file-sharing, defendants are responding with what amount to boilerplate defenses and counterclaims against the RIAA's allegations of copyright infringement. One recent RIAA target, Suzy Del Cid, is fighting back with a counterclaim that accuses the RIAA of all sorts of nefarious misdeeds.

UMG v. Del Cid is being heard in the US District Court for the Middle District of Florida, and in a counterclaim filed late last week, Del Cid accused the RIAA of computer trespass, conspiracy, extortion, and violations of the Fair Debt Collection Practices Act.

We've seen many of these claims before. Tanya Andersen accused the RIAA of violating Oregon's RICO statute in Atlantic v. Andersen, saying that the RIAA "hired MediaSentry to break into private computers to spy, view files, remove information, and copy images." Del Cid's accusations are similar: "these record companies hired unlicensed private investigators—in violation of various state laws—who receive a bounty to invade private computers and private computer networks to obtain information—in the form of Internet Protocol ('IP') addresses—allowing them to identify the computers and computer networks that they invaded."

There are also allegations of a conspiracy in Del Cid's counterclaim. It details how the Settlement Support Center contacts those fingered by the RIAA after John Doe lawsuits are filed to learn the identity of those using an IP address allegedly engaged in file sharing. Del Cid says that the Settlement Support Center takes "no account of the merits" of a particular claim, instead relying on the "inherent inequality of resources and litigation power" between the record companies and defendants. It's almost the exact same argument Andersen made in 2005, when she said that "record companies have repeated these unlawful and deceptive actions with many other victims throughout the United States."

In this case, Del Cid accuses the plaintiffs of computer trespass, fraud, and abuse, saying that they "intruded into Del Cid's personal computer to obtain information." If Del Cid was indeed on Kazaa, or any other file-sharing network, she will have a hard time convincing a judge that MediaSentry trespassed. "There's no reasonable expectation of privacy, given [Kazaa's] settings," Rich Vazquez, a partner at Morgan Miller Blair, noted when discussing a similar claim in Atlantic v. Andersen.

Vazquez believes that in order for the RIAA to be vulnerable to claims of malicious prosecution in cases like this, someone involved on the music industry's side would have to flip. "It would likely take someone on the inside testifying that the RIAA pursued people that it knew were innocent," Vazquez told Ars. "Then there would be a serious risk of malicious prosecution. But you've got to have them cold."

Del Cid does appear to break new ground with a couple of her counterclaims. She alleges that the RIAA used private investigators unlicensed by the state of Florida (where she lives) to track her online activities in violation of Florida law. Del Cid also accuses the RIAA of violating the Fair Debt Collection Practices Act by "knowingly collecting an unlawful consumer debt," referring to the Settlement Support Center's attempts to settle the case before the lawsuit was filed.

We are going on four years since the first file-sharing lawsuits were brought by the RIAA, and over the past several months, defendants' responses echo a number of similar themes—no doubt due to attorneys sharing "best practices" with one another. The computer trespass and conspiracy claims outlined above are two examples. Other defenses include arguments that the RIAA is barred from recovering damages from individual defendants due to its $115 million settlement with Kazaa and that the damages of $750 per song requested by the record labels are unconstitutionally excessive.

Aside from the occasional claim under state law—like Del Cid's charges that the RIAA used unlicensed private investigators—we are likely at a point where there is nothing new under the sun when it comes to file-sharing litigation. Any significant developments are going to come in the form of rulings—like the award of attorneys' fees to Debbie Foster in Capitol v. Foster—or even jury trials. The RIAA and its defendants have thrown just about everything in the book at one another, and it's up to the courts to decide what charges are going to stick.
http://arstechnica.com/news.ars/post...extortion.html





RIAA Throws in the Towel in Atlantic v. Andersen
Eric Bangeman

One of the most notorious file-sharing cases is drawing to a close. Both parties in Atlantic v. Andersen have agreed to dismiss the case with prejudice, which means that Tanya Andersen is the prevailing party and can attempt to recover attorneys fees.

Tanya Andersen was originally sued by the RIAA in 2005. She's a disabled single mother with a nine-year-old daughter living in Oregon; she was targeted by the music industry for downloading gangster rap over Kazaa under the handle "gotenkito." She denied engaging in piracy and in October 2005, she filed a countersuit accusing the record industry of racketeering, fraud, and deceptive business practices, among other things.

As we noted earlier today, counterclaims accusing the RIAA of all sorts of wrongdoing have become increasingly common. Late last month, Andersen filed a motion for summary judgment, saying that the plaintiffs have "failed to provide competent evidence sufficient to satisfy summary judgment standards" to show that she engaged in copyright infringement. Most notably, a forensic expert retained by the RIAA failed to locate "any evidence whatsoever" on Andersen's PC that she had engaged in file-sharing.

The RIAA has already taken a beating in the press in this case—accusing a disabled single mother of sharing songs like "Hoes in My Room" over Kazaa and then pressing doggedly ahead with the case despite mounting evidence that it had erred tends to look bad. Faced with the prospect of a case that was all but unwinnable, the RIAA has cut its losses by agreeing to dismiss the case.

What's unusual is that the RIAA has stipulated to a dismissal with prejudice, completely exonerating Andersen. Next to a negative verdict, an exonerated defendant is the last thing the RIAA wants. When faced with an undesirable outcome, the RIAA's tactic has been to move to dismiss without prejudice, a "no harm, no foul" strategy that puts an end to a lawsuit without declaring a winner and a loser. Dismissing a case with prejudice opens the RIAA up to an attorneys' fee award, which happened in the case of another woman caught in the music industry's driftnet, Debbie Foster.

With the original RIAA complaint has dismissed, Andersen told Ars Technica in an e-mail that the counterclaim is "now standing on its own," meaning that she will still have the opportunity to argue her counterclaims before the court. Given the allegations she has made, prevailing with the counterclaim could prove even more troubling to the RIAA.

Given the facts of the case and the precedent set by Capitol v. Foster, an attorneys' fee award is not out of the question. Getting the RIAA to actually cut a check may prove to be a bit more difficult, as Foster's attorneys have discovered. You can track the progress of Foster's attempts to recover fees—and many other file-sharing cases—at Recording Industry vs. The People.
http://arstechnica.com/news.ars/post...-andersen.html





Committee Looks at Technology to Limit Illegal Filesharing
Press Release

Members of the House Science and Technology Committee today heard from university officials and a leading technology expert on different methods to reduce illegal filesharing on campus internet systems.

While most colleges and universities provide their students with internet access for educational and research purposes, a growing number of college students have instead come to use the system to illegally download and share copyrighted music and movies through free peer-to-peer (P2P) filesharing programs, such as eMule and LimeWire. In 2006, some 1.3 billion tracks were downloaded illegally in the U.S. by college students, compared with approximately 500 million legal downloads.

“Illegal filesharing isn’t just about royalty fees. It clogs campus networks and interferes with the educational and research mission of universities,” said Chairman Bart Gordon (D-TN). “It wastes resources that could have gone to laboratories, classrooms and equipment. And it is teaching a generation of college students that it’s alright to steal music.”

While other House Committees have examined the regulation of illegal filesharing, adequate technology will be the first line of defense in actually preventing it.

Witnesses at today’s hearing discussed their universities’ experiences with two different types of technological measures to prevent illegal filesharing on their networks: traffic-shaping systems and network-filtering systems.

Traffic-shaping systems control the speed of network transmissions based on where in the network they originate and what computer program sends them. This makes filesharing slower and more difficult by reducing the flow of data to and from computers that tend to transmit or receive copyright-infringing transmissions.

Network-filtering systems specifically identify and block transmissions that contain copyrighted material.

Witnesses testified on the extent to which these technologies reduced illegal filesharing, and also technological issues surrounding them–such as privacy and impacts on speed and reliability of campus networks.

“One of our nation’s greatest strengths is our educational system, and American universities are the envy of the world. Their mission is to educate students, and they should not condone or look the other way when their computer networks are used as clearinghouse for digital piracy and illegal filesharing,” said Gordon.

Today’s witnesses included Dr. Charles Wight, Associate Vice President for Academic Affairs and Undergraduate Studies, University of Utah; Dr. Adrian Sannier, Vice President and University Technology Officer, Arizona State University, on leave from Iowa State University; Mr. Vance Ikezoye, President and CEO of Audible Magic Corporation; Ms. Cheryl Asper Elzy, Dean of University Libraries, Illinois State University; Management Team, ISU’s Digital Citizen Project; Dr. Greg Jackson, Vice President and Chief Information Officer, University of Chicago.

(PDF), (PDF)
http://science.house.gov/press/PRArt...px?NewsID=1858





News From The North



The TankGirl Diaries


DC Users and Admins Raided in Finland
Tank Girl

The Finnish police raided earlier today a number private homes in three different cities (Turku, Oulu and Espoo), confiscating computers of suspected users and administrators of various Finnish Direct Connect hubs. The operation was initiated on the request of The Copyright Information and Anti-piracy Centre (CIAPC), known as TTVK in Finland. Immediately after the raids the international copyright organization IFPI came out with a well-prepared statement (in Finnish) about the raids, including typical propaganda comments from IFPI chairman John Kennedy and from the European MPAA representative Halli Kristinsson. There is no information on any arrests being made at the raids. All DC hubs in Finland have been invite-only for a longer time, so it is likely that the police or CIAPC used infiltrators to get access to the hubs in order to collect IP numbers and other information.

The previous major attack against Finnish filesharers happened in December 2004 when the popular torrent site Finreactor was busted, leading to dozens of charges against site administrators and moderators. Most of the Finreactor cases are still waiting for their turn in the appeals court. Finland and Sweden are among the leading Direct Connect countries in the world in terms of hub and user counts.
http://www.p2pconsortium.com/index.php?showtopic=13196





McAfee's Blubster Deal
Jon Newton

Yesterday, I did a post on the fact so-called security company McAfee has marked me RED! merely because I have an ad for p2p music sharing client Blubster on p2pnet.

McAfee claims Blubster is loaded all kinds of nasty stuff and is using this assertion to warn people away from it.

This McAfee item also carries a weird graphic (right) which among other things, has me linking to something called yourmercifulgod.co.uk.

I have so many links and hundreds, if not thousands, of comment posts include them as well. So it's quite possible there's a link to this sinful site somewhere on p2pnet. But only God knows where it is

And I link to SpyBot and The Pirate Bay too !!! Horror of Horrors!

So we'll soon see Google and Yahoo and everyone else similarly honoured with unmeritorious mentions on McAfee. Right?

Meanwhile, my mate Pablo Soto over in Spain (he's the guy who created Blubster, among other applications) has a post about this McAfee farce on his blog.

Here's what he says >>>>>>>>>>>>>

During the summer of 2002 McAfee approached me. A nice and pretty marketing manager of its Consumer Division wanted to ink a deal with us to distribute their Security Center software with our application: P2P music sharing client Blubster.

They were so excited. File sharing users download virus 24/7 they said. Not in an MP3 only network, I replied. But hey, it was the kind of deal that couldn't hurt neither our finance nor our users. And so we did.

Literally millions of our users opted-in to install McAfee's software and we received a good amount of revenue.

They were paying much less than what our competitors bundled, but it was a good deal.

We were not alone, days later more and more press releases started to flow announcing McAfee's deals with almost all other top tier P2P software distributors. Including Grokster, aka, the father of spyware. Yup, those users really needed a good antivirus, and I mean a good one.

Make no mistakes here, McAfee attracted more audience than they could have imagined. And they were obviously happy with it.

Today, I couldn't believe it when doing my daily check in my friend Jon's site I read that McAfee is targeting them. And for what you may ask? For linking Blubster.com (crowd wows).

Right. They bundled their software with us and now they protect our users from us because we bundle software, they say.

McAfee even removed the press releases anouncing the P2P deals.

Not only our software is totally free of viruses, spyware and unwanted programs, it was a major distributor of McAfee's products and they loved the traffic.

These guys must be kidding.

No, Pablo. They're perfectly serious.

Stay Tuned.
http://p2pnet.net/story/12363





Censorship 'Changes Face of Net'
BBC

Amnesty International has warned that the internet "could change beyond all recognition" unless action is taken against the erosion of online freedoms.

The warning comes ahead of a conference organised by Amnesty, where victims of repression will outline their plights.

The "virus of internet repression" has spread from a handful of countries to dozens of governments, said the group.

Amnesty accused companies such as Google, Microsoft and Yahoo of being complicit in the problem.

Website closures

When challenged on their presence in countries such as China in the past, the companies accused have always maintained that they were simply abiding by local laws.

Amnesty is concerned that censorship is on the increase.

"The Chinese model of an internet that allows economic growth but not free speech or privacy is growing in popularity, from a handful of countries five years ago to dozens of governments today who block sites and arrest bloggers," said Tim Hancock, Amnesty's campaign director.

"Unless we act on this issue, the internet could change beyond all recognition in the years to come.

More and more governments are realising the utility of controlling what people see online and major internet companies, in an attempt to expand their markets, are colluding in these attempts," he said.

According to the latest Open Net Initiative report on internet filtering, at least 25 countries now apply state-mandated net filtering including Azerbaijan, Bahrain, Burma, Ethiopia, India, Iran, Morocco and Saudi Arabia.

Egyptian blogger

Filtering was only one aspect of internet repression, the group said. It added that increasingly it was seeing "politically motivated" closures of websites and net cafes, as well as threats and imprisonments.

Twenty-two-year-old Egyptian blogger Abdul Kareem Nabeel Suleiman was imprisoned for four years in February for insulting Islam and defaming the President of Egypt.

Fellow Egyptian blogger Amr Gharbeia told the BBC that the internet was allowing people to express themselves: "The web is creating a more open society, it is allowing more people to speak out. It's only natural that upsets some people."

The Amnesty conference - Some People Think the Internet is a Bad Thing: The Struggle for Freedom of Expression in Cyberspace - will have some well-known speakers including Wikipedia founder Jimmy Wales.

It marks the first anniversary of Amnesty's website irrepressible.info, which is being relaunched to become an information hub for anyone interested in the future of internet freedom.
http://news.bbc.co.uk/go/pr/fr/-/2/h...gy/6724531.stm





Do Obama and Lieberman Think the Internet is Dangerous?
David Cassel

Does Joe Lieberman hate the internet? Is Barack Obama trying to scare you? Welcome to National Internet Safety Month. Its sole purpose? Reminding America how dangerous the internet is.

I’m not kidding. That’s the gist of an official resolution, quietly signed by 18 U.S. Senators in both parties at the end of May (including Senators Obama and Lieberman). Senate Resolution 207 specified that the month of June provides Americans an opportunity to “learn more about the dangers of the Internet.” Got anything positive to say about the net? Save it for July, pal. June is for commending organizations which “promote awareness of the dangers of the Internet.”

They might as well call it internet-is-dangerous month. But let’s look at some of their examples. What constitutes a danger? If someone puts a filter on your computer to censor it — it’s dangerous to disable it! You can say this about America’s youth — more than 3 out of 10 can de-activate censor-ware, according to the Senators’ own statistics. Congratulations, kids! Whoops, I’m sorry — I mean…danger!!

They’re actually talking about 18-year-olds here, at least in some cases. The Senators cite an age range from 5th grade through high school seniors. I guess we wouldn’t want any of those 18-year-olds thinking for themselves.

Another “danger” is online bullying — although apparently 77% of the students surveyed said that hadn’t happened to them, and that they didn’t even know anyone that it had happened to. And what’s dangerous about your mom knocking on your door asking what you’re doing? Not telling her. Danger! Danger! This calls for a Senate resolution….

Less than a quarter of the teenagers in their sample are even bothering to hide what they’re doing online, according to the Resolution. But that’s good enough for the Senators. And another “dangerous” behavior cited in the anti-internet resolution? Daring to meet someone in real life — ever — after having first met them online. Your virtual friends should never, ever be met. Until you’re 18.

But it’s not just a resolution. A few corporations are actually trying to cash in on this misguided disinformation campaign, including BSafe Online, a Tennessee company which markets a PC filtering software. (I wonder if it’s one of the ones that can be disabled by 31% of America’s teenagers…) Their CEO has an encouraging message for parents about safety on the internet. “This is a battle they must fight everyday with their children in order to keep pornographers, sexual predators and cyber-bullies at bay.” And keeping those pornographers and sexual predators away will cost you a mere $70 a year…

The co-founder of another filter company promised parents “a spike in persistence of online predators” this summer. And as an added bonus, PC Pandora has also added the ability to spy on your partner (in case you’ve accidentally married a sexual predator.) If you want to start worrying right away, they’ve even published a web page with 29 possible possible signs that your partner might be cheating on you. (Which include working late, avoiding you, not avoiding you….) Maybe they’re just getting a jump on National Internet Marital Fidelity Month.

So now you know. Your tax dollars paid for a bunch of techno-phobes to pass congratulatory resolutions about mom, Apple Pie, and the need to keep teenagers off MySpace. (BSafe’s press release specifically touts their ability to squelch all social networking sites.) Here’s a list of the Senators that co-sponsored this resolution.

Lisa Murkowski (R - AK) Joe Lieberman (I - CT)
Sheldon Whitehouse (D - RI) Barack Obama (D - IL)
Ted Stevens (R - AK) Mary Landrieu (D - LA)
David Vitter (R - LA) Norm Coleman (R - MN)
Larry Craig (R - ID) Evan Bayh (D - IN)
Kay Hutchison (R - TX) Blanche Lincoln (D - AR)
Mike Crapo (R - ID) Charles Schumer (D - NY)
Max Baucus (D - MT) John Thune (R - SD)
Patrick Leahy (D - VT) Pete Domenici (D - NM)

But if you think your Senator is more enlightened about the internet, remember — those are just the co-sponsors.

This internet-is-dangerous resolution was passed…unanimously.
http://tech.blorge.com/Structure:%20...-is-dangerous/





Saving the Internet

Cyberspace can be made safer from the chaos and crime that threaten to overwhelm it. But most recipes for security and order come at a very steep price: the loss of the Internet’s creative potency.

By Jonathan Zittrain

The famed Warner Bros. cartoon antagonist Wile E. Coyote demonstrates a fundamental principle of cartoon physics. He runs off a cliff unaware of its ledge and continues forward without falling. The Coyote defies gravity until he looks down and sees that there is nothing under him. His mental gears turn as he contemplates his predicament. Then: Splat.

The Internet and the PC are following a similar trajectory. They were designed by people who shared the same love of amateur tinkering as the Coyote and who dealt with problems only as they arose—or left them to individual users to deal with. This “procrastination principle,” together with a design premised on contributions from anyone who cared to pitch in, have caused the Internet and PC to emerge from the realms of researchers and hobbyists and to win out over far more carefully planned and funded networks and information appliances.

The runaway successes of the Internet and PC with the mainstream public have put them in positions of significant stress and danger. Though the Internet’s lack of centralized structure makes it difficult to assess the sturdiness of its foundations, there are strong signals that our network and computers are subject to abuse in ways that have become deeper and more prevalent as their popularity has grown.

The core boon and bane of the combined Internet and PC is its generativity: its accessibility to people all over the world—people without particular credentials or wealth or connections—who can use and share the technologies’ power for various ends, many of which were unanticipated or, if anticipated, would never have been thought to be valuable.

The openness that has catapulted these systems and their evolving uses to prominence has also made them vulnerable. We face a crisis in PC and network security, and it is not merely technical in nature. It is grounded in something far more fundamental: the doubled-edged ability for members of the public to choose what code they run, which in turn determines what they can see, do, and contribute online.

Poor choices about what code to run—and the consequences of running it—could cause Internet users to ask to be saved from themselves. One model to tempt them is found in today’s “tethered appliances.” These devices, unlike PCs, cannot be readily changed by their owners, or by anyone the owners might know, yet they can be reprogrammed in an instant by their vendors or service providers (think of TiVo, cell phones, iPods, and PDAs). As Steve Jobs said when introducing the Apple iPhone earlier this year, “We define everything that is on the phone. You don’t want your phone to be like a PC. The last thing you want is to have loaded three apps on your phone, and then you go to make a call and it doesn’t work anymore. These are more like iPods than they are like computers.”

If enough Internet users begin to prefer PCs and other devices designed along the locked-down lines of tethered appliances, that change will tip the balance in a long-standing tug of war from a generative system open to dramatic change to a more stable, less-interesting system that locks in the status quo. Some parties to the debates over control of the Internet will embrace this shift. Those who wish to monitor and block network content, often for legitimate and even noble ends, will see novel chances for control that have so far eluded them.

To firms with business models that depend on attracting and communicating easily with customers online, the rise of tethered appliances is a threat. It means that a new gatekeeper is in a position to demand tribute before customers and vendors can connect—a discriminating “2” inside “B2C.”

Two Generative Triumphs: Network and PC

Some brief history: The mainstream consumer network environment of the early 1990s looked nothing like today’s Internet, nor did it evolve to become the Internet we have today. As late as 1995, conventional wisdom held that the coalescing global network would be some combination of the proprietary offerings of the time, services like CompuServe, AOL, and Prodigy. Yet those companies went extinct or transformed into entirely different businesses. They were crushed by a baling-wire-and-twine network built by government researchers and computer scientists, one that had no CEO and no master business plan.

The leaders of the proprietary networks can be forgiven for not anticipating the Internet’s rise. Not only was there no plan for the provision of content on the Internet, there was an outright hostility toward many forms of it. The Internet’s backbone, operated by the U.S. National Science Foundation, had an acceptable-use policy prohibiting commercial endeavors. For years the Internet remained a backwater, a series of ad hoc connections among universities and research laboratories whose goal was to experiment with networking. Yet what the developers made was a generative system, open to unanticipated change by large and varied audiences. It is this generativity that has caused its great—and unanticipated—success.

Consumer applications were originally nowhere to be found on the Internet, but that changed in 1991, after the Internet’s government patrons began permitting personal and commercial interconnections without network research pretexts, and then ceased any pretense of regulating the network at all. Developers of Internet applications and destinations now had access to a broad, commercially driven audience. Proprietary network service providers who had seen themselves as offering a complete bundle of content and access became mere on-ramps to the Internet, from which their users branched out to quickly thriving Internet destinations for their programs and services. For example, CompuServe’s Electronic Mall, an e-commerce service intended to be the exclusive means by which outside vendors could sell products to CompuServe subscribers, disappeared under the avalanche of individual Web sites selling directly to anyone with Internet access.

PCs likewise started off slowly in the business world (even the name “personal computer” evokes a mismatch). Businesses first drew upon custom-programmed mainframes—the sort of complete package IBM offered in the 1960s, for which software was an afterthought—or relied on information appliances like smart typewriters. Some businesses obtained custom-programmed minicomputers, and employees accessed the shared machines through dumb workstations using small, rudimentary local-area networks. The minicomputers typically ran a handful of designated applications—payroll, accounts receivable, accounts payable, and company-specific programs, such as case-management systems for hospitals or course-registration programs for universities. There was not much opportunity for skilled users to develop and share innovative new applications.

Through the 1980s, the PC steadily gained traction. Its ability to support a variety of programs from a variety of makers meant that its utility soon outpaced that of specialized appliances like word processors. Dedicated word processors were built to function the same way over their entire product lifetimes, whereas PC word-processing software could be upgraded or replaced with an application from a competitor without having to replace the PC itself. This IT ecosystem, comprising fixed hardware and flexible software, soon proved its worth.

PCs had some drawbacks for businesses—documents and other important information ended up stored across different PCs, and enterprise-wide backup could be a real headache. But the price was right, and people entering the workforce soon could be counted on to have skills in word processing and other basic PC tools. As a round of mature applications emerged, there was reason for most every white-collar worker to be assigned a PC, and for an ever broader swath of people to want one at home. These machines might have been bought for one purpose, but their flexible architecture meant that they could quickly be redeployed for many others. A person who bought a PC for word processing might then discover the joys of e-mail, gaming, or the Web.

Four Elements of Generativity (Located at the end of this article)

Bill Gates used to describe Microsoft’s vision as “a computer on every desk.” That may have reflected a simple desire to move units—nearly every PC sold meant more money for Microsoft—but as the vision came true in the developed world, the implications went beyond Microsoft’s profitability. Whether running Mac or Windows, an installed base of tens of millions of PCs meant that there was tilled soil in which new software could take root. A developer writing an application would not need to convince people that it was worth buying new hardware to run it. He or she would need only persuade them to buy the software itself. With the advent of PCs connected to the Internet, people would need only click on the right link and new software could be installed. The fulfillment of Gates’s vision significantly boosted the generative potential of the Internet and PC, opening the floodgates to innovation.

Benefits of Generativity: Innovation and Participation

Generativity is a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences. As such, generativity produces two main benefits: The first is innovative output—new things that improve people’s lives. The second is participatory input—the opportunity to connect to other people, to work with them, and to express one’s own individuality through creative endeavors.

Nongenerative systems can grow and evolve, but such growth is channeled through their makers: Sunbeam releases a new toaster in response to anticipated customer demand, or an old proprietary network like CompuServe adds a new form of instant messaging by programming it itself. When users pay for products or services, they can exert market pressure on the companies to develop the desired improvements or changes. This is an indirect path to innovation, and there is a growing body of literature about its chief limitation: a persistent bottleneck that prevents large incumbent firms from developing and cultivating certain new uses, despite the benefits they could enjoy with a breakthrough.

For example, Columbia Law School professor Tim Wu has shown that when wireless telephone carriers control what kinds of mobile phones their subscribers may use, those phones often have undesirable features and are difficult for third parties to improve. Some carriers have forced telephone providers to limit the mobile phones’ Web browsers to certain carrier-approved sites. They have eliminated call timers on the phones, even though these would be trivial to implement and are much desired by users, who would like to monitor whether they have exceeded the allotted minutes for their monthly plan. These limitations persist despite competition among several carriers.

The reason big firms exhibit such innovative inertia, according to a theoretical framework by Clayton Christensen, is twofold: Big firms have ongoing investments in their existing markets and in established ways of doing business, and disruptive innovations often capture only minor or less-profitable markets—at first. By the time the big firms recognize the threat, they are not able to adapt. They lose, but the public wins.

For disruptive innovation to come about, newcomers need to be able to reach people with their offerings. Generative systems make this possible. Indeed, they allow users to try their hands at implementing and distributing new ideas and technologies, filling a crucial gap that is created when innovation is undertaken only in a profit-making model, especially one in which large firms dominate.

Consider novel forms of commercial and social interaction that have bubbled up from unexpected sources in recent years. Online auctions might have been ripe for the plucking by Christie’s or Sotheby’s, but upstart eBay got there first and stayed. Craigslist, initiated as a dot-org by a single person, dominates the market for classified advertising online. Ideas like free Web-based e-mail, hosting services for personal Web pages, instant-messaging software, social networking sites, and next-generation search engines emerged from individuals or small groups wanting to solve their own problems or try something neat, rather than from firms realizing there were profits to be gleaned.

Eric von Hippel, head of MIT’s Innovation and Entrepreneurship Group, has written extensively about how rarely firms welcome improvements to their products by outsiders, including their customers, even when they could stand to benefit from them (see “Customers as Innovators: A New Way to Create Value,” by Stefan Thomke and Eric von Hippel, HBR April 2002). In his work, von Hippel makes the case to otherwise-rational firms that the users of their products can and often do serve as disruptive innovators, improving products and sometimes adapting them to entirely new purposes. They come up with ideas before there is widespread demand and vindicate them sufficiently to get others interested. These users are commonly delighted to see their improvements shared. When interest gets big enough, companies can step in and fully commercialize the innovation.

We have thus settled into a landscape in which both amateur and professional, small- and large-scale ventures contribute to major innovations. Consumers can become enraptured by a sophisticated “first-person shooter” video game designed by a large firm in one moment and by a simple animation featuring a dancing hamster in the next. So it is unsurprising that the Internet and PC today comprise a fascinating juxtaposition of sweepingly ambitious software designed and built like a modern aircraft carrier by a large contractor, alongside killer applets that can fit on a single floppy diskette. OS/2, an operating system created as a joint venture between IBM and Microsoft, absorbed more than $2 billion of research and development investment before its plug was pulled, whereas Mosaic, the first graphical PC Web browser, was written by a pair of students during a university break.

Generative growth can blend well with traditional market models. Big firms can produce software where market structure and demand call for such enterprise; smaller firms can fill in niches; and amateurs, working alone and in groups, can design both inspirational applets and more labor-intensive software that increases the volume and diversity of the technological ecosystem. Once an eccentric and unlikely invention from outsiders has gained traction, traditional means of raising and spending capital to improve a technology can shore it up and ensure its exposure to as wide an audience as possible. An information technology ecosystem comprising only the products of the free software movement would be much less usable by the public at large than one in which big firms help sand off rough edges. GNU/Linux has become user friendly thanks to firms that package and sell copies, even if they cannot claim proprietary ownership of the software itself. Tedious tasks that improve ease of mastery for the uninitiated are probably best done through corporate models: creating smooth installation engines, extensive help guides, and other forms of hand-holding to help users embrace what otherwise might be an off-putting technical software program or Web service.

For the individual, there is a unique joy to be had in building something—even if one is not the best craftsperson. (This is a value best appreciated by experiencing it; those who demand proof may not be easy to convince.) The joy of being helpful to others—to answer a question simply because it is asked and one knows a useful answer, to be part of a team driving toward a worthwhile goal—is among the best aspects of being human. Our information technology architecture has stumbled into a zone where helpfulness and teamwork can be elicited among and affirmed for tens of millions of people. Novel invention by engineers at the technical layer allows artists to contribute at the content layer. The feeling is captured fleetingly when strangers are thrown together in adverse situations and unite to overcome them—an elevator that breaks down, a blizzard or blackout that temporarily paralyzes the normal cadences of life but that leads to wonder and camaraderie rather than fear. The Internet of the early twenty-first century has distilled some of these values, promoting them without the kind of adversity or physical danger that could make a blizzard fun for the first day but divisive and lawless after the first week without structured relief.

The Generative Stall

Generative technologies need not produce forward progress, if by progress one means something like enhancing social welfare. Rather, they foment change. Generative systems are by their nature unfinished, awaiting further elaboration from users and firms alike. As such, they can be threatened as soon as their popularity causes abusive business models to pop up. The very openness and user-adaptability that make the Internet a creative wellspring also allow for the propagation of assorted evils—viruses, spam, porn, predation, fraud, vandalism, privacy violations, and potentially ruinous attacks on Web sites and on the integrity of the Internet itself. This is becoming an existential threat to the generative IT ecosystem.

The benefit of the generative PC is that it may be repurposed by a neophyte user at the click of a mouse. That is also a huge problem, for two main reasons. First, the PC user who clicks on bad code in effect hands over control of the PC to a total stranger. Second, the threat presented by bad code has been steadily increasing. The most well-known viruses have so far had completely innocuous payloads. The 2004 Mydoom worm spread like wildfire and affected connectivity in millions of computers around the world. Though it cost billions of dollars in lost productivity, Mydoom did not tamper with data, and it was programmed to stop spreading at a set time. Viruses like Mydoom are more like the crime of graffiti, with no economic incentive, than like the sale of illegal drugs, with its large markets and sophisticated criminal syndicates.

There is now a business model for bad code—one that gives many viruses and worms payloads for purposes other than simple reproduction. What seemed truly remarkable when it was first discovered is now commonplace: viruses that compromise PCs to create large “botnets” open to later instructions. Such instructions have included directing the PC to become the botnet’s own e-mail server, sending spam by the millions to e-mail addresses harvested from the hard disk of the machine itself or from Web searches, all in a process typically unnoticeable to the PC’s owner. One estimate pegs the number of PCs involved in such botnets at 100 million to 150 million—one quarter of all the computers on the Internet as of early 2007. Such zombie computers were responsible for more than 80% of the world’s spam in June 2006, and spam in turn accounted for an estimated 80% of the world’s total e-mail that month.

Because the current computing and networking environment is so sprawling and dynamic, and its ever-more-powerful building blocks are owned and managed by regular citizens rather than technical experts, its vulnerability has increased substantially. The public will not and cannot maintain their PCs to the level that professional network administrators do, despite the fact that their machines are significantly more powerful than the minicomputers of the 1970s and 1980s. That vulnerability is exacerbated by people’s increased dependence on the Internet. Well-crafted worms and viruses routinely infect vast swaths of Internet-connected personal computers. In 2004, for example, the Sasser worm infected more than half a million computers in three days. The Sapphire/Slammer worm in January 2003 went after a particular kind of Microsoft server and infected 90% of them—120,000 machines—within ten minutes. These hijacked machines together were performing 55 million searches per second for new targets just three minutes after the first computer fell victim. If any of these pieces of malware had truly “mal” or nefarious purposes—for example, to erase hard drives or randomly transpose numbers in spreadsheets—nothing would stand in the way.

The fundamental tension is that the point of a PC is to be easy for users to reconfigure to run new software, but when users make poor decisions about what new software to run, the results can be devastating to their machines and, if they are connected to the Internet, to countless others. Simply choosing a more secure platform does not solve the problem. To be sure, Microsoft Windows has been the target of malware infections for years, but this in part reflects Microsoft’s dominant market share. As more users switch to other platforms, those platforms will become appealing targets as well. And the most enduring way to subvert security measures may be through the front door—by simply asking a user’s permission to add some malware disguised as new functionality—rather than trying to steal in through the back to silently exploit an operating system flaw.

PC and Internet security vulnerabilities are a legitimate menace, and people are right to be concerned. However, the most likely reactions if they are not forestalled will be at least as unfortunate as the security problems themselves. Users will choose PCs that operate more like appliances, forfeiting the ability to easily install new code themselves. Instead they will use their machines as mere dumb terminals linked to Web sites that offer added interactivity. Many of these Web sites are themselves amenable to appliance-like behavior. Indeed, what some have applauded as Web 2.0—a new frontier of peer-to-peer networks and collective, collaborative content production—is an architecture that can be tightly controlled and maintained by a central source, which may choose to operate in a generative way but is able to curtail those capabilities at any time.

Consider Google’s terrific map service. It is not only highly useful to end users, it also has an open application-programming interface to its map data. Thanks to the open API, a third-party Web site creator can start with a mere list of street addresses and immediately produce on her site a Google map with a digital pushpin at each address. This allows any number of “mashups” to be made, combining Google maps with third-party geographic data sets. Web developers are using the Google Maps API to create Web sites that find and map the nearest Starbucks; create and measure running, hiking, or biking routes; pinpoint the locations of traffic-light cameras; and collate prospective partners on Internet dating sites to produce instant displays showing where one’s best matches are located.

In allowing coders access to its map data, Google’s mapping service is generative. But its generativity is contingent: Google assigns each Web developer a key and reserves the right to revoke it at any time, for any reason—or to terminate the whole service. It is certainly understandable that Google, in choosing to make a generative service out of something in which it has invested heavily, would want to control it. But this puts within the control of Google, and anyone who can regulate Google, all downstream uses of Google Maps—and maps in general, to the extent that Google Maps’ excellence means other mapping services will fail or never be built.

What’s Generative and What’s Not? (Located at the end of this article)

The business models of other next-generation Internet appliances and services are neither enduringly generative nor, in some instances, as unambiguously generative as the open Internet and PC. For example, Microsoft’s Xbox is a video game console that has as much computing power as a PC and is networked to other users with Xboxes. Microsoft loses money on every Xbox it sells but makes it back by selling its own games and other software to run on it. Third-party developers can write Xbox games, but they must obtain a license from Microsoft (which includes giving Microsoft a share of the profits) before they can distribute them.

Most mobile phones are similarly constrained: They are smart, and many can access the Internet, but the access is channeled through browsers provided and controlled by the phone-service vendor. Many PDAs come with software provided through special arrangements between device and software vendors, as Sony’s Mylo does when it offers Skype. Without first inking deals with device makers, software developers cannot have their code run on the devices even if users desire it. In 2006, AMD introduced the Internet Box, a device that looks just like a PC but cannot run any new software without AMD’s permission. What’s more, AMD can install on the machines any software it chooses—even after they have been purchased.

The growing profusion of tethered appliances takes many Internet innovations and wraps them up neatly and compellingly, which is good—but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to provide competition for the locked-down appliances. The balance between the two spheres is precarious, and it is slipping toward the appliances. People buy these devices for their convenience or functionality, and some may appreciate the fact that they limit the damage users can do through ignorance or carelessness. But appliances also circumscribe the beneficial applications users can create or receive from others—applications they may not realize are important to them when they purchase the device. The risk, then, is that users will unwittingly trade away the future benefits of generativity, a loss that may go unappreciated even as innovation tapers off.

Eliminate the PC from many dens and living rooms, and we eliminate the test bed and distribution point for new software. We also eliminate the safety valve that keeps information appliances honest: If TiVo makes a digital video recorder that too-strictly limits what people can do with their recorded video, customers will turn to DVR software like MythTV, which records and plays TV shows on PCs; if mobile phones are too expensive, people will use Skype.

Of course, people don’t buy PCs as insurance policies against appliances that limit their freedom (even though they serve this vital function); they buy them to perform certain preconceived tasks. But if Internet security breaches and other sorts of anarchy threaten the PC’s ability to perform those tasks reliably, most consumers will not see the PC’s merit, and the safety valve will be lost. If the PC ceases to be at the center of the information technology ecosystem, the most restrictive aspects of information appliances will become commonplace.

Information Appliances and Regulation

When information appliances stay connected to their makers, those companies can be asked to implement changes to the way they work long after they have been purchased for a specific use. Consider the case of TiVo v. EchoStar. TiVo introduced the first digital video recorder in 1998, allowing consumers to record and time-shift TV shows. In 2004, TiVo sued satellite TV distributor EchoStar for infringing TiVo’s patents by building DVR functionality into some of EchoStar’s dish systems. TiVo won and was awarded $90 million in damages and interest—but that was not all. In August 2006 the court issued an order directing EchoStar to disable the DVR functionality in most of the infringing units then in operation.

In other words, the court ordered EchoStar to kill DVRs in the living rooms of people around the world who had bought them and who might be watching programs recorded on them at that very instant. Imagine sitting down to watch a much-anticipated TV show or sportscast and instead finding that all your recordings have been zapped, along with the DVR functionality itself—killed by a remote signal traceable to the stroke of a judge’s quill. The logic is plain: If an article infringes intellectual property rights, under certain circumstances it can be impounded and destroyed. It is typically impractical to go around impounding every item that falls under this category (police officers don’t go door-to-door looking for Rolex and Louis Vuitton knockoffs), so plaintiffs and prosecutors traditionally go after only those selling the contraband goods. But the tethered functionality of a DVR means that EchoStar can easily effect the remote modification or even destruction of its units. (The case is currently on appeal.)
Remote modification can also allow makers to repurpose their appliances, sometimes in ways that are undesirable to their owners. General Motors and BMW offer onboard systems like OnStar to provide car owners with a variety of useful services and functions, including hands-free calling, turn-by-turn driving directions, tire pressure monitoring, and emergency roadside assistance. Because the systems are networked and remotely upgradeable, the U.S. Federal Bureau of Investigation sought to use the technology to eavesdrop on conversations occurring in a vehicle by remotely reprogramming the onboard system to function as a roving bug. The bureau obtained secret orders requiring one carmaker to carry out that modification, and the company complied under protest. A U.S. federal appellate court found in The Company v. the United States that the anonymous carmaker could theoretically be ordered to perform the modifications but that the FBI’s surveillance interfered with the computer system’s normal use. A car with a secret open line to the FBI could not simultaneously connect to the automaker. If the occupants tried to use the system to summon emergency help, it would not function. (Presumably, the FBI would not come to the aid of the motorist the way the automaker promises to do.) The implication of the ruling was that secret FBI surveillance of this sort would be legally permissible if the system were redesigned to simultaneously process emergency requests.

A shift to smarter appliances, ones that can be updated by—and only by— their makers, is fundamentally changing the ways in which we experience our technologies. They become contingent: Even if you pay up front for them, such appliances are rented instead of owned, subject to revision by the maker at any moment.

What price will that control exact? It is difficult to sketch a picture of all the innovative changes that will not happen in a future dominated by appliances, but history offers a guide. Before the generative PC and Internet entered the mainstream around 1995, the IT landscape saw comparatively few innovations. In the dozen years since then, the Internet and PC have combined to inspire accelerated technical innovation outside the traditional firm-based R&D process: new Web-powered forms of business value, new social networks and communities of interest, and experiments in collaborative, collective intelligence. They are crucibles for new forms of culture, political action, and participation, and they will lose their power if the Internet and its end points migrate toward more reliable but less changeable configurations.

Saving the Generative Internet

If the Internet status quo is untenable, and the solution of tethered appliances creates too many undesirable consequences, we must look for other solutions. The central challenge facing today’s information technology ecosystem is to maintain a generative openness to experiments that can be embraced by the mainstream with as few barriers as possible, in the face of potentially overwhelming problems that arise precisely because it is so flexible and powerful. We may draw useful general guidelines from some of the success stories of generative models that have shown staying power. Here is a brief sampling:

Netizenship.

One solution to the generative problem deploys tools for people to use, usually in small groups, to prevent what they see as abuse. For example, Wikipedia offers easy-to-master tools that make it possible for self-identified editors to combat vandalism that arises from allowing anyone to edit entries. It is a system at once naïve and powerful compared with the more traditional levers of regulation and control designed to stop outliers from doing bad things. It is the opposite of the client-service model in which a customer calls a help line. Rather, it is like a volunteer fire department or a neighborhood watch. Not everyone will be able to fight fires or watch the neighborhood—to be sure, some will be setting the fires!—but even a small subset can become a critical mass.

The propagation of bad code is a social problem as well as a technical one, and people can enter into a social configuration to attack it. A small application could run unobtrusively on PCs of participating users and report either to a central source, or perhaps only to each other, information about the vital signs and running code of that PC, which would help other PCs understand whether the code is risky or not. With that information, one PC could use other unidentified PCs’ experiences to empower the user: At the moment the user is deciding whether to run some new software, the application’s connections to other machines could show, say, how many of the other machines were running the code, whether the machines of self-described experts were running it, whether those experts had been moved to vouch for it, and how long the code had been available. It could also signal the amount of unintended network traffic, pop-up ads, or crashes the code appears to cause. These sorts of data could be viewed on a simple dashboard, letting PCs users make quick judgments in light of their own risk preferences.

Virtual machines.

For those people who simply want their PCs to operate reliably, a medium-term solution may lie in technologies that allow mission-critical work to be isolated from the whimsical, experimental activities that might be dangerous—or might become the next key use of the Internet. Computer scientist Butler Lampson and others are developing promising architectures that allow single PCs to have multiple zones, two or more virtual machines running within one box. A meltdown in the red, experimental zone cannot affect the more-secure green zone, and thus the consumer is spared having to choose between a generative box and an appliance. Tax returns and important documents go in green; Skype starts out in red and then moves over only when it seems ready for prime time.

More help from ISPs.

Maintaining security of a generative system is by its nature an ongoing process, one requiring the continuing ingenuity of those who want it to work well and the broader participation of others to counter the actions of a determined minority to abuse it. If the network is completely open, the end points can come under assault. If the end points remain free as the network becomes slightly more ordered, they act as safety valves should network filtering begin to block more than bad code. Today ISPs turn a blind eye to zombie computers on their networks, so they do not have to spend time working with their subscribers to fix them. Whether through new industry best practices or through a rearrangement of liability requiring ISPs to take action in the most flagrant and egregious of zombie situations, we can buy another measure of time in the continuing cat-and-mouse game of security.

Network neutrality for mashups.

Those who provide content and services over the Internet have lined up in favor of “network neutrality,” by which ISPs would not be permitted to disfavor certain legitimate content that passes through their servers. Similarly, those who offer open APIs on the Internet ought to be application neutral, so all those who want to build on top of their interfaces can rely on certain basic functionality.

Generative systems offer extraordinary benefits. As they go mainstream, the people using them can share some sense of the experimentalist spirit that drives them. The solutions above are sketched in the most basic of terms, but what they share is the idea that for the generative Internet to save itself, it must generate its own solutions. The more we can maintain the Internet as a work in progress, the more progress we can make.

Four Elements of Generativity

Four main features define generativity: (1) how strongly a system or technology leverages a set of possible tasks; (2) its adaptability to a range of tasks; (3) its ease of mastery; and (4) its accessibility. The greater the extent to which these features are represented in a system, the more readily it can be changed in unanticipated ways—and the more generative it is. For example, many tools can be leveraging and adaptable but are difficult to master—thus decreasing generativity.

Leverage.

Generative systems make difficult jobs easier. The more effort they save, and the greater the number of instances in which their use can make a difference to someone, the more generative they are. Leverage is not exclusively a feature of generative systems; nongenerative specialized technologies (a plowshare, for instance) can provide great leverage for the tasks they’ve been designed to perform.

Adaptability.

Adaptability applies to both the breadth of a system’s uses without change and the ease with which it can be modified to broaden its range of uses. Adaptability is a spectrum—a technology that offers hundreds of different kinds of uses is more adaptable, and thus more generative, than a technology that offers fewer.

Ease of mastery.

How easy is it for broad audiences to both adopt and adapt a technology? An airplane is neither easy to fly nor simple to modify for new purposes. Paper, on the other hand, can be readily mastered and adapted—whether to draw on or to fold into airplanes. The skills needed to use many otherwise-generative technologies may be hard to absorb, requiring apprenticeship, formal training, or long practice.

Accessibility.

The easier it is to obtain the technology, tools, and information necessary to achieve mastery—and convey changes to others—the more generative a system is. Barriers to access include the sheer expense of producing (and therefore consuming) the technology; taxes and regulations surrounding its adoption or use; and secrecy or obfuscation that its producers wield in order to maintain scarcity or control.

What’s Generative and What’s Not?

Legos and a dollhouse.

Legos are highly adaptable, accessible, and easy to master. They can be built, deconstructed, and rebuilt into whatever form the user wishes, and third parties can publish “recipes” for new forms. (To be sure, Legos are still usually only toys.) The less-generative dollhouse supports imaginative play but is itself unmodifiable.

Hammer and jackhammer.

A hammer is accessible, easy to master, and useful in any number of household tasks. A jackhammer is less broadly accessible, harder to master, and good only for breaking up asphalt, concrete, and stone.

PC and TiVo.

A PC is an adaptable multipurpose tool whose leverage extends through networked access to new software and other users. TiVo is an inflexible tethered appliance. Though based on the same technology as a PC, it can be modified only by its maker, restricting its uses to those that TiVo invents.

Bicycle and airplane.

Bicycles are accessible (there’s no license to pedal), relatively easy to master, and adaptable by large communities of avid users and accessorizing firms. Airplanes are highly useful for long-distance travel but not very accessible, adaptable, or easy to master.
http://harvardbusinessonline.hbsp.ha...requestid=6603





Doll Web Sites Drive Girls to Stay Home and Play
Matt Richtel and Brad Stone

Presleigh Montemayor often gets home after a long day and spends some time with her family. Then she logs onto the Internet, leaving the real world and joining a virtual one. But the digital utopia of Second Life is not for her. Presleigh, who is 9 years old, prefers a Web site called Cartoon Doll Emporium.

The site lets her chat with her friends and dress up virtual dolls, by placing blouses, hair styles and accessories on them. It beats playing with regular Barbies, said Presleigh, who lives near Dallas.

“With Barbie, if you want clothes, it costs money,” she said. “You can do it on the Internet for free.”

Presleigh is part of a booming phenomenon, the growth of a new wave of interactive play sites for a young generation of Internet users, in particular girls.

Millions of children and adolescents are spending hours on these sites, which offer virtual versions of traditional play activities and cute animated worlds that encourage self-expression and safe communication. They are, in effect, like Facebook or MySpace with training wheels, aimed at an audience that may be getting its first exposure to the Web.

While some of the sites charge subscription fees, others are supported by advertising. As is the case with children’s television, some critics wonder about the broader social cost of exposing children to marketing messages, and the amount of time spent on the sites makes some child advocates nervous.

Regardless, the sites are growing in number and popularity, and they are doing so thanks to the word of mouth of babes, said Josh Bernoff, a social media and marketing industry analyst with Forrester Research.

“They’re spreading rapidly among kids,” Mr. Bernoff said, noting that the enthusiasm has a viral analogy. “It’s like catching a runny nose that everyone in the classroom gets.”

Hitwise, a traffic measurement firm, says visits to a group of seven virtual-world sites aimed at children and teenagers grew 68 percent in the year ended April 28. Visits to the sites surge during summer vacation and other times when school is out. Gartner Research estimates that virtual-world sites have attracted 20 million users, with those aimed at younger people growing especially quickly.

Even as the children are having fun, the adults running the sites are engaged in a cutthroat competition to be the destination of choice for a generation of Americans who are growing up on computers from Day 1.

These sites, with names like Club Penguin, Cyworld, Habbo Hotel, Webkinz, WeeWorld and Stardoll, run the gamut from simple interactive games and chat to fantasy lands with mountains and caves.

When Evan Bailyn, chief executive of Cartoon Doll Emporium, said that when he created the site, “I thought it would be a fun, whimsical thing.” Now, he says, “it’s turned into such a competitive thing,” adding that “people think they are going to make a killing.”

Even Barbie herself is getting into the online act. Mattel is introducing BarbieGirls.com, another dress-up site with chat features.

In recent months, with the traffic for these sites growing into the tens of millions of visitors, the entrepreneurs behind them have started to refine their business models.

Cartoon Doll Emporium, which draws three million visitors a month, is free for many activities but now charges $8 a month for access to more dolls to dress up and other premium services. WeeWorld, a site aimed at letting 13- to-25-year-olds dress up and chat through animated characters, recently signed a deal to permit the online characters to carry bags of Skittles candy, and it is considering other advertisers.

On Stardoll, which has some advertising, users can augment the wardrobe they use to dress up their virtual dolls by buying credits over their cellphones. At Club Penguin, a virtual world with more than four million visitors a month, a $5.95-a-month subscription lets users adopt more pets for their penguin avatars (animated representations of users), which can roam, chat and play games like ice fishing and team hockey.

Lane Merrifield, chief executive of Club Penguin, which is based in Kelowna, British Columbia, said that he decided on a subscription fee because he believed advertising to young people was a dangerous proposition. Clicking on ads, he said, could bring children out into the broader Web, where they could run into offensive material.

Mr. Merrifield also bristles at any comparison to MySpace, which he said is a wide-open environment and one that poses all kinds of possible threats to young people.

To make Club Penguin safe for children, the site uses a powerful filter that limits the kinds of messages users can type to one another. It is not possible, Mr. Merrifield said, to slip in a phone number or geographic location, or to use phrases or words that would be explicit or suggestive. Other sites are also set up to minimize the threat of troublesome interactions or limit what users can say to one another.

“We’re the antithesis of MySpace,” Mr. Merrifield said. “MySpace is about sharing information. We’re all about not being able to share information.”

Other sites are more open, like WeeWorld, which permits people to create avatars, dress them up and then collect groups of friends who type short messages to one another. The characters tend to be cute and cartoonish, as do the home pages where they reside, but the chatter is typical teenager.

“There’s a lot of teasing and flirting,” said Lauren Bigelow, general manager of WeeWorld. She said that the site had around 900,000 users in April and is growing around 20 percent a month.

Ms. Bigelow said that 60 percent of WeeWorld users are girls and young women, a proportion that is higher on some other sites. Stardoll said that its users are 93 percent female, typically ages 7 to 17, while Cartoon Doll Emporium said that it is 96 percent female, ages 8 to 14.

Some of the companies are aiming even younger. The Ontario company Ganz has a hit with Webkinz, plush toys that are sold in regular stores and are aimed at children as young as 6. Buyers enter secret codes from their toy’s tag at webkinz.com and control a virtual replica of their animal in games. They also earn KinzCash that they can spend to design its home. The site draws more than 3.8 million visitors a month.

Sherry Turkle, a professor at the Massachusetts Institute of Technology who studies the social aspects of technology, said that the participants on these sites are slipping into virtual worlds more easily than their parents or older siblings.

“For young people, there is rather a kind of fluid boundary between the real and virtual world, and they can easily pass through it,” she said.

For some children, the allure of these sites is the chance to participate and guide the action on screen, something that is not possible with movies and television.

“The ability to express themselves is really appealing to the millennial generation,” said Michael Streefland, the manager of Cyworld, a virtual world that started in South Korea and now attracts a million users a month in the United States, according to comScore, a research firm. “This audience wants to be on stage. They want to have a say in the script.”

But Professor Turkle expressed concern about some of the sites. She said that their commercial efforts, particularly the advertising aimed at children, could be crass. And she said that she advocates an old-fashioned alternative to the sites.

“If you’re lucky enough to have a kid next door,” she said, “I’d have a play date instead of letting your kid sit at the computer.”
http://www.nytimes.com/2007/06/06/te...gy/06doll.html





Kids Socialize in a Virtual World as Avatars
Yinka Adegoke

Children have always enjoyed make-believe. Now, some new Web sites are letting them live out their fantasies in virtual worlds using self-designed avatars.

Unlike the often-violent world of videogames, virtual sites such as Stardoll, Doppelganger, Club Penguin and Gaia Online hark back to a more innocent time of tea parties and playing outdoors -- and they are winning young users in droves.

The success of Second Life, one of the most popular virtual lifestyle sites for adults, with even its own banks and real estate agents, has helped to raise interest in the genre.

At Stardoll, young girls can create their own online 'MeDoll' identities from a template that allows the user to choose everything from skin tone to eyebrow shapes.

Most important, it allows the user to dress-up their avatar in the latest teen fashion.

Stockholm-based Stardoll, which only started four years ago, has been a huge hit with girls aged seven to 17 years.

The founders say they have over 7 million users in dozens of countries, even though Stardoll only very recently became available in four languages other than English.

"Role-playing is a hugely important part of growing up, especially for girls," said Matteus Miksche, chief executive of Stardoll, whose backers include venture capital firms Sequoia Capital and Index Ventures.

Like many new-generation Web sites popular with youngsters, the attraction is as much in the ease of use as it is the ability to interact with others.

Stardoll users can measure their popularity by the number of "friends" they accumulate on their page, just as they might do on MySpace or Facebook -- except the photos are not real.

And as in real life, popularity has its benefits.

One of the most obvious on Stardoll is that you can be a "cover girl" of the Stardoll fashion magazine by getting the most votes for your MeDoll.

Fashion is important for young girls who buy the latest clothes and accessories from the various virtual stores in Stardoll with made-up fashion brands.

Virtual Hollywood

Another virtual life site, Doppelganger, was built to support music, media and fashion.

Aimed at a slightly older crowd than Stardoll, users can throw parties, attend live shows and recordings of talk shows.

Doppelganger has tied up with major fashion and entertainment names in the real world, including ex-model and talk show host Tyra Banks and youth fashion brands like Rocawear and Kitson, the Los Angeles brand made famous by Paris Hilton.

Acts like Maroon 5 and the Pussycat Dolls have also performed on Doppelganger and given virtual interviews.

"The fashion element is a big part of Doppelganger," said founder Tim Stevens. "It's like a virtual Hollywood."

Most of these sites also have virtual economies with their own currencies, which users can earn or buy with their parents' credit cards, other online payment systems or premium text messages widely available in Europe.

On Gaia Online, another rapidly growing site, users earn 'gold' to buy virtual goods -- usually clothes for their avatar. "Up to 99 percent of the experience online is free at Gaia," said Gaia Online Chief Executive Craig Sherman.

"In a world where teens are constantly packaging and branding themselves, whether it's on MySpace or in their high school, Gaia is a place for them to get away from it all to just hang out and be yourself," Sherman said.

Stardoll's Miksche agrees, saying the young visitors to his site are not in as much a hurry to grow up as adults might think. For his users, he says, it's more important to be who you want to be.

"Part of our success is that some users are maybe getting tired of having pages where they feel forced to look sexy or cool or write some outrageous stuff in order to stand out."
http://www.reuters.com/article/techn...18618120070601





A Jazzman So Cool You Want Him Frozen at His Peak
Terrence Rafferty

AT the very end of Bruce Weber’s seductive, unsettling “Let’s Get Lost,” the movie’s subject, the semi-legendary cool-jazz trumpeter and singer Chet Baker, looks back on the shooting of the film and says, in a quavery, almost tearful voice, “It was a dream.” Although in the preceding two hours Mr. Baker has delivered a fair number of dubiously reliable utterances, you’re inclined to believe him on this one because that’s what the movie feels like to the viewer too. It’s nominally a documentary (Oscar-nominated in that category in 1989), but it documents something that only faintly resembles waking reality. And Mr. Baker, who wanders through “Let’s Get Lost” with the eerie deliberateness of a somnambulist, appears to be a man who knows a thing or two about dreams.

Film Forum, which gave the movie its New York premiere 18 years ago, is reviving it for a three-week run (beginning Friday) in a restored 35-millimeter print, and Mr. Weber’s black-and-white hipster fantasia is as beautiful, and as nutty, as ever. Now, as in 1989, the filmmaker seems bent on stopping time in its tracks, preserving the illusion that nothing important has changed since the early 1950s, when Mr. Baker was a handsome young man with a sweet-toned horn, the great white hope of West Coast jazz.

He doesn’t look the same of course; actually he looks like hell. When “Let’s Get Lost” was shot, Mr. Baker was in his late 50s, and after 30-plus years of dedicated substance abuse (he wasn’t picky about the substance, though heroin was generally his first choice) his face is ravaged, cadaverous — groovy in entirely the wrong way. He often appears to be having some difficulty remaining awake, even while he’s performing, whispering standards like “My Funny Valentine” at tempos so languid that the songs kind of swirl and hover in the air like cigarette smoke until they finally just drift away.

The really peculiar thing about “Let’s Get Lost” is that its subject’s physical decrepitude and narcoleptic performance style seem not to bother Mr. Weber at all. This isn’t one of those documentaries that poignantly contrast the beauty and energy of youth with the sad debilities of age. Far from it. The picture cuts almost randomly between archival clips and 1987 footage to create a sort of perverse continuum, a frantic insistence that the essence of Chetness is unvarying, eternal. And you can’t always see much difference between the young Mr. Baker and the old. Even in his prime his cool was so extreme that he often looked oddly spectral, like someone trapped in a block of ice.

Chet Baker’s brand of frosty hipness was, in the ’50s, considered a sexy alternative to that era’s prevailing ethos of earnest, striving respectability (at least until rock ’n’ roll, which was more fun, came along). Maybe you had to have grown up in that nervous decade, as Mr. Weber did, to find Mr. Baker’s ostentatious laid-backness subversive, to imbue it with so much bad-boy allure. Mr. Weber, who is also a fashion photographer, is a glamorizer both by trade and by nature, and when something imprints itself as strongly on his fantasy life as the image of the young Chet Baker clearly did, he holds onto it tightly — cherishes it, embellishes it, uses it to transport himself back to his own hard-dreaming youth. “Let’s Get Lost” is his “Remembrance of Things Past,” with this strung-out trumpeter as his madeleine.

And what Mr. Weber winds up doing in this original, deeply eccentric movie is giving Mr. Baker a luxurious fantasy world to live in, a holiday condo of the imagination, where age and time are utterly irrelevant. The filmmaker supplies his weary but grateful subject with a ready-made entourage of shockingly good-looking young people (Chris Isaak and Lisa Marie among them) who, in shifting combinations, drink with him, ride in snazzy convertibles with him, giggle with him on a bumper-car ride and gaze on him reverently while he croons a breathy tune in the recording studio. Mr. Weber takes him to the Cannes Film Festival, where paparazzi surround him and he sings “Almost Blue” for celebrities at a glittery party. No wonder Mr. Baker gets misty-eyed at the end of the movie. The dream he’s been dreaming, courtesy of his devoted director, is the sweetest one a performer could ask for in his declining years: the dream that he still matters.

Chet Baker hadn’t mattered for a while when Mr. Weber was filming him. The movie’s release rekindled a bit of interest in his music, partly because he was dead by the time it came out: In 1988, at the age of 58, he was found on the street in Amsterdam, having apparently fallen from the window of his hotel. He’s practically forgotten now.

Jazz history hasn’t been kind to him; his talent, though real, was thin. Unlike his rival Miles Davis, he persisted, with a stubbornness that suggests a fairly serious failure of imagination, in playing the cool style long past the point at which it had begun to sound mannered and even a little silly. When you hear Mr. Baker’s stuff, you can’t help picturing his ideal listener as one of those lupine swingers of the Playboy era, decked out in a velvet smoking jacket and loading smooth platters onto the hi-fi to get a hot chick in the mood for love. The ’50s die before your eyes in “Let’s Get Lost.” It feels like the last stand of something that may not have been worth fighting for in the first place.

In a funny way, the movie gives the lie to the nostalgic illusions it seems to want to embody, just because the construction of this fragile, faded jazzman as the epitome of cool is so elaborate and so obviously effortful. It’s killing work to be this cool. When Mr. Weber starts interviewing people who loved the musician not from afar, as he did, but from too close — his bitter wife, a few girlfriends, three of his neglected kids — you see how tough it’s been: how many drugs it took, how much willful indifference, how much hollowing out of whatever self may once have inhabited the pale frame of Chet Baker.

The enduring fascination of “Let’s Get Lost,” the reason it remains powerful even now, when every value it represents is gone, is that it’s among the few movies that deal with the mysterious, complicated emotional transactions involved in the creation of pop culture — and with the ambiguous process by which performers generate desire. Mr. Baker isn’t so much the subject of this picture as its pretext: He’s the front man for Mr. Weber’s meditations on image making and its discontents.

If you want the true story of Chet Baker, you’d do better to look up James Gavin’s superb, harrowing 2002 biography, “Deep in a Dream: The Long Night of Chet Baker,” where you can also find, in the words of a pianist named Hal Galper, perhaps the most perceptive review of Mr. Weber’s slippery movie. “I though it was great,” Mr. Galper says, “because it was so jive. Everybody’s lying, including Chet. You couldn’t have wanted a more honest reflection of him.” That’s “Let’s Get Lost,” to the life: the greatest jive movie, or maybe the jivest great movie, ever made.
http://www.nytimes.com/2007/06/03/movies/03raff.html





Still Needing, Still Feeding the Muse at 64
Allan Kozinn

THE first video from Paul McCartney’s new album, “Memory Almost Full,” is an otherworldly fantasy, directed by the French filmmaker Michel Gondry, in which a postman brings this former Beatle a box with an old mandolin and, it turns out, an assembly of mischievous ghosts. As Mr. McCartney plays “Dance Tonight,” with its simple percussion and bright pop melody, the ghosts — including one played by Natalie Portman — leap around him, throw sparkling fireballs and scare off the postman. Mr. McCartney later follows them into the box, and as the clip ends, he is seen jamming with them, playing the drums.

Surreal as the video is, it says a lot about what Mr. McCartney is up to on “Memory Almost Full,” to be released on Tuesday on the Hear Music label, a joint venture between Starbucks and the Concord Music Group. The ghosts may terrify the postman, but Mr. McCartney happily cavorts with them. And while the ghosts don’t seem to be from Mr. McCartney’s past, his comfort with them suggests the ease with which his history informs many of the songs on the album, including a suite that moves from childhood memories to thoughts of death. He is describing “Memory Almost Full” as a “rather personal” album.

It almost wasn’t an album at all. Mr. McCartney began recording it at the end of 2003 with his touring band but abruptly shelved the project. It wasn’t that he was dissatisfied with the music, he said in a telephone interview from his recording studio in Sussex, England; but he had wanted to work with Nigel Godrich, Radiohead’s longtime producer. When Mr. Godrich became available, Mr. McCartney decided to start fresh and to play all the instruments himself. That collaboration yielded “Chaos and Creation in the Backyard” in 2005.

The tapes for “Memory Almost Full” languished as he moved on to other things, including his divorce from Heather Mills and the latest in his growing series of classical scores, “Ecce Cor Meum,” a large work for chorus and orchestra dedicated to the memory of his first wife, Linda, who died in 1998.

Then he remembered the recordings he had filed away.

“I realized that I didn’t want to have any unfinished work lying around,” he said.

His first move was to summon David Kahne, who produced his “Driving Rain” CD (2001) and the early recordings for the shelved album. It wasn’t Mr. McCartney’s plan to record the rest of the album without his band, but with a studio at his house it was hard to resist wandering out to finish tracks he was working on whenever the mood took him, and in the end he played all the instruments on about half the tracks.

“Memory Almost Full” is a change for Mr. McCartney, although not primarily in musical ways. It has, after all, hints of everything from the sound of his 1970s band, Wings, to echoes of relatively recent work like “Flaming Pie,” from 1997, and Mr. McCartney seems to heave steadfastly avoided hopping on current pop music trends.

Still, he wanted to shake up his approach to releasing an album. The video made its debut on YouTube. And having been an EMI artist since the Beatles signed with the company in 1962 (apart from a series of American releases on Columbia in the 1980s), he moved to Hear Music, hoping to draw on the eagerness and energy of an upstart label.

“Am I feeling like I’ve left the family home?” Mr. McCartney said, when asked if switching labels was traumatic. “I have left the family home, but it doesn’t feel bad. I hate to tell you — the people at EMI sort of understood. The major record labels are having major problems. They’re a little puzzled as to what’s happening. And I sympathize with them. But as David Kahne said to me about a year ago, the major labels these days are like the dinosaurs sitting around discussing the asteroid.”

Although Hear Music has collaborated with other labels on projects ranging from Ray Charles’s “Genius Loves Company” to a recent compilation of John Lennon tracks, Mr. McCartney is the first artist signed to it directly. To celebrate his album’s release Starbucks is having what it is calling a global listening event: The album will be played around the clock on Tuesday in more than 10,000 Starbucks stores in 29 countries. Based on its high-volume traffic — some 44 million customers a week — the company expects about six million people to hear the music that day. Starbucks’ channel on XM satellite radio will also be promoting the record heavily, and XM will devote another channel exclusively to Mr. McCartney’s music on the release day.

“We got a call saying that Paul McCartney was interested in talking to us,” said Ken Lombard, president of Starbucks Entertainment, “and after we picked ourselves up off the floor, we met with him in London and had a pretty in-depth conversation about who we are as a company, and about our commitment to music.” He added that the company told Mr. McCartney it could “bring more exposure to this album than to other projects he’s done.”

Hear Music is releasing “Memory Almost Full” simultaneously on CD and as digital downloads, through iTunes. Mr. McCartney has already made several songs available online, both through iTunes (his Live8 performances, for example) and on his own Web site, paulmccartney.com. But this is his first full album available digitally, and iTunes is offering a version with bonus tracks, and, for preorders, the “Dance Tonight” video.

But for all that his defection from EMI is less than it seems: these days, he works album by album and can take any project where he chooses. He also controls his recordings, including his back catalog, so if he returns to EMI, he could take “Memory Almost Full” with him. On the other hand, if his success with Hear Music is such that he decides to stay with the label, he could bring his back catalog to it. For the moment he is leaving the older recordings in the custody of EMI, which has just announced a plan to reissue his complete back catalog through iTunes and on remastered CDs.

Mr. McCartney said the Beatles catalog would make its way to iTunes also, but he would not say when, other than to quote the early Beatles song “It Won’t Be Long.”

With his past work about to flood into the latest music distribution pipeline, it is probably fitting that his new album has a nostalgic quality. The title, “Memory Almost Full,” touches both aspects: a computer term, it also hints at the well of remembered experience that Mr. McCartney draws on here.

“There is quite a bit of retrospective stuff,” he acknowledged, “and looking at that, I thought, ‘Whoa, I wonder if there’s any particular reason?’ But then I thought, when I was writing ‘Penny Lane,’ that was me in my early 20s writing about when I was 15, 16. That’s retrospective. It’s a natural thing, I think, for a creative artist. Because the past, in a way, is all you have.”

“I didn’t sit down to write a personal album,” he added, “but sometimes you can’t help what comes out. I’m a great believer in that.”

By personal he means that several of the songs — particularly those in a suite near the end of the 13-song disc — look back at earlier times in his life, starting with his childhood in “That Was Me,” a tour of a family photo album. But personal has limits for him. He’s not singing about his marital woes, so don’t expect “Memory Almost Full” to be Mr. McCartney’s version of “Across a Crowded Room,” Richard Thompson’s searing 1985 divorce album, an example of the genre at its venomous best.

Mr. McCartney’s specialty has been the opposite: love songs, of which there are several on the new album. When advance copies leaked on the Internet last month, some listeners interpreted songs that mix love and nostalgia — “Vintage Clothes,” “See Your Sunshine” and “Gratitude” — as hymns to Linda, who has attained sainted status in the McCartney myth, much as John Lennon has in the Beatles’ legend.

“Funny that, isn’t it?” Mr. McCartney said. “ ‘Gratitude’ is just me being grateful for the good stuff in my life, past and present. That’s the thing about me, when I talk about love, it’s often general, it’s not always specific. If people think these songs are specific to Linda, that wouldn’t be true. But they’re pertaining to Linda, or my children, or other things in life for which I feel grateful. So she’s certainly in there.

“I don’t really mind how people interpret my songs. But I don’t want to have to say, ‘Yes, you’re right.’ I’d more gladly say, ‘Yeah, you’re partially on the button, but it means a whole bunch of other things.’ ”

At 64 (he turns 65 on June 18) Mr. McCartney is reportedly a billionaire and could easily settle into retirement at his Sussex estate. If anything, he seems to be expanding his one-man entertainment franchise.

In recent years he has published a poetry book, “Blackbird Singing,” and written an illustrated children’s book, “High in the Clouds,” with Geoff Dunbar and Philip Ardagh. He has mounted shows of his paintings and continued the series of classical works that began with “The Liverpool Oratorio” in 1991. And he is working on a guitar concerto.

Even so, he has been thinking about mortality. In “The End of the End” he imagines his death and sings, “on the day that I die, I’d like jokes to be told, and stories of old to be rolled out like carpets.” The idea, he said, came to him after he read a quotation that began, “On the day that I die”; he thought that taking on mortality so directly was brave.

Oddly, given that the album was recorded over four years with a long hiatus, partly with a band and partly by Mr. McCartney on his own, “Memory Almost Full” has a consistent sound and feel. It has a simplicity that gives it a rougher, rockier, more homespun sound than most of his recent albums.

That he overdubbed all the instruments on seven of the songs might have something to do with it; but it doesn’t explain why the six songs recorded with his band sound of a piece with them. That was something Mr. McCartney hoped for, but he isn’t sure how it worked out that way.

“I’m not that analytical,” he said. “I just do what feels right. And there’s a lot of crossing fingers: ‘I hope this works.’ ”

What does he mean when he says he hopes it works?

“That it sounds absolutely wonderful, and that I’m thrilled to listen to it. And that the feedback I get is great. Occasionally the feedback isn’t great.

“I’ve worked quite a lot in the past with Richard Rodney Bennett, who’s a great composer and orchestrator, and he once said to me that his greatest fear is ‘being found out.’ So many artists I know have that essential lack of confidence. Perhaps it’s what drives them. So for me it’s always a pleasant surprise when it works.”
http://www.nytimes.com/2007/06/03/ar...ic/03kozi.html





Why They Booed Her in Mexico
Marc Lacey

NOWHERE in the United States Constitution is there any mention of Miss U.S.A. She has no authority to declare war. She does not build border walls or round up undocumented immigrants. Those things are left to others, none of whom wear a sash.

But that fact seemed to get lost during the recent Miss Universe pageant, when Mexicans greeted Rachel Smith, Miss U.S.A., with one chorus after another of boos. Pageant officials said Ms. Smith, 22, was rattled by the denunciations, which echoed other booing she had received during her monthlong stay in Mexico, notably when she showed off a sleek, white Elvis outfit as her national costume on a runway on one of Mexico City’s grand avenues.

On pageant night, the wrath continued. As Ms. Smith was chosen for the final five, despite an awful fall in her evening dress, the crowd grew more boisterous, especially because Miss Mexico, Rosa María Ojeda Cuen, had been eliminated. Donald Trump, who owns the pageant, said he was nervous the audience might storm the stage. “The level of hostility was amazing,” he said, comparing it to the fury on display at the end of a disputed prizefight.

Mario López, the TV actor who was the show’s host, did his best to calm the crowd during a commercial break. “I said in Spanish: ‘Hey, listen, Mexico, the world is watching. Let’s show the world we’re really good hosts,’ ” he recalled.

The problem was that this was no simple matter of bad manners toward a guest, but an upwelling of a national angst, many Mexicans will tell you.

Mexicans admire the United States and loathe it in the very next breath. Well-heeled Mexicans struggle to get their little ones into American schools. Down-and-out Mexicans risk their lives to cross the border. Yet all still refer to those from El Norte as “gringos,” a term that dates back to the days when American troops were on Mexican soil.

“This is a symptom of Mexico’s schizophrenia when it comes to the United States,” said Jorge G. Castañeda, a former foreign minister of Mexico who is now a professor at New York University. “We are on the one hand more linked than ever to the United States — sometimes for better and sometimes for worse — and at the same time we are now more irreverent, discourteous and inhospitable, which is an un-Mexican sentiment.”

It is not easy to live life attached to a behemoth, Mexicans chronically complain. One’s culture is often eclipsed. One has to stand by as people who live in the former Mexican territories of Texas, California, New Mexico and Arizona speak ill of Mexico.

So Mexicans miss no chance to stick it to the States.

The last time they hosted the Miss Universe pageant, in 1993, the same thing occurred. Miss Mexico did not make the semifinals. Mexicans took out their anger by booing Kenya Moore, that pageant’s Miss U.S.A.

Three years ago, Mexican soccer fans began shouting “Osama! Osama!” when the United States soccer team faced Mexico in an Olympic qualifying match. When Mexico won, the revelry was intense.

So, Mexicans say, the booing at this pageant was never about Miss U.S.A. herself. It was those letters on her sash.

“This was about immigration and so many things,” said Nicolas Corte, 23, a student who was in the crowd when Miss Smith was booed in her Elvis outfit. “She represented the United States and many people are thinking negative things about the country right now.”

Mr. Corte and others said the complaints included arrogance by the Bush administration and frustration over American immigration policy, the war in Iraq and the historical grievances Mexico harbors against its neighbor.

The Woodrow Wilson Center in Washington will hold a conference this week titled, “The United States and Mexico: Strategic Partners or Distant Neighbors?” It will bring together officials from both countries, who will no doubt agree that the answer to the question is both.

Perhaps they ought to invite Ms. Smith, an aspiring journalist, who is a bit down on Mexico right now. She said in an interview that she had vacationed in Mexico several times before the pageant but would wait a good while before going back.

“I knew it wasn’t about me, a 22-year-old girl from a small town in Tennessee who just wants to help the world,” she said by phone. “But you can’t help but take it personally.”

She may have missed that there was applause mixed in with the booing when she picked herself back up from her fall, which some Mexicans pointed to as a reflection perhaps of the other side of the story — the admiration and respect that many Mexicans had for Ms. Smith and, alongside their frustration, for her country.

“I was embarrassed that my countrymen were booing,” said Javier Razo, 57, a businessman who was in the rowdy auditorium. “If it was a speech by a politician, I could understand it. But this was a pageant. I hope she knows it wasn’t about her at all.”
http://www.nytimes.com/2007/06/03/we...w/03lacey.html





"Pirates," "Knocked Up" Lead Box Office
Dean Goodman

"Pirates of the Caribbean: At World's End" led the North American box office for a second weekend, while the new pregnancy comedy "Knocked Up" delivered a surprisingly large bundle of joy.

According to studio estimates issued on Sunday, the third installment in Walt Disney Co.'s buccaneering franchise sold $43.2 million worth of tickets in the three days beginning June 1. Its 10-day total stands at $216.5 million. But the second Pirates film, "Dead Man's Chest" had earned $258 million after the same time last year.

Worldwide, the Johnny Depp adventure has earned $625.3 million, and will soon pass the $653 million total of the first Pirates film -- 2003's "The Curse of the Black Pearl." "Dead Man's Chest" topped out at $1.1 billion.

"Knocked Up" squeezed out $29.3 million, equivalent to its production budget. The film's distributor, Universal Pictures, had hoped the acclaimed comedy would open in the same $21 million range as director Judd Apatow's previous film, 2005's "The 40-Year-Old Virgin." The Steve Carell comedy went on to make $109 million domestically.

The new film stars Katherine Heigl ("Grey's Anatomy") as an entertainment journalist impregnated during a drunken one-night-stand with a slacker, played by Seth Rogen.

Exit surveys provided by Universal indicated that 57 percent of the audience was female, and 44 percent were under 30. It is also the best-reviewed wide release so far this year with raves from 92 percent of critics, according to Rotten Tomatoes (http://www.rottentomatoes.com), a Web site that tabulates reviews.

Amid a proliferation of family-friendly sequels, the film was "absolutely a breath of fresh air for the target audience," said Nikki Rocco, Universal's president of domestic distribution.

Universal, a unit of General Electric Co.'s NBC Universal Inc., has largely been missing in box office action this year. The studio and Carell will return on June 22 with "Evan Almighty," whose reported $175 million budget makes it the costliest comedy of all time.

DreamWorks Animation SKG Inc.'s "Shrek the Third" slipped one to No. 3 with $26.7 million, taking its three-week haul to $254.6 million -- about $100 million off the pace of 2004's "Shrek 2."

Also new was the Kevin Costner thriller "Mr. Brooks," which opened at No. 4 with $10 million, in line with the modest expectations of its closely held distributor, Metro-Goldwyn-Mayer.

Costner plays a man held in high esteem by the community, who is a serial killer and is in turn pursued by a stalker. Critics were scathing, and exit surveys were not good.

"Spider-Man 3" fell two places to No. 5 with $7.5 million. The superhero franchise has earned $318.3 million after five weeks. The worldwide total stands at $844 million, surpassing the $821 million haul of 2002's "Spider-Man," the previous record-holder in the franchise. "Spider-Man 2," released in 2004, finished with $784 million worldwide. The series was released by Columbia Pictures, a unit of Sony Corp..
http://www.reuters.com/article/enter...34343720070603





Russia Demands Halt to Unlicensed Production of its Weapons

The production of Russian weapons in eastern Europe without licenses causes direct damage to the country's economy and interests, a first deputy prime minister said Friday.

"It is not a secret that such production is carried out in a number of eastern European countries, including NATO members," Sergei Ivanov said adding that the illegal production should be stopped.

He said this is "intellectual piracy," adding that these countries supply Russian weapons to world markets at dumping prices.

"Despite our appeals to these countries, we have received no reasonable answer," he said.

Russia says it suffers major losses from the counterfeit manufacture of Kalashnikov assault rifles in Bulgaria. The armies of 47 countries use the AK-47 assault rifle, known as the Kalashnikov after its designer, Mikhail Kalashnikov.

About 100 million AK-47s and modified versions are believed to circulate around the world, but many of them are produced illegally.

Bulgaria's Arsenal, whose license to produce Kalashnikov rifles expired a long time ago, displayed a wide range of counterfeit rifles at the DSA 2006 arms show in Malaysia.

Ivanov said earlier that the annual sales of unlicensed small arms on the international market totaled about $2 billion, with counterfeit Kalashnikov assault rifles accounting for 80-90% of the volume.

Kalashnikov producer Izhmash said that Russia accounts for only 10-12% of the million Kalashnikov rifles sold globally every year, with the rest being unlicensed copies.

It said there is no single licensing agreement conforming to international legal norms that specifically protects Russia's intellectual property rights in small arms and light weapons production.

Almost half of all NATO member countries have yet to sign intellectual property rights protection agreements with Russia, including Lithuania, Latvia, Canada, Iceland, Luxembourg, the Netherlands and Norway.
http://en.rian.ru/russia/20070316/62123005.html





Harvard Is Licensing More Than 50 Patents to a Nanotechnology Start-Up
Barnaby J. Feder

George M. Whitesides, a Harvard University chemist, is a renowned specialist in nanotechnology, a field built on the behavior of materials as small as one molecule thick. But there is nothing tiny about the patent portfolio that Harvard has amassed over the last 25 years based on work in his lab.

Today, Harvard and Nano-Terra Inc., a company co-founded by Professor Whitesides, plan to announce the exclusive licensing for more than 50 current and pending Harvard patents to Nano-Terra. The deal could transform the little-known Nano-Terra into one of nanotechnology’s most closely watched start-ups.

“It’s the largest patent portfolio I remember, and it may be our largest ever,” said Isaac T. Kohlberg, who has overseen the commercialization of Harvard’s patent portfolio since 2005. Nano-Terra, based in Cambridge, Mass., said that the patent filing and maintenance costs alone top $2 million.

Terms of the deal were not disclosed, but Harvard said that it would receive a significant equity stake in Nano-Terra in addition to royalties.

The patents cover methods of manipulating matter at the nanometer and micron scales to create novel surfaces and combinations of materials.

A nanometer is a billionth of a meter (proteins and the smallest elements in many microprocessor designs are measured in nanometers); a micron is 1,000 times larger (pollen and many single-celled animals are measured microns). Such technology could lead to products to make better paints and windows, safer and cleaner chemicals, and more-efficient solar panels.

The patents cover virtually all nonbiological applications of work performed by Professor Whitesides and dozens of doctoral students over the last decade. The biology related research — mostly in health care — had previously been licensed to other companies involving Professor Whitesides, including Genzyme, GelTex (sold to Genzyme for $1.2 billion in 1993), Theravance, and two privately held start-ups, Surface Logix and WMR Biomedical.

Nano-Terra, though, is selling no products. It is just offering manufacturing and design skills in realms where flexibility and low cost are crucial.

The best known patents cover soft lithography, Professor Whitesides’s method of depositing extremely thin layers of material onto a surface in carefully controlled patterns. It can work over larger surfaces than photolithography, which is widely used to make microchips. Perhaps even more intriguing, soft lithography can work on highly irregular or rounded surfaces where photolithography is all but impossible.

But while nanotechnology’s promise remains immense — the potential advances in energy, medicine and information technology have attracted billions of dollars in government and private investment in recent years — it is not yet clear which patents will prove valuable.

“You can’t just go to market with a huge patent portfolio and a promising pipeline but no revenues,” said Stephen B. Maebius, a patent lawyer in Washington and a nanotechnology expert. “That was the lesson of Nanosys,” he said, referring to the aborted 2004 public offering of a company based in Palo Alto, Calif., that was the highest-profile nanotechnology start-up backed by venture capital.

Nano-Terra was founded in 2005 with the goal of creating a home for the Whitesides patents. Its management team includes the vice chairman, Carmichael Rogers, a former student of Professor Whitesides’s and a partner with him in two other companies; the chief executive, Myer Berlow, a former AOL Time Warner marketing executive; and the president, Ueli Morant, a former market executive at I.B.M. and Philips Consumer Electronics.

Nano-Terra is part of a growing segment of nanotechnology start-ups. Other prominent academic researchers who have started nanotech companies include Chad A. Mirkin of Northwestern University (Nanosphere and NanoInk) and the late Richard E. Smalley of Rice University (Carbon Nanotechnologies). Other leading Harvard professors whose research has led them and the Harvard patent office into entrepreneurial nanotechnology include Thomas Rueckes (Nantero) and Charles M. Lieber and Hongkun Park (Nanosys).
http://www.nytimes.com/2007/06/04/te...gy/04nano.html





Patent Ruling Strikes a Blow at Qualcomm
Matt Richtel

Millions of new mobile phones containing certain Qualcomm semiconductors could be barred from import into the United States under a ruling issued Thursday by a federal government agency in a patent dispute.

Qualcomm said the ruling by the United States International Trade Commission, if it withstands an appeal, could prevent the importation into the United States of tens of millions of new mobile handsets designed for the Verizon, Sprint and AT&T Wireless networks.

The agency ruled that Qualcomm, a semiconductor company based in San Diego, had infringed on a key patent belonging to Broadcom, a competing chip company based in Irvine, Calif., that is used in the design of chips made for advanced 3G, or third-generation, smart cellphones. Qualcomm said that it planned to appeal immediately to the federal court to block the ruling. The company also said that it planned to appeal to President Bush, whose trade representative, Susan C. Schwab, has 60 days within which to veto the ruling. The company said it sought “to avoid irreparable harm to U.S. consumers” and injury to the economy.

Nancy Stark, a spokeswoman for Verizon Wireless, said that company would ask the White House to void the ruling and the federal appeals court to stay it. “It’s bad for the industry and bad for the wireless consumer,” she said. “It’s going to freeze innovation.”

Tim Luke, a telecommunications industry analyst with Lehman Brothers, said that while the I.T.C. ruling is “big,” it probably does not mean any disruption in handset supplies. Investors “will be looking for a settlement between Qualcomm and Broadcom,” he said, adding that Qualcomm also might be able to find a technological fix so that it does not use the technology covered by the Broadcom patent.

Qualcomm’s “fundamental business is really strong and they’ll have to think of a way to work around this,” Mr. Luke said.

The I.T.C. ruled that a patent governing power management in cellphone chips that is held by Broadcom was violated. Broadcom asserts that Qualcomm is using the power management technology without paying licensing royalties.

“This is tremendously significant,” said David Rosmann, vice president of intellectual property litigation for Broadcom. “Qualcomm is either going to need to take a license or they will not be able the provide the next generation of handsets.”

The I.T.C. ruling affects only new models of handsets. Under the ruling, Qualcomm would still be permitted to deliver models that already are on the market as of June 7, whether or not they use the patented technology.

Qualcomm officials said in a conference call with investors late Thursday that it had been negotiating with Broadcom to establish royalty rates. But Qualcomm officials said the rates currently under discussion were so prohibitive that, if met, would undermine Qualcomm’s business model.

Paul E. Jacobs, chief executive of Qualcomm, said the I.T.C. overstepped its statutory authority and the decision had the potential to disrupt the supply of handsets in a way that, he said, could hurt wireless carriers, and consumers.

The issue ruled on by the I.T.C. is part of a broader dispute between Qualcomm, one of the biggest makers in the world of chips for mobile phones, and Broadcom, which makes chips for many digital devices and is trying to gain more business in the mobile phone market. Last week, Broadcom prevailed in a jury trial in United States District Court in Santa Ana, Calif., in which it claimed Qualcomm had infringed three additional patents. The technology covered in those patents includes methods for transmission of high-speed data over mobile phones.

Broadcom has also sued Qualcomm over the patent covered in the I.T.C. ruling, but a federal court delayed ruling on the case until the I.T.C. acted. Four commissioners supported the decision, while two others recommended a more limited penalty be imposed on Qualcomm. Their opinions will be made public after both companies remove any confidential business information from them.
http://www.nytimes.com/2007/06/08/business/08phone.html





New Firm Eager to Slap Patents on Security Patches

Security researchers, are you tired of handing your vulnerability discoveries over to your employer, as if that were what you're paid to do? Helping vendors securing their products—for free—so that their users won't be endangered by new vulnerabilities? Showing your hacking prowess off to your friends, groveling for security jobs or selling your raw discoveries to middlemen for a fraction—a pittance—of their real value?

Take heart, underappreciated, unremunerated vassals, for a new firm is offering to work with you on a vulnerability patch that they will then patent and go to court to defend. You'll split the profits with the firm, Intellectual Weapons, if they manage to sell the patch to the vendor. The firm may also try to patent any adaptations to an intrusion detection system or any other third-party software aimed at dealing with the vulnerability, so rest assured, there are many parties from which to potentially squeeze payoff.

Intellectual Weapons is offering to accept vulnerabilities you've discovered, as long as you haven't told anyone else, haven't discovered the vulnerability through illegal means or have any legal responsibility to tell a vendor about the vulnerability.

Also, the vulnerability has to be profitable—the product must be "highly valuable," according to the firm's site, "especially as a percentage of the vendor's revenue." The product can't be up for upcoming phaseout—after all, the system takes, on average, seven years to churn out a new patent. The vendor has to have deep pockets so it can pay damages, and your solution has to be simple enough to be explained to a jury.

Because goodness, you will be looking at juries and lawyers, you can count on that. Intellectual Weapons says this isn't for everybody. The firm says it "fully [anticipates] major battles."

"We need people who have the emotional stability and the tenacity to persevere with each project—from describing the vulnerability, and helping develop the fix, through to generating and enforcing the IP," the firm states on its site.

Patenting may be a new twist, but the idea of profiteering from vulnerabilities is nothing new. iDefense Labs has its Vulnerability Contributor Program, and TippingPoint has its Zero Day Initiative. Even the Mozilla Foundation tried it, although of course the open-source software project dedicated funds to bugs found in only its own code.

The blogosphere is frothing.

"Nice. The race to the bottom started by [TippingPoint parent company] 3Com and [iDefense] is now complete. I for one hope that Matasano is able to use this idea in regards to a TippingPoint vulnerability," wrote Chris_BJune in a response to a blog from security firm Matasano's Thomas Ptacek.

According to Ptacek, the reasons why nobody should care about Intellectual Weapons includes the fact that the time required to complete a patent filing is over seven years. Add on to that the years it will take to "initiate, litigate and prevail in a patent claim, especially against an established software vendor," Ptacek said. "Presuming you do prevail; you likely won't."

Intellectual Weapons has plans to deal with these inconveniences, however. The company says that it may try to use a Petition to Make Special in order to speed up the examination process when filing a U.S. patent. Another strategy the firm proposes using is to go after a utility model rather than a patent—a utility model being similar to a patent but easier to obtain and of shorter duration—typically six to 10 years.

"In most countries where utility model protection is available, patent offices do not examine applications as to substance prior to registration," the company says. "This means that the registration process is often significantly simpler, cheaper and faster. The requirements for acquiring a utility model are less stringent than for patents."

Ptacek calls utility models "patents-lite." Other nicknames are "petty patent," "minor patent" and "small patent." Such patent workarounds are available in some EU countries and other countries including Argentina, China, Malaysia, Mexico, Morocco, Philippines, Poland, Russia, South Korea and Uzbekistan.

"Would it be [possible] for an outfit like 'Intellectual Weapons,' exploiting the services of contingency-fee lawyers, to get an injunction against a Microsoft security fix in the Republic of Moldova? Anything's possible," Ptacek said.

He doesn't believe it will happen, however, given that international patents have to be fought jurisdiction by jurisdiction. "In this case, you'd be slogging through those fights for a shot at a tiny sliver of the revenue generated by the products you're targeting. This is nothing like NTP vs. RIM, where NTP's claims enabled RIM's entire product."
http://securitywatch.eweek.com/patch...ilities.h tml





Administration Seeks Overhaul of Patent System
Steve Lohr

The Bush administration wants to reform the nation’s patent system by requiring better information from inventors and allowing public scrutiny of applications, according to the director of the government’s patent office.

The goal, said Jon W. Dudas, director of the United States Patent and Trademark Office, is to improve the quality of patents, which should curb the rising wave of patent disputes and lawsuits. The legal wrangling is often over broad descriptions of ideas or activities, so-called business methods, or software that contains only incremental changes over prior work.

“There ought to be a shared responsibility for patent quality among the patent office, the applicants and the public,” Mr. Dudas said in an interview yesterday. “If everything is done right at the front end, we’ll have to worry a lot less about litigation later.”

Some steps to improve patent quality will require changes in the law, said Mr. Dudas, who will present his views to the Senate Judiciary Committee today. Both the Senate and the House have introduced patent-reform legislation this year, amid concerns that the current overburdened, litigation-choked system is hampering innovation rather than encouraging it.

One key change, Mr. Dudas said, would be a legal clarification of what is required of patent applicants. Under current law, an inventor is required to explain why a new product is sufficiently original to deserve the exclusive rights that patent protection conveys. But the applicants have a lot of discretion. The supporting information, Mr. Dudas said, ranges from “almost nothing” to what he called “malicious compliance,” which he described as boxes and boxes of background information intended mainly to obscure the nugget of an invention in the patent application.

Reform legislation, he said, should require the applicants to conduct a thorough search of related patents and technical journals, and then explain why the patent being sought represents a significant innovation beyond previous ideas in the field.

Mr. Dudas said the reform legislation should also make sure the search and information disclosures do not put an unfair burden on inventors who are not wealthy. Personal income, number of patents filed and other measures, he said, could be used to determine who would be exempt from certain requirements. “For the truly small inventor, we might do the search for them,” he said.

The patent office is experimenting with the concept of opening the examination process to outsiders, inviting public peer reviews. On June 15, Mr. Dudas said, the patent office will begin a pilot project for open reviews of software patents. The patents in the pilot program will be posted on a Web site, and members of the public with software expertise will be allowed to send the patent office technical references relevant to the patent claims.

But the pilot project applies only to patent applications in the field of information technology, and only with the approval of patent applicants. Legislative changes would be required to have public peer views without an applicant’s approval, and thus to extend the concept to other fields.

The patent office has been putting its own quality initiatives in place in recent years. And it has hired more patent examiners, adding 1,200 examiners last year to bring its staff to more than 5,000. The percentage of patent applications approved in the first quarter of this year was 49 percent, down from 72 percent in 2000. “We’ve taken steps, and the result has been that a lot more patents are rejected,” Mr. Dudas said. “But those numbers also tell you there are a lot of bad patent applications.”

The patent office, said Josh Lerner, a professor at the Harvard Business School, has made a real effort to improve patent quality in the last few years. But Mr. Lerner questioned whether Mr. Dudas’s current proposals amounted to relying too much on getting better information from applicants.

Mr. Lerner said inventors are instinctive optimists who tend to believe that what they are doing is unique. Yet even discounting any self-serving bias, he said, the growing complexity of technology makes it more difficult for a single person — applicant or examiner — to assess the innovative merit of a patent claim.

“That’s why I think really opening the examination process to public peer review is so important,” Mr. Lerner said. “While the patent office has shown a willingness to experiment with openness, I would put that at the center.”
http://www.nytimes.com/2007/06/06/bu...nd-patent.html





Inside the Black Box
Saul Hansell

THESE days, Google seems to be doing everything, everywhere. It takes pictures of your house from outer space, copies rare Sanskrit books in India, charms its way onto Madison Avenue, picks fights with Hollywood and tries to undercut Microsoft’s software dominance.

But at its core, Google remains a search engine. And its search pages, blue hyperlinks set against a bland, white background, have made it the most visited, most profitable and arguably the most powerful company on the Internet. Google is the homework helper, navigator and yellow pages for half a billion users, able to find the most improbable needles in the world’s largest haystack of information in just the blink of an eye.

Yet however easy it is to wax poetic about the modern-day miracle of Google, the site is also among the world’s biggest teases. Millions of times a day, users click away from Google, disappointed that they couldn’t find the hotel, the recipe or the background of that hot guy. Google often finds what users want, but it doesn’t always.

That’s why Amit Singhal and hundreds of other Google engineers are constantly tweaking the company’s search engine in an elusive quest to close the gap between often and always.

Mr. Singhal is the master of what Google calls its “ranking algorithm” — the formulas that decide which Web pages best answer each user’s question. It is a crucial part of Google’s inner sanctum, a department called “search quality” that the company treats like a state secret. Google rarely allows outsiders to visit the unit, and it has been cautious about allowing Mr. Singhal to speak with the news media about the magical, mathematical brew inside the millions of black boxes that power its search engine.
Google values Mr. Singhal and his team so highly for the most basic of competitive reasons. It believes that its ability to decrease the number of times it leaves searchers disappointed is crucial to fending off ever fiercer attacks from the likes of Yahoo and Microsoft and preserving the tidy advertising gold mine that search represents.

“The fundamental value created by Google is the ranking,” says John Battelle, the chief executive of Federated Media, a blog ad network, and author of “The Search,” a book about Google.

Online stores, he notes, find that a quarter to a half of their visitors, and most of their new customers, come from search engines. And media sites are discovering that many people are ignoring their home pages — where ad rates are typically highest — and using Google to jump to the specific pages they want.

“Google has become the lifeblood of the Internet,” Mr. Battelle says. “You have to be in it.”

Users, of course, don’t see the science and the artistry that makes Google’s black boxes hum, but the search-quality team makes about a half-dozen major and minor changes a week to the vast nest of mathematical formulas that power the search engine.

These formulas have grown better at reading the minds of users to interpret a very short query. Are the users looking for a job, a purchase or a fact? The formulas can tell that people who type “apples” are likely to be thinking about fruit, while those who type “Apple” are mulling computers or iPods. They can even compensate for vaguely worded queries or outright mistakes.

“Search over the last few years has moved from ‘Give me what I typed’ to ‘Give me what I want,’ ” says Mr. Singhal, a 39-year-old native of India who joined Google in 2000 and is now a Google Fellow, the designation the company reserves for its elite engineers.

Google recently allowed a reporter from The New York Times to spend a day with Mr. Singhal and others in the search-quality team, observing some internal meetings and talking to several top engineers. There were many questions that Google wouldn’t answer. But the engineers still explained more than they ever have before in the news media about how their search system works.

As Google constantly fine-tunes its search engine, one challenge it faces is sheer scale. It is now the most popular Web site in the world, offering its services in 112 languages, indexing tens of billons of Web pages and handling hundreds of millions of queries a day.

Even more daunting, many of those pages are shams created by hucksters trying to lure Web surfers to their sites filled with ads, pornography or financial scams. At the same time, users have come to expect that Google can sift through all that data and find what they are seeking, with just a few words as clues.

“Expectations are higher now,” said Udi Manber, who oversees Google’s entire search-quality group. “When search first started, if you searched for something and you found it, it was a miracle. Now, if you don’t get exactly what you want in the first three results, something is wrong.”

Google’s approach to search reflects its unconventional management practices. It has hundreds of engineers, including leading experts in search lured from academia, loosely organized and working on projects that interest them. But when it comes to the search engine — which has many thousands of interlocking equations — it has to double-check the engineers’ independent work with objective, quantitative rigor to ensure that new formulas don’t do more harm than good.

As always, tweaking and quality control involve a balancing act. “You make a change, and it affects some queries positively and others negatively,” Mr. Manber says. “You can’t only launch things that are 100 percent positive.”

THE epicenter of Google’s frantic quest for perfect links is Building 43 in the heart of the company’s headquarters here, known as the Googleplex. In a nod to the space-travel fascination of Larry Page, the Google co-founder, a full-scale replica of SpaceShipOne, the first privately financed spacecraft, dominates the building’s lobby. The spaceship is also a tangible reminder that despite its pedestrian uses — finding the dry cleaner’s address or checking out a prospective boyfriend — what Google does is akin to rocket science.

At the top of a bright chartreuse staircase in Building 43 is the office that Mr. Singhal shares with three other top engineers. It is littered with plastic light sabers, foam swords and Nerf guns. A big white board near Mr. Singhal’s desk is scrawled with graphs, queries and bits of multicolored mathematical algorithms. Complaints from users about searches gone awry are also scrawled on the board.

Any of Google’s 10,000 employees can use its “Buganizer” system to report a search problem, and about 100 times a day they do — listing Mr. Singhal as the person responsible to squash them.

“Someone brings a query that is broken to Amit, and he treasures it and cherishes it and tries to figure out how to fix the algorithm,” says Matt Cutts, one of Mr. Singhal’s officemates and the head of Google’s efforts to fight Web spam, the term for advertising-filled pages that somehow keep maneuvering to the top of search listings.

Some complaints involve simple flaws that need to be fixed right away. Recently, a search for “French Revolution” returned too many sites about the recent French presidential election campaign — in which candidates opined on various policy revolutions — rather than the ouster of King Louis XVI. A search-engine tweak gave more weight to pages with phrases like “French Revolution” rather than pages that simply had both words.

At other times, complaints highlight more complex problems. In 2005, Bill Brougher, a Google product manager, complained that typing the phrase “teak patio Palo Alto” didn’t return a local store called the Teak Patio.

So Mr. Singhal fired up one of Google’s prized and closely guarded internal programs, called Debug, which shows how its computers evaluate each query and each Web page. He discovered that Theteakpatio.com did not show up because Google’s formulas were not giving enough importance to links from other sites about Palo Alto.

It was also a clue to a bigger problem. Finding local businesses is important to users, but Google often has to rely on only a handful of sites for clues about which businesses are best. Within two months of Mr. Brougher’s complaint, Mr. Singhal’s group had written a new mathematical formula to handle queries for hometown shops.

But Mr. Singhal often doesn’t rush to fix everything he hears about, because each change can affect the rankings of many sites. “You can’t just react on the first complaint,” he says. “You let things simmer.”

So he monitors complaints on his white board, prioritizing them if they keep coming back. For much of the second half of last year, one of the recurring items was “freshness.”

Freshness, which describes how many recently created or changed pages are included in a search result, is at the center of a constant debate in search: Is it better to provide new information or to display pages that have stood the test of time and are more likely to be of higher quality? Until now, Google has preferred pages old enough to attract others to link to them.

But last year, Mr. Singhal started to worry that Google’s balance was off. When the company introduced its new stock quotation service, a search for “Google Finance” couldn’t find it. After monitoring similar problems, he assembled a team of three engineers to figure out what to do about them.

Earlier this spring, he brought his squad’s findings to Mr. Manber’s weekly gathering of top search-quality engineers who review major projects. At the meeting, a dozen people sat around a large table, another dozen sprawled on red couches, and two more beamed in from New York via video conference, their images projected on a large screen. Most were men, and many were tapping away on laptops. One of the New Yorkers munched on cake.

Mr. Singhal introduced the freshness problem, explaining that simply changing formulas to display more new pages results in lower-quality searches much of the time. He then unveiled his team’s solution: a mathematical model that tries to determine when users want new information and when they don’t. (And yes, like all Google initiatives, it had a name: QDF, for “query deserves freshness.”)

Mr. Manber’s group questioned QDF’s formula and how it could be deployed. At the end of the meeting, Mr. Singhal said he expected to begin testing it on Google users in one of the company’s data centers within two weeks. An engineer wondered whether that was too ambitious.

“What do you take us for, slackers?” Mr. Singhal responded with a rebellious smile.

THE QDF solution revolves around determining whether a topic is “hot.” If news sites or blog posts are actively writing about a topic, the model figures that it is one for which users are more likely to want current information. The model also examines Google’s own stream of billions of search queries, which Mr. Singhal believes is an even better monitor of global enthusiasm about a particular subject.

As an example, he points out what happens when cities suffer power failures. “When there is a blackout in New York, the first articles appear in 15 minutes; we get queries in two seconds,” he says.

Mr. Singhal says he tested QDF for a simple application: deciding whether to include a few news headlines among regular results when people do searches for topics with high QDF scores. Although Google already has a different system for including headlines on some search pages, QDF offered more sophisticated results, putting the headlines at the top of the page for some queries, and putting them in the middle or at the bottom for others.

GOOGLE’S breakneck pace contrasts with the more leisurely style of the universities and corporate research labs from which many of its leaders hail. Google recruited Mr. Singhal from AT&T Labs. Mr. Manber, a native of Israel, was an early examiner of Internet searches while teaching computer science at the University of Arizona. He jumped into the corporate fray early, first as Yahoo’s chief scientist and then running an Amazon.com search unit.

Google lured Mr. Manber from Amazon last year. When he arrived and began to look inside the company’s black boxes, he says, he was surprised that Google’s methods were so far ahead of those of academic researchers and corporate rivals.

“I spent the first three months saying, ‘I have an idea,’ ” he recalls. “And they’d say, ‘We’ve thought of that and it’s already in there,’ or ‘It doesn’t work.’ ”

The reticent Mr. Manber (he declines to give his age), would discuss his search-quality group only in the vaguest of terms. It operates in small teams of engineers. Some, like Mr. Singhal’s, focus on systems that process queries after users type them in. Others work on features that improve the display of results, like extracting snippets — the short, descriptive text that gives users a hint about a site’s content.

Other members of Mr. Manber’s team work on what happens before users can even start a search: maintaining a giant index of all the world’s Web pages. Google has hundreds of thousands of customized computers scouring the Web to serve that purpose. In its early years, Google built a new index every six to eight weeks. Now it rechecks many pages every few days.

And Google does more than simply build an outsized, digital table of contents for the Web. Instead, it actually makes a copy of the entire Internet — every word on every page — that it stores in each of its huge customized data centers so it can comb through the information faster. Google recently developed a new system that can hold far more data and search through it far faster than the company could before.

As Google compiles its index, it calculates a number it calls PageRank for each page it finds. This was the key invention of Google’s founders, Mr. Page and Sergey Brin. PageRank tallies how many times other sites link to a given page. Sites that are more popular, especially with sites that have high PageRanks themselves, are considered likely to be of higher quality.

Mr. Singhal has developed a far more elaborate system for ranking pages, which involves more than 200 types of information, or what Google calls “signals.” PageRank is but one signal. Some signals are on Web pages — like words, links, images and so on. Some are drawn from the history of how pages have changed over time. Some signals are data patterns uncovered in the trillions of searches that Google has handled over the years.

“The data we have is pushing the state of the art,” Mr. Singhal says. “We see all the links going to a page, how the content is changing on the page over time.”

Increasingly, Google is using signals that come from its history of what individual users have searched for in the past, in order to offer results that reflect each person’s interests. For example, a search for “dolphins” will return different results for a user who is a Miami football fan than for a user who is a marine biologist. This works only for users who sign into one of Google’s services, like Gmail.

(Google says it goes out of its way to prevent access to its growing store of individual user preferences and patterns. But the vast breadth and detail of such records is prompting lust among the nosey and fears among privacy advocates.)

Once Google corrals its myriad signals, it feeds them into formulas it calls classifiers that try to infer useful information about the type of search, in order to send the user to the most helpful pages. Classifiers can tell, for example, whether someone is searching for a product to buy, or for information about a place, a company or a person. Google recently developed a new classifier to identify names of people who aren’t famous. Another identifies brand names.

These signals and classifiers calculate several key measures of a page’s relevance, including one it calls “topicality” — a measure of how the topic of a page relates to the broad category of the user’s query. A page about President Bush’s speech about Darfur last week at the White House, for example, would rank high in topicality for “Darfur,” less so for “George Bush” and even less for “White House.” Google combines all these measures into a final relevancy score.

The sites with the 10 highest scores win the coveted spots on the first search page, unless a final check shows that there is not enough “diversity” in the results. “If you have a lot of different perspectives on one page, often that is more helpful than if the page is dominated by one perspective,” Mr. Cutts says. “If someone types a product, for example, maybe you want a blog review of it, a manufacturer’s page, a place to buy it or a comparison shopping site.”

If this wasn’t excruciating enough, Google’s engineers must compensate for users who are not only fickle, but are also vague about what they want; often, they type in ambiguous phrases or misspelled words.

Long ago, Google figured out that users who type “Brittany Speers,” for example, are really searching for “Britney Spears.” To tackle such a problem, it built a system that understands variations of words. So elegant and powerful is that model that it can look for pages when only an abbreviation or synonym is typed in.

Mr. Singhal boasts that the query “Brenda Lee bio” returns the official home page of the singer, even though the home page itself uses the term “biography” — not “bio.”

But words that seem related sometimes are not related. “We know ‘bio’ is the same as ‘biography,’ ” Mr. Singhal says. “My grandmother says: ‘Oh, come on. Isn’t that obvious?’ It’s hard to explain to her that bio means the same as biography, but ‘apples’ doesn’t mean the same as ‘Apple.’ ”

In the end, it’s hard to gauge exactly how advanced Google’s techniques are, because so much of what it and its search rivals do is veiled in secrecy. In a look at the results, the differences between the leading search engines are subtle, although Danny Sullivan, a veteran search specialist and blogger who runs Searchengineland.com, says Google continues to outpace its competitors.

Yahoo is now developing special search formulas for specific areas of knowledge, like health. Microsoft has bet on using a mathematical technique to rank pages known as neural networks that try to mimic the way human brains learn information.

Google’s use of signals and classifiers, by contrast, is more rooted in current academic literature, in part because its leaders come from academia and research labs. Still, Google has been able to refine and advance those ideas by using computer and programming resources that no university can afford.

“People still think that Google is the gold standard of search,” Mr. Battelle says. “Their secret sauce is how these guys are doing it all in aggregate. There are 1,000 little tunings they do.”
http://www.nytimes.com/2007/06/03/bu.../03google.html





The Superfabulous World of Rufus Wainwright
Melena Ryzik

A few weeks ago, on his way to an appearance at the Union Square Barnes & Noble to promote his new album, “Release the Stars,” Rufus Wainwright decided his all-black outfit was a little dour for a meet-and-greet. “Fashion emergency!” he said. So he dashed down to the antique-jewelry shop below his apartment and picked up a 1920s Czech glass necklace, which sparkled atop his black T-shirt.

Good thing too: Mr. Wainwright’s fans expect a little flash. Around 800 of them came, some lining up as early as noon for a 7 p.m. appearance, to see him perform and autograph their CDs. Afterward they lingered, snapping photos of him and discussing their devotion.

“I’ve learned a lot about myself listening to his music,” one man gushed.

Does Rufus Wainwright know he’s fabulous?

“I do feel like I live a fabulous life,” he said over afternoon dumplings at a Japanese teahouse near the Gramercy Park home he shares with his new boyfriend, Jörn Weisbrodt, an arts administrator. “And I know that’s why a lot of the critics get so mad at me sometimes, because they’re just really jealous.”

He must be expecting an onslaught, because Mr. Wainwright, 33, the singer-songwriter-rhinestone-lover, has been superfabulous lately. His re-creation of Judy Garland’s 1961 Carnegie Hall concert garnered praise and awe, and he received a commission from the Metropolitan Opera. “Release the Stars” immediately became a best seller in Britain when it arrived last month and has been a critical hit in the United States. He did five sold-shows at the Old Vic in London, and tomorrow he will begin a run of four sold-out nights at the Blender Theater at Gramercy in Manhattan.

In New York he was in the midst of a publicity — and fashion — blitz: The night after Barnes & Noble he appeared on “Late Show With David Letterman” wearing lederhosen he had custom-made in Austria by a 25th-generation artisan who also fitted the Porsche family.

But the glam life is not without pitfalls. Watching that show with a few friends from a private dining room at the boutique Hotel on Rivington, Mr. Wainwright had an epiphany: “It’s all commercials. It’s horrifying how many commercials there are and how it just ruins the experience.”

But, he was quick to add, “I’d still love to be on ‘Oprah’ and, you know, have them visit my crib or whatever.”

Scale has always been a tricky issue for Mr. Wainwright. Though he casually refers to himself as a superstar — in a tone that’s a few notes short of irony — his last few albums were more like cult hits. In the United States “Release the Stars,” which had its debut at No. 23 on the Billboard charts with just over 24,000 copies sold, was his highest ranking; by contrast the new album from another indie favorite, Wilco, came in at No. 4 that week. And it was only recently that he became too well known to have a profile posted on a gay cruising site. (The administrators took it down, thinking it was fake.)

In the United States and Britain his most loyal audience tends to be gay men, teenagers and mother-daughter fans. (Several sets turned up at Barnes & Noble.) “There’s a tinge of sadness to their devotion,” he said. “It relates with the alienation that I bring up. So I still feel somewhat subversive, which is nice.”

To promote that approach “Release the Stars” was meant to have an underground feel, recorded in Brooklyn with a Berlin detour to “go totally electroclash, get a weird haircut and maybe take up drug addiction again or something,” Mr. Wainwright said. Instead, when he got to Germany, “this kind of wave of, like, romanticism and grandiosity and sort of high culture really took hold of me,” he said.

His critics — the jealous ones — might suggest he has always been in thrall to ostentation, so Mr. Wainwright enlisted Neil Tennant of the Pet Shop Boys to rein him in. It worked, sort of. “Remarkably, Mr. Wainwright infuses ‘Release the Stars’ with enough honest emotion to overcome the grandiosity, or at least undercut it a bit,” the critic Nate Chinen wrote in The New York Times.

Mr. Wainwright would like to make a solo piano record, and several albums with his musical family. (His parents are the folkies Kate McGarrigle and Loudon Wainwright III; his sisters, Martha Wainwright and Lucy Wainwright Roche, often join his tours.) But he talks most excitedly — and most often — about his opera, a tale of a (fabulous) day in the life of a diva.

“I really believe that opera’s a language,” he said. “I think it’s a whole parallel, separate world where all those characters exist. And once a composer of opera realizes that or discovers who those people are, as I have with this character who I’m writing about, it’s your mission to breathe life into this other being.”

So Mr. Wainwright is in no danger of deflating. What would make his life more fabulous? “I’d love to play Madison Square Garden,” he said, “and get hounded and lose all sense of dignity.”
http://www.nytimes.com/2007/06/04/ar...ic/04wain.html





Saatchi Gets the Boot Over the Use of a Dead Rock Star in Advertising
Eric Pfanner

Dead celebrities are hot. From Einstein to Elvis and Gene Kelly to Orville Redenbacher, they keep popping up as posthumous pitchmen for everything from cars to cola. But when Saatchi & Saatchi London recently featured images of Kurt Cobain and other dead rock stars in ads for Dr. Martens footwear, the agency and its client got burned.

Courtney Love, Cobain's widow, went ballistic when she heard about the ads, which ran in a small British music magazine called Fact. One of the ads shows Cobain, who was the lead singer of the band Nirvana, sitting on a cloud in the sky, draped in robes and shod in Dr. Martens boots.

"She thinks it's outrageous that a company is allowed to commercially gain from such a despicable use of her husband's picture," a spokeswoman for Love told People magazine.

It was hardly the first time that Cobain's image had been used for commercial gain. According to Forbes magazine, which compiles a list of the earning power of dead celebrities, Cobain came in first last year, just ahead of Elvis Presley, reeling in $50 million for his estate.

In this case, however, what started out as a legitimate use of the photo of Cobain, along with images of Sid Vicious of the Sex Pistols, Joey Ramone of the Ramones, and Joe Strummer of the Clash, went wrong because of a series of missteps and the border-hopping power of the Internet.

Saatchi said it found the images in the Corbis photo library and obtained copyright clearance to use them in Britain.

The trouble began when an employee - disobeying instructions, Saatchi insisted - submitted the images to www.adcritic.com, a U.S.-based ad industry Web site. In the United States, the estates of dead celebrities are allowed to control the use of their images, unlike in Britain, where, lawyers say, no approval is needed.

A spokeswoman for Saatchi, Eleanor Conroy, said the employee who was responsible for the breach had been dismissed.

"While we believe the creative is a beautiful tribute to four legendary musicians, the individual broke both agency and client protocol in this situation by placing the ads on a U.S. advertising Web site and acting as an unauthorized spokesperson for the company," Kate Stanners, executive creative director at Saatchi & Saatchi London, said in a statement.

Sending ads to sites like AdCritic is common, particularly when an agency or ad executive is trying to "seed" it so that it can spread "virally" on the Internet. Creative types like to do this in order to generate chatter about their ads, which is helpful when awards season rolls around. Clients rarely complain, because they get free advertising.

In this case, however, Airwair International, the British company that makes Dr. Martens, was not impressed. It canceled its contract with Saatchi & Saatchi, reportedly worth £5 million, or $9.9 million, over three years.

David Suddens, chief executive of Airwair, said Saatchi first approached his company's marketing department in February with sketches outlining the idea for the ads.

"We said firmly, 'no way,' " he said.

But dead celebrities are trendy in advertising at the moment. Gene Kelly appeared in a recent British ad for Volkswagen; a digitally generated likeness of Orville Redenbacher starred in U.S. ads for the eponymous popcorn brand.

Suddens said Saatchi wanted to give the idea another try, developing the sketches into proposed ads, and showed them to Airwair in April. Agency executives said they wanted to have the images published at least once so that they could be submitted for awards, he added. An Airwair executive finally agreed to allow the ads to be used in Britain only, and only in Fact magazine, Suddens said.

The company has apologized to Love, and Suddens said he was unmoved by Saatchi's argument that the use of the ads was legitimate in Britain. "Enough people said it was offensive for us to consider it offensive," he said.

Airwair has focused its marketing on a campaign called "Freedm," featuring a Web site that invites would-be rock stars and other artists to post their creations.

Many marketing executives have been wary of user-generated content, fearing the loss of the editing function that ad agencies provide. In this case, however, it was the pros who got their clients in trouble.
http://www.iht.com/articles/2007/06/...iness/ad04.php





Networks Try New Ways to Keep Eyes on Ads
Louise Story

To many people, the commercial break is when you use the restroom, change the channel or grab a bite to eat.

But television networks, under pressure from advertisers who want their commercials to be seen, are trying to change that.

Fixing the commercial break is the most pressing topic of discussions this spring between the U.S. networks and advertisers as they negotiate television ad sales deals for the next year. Pressure to keep viewers tuned in is greater because of the rising number of digital video recorders, which allow people to fast-forward through commercials.

All of the networks say they are experimenting with ways to hold viewers' attention during commercials. But Viacom, the media conglomerate that owns cable networks like MTV, VH1, Comedy Central and Spike, is describing more specifics than most. Viacom says it has come up with several formats that could help keep people tuned in, and its creative teams have been involved in some of the production.

The changes include creating commercials that last for an entire break, integrating stars from programs into the ads and developing story lines that run through the ads. MTV and VH1 have decided to change from two commercial breaks per half-hour to three, so that each one can be shorter.

Viacom executives said that their networks' youthful audiences have made it acutely important for them to innovate.

"They're younger, they're more quickly engaged and more quickly dismissive if they're not engaged," said Judy McGrath, chairman and chief executive of MTV Networks, which includes MTV, Logo and Comedy Central.

In one example from February, a Verizon Wireless ad ran during a live telecast of a concert on MTV, but the camera never stopped showing the concert in the background. As the band Fall Out Boy continued to play, an image of a Verizon Wireless phone appeared in the center of the screen; viewers did not have to miss a beat of the concert and could still hear the crowd cheering.

"The whole goal here is to blur the line between content and advertising message," said Hank Close, executive vice president for ad sales at MTV Networks.

Logo, the lesbian and gay network, is currently showing a two-minute commercial for Subaru that tells the story of a couple of women who like to take extreme athletic trips together. Only at the end of the ad does the Subaru logo appear.

MTV Networks has been involved creating these ads, and in many cases the advertisers are able to run the ads elsewhere if they choose, Close said. The beverage company Dr Pepper, for instance, liked an ad that VH1 created for it so much that it posted the commercial on its Web site.

One of the problems the networks face is letting viewers know about the new content during commercials, Close said. Viacom has been promoting some commercials before it shows them.

Last November, for example, six Viacom networks showed the "Spider-Man 3" trailer at the same time. It was the first time that the trailer had appeared anywhere, and leading up to its airing, actors promoted it during content time on the networks.

Kirsten Dunst, an actress starring in the movie, did a spot on MTV encouraging viewers to tune in to see the premiere of the movie trailer.

Similarly, MTV was the first to air an extended version of the first Nintendo Wii commercial during a block of programming in November called Gamer's Week 2.0. After the ad, a host of Gamer's Week 2.0 told the audience that they had just seen a world premiere of the Wii commercial.

"The commercial was so integrated into the context of the messaging of the program that it felt very synonymous," said John Shea, executive vice president of integrated marketing for MTV Networks Music Group and for the Logo Group. "Whenever we can turn what has been thought of as a break into an entertaining moment, we're doing that."

On a new Logo show this month, "The Big Gay Comedy Sketch Show," Amp'd Mobile, a U.S. cellphone company, sponsored an ad that stars an actor from the show "The Gay Werewolf." In the commercial, which filled the entire two-and-a-half-minute commercial break, the actor played his character from the show, a man who turns gay whenever there is a full moon.

Not coincidentally, the werewolf in the ad likes to call his mom on his Amp'd Mobile phone.

MTV last summer created a new character, a woman named Parker, to turn commercials for Herbal Essences hair care products into more entertaining content. There were five serial ads that led up to the network's Video Music Awards. First Parker sneaked into the theater where the awards show would be held, and then she was mistaken for a presenter and pushed onto the stage.

Finally, for all the television viewers who had been following the Herbal Essences ad story line, Parker appeared on the red carpet during the awards show - and waved to viewers as if she were a real celebrity rather than the star of a few television commercials.
http://www.iht.com/articles/2007/05/...ess/adco22.php





Nielsen: DVRs Behind Viewer Drop
Paul J. Gough

Nielsen Media Research said Thursday that the impact of digital video recorders is a leading cause of why television viewing dropped precipitously this year.

Many of the top shows -- from ABC's "Grey's Anatomy" to Fox's "American Idol" to CBS' "CSI" -- saw their ratings drop in the spring.

Prompted this month by questions from NBC, Nielsen began an investigation into the factors that could have led to the slide. Nielsen's probe is almost complete, but in the meantime the company has discovered several things.

"DVRs appear to be the largest factor in that," said Pat McDonough, Nielsen senior vp planning policy and analysis.

But there are other factors in Nielsen's early findings, among them the difference between an Olympic year (2006) and a non-Olympic year (2007) as well as a higher number of repeat programs this spring than in previous years.

Nielsen also said that, ahead of this year's upfront negotiations, it would offer average commercial minute ratings in an electronic file that includes shows from April 30 forward and the six streams that includes live, live-plus-same-day DVR playback and live-plus-1, 2, 3 and 7 DVR playback.

The ratings measure the audience for commercials during a given program, excluding the program itself as well as any public service announcements, promotions or other noncommercial time. TV networks and ad agencies traditionally use program ratings to approximate commercial ratings, but now with the weekly data they'll be able to come closer than ever before, said Sara Erichson, executive vp client services at Nielsen.

Nielsen also released data that said NBC's "The Office" topped the week of April 30 for commercial viewing on DVRs compared with live viewing. Also scoring higher were Fox's "Family Guy" and "Bones," the CW's "Smallville" and "Grey's."

Nielsen found that 58% of broadcast prime viewing during that week among adults 18-49 in DVR households was live, compared with 85% for cable primetime and 84% for syndicated. The majority (95%-99%) of viewing of all types was done within the first 75 hours of original air, which is covered by the live-plus-3 system.

The Hollywood Reporter and Nielsen Media Research are both owned by the Nielsen Company.
http://www.hollywoodreporter.com/hr/...ed3e283c6b581b





TV Advertising Sound Levels

Since assuming responsibility for TV advertising regulation, the ASA has received hundreds of complaints from viewers objecting to what they have found to be “noisy ads”. In many of those instances, the ASA has found that the ads have been broadcast at levels that are acceptable according to the current stipulations of the BCAP TV Advertising Standards Code. Concerned at the apparent incongruity between viewer perception and the realities of TV ad broadcasting, BCAP has been monitoring the ad sound levels issue and now proposes that the current rule on sound levels be changed. But what does it all mean for the viewer?

Sound level standards – the technicalities (you may wish to skip to the next section!)
Sound levels in TV broadcasting have traditionally been measured using Peak Programme Meters (PPMs), which indicate the peak sound levels (the loudest part or parts) of ads’ soundtracks. Currently, the BCAP TV Advertising Standards Code states that: “ads must not be excessively noisy or strident. Studio transmission power must not be increased from normal levels during advertising.”

To comply with the rule, broadcasters are told that the peak sound level at the studio output should not exceed a level of 6 on the PPM or, as a lot of advertisers today use sound compression techniques, a maximum level of 4 on the PPM is imposed on ads with a highly compressed soundtrack. Compressing an ad’s soundtrack is akin to levelling out the ‘peaks and troughs’ of the sound waves so that the peak levels of the compressed version would be the same as those of the “natural” version but the ‘troughs’ are raised.

The overall effect will be that the ad is subjectively louder. Also an ad break may occur during a quiet moment in a programme, therefore increasing the perceived loudness of the ads that follow.

What is to be done?
BCAP’s proposed rule encourages broadcasters to measure the subjective loudness levels of ads, rather than simply measuring peak sound levels. Subjective loudness is based on:

*the peak levels of sounds
*the length of time sound levels are maintained
*the different frequencies, or ‘pitches’, contained in the soundtrack.

Under the proposed rule, broadcasters will be told that “A consistent subjective loudness must be maintained between individual advertisements and between the advertisements and programme and other junction material.”

The proposed new rule gives broadcasters much more technical guidance on how they can ensure greater consistency between ad and programme sound levels. The International Telecommunications Union (ITU) has drawn up recommendations on measuring subjective loudness levels; those recommendations have been incorporated into the proposed rule. Broadcasters will now have the option to carry out their testing in accordance with the following ITU recommendations:

Algorithms to measure audio programme loudness and true-peak audio level (ITU-R BS1770)

and

Requirements for loudness and true-peak indicating meter (ITU-R BS1771)

What should it all mean?
If the proposal is accepted, BCAP considers that broadcasters should be better able to match the sound levels of ads with the sound output of the whole channel. That means there should be less of a perceived imbalance between ad and programme sound levels, leading to less viewer irritation and fewer complaints to the ASA.

What now?
BCAP is consulting on its proposed rule. The purpose of the consultation is not simply to ask if TV ads are too loud: BCAP already acknowledges that some viewers perceive that they are. Instead, the purpose of the consultation is to encourage technically informed responses as to whether the proposed rule will give broadcasters enough guidance to ensure that there will be less of a perceived disparity between the sound levels of TV ads and programmes.

The consultation will close on Friday 3 August 2007 at 5pm. Any responses received will be considered and then a final decision made. BCAP will announce its decision later in the year.

Further information on the consultation can be here.
http://www.asa.org.uk/asa/focus/back...und+Levels.htm




Why Music Really is Getting Louder
Adam Sherwin

Dad was right all along – rock music really is getting louder and now recording experts have warned that the sound of chart-topping albums is making listeners feel sick.

That distortion effect running through your Oasis album is not entirely the Gallagher brothers’ invention. Record companies are using digital technology to turn the volume on CDs up to “11”.

Artists and record bosses believe that the best album is the loudest one. Sound levels are being artificially enhanced so that the music punches through when it competes against background noise in pubs or cars.

Britain’s leading studio engineers are starting a campaign against a widespread technique that removes the dynamic range of a recording, making everything sound “loud”.

“Peak limiting” squeezes the sound range to one level, removing the peaks and troughs that would normally separate a quieter verse from a pumping chorus.

The process takes place at mastering, the final stage before a track is prepared for release. In the days of vinyl, the needle would jump out of the groove if a track was too loud.

But today musical details, including vocals and snare drums, are lost in the blare and many CD players respond to the frequency challenge by adding a buzzing, distorted sound to tracks.

Oasis started the loudness war and recent albums by Arctic Monkeys and Lily Allen have pushed the loudness needle further into the red.

The Red Hot Chili Peppers’ Californication, branded “unlistenable” by studio experts, is the subject of an online petition calling for it to be “remastered” without its harsh, compressed sound.

Peter Mew, senior mastering engineer at Abbey Road studios, said: “Record companies are competing in an arms race to make their album sound the ‘loudest’. The quieter parts are becoming louder and the loudest parts are just becoming a buzz.”

Mr Mew, who joined Abbey Road in 1965 and mastered David Bowie’s classic 1970s albums, warned that modern albums now induced nausea.

He said: “The brain is not geared to accept buzzing. The CDs induce a sense of fatigue in the listeners. It becomes psychologically tiring and almost impossible to listen to. This could be the reason why CD sales are in a slump.”

Geoff Emerick, engineer on the Beatles’ Sgt. Pepper album, said: “A lot of what is released today is basically a scrunched-up mess. Whole layers of sound are missing. It is because record companies don’t trust the listener to decide themselves if they want to turn the volume up.”

Downloading has exacerbated the effect. Songs are compressed once again into digital files before being sold on iTunes and similar sites. The reduction in quality is so marked that EMI has introduced higher-quality digital tracks, albeit at a premium price, in response to consumer demand.

Domino, Arctic Monkeys’ record company, defended its band’s use of compression on their chart-topping albums, as a way of making their music sound “impactful”.

Angelo Montrone, an executive at One Haven, a Sony Music company, said the technique was “causing our listeners fatigue and even pain while trying to enjoy their favourite music”.

In an open letter to the music industry, he asked: “Have you ever heard one of those test tones on TV when the station is off the air? Notice how it becomes painfully annoying in a very short time? That’s essentially what you do to a song when you super-compress it. You eliminate all dynamics.”

Mr Montrone released a compression-free album by Texan roots rock group Los Lonely Boys which sold 2.5 million copies.

Val Weedon, of the UK Noise Association, called for a ceasefire in the “loudness war”. She said: “Bass-heavy music is already one of the biggest concerns for suffering neighbours. It is one thing for music to be loud but to make it deliberately noisy seems pointless.”

Mr Emerick, who has rerecorded Sgt. Pepper on the original studio equipment with contemporary artists, admitted that bands have always had to fight to get their artistic vision across.

He said: “The Beatles didn’t want any nuance altered on Sgt. Pepper. I had a stand-up row with the mastering engineer because I insisted on sitting in on the final transfer.”

The Beatles lobbied Parlophone, their record company, to get their records pressed on thicker vinyl so they could achieve a bigger bass sound.

Bob Dylan has joined the campaign for a return to musical dynamics. He told Rolling Stone magazine: “You listen to these modern records, they’re atrocious, they have sound all over them. There’s no definition of nothing, no vocal, no nothing, just like – static.”

Studio sound

— The human ear responds to the average sound across a piece of music rather than peaks and crescendos. Quiet and loud sounds are squashed together, decreasing the dynamic range, raising the average loudness

— The saturation level for a sound signal is digital full scale, or 0dB. In the 1980s, the average sound level of a track was -18dB. The arrival of digital technology allowed engineers to push finished tracks closer to the loudest possible, 0dB

— The curves of a sound wave, which represent a wide dynamic range, become clipped and flattened to create “square waves” which generate a buzzing effect and digital distortion on CD players
http://entertainment.timesonline.co....cle1878724.ece





Converters Signal a New Era for TVs
Jacques Steinberg

At midnight on Feb. 17, 2009, the rabbit ears and the rooftop antennas that still guide television signals into nearly 1 of every 5 American homes will be rendered useless — unless they are tethered to a new device, including two versions unveiled yesterday, that the government will spend as much as $80 a household to help families buy.

The V-shaped rabbit ears, which have stood sentry in some living rooms and dens since the early 1950s, risk going the way of the eight-track tape player or Betamax in 20 months because that is when local television stations will cease sending their signals over the analog airwaves, and instead begin transmitting their programming exclusively over the more modern digital spectrum.

The change, which was set in motion by Congress and the Federal Communications Commission in the mid-1990s, is being made at least partly to give viewers a better picture and to make it easier for stations to broadcast their signals in high definition.

“The moment coming is the end of something that has been around for 60 years — conventional television — and it has been a wonderful era,” said Richard E. Wiley, a former chairman of the F.C.C. who led a government advisory panel on what was then known as “advanced television” from 1987 to 1995.

“With that ending will come this new digital world, this much greater world,” Mr. Wiley said, “but many people aren’t yet ready or haven’t gotten the word.”

Those families still using antennas on their roofs or atop their sets to watch David Letterman or “Desperate Housewives” — nearly 20 million homes, according to government figures — will eventually be unable to see their favorite programs, at least not without a digital-ready television or a converter that will serve to translate the new signals for old TVs and their antennas. (Those viewers who already get their television from satellite or cable providers are not expected to have much disruption.)

That is where the government vouchers come in. Yesterday, the National Association of Broadcasters, the powerful trade lobby representing the nation’s television networks and stations, lifted the curtain on two prototypes for those basic digital converters — one made by LG, the other by Thomson, which is distributed under the RCA brand — that will start appearing in electronic and department stores in January, at an expected cost of about $50 to $70.

To ensure that uninterrupted access to free, over-the-air television does not pose a financial hardship for viewers, a government agency with a name that sounds as if it was borrowed from the old Soviet Union — the National Telecommunications and Information Administration — will issue $40 gift cards to consumers who want to buy the converters so they are not left behind when television as we have always known it goes dark in early 2009.

Beginning in January, consumers may apply for up to two coupons each, for a total of $80. (More information on the program is available at an F.C.C. Web site, www.dtv.gov, or the broadcasters’ site at www.dtvanswers.com.)

All told, the government has set aside $1.5 billion to help viewers pay for the converters, although it expects to recoup that cost — and more — by later auctioning off the portion of the broadcast spectrum being vacated by the TV stations.

While some of the unused spectrum will be given to public safety agencies like police and fire departments — because those frequencies are useful at passing through buildings and walls — much of it will be bought by cellular and other wireless companies seeking to expand their services.

The legislation establishing the $40 coupons was passed by Congress in late 2005, with the support of telecommunications and software companies. At least some of those companies expected either to manufacture the digital converters or to bid for the older frequencies being returned by the stations.

Consumer groups, however, have expressed concern that some families will have neither the means to buy the converters nor the awareness to successfully obtain the vouchers.

The broadcasters’ association said yesterday that it was embarking on a public service campaign intended to ensure that some viewers know they have to update their equipment or risk losing the ability to watch TV.

When the value of the advertising time being donated by the stations is taken into account, the broadcasters estimate the value of their awareness campaign at $100 million.

“Our No. 1 goal,” said Shermaze Ingram, a spokeswoman for the broadcasters’ association, “is that no one loses TV reception because of a lack of information.”

Among the advantages of digital television being promoted by the broadcasters is that the signal required is so compressed, or efficient, that a station may be able to send out four streams of programming where once it had only one. WETA, a public television station in Washington, has already begun transmitting a supplemental digital channel aimed solely at families, in addition to its regular programming.

That the digital signal provides a far superior image on the screen than its analog forebear was made evident yesterday morning, when representatives of the broadcasters’ association set up a makeshift experiment in a conference room at the Hearst building in Manhattan.

On one side was a television receiving a traditional over-the-air signal from a local Fox affiliate, its picture grainy and chattering with static. Next to it was a television tuned to the same station, this one with its antennas connected to the converter prototype made by LG, which was not much bigger than a cigar box.

The image on its screen was as clear as if being sourced from a DVD player.
http://www.nytimes.com/2007/06/07/te...07digital.html





Away From the Set but Not Away From HDTV
Stephen C. Miller

It’s summertime, and catching your favorite TV shows is not so easy when you are on vacation or a weekend outing. A cheap, portable TV is one option, but what if you’ve developed a taste for high definition? Plextor has come out with its Mini Digital HDTV Receiver, which connects to a laptop’s U.S.B. port. The receiver, which sells for $99 and is available at www.plextor.com, has an external antenna and software that scans for over-the-air HD signals.

Plextor’s receiver works only with computers running Windows XP or Vista. The more computing horsepower you have — both memory and graphics — the better your viewing experience. Underpowered systems can produce a picture that occasionally stutters.

The software, called ArtecMedia from Ultima, allows you to switch channels and record and play back shows. You can also set a schedule of shows to record. Of course, the PC and the software must be running to time-shift shows this way. The receiver draws its power from the laptop, so you may want to plug in before you veg out.
http://www.nytimes.com/2007/06/07/te...gy/07hdtv.html





Everything You Ever Wanted to Know About Video Codecs
David Field

Back in the Paleolithic age – just after man had discovered stone tools and how to load CD-ROMs into caddies – stunning pixelated video played back from our mighty 486s. In short, we have video codecs to thank for that and everything that evolved from it.
In the many years since that early time, video quality has increased thanks to ever-expanding storage capacities and processing power – the two building blocks of high quality digital video. At the same time we also developed a taste for better quality from physical media and video, with a bitrate small enough to be streamed over our measly bandwidth limits.

All codecs (a contraction of code/decode), whether they be for video, audio or some other type of data, exist to change a long bit series into a shorter bit series and back again, or at least into something that closely resembles the original. This magic process is called ‘compression’ (or ‘decompression’ in the latter case).

It’s taken its sweet time, but high definition video is finally here in the form of HD-DVD and Blu-ray. Although they’re both a huge jump up from DVDs, there’s very little difference between the two formats: They provide 1920 x 1080 (or 1080p) resolution, have considerably more space and higher transfer speeds than DVDs and both use the same codecs to decrease the size of the original video so it can be shoehorned onto the disc.

If you are wondering why optical discs still need to use compression to hold a movie when they can now store anywhere from 15 to 50GB and transfer data at a minimum of 36Mb/s, ask this question instead: How much space do you need for true high definition video?

Movies in space
Here’s a fun and jaw-dropping fact about digital video: At a post-production house, an uncompressed two-hour film in digital cinema resolution and quality will clock in at about 12 terabytes, less 9 to 18 gigabytes for the accompanying 16 channels of 48 or 96kHz audio.

Some of this can be explained away when you consider digital cinema’s 4096 x 2160 (or 4K) resolution, but the data rate is still monstrous – far too high for commercial cinemas to read and project, let alone store. This is why digital films are perfectly – or ‘losslessly’ – compressed to no more than 500GB, resulting in visually identical footage that requires a bit of decoding processor muscle.

Even after you account for the drop in resolution from 4K to 1080p, it’s still clear that no consumer format has enough space to deliver this kind of perfectly reproduced image quality. And that’s just the film – we haven’t even thought about the space needed for the extra features we’ve come to expect from our discs yet. This is where ‘lossy’ codecs come into play. They’re much more complex than lossless codecs, and we’ll examine them after we’ve looked at the basics of compression.

Slice and dice
Compression in general exploits patterns that exist in data sequences. If lengthy patterns can be replaced with a more concise placeholder, the sequence will become smaller without any information being lost.

If you’re thinking of ZIP and RAR files right now, you’re on the right track. Conceptually, lossless video codecs resemble a RAR archiver designed for video. There’s a hard limit on how much data you can remove, which is governed by the laws of information entropy. To sidestep these hard mathematical limits, we have to be prepared to sacrifice some data first.

Lossy codecs not only use straight compression, they exploit the way we perceive video and the way it is constructed. They predict what will happen from one frame to the next, then deliberately leave data out, then take a mathematical guess at what to fill in the blank spaces with later on. It sounds scary, but in practice all they do is throw away information from the picture that is hard for your eyes to perceive and easy for your brain to miss.

What’s in a frame?
At the most basic level, a video is just a series of images (in this case, frames) displayed one after the other at a constant rate. The rate determines the look and smoothness of the video; 24fps for a movie, 25fps for PAL and 29.97fps for NTSC.

Like a bitmap, every frame of video is made up of a grid of pixels arranged along the X and Y axes. Think of a video as thousands of frames positioned sequentially down the Z axis that are displayed one at a time, every 1/24, 1/25 or 1/30 of a second. Video sequences differ slightly from computer images as the pixels aren’t made up of RGB values – they are stored in a YCrCb colour space. This meshes a full resolution greyscale (luma, or Y) layer with two layers of colour (chroma, or the red component Cr and the blue component Cb).

Generally, video contains a full resolution luma image and half resolution chroma images, which are scaled up and layered over the full resolution luma image. This effectively colours in four pixels of a detailed greyscale image with one pixel of colour. The technique is called chroma subsampling, and it works because our eyes are much more sensitive to the brightness of a signal than its colour. This little biological quirk not only came in handy when colour was added to the first black and white TV signals, but it’s also used to reduce the bandwidth of a video stream.

All MPEG formats use 4:2:0 chroma subsampling to halve the video bandwith of a high quality master source. Not only is it very hard to tell the difference between a half bandwidth 4:2:0 signal and a full bandwidth 4:4:4 signal, material encoded with any MPEG codec (which encompasses most of what we watch) is subsampled at 4:2:0. You literally won’t know what you’re missing unless you see a film shot and projected digitally with fearsome gear like the Arriflex D20 and Sony’s Cinealta projector.

And yes, we’re purposely sweeping the whole film thing under the rug.

The Moving Picture Experts Group, or MPEG, is easily the biggest player in the lossy video codec game. It’s been around for the last 18 years, has a lot of imitators and a legacy of codecs used in all facets of the industry. MPEG-1 drove VCDs. MPEG-2 drove DVDs. If it hasn’t already, MP3 should win the award for the most publicly recognisable IT acronym in the world.

The MPEG-4 specification is more of a container standard than a codec. It’s comprised of 23 parts, not all of which are dedicated to video. Part 2 is the standard video codec – the same compression scheme that both DivX and XviD are based on. Part 10 is a more advanced video codec – known formally as H.264/MPEG-4 AVC. H.264 is one of the three codecs that drives both HD-DVD and Blu-ray.

Aside from throwing away half the colour information from a high quality master to save space, codecs (MPEG-based and others) use other techniques to approximate data from a video file before compressing it. Here are the most common techniques:

Spatial compression
Using a technique similar to that of JPEG to compress still images, the size of a single image can be reduced. This does reduce the image size, but not greatly, mostly relegating spatial compression to the domain of lossless codecs. It still serves a fairly major purpose in the process of lossy encoding though, as you’re about to find out.

Temporal compression
Apart from some epilepsy-inducing Japanese music clips, all video is continuous. From one frame to the next, most of the detail stays the same: Think of the background, the walls or, if he’s been cast, Keanu Reeves’ expression. Why waste precious storage space to store tens of thousands of images of Keanu Reeves if he looks exactly the same in 90 percent of them?

This is exactly what temporal compression does. A keyframe (known in the MPEG world as an I-frame) that contains all the important data is drawn, and in the following frames whatever doesn’t change is left out and filled in with data from the keyframe. Temporal compression literally means compression in time (as opposed to spatial compression, which is literally compression in space) and it can slice away massive amounts of data.

Keyframes are reference points in a movie made of a spatially compressed image that is used by subsequent frames to fill in parts of the image that stay the same from frame to frame, letting them be replicated instead of repeatedly encoded. As such, the best position for a keyframe in a sequence is when the sequence suddenly changes, such as a cut between a dim indoor game of cards and an outdoor shot of a car about to run into the house where said game is being played.

Motion compensation
Temporal compression has some limits, in that it doesn’t deal with camera pans very well. When an object moves from one location in a frame to another, the scene has to be updated even if the element itself doesn’t change. MPEG-4 introduced motion compensation, which uses vectors to push static elements around a frame in time instead of redrawing them.

Motion compensation and temporal compression are the keys to reducing data, and the reason why when you jump to a point in a video on an old machine it takes a second to play. The codec has to render the keyframe first then recreate all the frames between it, as well as the frame you requested.

Discrete Cosine Transformation
Although you’ll need a degree in computer science to fully understand it, the DCT is the heart of a lossy encoder. In short, it’s a process of approximating numbers with a degree of accuracy. During an encode, every number in a series is simply halved and the remainders thrown away. When it comes time to decode, they are doubled, resulting in values that closely resemble the original.

The technique works better on bright areas than dark ones, which is why compressed blacks don’t always look as smooth as their non-compressed counterparts, although codecs can control this.

Macroblocks
It’s inefficient, especially when video is stored in a YCrCb colour space, to refer to each pixel individually. Macroblocks are groups of (usually) 8 x 8 pixels that have their values converted to a formula. Because neighbouring pixels normally look very similar, the formula determines the average brightness of the pixels and how they change relative to the average value of the macroblock.

The quantisation matrix
Here’s another tricky concept deeply rooted in hardcore mathematics. Think of a quantisation matrix as a palette of values that controls how the pixels in a macroblock are converted from pixels to a formula. Modifying it modifies the way pixel information is thrown away.

Multipass encoding & variable bitrates
Thanks to the world of audio codecs, you should already be familiar with the concept of variable bitrates. In short, they let you open the bandwidth taps during the more visually intensive scenes and use less bandwidth for the more placid scenes.

Multipass encoding is an extension of this; it lets the codec plot where to position keyframes and how to allocate its bandwidth resources as the footage progresses.

New school

x264
Reverse-engineering industry standards is a great open source tradition, and x264 is the result of the video industry’s new wonder codec, H.264, being given the treatment. H.264 is a joint venture between the video arm of the telecommunications standardisation sector (think video-conferencing) and the Moving Picture Experts Group, and it’s encapsulated in the behemoth that is the MPEG-4 standard. It’s very different to and much more processor intensive than standard MPEG-4, which is why it’s used with HD-DVD and Blu-ray, some hard drive-based HD cameras and, perhaps most importantly, broadcasting.

Like H.264, x264’s strength lies in the way it treats macroblocks. It can work with standard 8 x 8 pixel macroblocks as well as 4 x 4 blocks and rectangular macroblocks if a frame is detailed enough to warrant it. It also supports cut detection for better I-frame placement and motion compensation. If you’re game, you can even toy with custom quantisation matrices. x264’s roots may be deeply entrenched in H.264’s heart, but its slight differences make it unsuitable for broadcast. We included it in our test because it’s better suited to PC-based archival and we already have a broadcast codec in the roundup.

WMV9
We couldn’t let Windows Media 9 slip underneath the radar for a few reasons. Its SMPTE-approved identical twin VC-1 is driving the images on HD-DVD and Blu-ray, and it uses the same fundamental coding mathematics (DCT) as MPEG without, er, ‘borrowing’ MPEG theory. One such technique involves using what are known as zig-zag tables to reorder the data into one of 13 preset patterns. One of these patterns will yield better compression.

WMV and VC-1 aren’t as demanding as x264 and H.264, but in comparison to the other codecs available, they’re both highly asymmetrical – they take a lot more time to encode something than decode it. They also need a lot of processing power to draw a series of frames based on the encoded data. This is why, when H.264 found its way onto the iPod in an effort to reduce the video file size but maintain the quality level, a dedicated decoder chip found its way into the circuitry to tackle the encoding.

Old school

DivX
Originally created from the ashes of an early build of a Microsoft MPEG-4 based codec, DivX has evolved into a container format and has developed a reasonably friendly user interface. It’s maintained in-house by DivX Networks, a company that earns a multi-million dollar crust by licensing out its codec for use in DVD players and providing a high quality alternative to YouTube.

XviD
Before DivX went commercial, it launched Project Mayo, an open(ish) source multimedia project. It was eventually scrapped, at which point some of the contributors to Project Mayo took their work and retooled it into XviD. It too is based on MPEG-4.

XviD uses global motion compensation to handle camera tilts and pans as well as quarter-pixel block motion compensation for movement of fine detail. It works best on two-pass encoding and is quite refined thanks to its popularity with users and project contributors.

Really old school

Cinepak
The geriatric of the bunch, Cinepak arrived on the scene in 1992, just after the dawn of QuickTime. Cinepak was the first non-Apple codec ever added to Apple’s multimedia framework, and in 1993 went on to be the first non-Microsoft codec to be added to Video for Windows – which predated DirectX and DirectShow. It was also responsible for FMV in early games, both on PCs and consoles like the Sega Saturn.

Unlike most DCT-based codecs, Cinepak uses the simpler vector quantisation combined with motion keyframes to reproduce blocky images, albeit with processor requirements from the early ‘90s. It works by dividing the image into sections and assigning each its own 256-colour palette. These sections are then subdivided into blocks of 4 x 4 pixels, which instead of being assigned colours are given references to a section’s colour palette and told how to assign colour to the pixels in the block.

Originally, it provided 320 x 240 video at bitrates within the reach of x1 CD-ROM drives, but has been improved since then. Although we’ve included it in out tests for reference, you’re crazy if you use it for anything serious.

It’s been well and truly eclipsed.

To The Labs!
We picked a few choice DVDs from our collection that we felt would provide the codecs with a good spectrum of different material to work with. We cropped out 40 frames, exported them as an uncompressed RGB sequence, then exported this with VirtualDub Mod into different codecs with different settings. And we did this over and over and over again. We used the default codec settings, but tweaked any choices between quality and render time to maximum quality, as well as setting all the codecs to two-pass variable bitrate with a specified target.

We wound up with three sequences encoded in 300, 700, 1500 and 3000Kb/s in five different codecs. DivX and XviD were chosen because the similarities in their lineage allow us to see the work of the open source movement pitted against proprietary software. Windows Media 9 (WMV9) is almost exactly the same as VC-1 – Microsoft’s HD-DVD/Blu-ray codec – only with more options. It’s not based on an MPEG standard either; so in it went. x264 (H.264’s open source equivalent) was thrown into the mix too, as it represents the new wave of computer-based open source codecs. Cinepak was added just for laughs and to see what a difference 15 years makes in codec land.

We dropped every encoded sequence back into VirtualDub and picked one frame that we felt demonstrated the encoder’s prowess, checked that none of the sequences used that particular frame as a keyframe and then exported the frame as an image. After all, we wanted to see what the encoders were doing, not what they were relying on.

One small caveat: The WMV encodes weren't done with VirtualDubMod; they were done with Adobe Premiere Pro 2. We also used Premiere to export the WMV frames used in the comparison tables.

Author's note: Good news everyone! I've just invented a lossless entropy encoded container into which I've put all the sample images I used over the course of writing this article. Although in reality I didn't invent it; it's just a *.RAR file. You can use it when you need a closer look at any of the full images that became these swashes which were originally printed in issue 77 of Atomic. Off you go!

Futurama
Most animation is quite simple. To cut down on the time it takes to draw an animation, movement generally changes every two frames. They contain large expanses of solid colour and constant backgrounds, but can also contain sections of complex CGI, like the doctor’s head in this example.

XviD handled backgrounds very well, but had a problem with edge definition at lower bitrates. It overcame these problems at 1500Kb/s, but struggled with gradients until 3000Kb/s, where it looked mostly flawless.

DivX was blockier than we were expecting when it was faced with high motion and low bitrates, but settled down quickly when given real world bandwidth to play with.

x264 produced total rubbish at 300Kb/s, but the jump in quality it produced when given 700Kb/s was astounding. Its variable macroblock size handled edges and the crazy outline around Fry better than any of the other codecs. Strangely, at high bandwidth, lines seemed soft and almost blurry – but this was masked purely by the colours and style if the animation.

It may not look like it from the stills, but WMV performed incredibly well at low bitrates, reproducing gradients at the cost of line definition.

The blockiness that we had come to expect at low bitrates wasn’t as pronounced as the other codecs, and like x264, it too produced a soft encode.

Firefly
Many codecs don’t do dark footage justice because of the way they approximate colour values. You can see this in low bitrate YouTube videos that have large black gradients that have clumped together. We also needed something to test close-ups to see how the codecs dealt with detail in a human face, and a bit of fire (on screen, anyway) never hurt anybody.

XviD crunched a lot of the details in the blacks out, especially at low bitrates. At 700Kb/s, ugly gradient smearing was still visible when all the other codecs had dealt with it. Skin detail was still pixelated at 3000Kb/s, but the rest of the image (especially outlines) looked great.

DivX fared better than XviD overall, showing less blockiness and better gradients, but still lacked the skin detail that we’d come to expect from it. From experience, this is less of a problem in brighter scenes.

x264 didn’t fare too well at low bitrates, but stepping up to 700Kb/s corrected most of its problems except for detailed skin gradients and low lighting; although it did render the torch nicely. At 3000Kb/s, all is forgiven – it looks the closest to the original.

WMV hid its low bitrate compression artefacts under softness. The reflections of the fire from the side of the doctor’s face look too static at low bitrates, but this gets better as we ramp up the bitrate. Not as good as x264, but better than XviD/DivX.

Ultra fine detail, such as the curly hairs on the man’s head (we’ve dubbed him Patoli) show the fundamental ways in which codecs deal with information. DivX smooths out the grain of the film, then blocks information together. XviD keeps the grain, but the macroblocks become speckled, which lowers the detail. x264 tries to approximate how the data clumps together and does a reasonably good job of injecting information back into these areas. WMV uses gradients to give the illusion of depth. And Cinepak, as expected, remains a speckled mess.

Troy
This scene is a real killer. At low bitrates, the people walking around on the sand turned into sprites drifting across the frame. A lot of the poor results have to do with the source – an MPEG-2 stream from a DVD that does produce fine details, but struggles to do it well.

DivX was awful at low bitrates, only showing fluid movement in the sails of the ship. At 700Kb/s only a bit of finely detailed movement was visible, but it only became remotely watchable at 1500Kb/s. It had its act together at 3000Kb/s but we still saw blocky edges around small details.

Although XviD smeared less than DivX at low bitrates and did contain some fine movement, it still lacked too much detail for our liking.

Only under x264 did the people seem to be moving. For a laugh, we encoded it at 150Kb/s with x264 and still saw movement, but sections of the frame (most of which were in the distance) were completely blurred out. At high bitrates, it won out, but only just.

WMV didn’t provide the kind of detail in low bitrates as x264, but at the top end details in the shore that x264 had blurred out were visible.

It didn’t render movement in the distance as well as X.264, but did an admirable job.

Examine the frames closely and you can see that at low bitrates, all the codecs (bar Cinepak) have simply blurred out the ships in the distance.

This is the best visual representation of what codecs do. In the words of Tyler Durden, they have the ability to let that which does not matter truly slide.

Conclusion
We’ve covered a lot here but video technology is both a science and a black art beyond the scope of this Head to head – and one best approached with a degree in computer science. If you’re simply looking for a definitive answer as to what the best quality encoder is, you won’t find it here – or anywhere else for that matter. There is a chasm of optimisations you can specify during the encoding process that can vary the results dramatically, which is why we left all the options at their defaults.

Codecs work differently with the mathematics behind a certain visual style, and visual styles are as varied as the rows of tapes in the BBC’s archive are long. On top of this, the best encodes use the vast array of options available in a codec to fine tune its encoding mechanics and put it in harmony with the style of the source material.

So what you’ve read here is a primer, and what you’ve seen a guideline. If you see a characteristic you like from our tests, investigate. Run your own tests with the footage you normally work with. Become one with the options.

That is the way of the codec.
http://www.atomicmpc.com.au/article....=14&CIID=82898





Netflix Offers $1 Million Prize for a More Accurate System to Find What Online Movies Customers Want
Katie Hafner

Sometimes a good idea becomes a great one after it is set loose.

Last October, Netflix, the online movie rental service, announced that it would award $1 million to the first person or team who can devise a system that is 10 percent more accurate than the company's current system for recommending movies that customers would like.

About 18,000 teams from more than 150 countries - using ideas from machine learning, neural networks, collaborative filtering and data mining - have submitted more than 12,000 sets of guesses. And the improvement level to Netflix's rating system is now at 7.42 percent.

The competition is "three-quarters of the way there in three-quarters of a year," said Reed Hastings, the chairman and chief executive of Netflix, based in Los Gatos, California.

The race is very close, with no consistent front-runner. Each contestant is given a set of data from which three million predictions are made about how certain users rated certain movies. Netflix compares that list with the actual ratings and generates a score.

For several months, a team from the University of Toronto was in the lead, but a group from the Budapest University of Technology and Economics, calling themselves Team Gravity, surpassed the Canadians in January and remains in front.

Jim Bennett, vice president of recommendation systems at Netflix, said he knew little about the Hungarians but noted that they have a knack for pulling ahead.

"These guys, especially that team, they're deep into it," Bennett said. "Toronto would get slightly ahead of Gravity, and within hours, Gravity would make the next submission that would be just beyond them."

The entries have sometimes arrived when it was the middle of the night in Hungary, Bennett said.

Domonkos Tikk, a data mining expert who is a senior researcher at the university in Budapest, leads Team Gravity. He said that since October, his team, composed of three Ph.D. candidates and himself, has spent eight hours a day, seven days a week on the problem.

"One of the reasons of our current leading position is that we keep on trying to implement new tricks and ideas, and a reasonable portion of them works," he said.

The contest has also generated several academic papers, Bennett said. It has turned out to be more exciting than officials expected.

"It sits for the longest time and you think, 'Gee, maybe it's over,' " Bennett said. "And then - bam - someone takes it to the next step."

If no one wins within a year, Netflix will award $50,000 to the team that makes the most progress, and it will award the same amount each year until someone reaches the goal.
http://www.iht.com/articles/2007/06/...ss/netflix.php





Sony Cuts Price on New Blu-Ray Player
Peter Svensson

With dominance of the market for high-definition movie discs still up in the air, Sony said Monday it is including a small surprise with the new Blu-ray disc player it is shipping this week: a price tag $100 lower than previously announced.

When Sony announced the BDP-S300 player in February, it put the price at $599, but it has now set a list price at $499.

That means the new player costs half of what the company's first Blu-ray player cost when it launched just six months ago — probably one of the fastest price declines in the consumer electronics industry. The new player has essentially the same capabilities as the older BDP-S1 but is smaller.

The price cut is due to falling production costs and the growing demand for Blu-ray products, according to Chris Fawcett, vice president of Sony Electronics' home products division.

Sony has been undersold in the market for high-definition disc players by Toshiba, which created the rival HD DVD format. Its players are now selling for less than $300, 14 months after Toshiba's first player appeared in U.S. stores.

Neither Blu-ray nor HD DVD players have caught on strongly with consumers, who have been waiting for the market to settle on one of the formats. But dropping prices for players and HDTV sets in more homes mean a big showdown between the discs may be looming this holiday season.

Hollywood studios are split on the issue, but Blu-ray has the strongest support.

Most people buying Blu-ray discs are apparently buying them for their Sony PlayStation 3 game consoles. The cheapest version of the console costs $499, but its game-oriented wireless controller and relatively loud fan makes it a less than ideal movie player.
http://www.usatoday.com/tech/product...rice-cut_N.htm





As Music Labels Struggle, Bands Thrive in Games
Lisa Baertlein

It is a dark time for record labels and mainstream radio, but the people who pick music for video games say there has never been a better time to be an aspiring rock star.

"There are more opportunities than ever before. I would much rather be a young band right now than 10 years ago," said Steve Schnur, referring to a time when record companies and radio station owners held the keys to what got heard.

The worldwide executive of music at Electronic Arts Inc., which is the biggest video game publisher, put a once unknown Southern California band called Avenged Sevenfold in multiple games including EA's "Need for Speed: Most Wanted" racing game and its perennially popular "Madden" football game, which is considered prime real estate.

The band, also known as A7X, has since gotten a Warner Bros Records contract and its songs are now familiar to millions of gamers.

Scottish indie rock band Franz Ferdinand crossed the pond, winning U.S. fans after its music was in games like "Madden NFL 2005," soccer game "FIFA 2005" and racing title "Burnout 3: Takedown," said Schnur, who also led the music selection in "NBA Live 2003" -- the only video game soundtrack to go platinum.

"We're a new medium that delivers music in a new and interesting way," said Alex Hackford, artist and repertoire manager for Sony Computer Entertainment America.

Hackford has worked with bands in all stages of development, including Stab the Matador, a young band from upstate New York.

He put them in baseball game "MLB 06: The Show." From there, he said, the band got a booking agent and a national tour.

"You have almost a completely level playing field," said Hackford.

These days, artists market themselves on the Internet from their bedrooms or depend on a Madison Avenue marketing firm to get the word out.

"If you're entrepreneurial, you can do it yourself," Hackford said. "It's easy to give over control of your career to a multinational corporation and blame somebody when it doesn't go right. Really driven people aren't going to cede control," he said.

Music-based games such as Konami's various karaoke titles, Activision Inc.'s "Guitar Hero" and Sony's "SingStar" are also an outlet for established groups from the Rolling Stones and Queen to Lynyrd Skynyrd and Deep Purple.

Crooner Frank Sinatra, country star Johnny Cash and the Doors were headliners in Activision's "Tony Hawk Underground 2."

"It really underscores the fact that there is no longer a magic bullet that sells a record," said Celia Hirschman, founder of Downtown Marketing, a music marketing consulting company in San Francisco.

Video games are a perfect way for consumers to discover new music and for bands, especially those of the post-modern punk, hip hop, funk and heavy metal variety, to reach their typically rabid fan base, she said.

"The music fit with the lifestyle of what they were selling in the game. It was a no-brainer," Hirschman said.

Nick Beard, bassist for Circa Survive, said having the band's music appear in a video game would be like fulfilling a childhood dream.

"I've been playing video games since I was 5. It would just be sweet," Beard said.
http://www.reuters.com/article/techn...29551120070607





Putting the We Back in Wii
Martin Fackler

If there is a secret to the smash success of Nintendo’s Wii video game console, it may be this: even the creative loner can benefit from having friends.

Nintendo is known for turning out hits with memorable characters like Donkey Kong and the Super Mario Bros., but it has had a reputation for cold-shouldering game software developers because it preferred to make both its hardware and software internally.
The company, based in Kyoto, Japan, certainly produced innovative designs like the GameCube or the touch-screen on the portable Nintendo DS, but it was perennially outclassed and outsold by the more powerful Sony game machines. Sony’s PlayStation 2 outsold the GameCube six to one.

Contrast that with the success of the Wii. The Wii and Sony’s technology-packed PlayStation 3 went on sale in the United States in November, a year after Microsoft rolled out its Xbox 360. As of the end of April, Nintendo has sold 2.5 million Wii consoles in the United States, almost double PlayStation 3’s sales of 1.3 million and closing in on Xbox 360’s 5.4 million sales, according to the NPD Group, a market research firm.

What changed? The secretive company is coming out of its shell. It has made a concerted effort to woo other makers of game software as part of a broader change in strategy to dominate the newest generation of video game consoles.

The new Nintendo surprised employees at the software maker Namco Bandai Games when during a routine meeting at Namco Bandai’s Tokyo headquarters a year and a half ago, Nintendo’s usually aloof executives made a sudden appeal for their support.

The Nintendo group had come to demonstrate a prototype of the Wii, which had not then been released. They handed Namco Bandai employees the unique wand-like controllers and as the developers tested a fly fishing game, the Nintendo team urged them to build game software for the console, listing arguments about why Wii would be a chance for both companies to make money.

“I had not seen that attitude from them before,” said Namco Bandai’s chief operating officer, Shin Unozawa, who was at the meeting. “Nintendo was suddenly reaching out to independent developers.”

With its new approach, Nintendo hopes to avoid the disappointments of its previous home game console, GameCube, which placed a distant third in the United States against Sony’s PlayStation 2 and the Xbox of Microsoft, say analysts and game developers. It also promises to change the famously secretive corporate culture of Nintendo, though only slightly; Nintendo refused repeated requests for interviews with its executives.

Nintendo’s new strategy is two-pronged. Making the Wii cheaper and easier to play than its rivals attracts a broader range of new customers, including people who never bought a game machine before. With Wii, Nintendo has avoided one mistake it made with GameCube, which was competing with its wealthier rivals on expensive technology-driven performance. While Wii lacks the speed and graphics of PlayStation 3 and Xbox 360, Wii sets itself apart with novel ideas like its wireless motion-sensor controller that gets game players off the couch and jumping around.

The other thrust of Nintendo’s new strategy is to enlist software developers like Namco Bandai to write more games for Wii than they did for previous Nintendo machines. Nintendo’s hope is that this will help erase one of Sony’s biggest past advantages: the far greater number of game titles available for its machines. The more games a machine has, the industry theory holds, the more gamers want to play it.

In March, Nintendo’s star game designer, Shigeru Miyamoto, even goaded software companies to devote their top people to developing games for Wii. That is a big change from Nintendo’s previous strategy, which was to write most of its own software. Game developers say Nintendo has been more forthcoming with providing the permissions and codes needed to write games for its consoles.

“The relationship is warmer and more active than before,” said Jeff Brown, the spokesman for Electronic Arts, the giant game developer based in Redwood City, Calif. The push appears to be bringing results. Analysts say one reason for Wii’s popularity has been its larger number of available game titles. At present, there are 58 games on sale in the United States for Wii, versus 46 for PlayStation 3, according to the Sony and Nintendo Web sites. That is a huge contrast with the previous generation of game consoles: to date, PlayStation 2 has 1,467 titles, overwhelming GameCube’s 271 titles.

Nintendo, which was founded in 1889 as a maker of playing cards and made its first video game in 1975, is also opening up in other ways. In March, Nintendo announced that it had licensed its Super Mario Bros. characters to another software maker for the first time, signing a deal allowing Sega to use them in a sports game to appear ahead of the 2008 Beijing Olympics.

“Nintendo is determined not to repeat past mistakes,” said Masashi Morita, a games analyst at Okasan Securities in Tokyo. “It is taking a whole new approach with Wii.”

In Japan, the home market of Nintendo and Sony, Wii’s success has been even more striking than in the United States. Through the end of May, 2.49 million Wii consoles were sold, 50 percent more than the combined sales of the PS3 and the Xbox, according to Enterbrain, a market research firm in Tokyo. Aided by the Wii’s popularity, Nintendo’s net profit jumped 77 percent in the most recent fiscal year, ended March 31, from the year before to $1.47 billion, on sales of $8.13 billion. Its shares, traded in the United States as an American depository receipt, have doubled in the last year.

Wii’s success stands in marked contrast with Nintendo’s performance in the earlier generation of game consoles, when it shipped just 21.6 million GameCube machines worldwide compared with Sony’s total shipments of 117.9 million PlayStation 2s, according to Sony and Nintendo. Nintendo’s turnaround has been so startling that there is now talk of the end of the era of Sony’s dominance, with the more than $25 billion global game market now increasingly likely to be split more evenly among the three big rivals.

“Wii’s success shows that from now on, we are looking at a divided market,” said Yoichi Wada, chief executive of Square Enix, one of Japan’s biggest game developers. “We can no longer afford to focus our resources on writing games for just one manufacturer.”

While Square Enix made far more games for PlayStation 2 than for GameCube, it has been developing equal numbers for PlayStation 3 and Wii, the company said. It has so far announced plans to release three games for both new consoles, most of them variants of its popular Final Fantasy series.

The Wii’s simplicity is also the selling point for software makers. Mr. Wada said developers had been slower to write games for PlayStation 3 because of the greater complexity of the console’s main processor, the high-speed multi-core Cell Chip. He said PlayStation 3’s production delays had also made Sony slow to provide developers with the basic codes and software needed to write games for the new console.

At Namco Bandai, Mr. Unozawa said PlayStation 3 was so complex, with its faster speeds and more advanced graphics, that it might take 100 programmers a year to create a single game, at a cost of about $10 million. Creating a game for Wii costs only a third as much and requires only a third as many writers, he said.

But Mr. Unozawa also said Nintendo’s promotional visit in late 2005 helped make Namco Bandai more willing to write games for Wii. When he saw the Wii prototype, and then later saw a PlayStation 3 prototype, he and his colleagues decided the Wii might have more potential than the expensive and difficult-to-operate Sony machine.

“The Wii just looked more fun,” Mr. Unozawa said. “It changed our thinking.”

As a result, on the day Wii rolled out in Japan, Namco Bandai had three games ready for it, including a version of its Gundam robot combat game. By contrast, when PlayStation 3 came out, Namco Bandai had two games ready.

Mr. Unozawa said Nintendo’s more open and cooperative attitude also helped make Nintendo appear a little less intimidating. That helped lower what he and other game developers called one of the biggest hurdles in the past to creating software for Nintendo: fear of Nintendo itself. The company was so good at writing games for its consoles that few wanted to compete against it.

Now, game developers and analysts say, Nintendo is showing itself more willing to be a partner and not just a rival.

“Being cool toward other game developers didn’t work,” said Masayuki Otani, an analyst at Maruwa Securities in Tokyo. “Nintendo has learned that it pays to be friendly.”
http://www.nytimes.com/2007/06/08/te...8nintendo.html





He’s 9 Years Old and a Video-Game Circuit Star
Bruce Lambert

Victor M. De Leon III has been playing video games on the professional circuit for five years now, racking up thousands of dollars in prizes and endorsements at tournaments around the country. He has a national corporate sponsor, a publicist and a Web site, with 531 photos chronicling his career. A documentary filmmaker has been following him for months.

Victor weighs 56 pounds and likes to watch SpongeBob SquarePants at his home here on Long Island. He celebrated his 9th birthday last month with a trip to a carnival and a vanilla cake. He gets above-average marks in the third grade, where he recently drew a dragon for art class.

The appropriately named Victor — better known to cyber rivals and fans as Lil’ Poison — is thought to be the world’s youngest professional gamer; Guinness has called about listing him in its book of World Records. Starting on Friday, he is set to be among 2,500 competitors in the three-day Major League Gaming Pro Circuit Event at the Meadowlands in New Jersey, battling for titles like the titan on the Xbox game Halo 2 and prizes up to $20,000.

Asked what he thinks about the fuss over his virtual exploits, Victor shrugged with shy indifference. Pressed, he mumbled: “I don’t know. I didn’t think about it.”

What was it like to be featured by “60 Minutes” as one of “the seven most amazing youngsters”? Victor’s only reaction was that he “looked small” on television because he had grown a bit during the lag between the taping and the broadcast.

Victor’s aptitude for video games surfaced at age 2, as he begin mimicking his father’s play. Mr. De Leon, 31, who markets and sells warehouse equipment, was an early adopter himself, having started at 8 with such quaint games as Pac-Man.

But Halo is a violent, shoot-’em-up game, the type that has stirred much debate about effects on youngsters since the 1999 massacre at Columbine High School, where the killers were frequent players of the computer game Doom.

Many researchers caution that excessive gaming displaces exercise, socializing and creative play, and that video games like Halo can promote aggressive feelings and actions. “It’s not enough,” said Joanne Cantor, a professor emerita at the University of Wisconsin at Madison, for “a parent to just tell a child that the video violence is not real.”

Anna Akerman, a developmental psychologist at Adelphi University on Long Island who specializes in media and children, said that it was not that simple to disentangle cause and effect, and that some violent people might be drawn to gory games because they are already predisposed to violence.

To critics who suggest that he is ruining Victor’s childhood, Mr. De Leon shrugs like his son, and notes that when not training for a specific competition, his Xbox time averages about two hours a day. Away from the screen, he said, Victor is a typical third grader who likes to bike and swim and plays the violin.

“If they don’t live here, they don’t know what we do,” Mr. De Leon said at his home here. “I’m not overdoing it, and he’s not overdoing it.”

Although Mr. De Leon helps manage his son’s career and accompanies him to contests around the nation, he insisted he is not the digital version of the archetypal stage mother. Victor’s mother, Maribel De Leon, runs a day care center and shares custody with his father.

Before Victor enters a competition, his father said he always asks, “Do you want to do it?”

Mr. De Leon said he never pushed his son to play video games in the first place, but welcomed his interest. Mr. De Leon’s brother Gabriel, a Halo aficionado known online as Poison, also served as a mentor.

“He copied me, and he was real good,” the father recalled. “He liked to help me finish games and found glitches, which is pretty hard to do.”

Soon Victor bested his father. “He kind of passed me when he was 4,” Mr. De Leon said. “I just couldn’t keep up with him. I became sort of a coach, but every time I told him something, he’d say, ‘I know, Daddy.’”

That year, Victor joined a team with his father and two uncles at a New York Halo contest, winning fourth place. At age 5, he entered the Major League Games and ranked in its top 64 players internationally. By the time he was 7, Victor competed in Chicago against more than 550 contestants, placing second — behind Uncle Gabriel.

Besides prizes and product endorsements, Victor has a deal worth about $20,000 annually, plus expenses for trips to tournaments, from his sponsor, 1UP Network, a division of Ziff Davis Game Group, owners of gamer magazines and Web sites. Mr. De Leon declined to specify how much his son has accumulated, but said that it was almost enough to cover a private college education.

Matthew S. Bromberg, chief executive officer of Major League Gaming, one of several groups that sponsor competitions, said Victor had been a “phenomenon” for some time. But while Victor earns money for playing, he is not yet a full-fledged pro by the league’s strict definition, since he would have to rank higher — and be at least 15 years old.

Victor plays video games in the corner of the basement of his home. Dwarfed by a 60-inch video monitor, he settled into a big chair on Tuesday evening, barefoot and wearing a black jersey with Lil’ Poison emblazoned across the back. His gaze locked on the screen, his tiny thumbs jabbed away at the controller, causing virtual mayhem of gunfire, explosions, blood splatters and cyber corpses in the outer-space battle.

Mr. De Leon said he took care to use parental controls to block excessive gore and offensive language. “Our family, we’re very old fashioned,” he added, noting that they belong to the Baptist Church, “and there’s no cursing.”

The father said he also counseled Victor about what is real versus pretend. “You can’t jump off a building and come back to life, or reach out and stop a truck,” Mr. De Leon gave as examples.

Victor reaps some extras from his gaming career, like a side trip to Disneyland during a competition in Los Angeles, and a visit to a rodeo while in Texas — his favorite excursion.

Victor said he has no plans about what to do when he grows up. For now, he seems preoccupied with Star Wars toys, fried chicken, jujitsu, guitar music, basketball, his hamster and his dog, Rocky.

“I like to ride my bike every day,” he said. Asked if he ever gets bored with video games, he said, “Sometimes, yeah.”
http://www.nytimes.com/2007/06/07/nyregion/07gamer.html
JackSpratts is offline   Reply With Quote
Old 06-06-07, 07:39 AM   #2
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,016
Default

FBI Hunts Down "24" Pirate

Follows trail of accused uploader
Andrew Wallenstein

A television show that dramatizes federal investigations is now finding itself at the center of a real-life FBI probe into copyright infringement.

The FBI filed a criminal complaint Friday against a Chicago man for allegedly uploading four episodes of the hit series "24" to LiveDigital.com, a video hosting site, before their primetime broadcast. If convicted on a felony count, Jorge Romero, 24, could face up to three years in prison.

The action represents a renewed aggressiveness to crack down on Internet bootleggers, particularly in the television industry, which has not been as vocal about anti-piracy activities as the music and movie businesses.

Romero is not suspected of stealing the "24" episodes from Fox; that individual is still at large, and neither Fox nor federal investigators has given up on trying to find the culprit.

20th Century Fox, which produces "24," issued a statement supporting the FBI investigation.

"We are grateful to the FBI and U.S. Attorney's offices in Los Angeles for aggressively pursuing this matter, and we hope it will serve as a powerful warning that uploading copyrighted TV shows and movies to the Internet can be a crime with significant penalties and will be prosecuted as such."

"The FBI makes this a different ball game," said Jay Cooper, an attorney at Greenberg Traurig who specializes in intellectual property issues. "The public doesn't seem to get that it's wrong, and maybe a message like this has to get out there so people realize there are criminal penalties."

The episodes in question were the first four episodes of the sixth season of "24," which aired over two consecutive days on Fox beginning Jan. 14. To give the season an additional marketing push, Fox also made the four episodes available via early DVD release on Jan. 16.

Sources indicate Fox execs were hoping that by finding the offender they could ultimately determine the source of the leak, which they suspected occurred somewhere along the distribution chain for the DVD release. Though the discs went to market only after the episodes aired in primetime, they had been shipped to retailers weeks before that airdate, which made them susceptible to bootleggers.

While the Internet is awash in pirated video content, it is rare for programs to find their way online before airdate. But eight days before the "24" TV premiere, Romero found the original file on a file-sharing service through Mininova.org, a bit torrent tracking site, according to the FBI affidavit.

Romero allegedly downloaded them from an illegal file-sharing service and subsequently uploaded them to LiveDigital, and also posted Web links to the pirated episodes on Digg.com.

Shortly after the episodes appeared on LiveDigital, Fox execs noticed the leak and moved to trace its origin. Both LiveDigital and YouTube were served subpoenas under the Digital Millennium Copyright Act demanding they disclose the identities of the users who uploaded the episodes, as well as past episodes of another Fox property, "The Simpsons." Both LiveDigital and YouTube complied with the subpoenas (HR, 1/25).

But as Fox pursued a civil action, the U.S. Attorney's Office in Los Angeles reached out to the studio in March and asked for its cooperation in building a criminal case.

In April, FBI agents obtained a search warrant and arrived at Romero's home, where they seized his computer. During an interview conducted on the premises, Romero admitted to agents that he had uploaded the episodes to LiveDigital.

In addition to information from LiveDigital and YouTube, the FBI was able to track down Romero with cooperation from Digg.com, where Romero posted links to the offending material, as well as Comcast Corp. and AT&T, the Internet service providers Romero used to access the Internet.

A second search is still under way to find a second offender who uploaded the same episodes to YouTube, said sources, and who is identified in the affidavit by the name "ecototal." Though parent company Google complied with a subpoena to disclose the identity of that user, it has not led to an arrest.

Had the FBI not intervened, sources said Fox likely would have brought a civil action against Romero, and still has legal grounds to do so. Piracy has always been an utmost cause of concern to parent company News Corp. In 2004, Fox broke up a movie piracy ring that emanated from its own studio.

Romero is expected to surrender at the U.S. District Courthouse in Chicago on Tuesday, when arrangements will be made for his travel to Los Angeles, according to Thom Mrozek, spokesman for the Department of Justice.
http://www.hollywoodreporter.com/hr/...83c279b046f860





YouTube Signs Broad Licensing Pact with EMI

Google Inc.'s YouTube has agreed to a deal with major music label EMI Group Plc to give users of the video-sharing site broad access to music videos by EMI artists.

The companies said Thursday that YouTube users would be allowed not only to watch and play authorized videos and recordings from EMI artists including Coldplay, Norah Jones and David Bowie, but also to incorporate elements of the videos in YouTube users' own "user generated content."

"With this deal, all four of the world's major music companies are now official YouTube partners," Chad Hurley, chief executive and co-founder of YouTube, said in a statement.

Following news of the deal, Google's shares rose 1.5 percent to $506, the first time they have broken $500 in five months. EMI shares were little changed, down 0.09 percent at 275 pence.

The deal follows copyright lawsuits filed by media companies that accuse YouTube of allowing its users to pirate their programs on the popular video sharing site.

Though YouTube has had talks with media companies, they have not all been convinced by its claims that the site will be able to efficiently identify and remove illegally uploaded video clips by its users. In March, Viacom Inc. filed a $1 billion copyright suit against Google.

London-based EMI, the No. 3 music company, is the last of the four major record companies to sign a deal with YouTube. The statement from the two companies said EMI will use the YouTube content management system to help the music company track its content and pay its artists. No financial terms were disclosed.

Last year, Warner Music Group Corp., Universal Music Group and Sony BMG Entertainment each signed a content deal with YouTube. As part of the agreements each music company took a small stake in YouTube, prior to it being bought by Google, according to sources familiar with the talks.

(Additional reporting by Yinka Adegoke in New York)
http://www.reuters.com/article/indus...20053420070603





Entertaining TV Programs Make You Eat, Study Finds
Jennifer Kwan

People eat more when they are glued to the television, and the more entertaining the program, the more they eat, according to research presented on Saturday.

It seems that distracted brains do not notice what the mouth is doing, said Dr. Alan Hirsch, neurological director of the Smell and Taste Treatment and Research Foundation in Chicago.

Hirsch explored the impact of smell, taste and eating behaviors while watching TV by measuring potato chip consumption.

Forty-five volunteers ate as many chips as they wanted during five-minute intervals over three-week periods while they watched monologues by late-night talk show hosts David Letterman and Jay Leno.

They also were given chips to eat when the television was off.

Hirsch found people ate an average of 44 percent more chips while watching Letterman and 42 percent more while viewing Leno, than when they did not watch TV.

"If you can concentrate on how the food tastes you'll eat less because you'll feel full faster," Hirsch said in an interview at the Endocrine Society's annual meeting in Toronto.

"So if that's the case, let's look at the opposite. What if you're distracted? If you're distracted, in theory, then you'd eat more."

Through his research at the foundation, Hirsch has helped people overcome the loss of sense and taste sensation, which typically results in weight gain because the brain does not know when it should stop eating.

The ventromedial nucleus in the hypothalamus, where the so-called satiety center is located, tells the body whether it is hungry or full. If it is inhibited or tricked, the result can be changes in eating patterns, he said.

"People who cook spaghetti all day don't fell like eating spaghetti at the end of the day," said Hirsch. "By being exposed to a smell all day long it's tricking the hypothalamus."

At each session, volunteers were asked to concentrate on the sensory characteristics of the food such as taste and smell. Researchers say these sensory clues, in addition to internal body changes, signal satiety.

But when distracted, a person does not pay attention to either the body's sensations of feeling full, or to the sensory characteristics of the food.

Many studies have linked obesity to watching television and that link is likely due to inactivity, Hirsch said. But perhaps entertaining shows are also contributing.

"If you want to lose weight, turn off the television or watch something boring," he said.
http://www.reuters.com/article/enter...34343720070603





When Are Photos Like Penny Stocks? When They Sell.
Eric A. Taub

Earn big money taking photographs in your spare time!

It sounds like a late-night TV come-on for a phony get-rich-quick scheme. But in this case, it might just be true.

Thanks to the Internet and digital cameras, thousands of semiprofessional photographers are now selling their shots through so-called microstock Web sites to customers around the world. But it’s not like the old days of stock photography — before 2000: the price that each shot fetches is not enough to buy a cup of coffee. Microstock Web sites have turned the pricing structure for picture licensing on its head.

Traditional photographic stock companies charge several hundred to several thousand dollars per image. Microstock prices can be as low as 25 cents, and payments to photographers are even lower, often not much more than pennies per sale.

But some photographers are making significant incomes from their pictures, making up in volume what they have lost in per-shot commissions. And that, in turn, is affecting the business of some mainstream professional photographers.

For small-business owners or others needing images, microstock sites can be an alternative to conventional stock agencies, which base fees on the published size of an image, circulation and other factors.

Microstock sites charge far less, and, with few exceptions, buyers pay a flat fee, no matter how large the image is or where it is used.

“Maybe a $300 photo for a pamphlet distributed to 300 people is not worth $300,” said Jon Oringer, the founder of Shutterstock (www.shutterstock.com), a four-year-old microstock agency.

Shutterstock customers, who pay a monthly subscription fee beginning at $199, can download up to 25 pictures a day of the site’s 1.8 million photos, at any resolution. For those who download the maximum, that amounts to 27 cents per shot. Shutterstock photographers are paid 25 cents for a purchased picture; the price rises to 30 cents once $500 worth of their work is bought.

In addition to Shutterstock, other microstock photo agencies include Big Stock Photo (bigstockphoto.com), Fotolia (fotolia.com), Dreamstime (dreamstime.com) and iStockphoto (istockphoto.com).

Each uses a different pricing and payment scheme; photographers have the option to upload the same pictures on multiple sites or, with some of the agencies, become an exclusive supplier for an increased commission. There is no fee to post photos on a microstock site.

Whether the varying approaches matter to customers and photographers is an open question. “The differences to consumers appear to be incremental,” said Bruce Livingstone, who founded an early microstock site, iStockphoto, in 2000.

Microstock sites do not accept all comers or all photographs. Each employs a team of inspectors who check every picture submitted for technical quality, as well as artistic and commercial merit.

Shots of dogs and cats are generally not welcome, while “lifestyle” photographs — pictures of people at work and play — are usually top sellers. Other subjects of interest include food, sports and fashion.

Getting photos accepted for a site is just one part of the battle. Potential buyers can find shots by browsing through a collection and its categories, or by searching using a keyword that describes what they want.

The photographer creates the keywords; most sites have no restrictions on how many, though Fotolia had to stop some photographers who were adding every keyword under the sun in the hopes that someone would stumble upon the shot.

Keeping one’s pictures confined to one site may not be a good idea, if the site attracts few customers, or becomes known for specializing in pictures of sheep while you are hoping to sell shots of toothpaste.

“We did not want to limit the ability of photographers to earn money,” said Tim Donahue, the founder of Big Stock Photo, which does not offer exclusivity.

Some photographers say exclusivity works. The same picture on multiple sites may have different prices. By being exclusive photographers can more easily trace those who might be misusing their work, either by using an image — on, say, a coffee mug — without buying rights to it or by stealing a concept they like, recreating a photograph and selling it as their own.

Those who are doing well selling their work on microstock sites have done their homework: they have figured out what type of photographs a site specializes in, what types of pictures sell and whether the commission is sufficient.

Lise Gagné of Quebec specializes in business shots, one of the most popular genres. Ms. Gagné, who has been shooting commercially for five years, earns more than $100,000 a year selling her work exclusively through iStockphoto.

“I like iStock’s sharing spirit,” Ms. Gagné said, referring to the extensive discussion groups and other client aides the site provides. “It’s a matter of being fair. You don’t have to go elsewhere.”

Because volume matters in microstock sales, a large number of shots must be uploaded. Ms. Gagné currently has 4,900 photographs available for sale on the site and adds 5 to 20 more each week.

Kelly Cline, a Seattle-based food photographer, has uploaded 1,363 images to iStockphoto, and her work has been bought 68,215 times. Significant payments began to arrive once she had 500 to 600 images in her portfolio, Ms. Cline said, adding, “If you upload more, it’s like shooting arrows in the air.”

Ms. Cline, a former food stylist, began shooting food four years ago. At first, she photographed her own work and then began uploading her material to iStockphoto.

Today, she said, she earns about $70,000 a year, 60 percent of her income, from microstock sales, and she remains an exclusive provider to iStockphoto.

But Stephen Coburn, a Web designer at Adobe Systems who began photography a few years ago as a hobby, said he would never use one microstock site exclusively. “I’d feel nervous about putting all my eggs in one basket,” he said.

Mr. Coburn supplies shots to five microstock sites, shooting people, objects and interiors. With 3,500 photos posted to the sites, he earns, on average, $6,000 per month.

Michael Shake, a tool-and-die maker in Toledo, Ohio, uploads pictures to 10 sites and earns $1,000 a month for his work. Specializing in shots of houses and new cars, he sells his work to real estate agents and car dealers looking for appropriate illustrations.

When a tire accessory manufacturer saw his work, he hired Mr. Shake to shoot an advertisement, shipping a tire to his home for the shot. “All I wanted was to earn enough money for new equipment,” Mr. Shake said. “It’s gone way past that.”

Not everyone is enamored with microstock Web sites. Professional photographers see the sites’ growth as diluting their own incomes.

“This is the death of beautiful photography,” said David Skernick, a professional photographer in Los Angeles who does not use the sites. Because of the low prices and large volumes of material, “now clients accept anything.”

Mr. Skernick has seen the value of his own work decrease, from a time when photographs were priced not just on their merit but on their intended use. He said he once sold a photograph that was used on a Brian Wilson album cover for $2,000. “Today I would get $2 for the same use,” he said.

Still, railing against the sites is about as useful as hoping cellphones will go away and phone booths will make a comeback.

“Every month, my income from microstock sales gets better,” Ms. Cline said. “You have to go with it or be left behind. Otherwise you’ll be saying, ‘Woe is me.’ ”
http://www.nytimes.com/2007/06/05/te...syndicate.html





Flickr Not Even Flickering in China

Internet photo site says service is being blocked and hopes it's only temporary
Verne Kopytoff,

The popular Internet photo site Flickr said that its service is being blocked in China, although the Yahoo subsidiary did not directly blame the Beijing government, which aggressively censors the Internet of material it deems subversive.

The blocking, which began Thursday, is keeping Internet users across a large part of China from viewing photos on Flickr, home to millions of snapshots of everything from birthday parties to beach vacations to nudes.

The Web site also hosts a smattering of images that may be frowned upon by Chinese censors, including student protesters in Tiananmen Square in 1989, which includes the famous photo of a man blocking the progress of Chinese army tanks, and bodies of students who were killed in the streets as part of a government crackdown.

China's tight control over the Internet has become a high-profile issue in recent years as the online world makes increasing inroads with its vast population. Authorities routinely block access to online information about political opposition groups, Taiwanese independence and overseas Web sites such as BBC News, prompting outrage from human rights advocates.

U.S. Internet companies have been caught in the middle, forced to weigh free expression against building their businesses in a potentially lucrative market. Mountain View's Google and Sunnyvale's Yahoo have faced intense criticism for their positions, which have included censoring search results and providing information about dissidents to police.

In postings on its Web site Thursday, Flickr said it was experiencing no technical problems and that its service was in fact being blocked, without saying by whom. In an update Friday, co-founder Stewart Butterfield wrote that the Web site's staff is checking on the issue periodically and that the blocking continues.

"We hope that this is a temporary issue, and we currently believe that it will be," he said in the posting. "In the meantime, we are investigating our alternatives."

Telephone and e-mail messages left with Butterfield and a Yahoo spokesman were not returned.

Users from across China posted messages on Flickr describing difficulties accessing images on the Web site, voicing frustration and laying blame on the Chinese government. Access to the Flickr home page and comments area is still apparently possible in China.

Jain Hua Li, a spokesman for the Chinese Embassy in Washington, said he hadn't heard of Flickr until told about it in a conversation with a Chronicle reporter, and then suggested that the blocking may be because Chinese authorities are trying to protect children from racy images.

Lucie Morillon, the U.S. representative for Reporters Without Borders, a French group that promotes free expression, said that the Beijing government often censors Web sites under the guise of protecting children or national security. She called the blocking of Flickr "one more blow against the free flow of information online by Chinese authorities" and added that it is particularly lamentable in light of promises by China to loosen restrictions before the 2008 Olympics in Beijing.
http://sfgate.com/cgi-bin/article.cg...UG9VQC8QE1.DTL





Japan Picture Book, 3: Non-Commercial CC Licenses, But What Does It Mean?
Olivier Oosterbaan

When licensing-out content under a Creative Commons license, one of the options available is to only allow “Non-Commercial” (NC) use of your works under the CC license, the opposite being that you allow commercial use under the CC license. But what does Non-Commercial mean? Both when using Creative Commons Non-Commercial licensed content, as when releasing original content under a Non-Commercial Creative Commons license, it makes sense to stop a moment and think about what Non-Commercial might mean, for you as creator, and for the licensor or licensee. What “Non-Commercial” might exactly mean is a question that has been asked before.

In this month’s post, TLC will take a look at what Non-Commercial, as one of the possible options of CC licenses, might mean, and how we are likely to apply it when looking for open content to use in the Japan photography book project. After explaining a little as to why and how we are looking at this question, we’ll see that the Creative Commons license itself, although concise on this point of Non-Commercial, possibly leaves room for interpretation. Next month, so as not to make this post too long, we will explore how the explanations as given by Creative Commons, as the license stewards, and by others, although all very helpful, do not seem to completely eliminate the gray areas present. Finally, given that there is some amount of (legal) uncertainty as to what non-commercial might mean, we will briefly look at how parties deal with the ambiguity in the NC clause of CC licenses, namely by checking and asking, thereby adding to the transaction costs of using Creative Commons licensed material.

Why and When is This Question Relevant?

First, a few words on why TLC stops to look at the meaning of Non-Commercial, as used in Creative Commons licenses, in the context of the Japan photography book project. First, in the book, pictures sourced from third-party sources will likely be used in the background design, in true digital DIY fashion, even where my own pictures are the main focus. Second, I am likely to use a print-on-demand (PoD) service for production and distribution, which means that at one point the book will be available through a public Internet market place, although I will most likely not make any money of it. (One of the main reasons this project came about is that iPhoto books and similar services allow for limited design freedom and become expensive quickly when above the standard number of pages. All I wanted were some cheap and nice looking books to give away ^^.)

So, as I am looking to incorporate content from others into a work that is to be made publicly available at a fee, it becomes relevant whether I should look only to use pictures of which the Creative Commons license allows for commercial use, or whether, since I am not likely to make any money of the book and it is in fact not my purpose or intent to make money of the book, I can also use images that use a Non-Commercial Creative Commons license. Important to note here is that more works are licensed under NC clauses; perhaps because it is sometimes the default for content hosting services that offer the option of applying a CC license.

Thus, when making a book incorporating Creative Commons licensed works available via a public Internet store front, would I be allowed to use works licensed under Non-Commercial Creative Commons terms? (What also comes into play is that my intention was to offer the entire book design, and my own pictures in it under a NC license, in which case I had to make sure that I could also include NC licensed work from others. And, as I might be making derivative works, I might have to share the results alike if source material were license under a share-alike (SA) license; but that is another question.)

What the License Says: Intent and Direction

The human-readable, or short, explanation of the Non-Commercial attribute (in this case, as part of the BY-NC 3.0 license) that Creative Commons gives is:

Noncommercial. You may not use this work for commercial purposes.

The actual license, or the non-human/lawyer readable code, says under 4.b that you may use the licensed work:

[…] in any manner that is primarily intended [emph. added] for or directed toward commercial advantage [emph. added] or private monetary compensation [emph. added]. The exchange of the Work for other copyrighted works by means of digital file-sharing or otherwise shall not be considered to be intended for or directed toward commercial advantage or private monetary compensation, provided there is no payment of any monetary compensation in connection with the exchange of copyrighted works.

The explanation of Creative Commons, when picking a license, says:

The licensor permits others to copy, distribute and transmit the work. In return, licensees may not use the work for commercial purposes — unless they get the licensor’s permission.

And in the FAQ, under “Can I still make money from a work I make available under a Creative Commons license?“:

However, you, the creator of the work and/or licensor, may at any time decide to use it commercially. People who want to copy or adapt your work, “primarily for monetary compensation or financial gain” must get your separate permission first.

One thing to note on the noncommercial provision: under current U.S. law, file-sharing or the trading of works online is considered a commercial use — even if no money changes hands. Because we believe that file-sharing, used properly, is a powerful tool for distribution and education, all Creative Commons licenses contain a special exception for file-sharing. The trading of works online is not a commercial use, under our documents, provided it is not done for monetary gain.

That is it for the source material. Now what do people think this means?

Next Month: What the License Stewards and Others Say, and How To Apply It All in a Practical Manner

So as not to let this post run too long, next month we will take a look at what the CC license stewards, such as (former) Creative Commons General Counsel Mia Garlick, had to say on the matter, whether or not others agree with their point of view, and how people are dealing with the existing uncertainty on this point in practice. We’ll see how, in part, the way to deal with the license ambiguity is to ask for explicit permission to use a work in a particular context. In my opinion, this takes away one of the main (intended) benefits) of CC license, namely semi-automated (and machine readable and possibly machine enforceable) licenses. Until next month!
http://tlc.oosterbaan.net/2007/japan...-does-it-mean/





Jack Valenti’s Memoir Suffers Without a Key Salesman
David M. Halbfinger

Jack Valenti’s death has created a marketing problem that would have challenged even him.

Mr. Valenti, a onetime Houston advertising man who became a confidant of President Lyndon B. Johnson and then, for nearly four decades, Hollywood’s spokesman as chairman of the Motion Picture Association of America, died on April 26, just weeks before the release of his new memoir. Now his publisher, Harmony Books, and his survivors are struggling to ensure that the autobiography gets a modicum of the attention it would have received had Mr. Valenti, a singular raconteur, been around to talk it up himself.
Shaye Areheart, vice president and publisher of Harmony, an imprint of the Crown Publishing Group, said she last saw Mr. Valenti in February, when the two met to go over a second set of revisions and plans for promoting the book, “This Time, This Place: My Life in War, the White House and Hollywood.”

“He was like a kid in a candy shop,” Ms. Areheart said of the 85-year-old Mr. Valenti. “We had so much lined up for him: the ‘Today’ show. Don Imus, before he fell from grace. Larry King. NPR. CBS and Fox News. Everyone was so drawn to Jack, and he had so many stories to tell.”

Mr. Valenti had arranged much of the publicity himself, Ms. Areheart said. “We mentioned ‘Regis and Kelly,’ and he said he’d call Regis Philbin. He said he’d contact Les Moonves, Bob Wright, Roger Ailes. He could make a phone call and get straight to the top.”

Mr. Valenti, the master networker, had also arranged to be celebrated by his friends among the rich and powerful at book parties in New York (given by Barry Diller), Washington (Dan Glickman, Mr. Valenti’s successor at the Motion Picture Association, and Franco Nuschese, owner of the Georgetown power spot Café Milano), and Los Angeles (Kirk Douglas, Mr. Valenti’s closest Hollywood friend, and Robert A. Day Jr., founder of Trust Company of the West).

But his death left Harmony in a costly, and awkward, bind. The book was the imprint’s lead summer title, with an initial printing of 100,000 copies, and Harmony had bought front-of-store display space in the major booksellers for the two weeks before Father’s Day. “We had an enormous investment in Jack,” Ms. Areheart said. She would not disclose what he had been paid, but called it a “significant advance.”

Harmony sought to capitalize on the coverage of Mr. Valenti’s death by shipping the book to retailers early, to go on sale May 15, three weeks before the scheduled on-sale date of June 5. Nielsen BookScan said only 1,000 copies had been sold through June 3 — a grim indication, since the first sales are often the strongest. (BookScan captures about 70 percent of book sales.) But confusion over the correct day to display the title could have made those early numbers less predictive, some industry executives speculated.

Many books are published posthumously of course, like David Halberstam’s book on the Korean War, due this fall. This is not the first time an author’s death has created a publisher’s nightmare: In 1992 Sam Walton, the billionaire founder of Wal-Mart, died after having signed a $4 million contract with Doubleday for his memoirs. And Virginia Clinton Kelley, President Clinton’s mother, died in 1994 four months before her memoir was to be published. Mr. Walton’s book, written with John Huey, became a best seller anyway; Ms. Kelley’s did not.

Mr. Valenti’s book recounts his bootstraps rise from modest means in Houston; his bombing runs as a World War II pilot; his place in the motorcade when President John F. Kennedy was shot; his close relationship with Johnson; and his tenure in Hollywood as a starry-eyed but fierce advocate. It includes little that is newsworthy — no salacious anecdotes or score-settling barbs, which comes as no surprise, given Mr. Valenti’s reputation for seldom speaking ill of anyone. What it had to grab attention, in a word, was him, and he’d promised to devote all of June and July to publicizing the book.

In his absence Ms. Areheart has been working with Mr. Valenti’s daughter, Courtenay, a movie executive at Warner Brothers, to line up surrogates from among her father’s friends in Washington and Hollywood, something she said was a welcome distraction from her own grieving. So far, a Harmony publicist said, “Today” has agreed to interview Ms. Valenti and her mother, Mary Margaret, and “Tavis Smiley” on PBS has invited Sherry Lansing, the former Paramount chairwoman, to talk about Mr. Valenti, but no other spots have been confirmed.

“It’s awkward,” Ms. Valenti said. “For a lot of these different outlets, it’s harder for them to make the show interesting. We know that talking to us is not what people want.” She added that no celebrity or politician would be able to do justice to the full sweep of her father’s life. “We’re all dealing with the reality that the best salesperson for the book was Daddy.”

Ms. Valenti, meanwhile, was able to prevail upon one very famous friend of her father’s, Michael Douglas, to stand in for him in the audio version of “This Time, This Place.” (Mr. Valenti suffered a stroke a week before he was to begin recording the audio version in March.)

“I’m in the movie business, so I know what it is to ask somebody to do something like that, knowing how busy he is, and how long it takes to do,” Ms. Valenti said. It took Mr. Douglas three days. “But Michael, without batting an eye, said: ‘Don’t give it another thought. I’ll do it immediately.’ ”

Ms. Areheart said she regretted allowing Mr. Valenti to delay publication several times as he dredged up fond memories and thought up new chapters. “I kept saying, ‘Jack, let it go,’ ” she said. If she’d only stuck to a March date, she said, “he’d have been able to enjoy it.”
http://www.nytimes.com/2007/06/07/books/07vale.html





Waxing Philosophical, Booksellers Face the Digital
Motoko Rich

John Updike would not be pleased.

A year ago that literary lion elicited a standing ovation in a banquet hall full of booksellers when he exhorted them to “defend your lonely forts” against a digital future of free book downloads and snippets of text. But this year, at BookExpo America, the publishing industry’s annual convention that ended yesterday, the battering ram of technology was back.

Chris Anderson, the editor of Wired magazine who made his own splash last year with his book “The Long Tail: Why the Future of Business is Selling Less of More,” returned to the convention to talk about the possibility of giving away online his next book — which he fittingly intends to title “Free” — to readers who were willing to read it with advertisements interspersed throughout its pages. (He still intends to sell the book traditionally to readers who’d rather get their text without the ads.)

Google and Microsoft both had large presences at the expo at the Jacob K. Javits Convention Center in New York, where about 35,000 publishers, booksellers, authors, agents and librarians attended the four-day carnival of promotion for the all-important fall lineup of titles. A panel sponsored by MySpace.com, the social networking site, drew a standing-room-only crowd, as did another discussion on the influence of literary blogs. Vendors offering to digitize books proliferated.

There were also the usual flashy parties, giveaways and autograph signings at the convention, which is not open to the public. Celebrities sold out $35-a-head breakfasts and lunches (Stephen Colbert, Alan Alda and Rosie O’Donnell all had books to hawk), and impersonators stalked the exhibition hall. (Elton John, Borat and a twinkling star who could be mistaken for a banana with arms were all sighted.) And publishers and booksellers attempted to figure out the Next Great Book (popular galleys included Denis Johnson’s “Tree of Smoke,” Alice Sebold’s “The Almost Moon” and “Loving Frank,” a debut novel by Nancy Horan.)

But in what has become another rite of the BookExpo in recent years, the industry continued to grapple with its evolving techno-future with a mixture of enthusiasm, anxiety and a whiff of desperation.

“I think there is going to be a lot of sturm and drang before we figure this out,” said Eamon Dolan, editor in chief of Houghton Mifflin. “There is a huge undertaking ahead. It is going to be rocky.”

Many of the independent booksellers, who have been buffeted by technological change for years, seemed quite philosophical about the need to move forward. Clark Kepler, president of Kepler’s Books and Magazines, an independent store in Menlo Park, Calif., visited a booth for a company that scans books and digitizes them, a technology that, on the face of it, would seem incompatible with a physical bookstore’s mission.

“In terms of the traditional bookstore it would not be good for us,” acknowledged Mr. Kepler, whose store closed its doors nearly two years ago because of financial problems set off in part by fierce competition from online retailers like Amazon.com. He was able to reopen shortly afterward when venture capitalists from Silicon Valley and other community members invested in the store. “But ultimately I think it is good for all of us as readers and seekers of knowledge to have that information available, so as a bookseller I need to rethink my position instead of saying, ‘I wish the world would stand still,’ ” he said.

In a pavilion outside the main exhibit hall Jason Epstein, the former editorial director of Random House and the creator of the Anchor Books paperback imprint, and Dane Neller, founders of OnDemandBooks.com, demonstrated their Espresso Book Machine, which can print a small paperback book on site in less than five minutes. “This could replace the entire supply chain that has been in existence since Gutenberg,” Mr. Epstein said.

Chris Morrow, whose parents founded Northshire Bookstore in Manchester Center, Vt., three decades ago, said he would be installing one of the machines. He said he planned to print local histories and Northshire-brand titles from the public domain, like “Middlemarch” or “Moby-Dick.”

“There are lots of challenges in bricks-and-mortar book selling, and I see this as a way of expanding our business,” Mr. Morrow said.

The idea that technology could enlarge, rather than replace, existing sales intrigued David Shanks, chief executive of Penguin Group (USA). “There are millions of gadgets out there where we could sell a lot of product digitally,” said Mr. Shanks, before turning his attention to the keynote address by Alan Greenspan, the former Federal Reserve chairman, who appeared with his wife, the NBC correspondent Andrea Mitchell, to promote Mr. Greenspan’s forthcoming memoir, “The Age of Turbulence.” (Penguin is hoping to sell a lot of copies of the book — in whatever form — to recover the $8.5 million advance it is paying Mr. Greenspan.)

Other uses of technology provoked unease. At a dinner party given by Alfred A. Knopf for some of its authors, Vivien Jennings, president of Rainy Day Books in Fairway, Kan., railed against authors who link from their Web pages to Amazon.com or even sell autographed copies of their books directly to consumers. “We host a lot of book signings,” Ms. Jennings said. Authors who sell their own books “are particularly hurtful to us.”

Tina Brown, the former editor of both The New Yorker and Vanity Fair, who appeared at a lunch at the Modern to promote “The Diana Chronicles,” Ms. Brown’s book about Diana, Princess of Wales, was more concerned about the possibility that authors’ work could be offered free online.

“Giving an author’s book away for nothing on the Web as a way to market books seems a mirage to me,” Ms. Brown wrote in an e-mail message after the lunch. “All it does is feed the hungry angles of journalists and bloggers who plunder it without any of the author’s context or nuance and makes the reader feel there is nothing new to learn from the genuine article when it finally limps on its weary way to a book shop.” Although “The Diana Chronicles” will be excerpted in Vanity Fair, Ms. Brown pointed out that both the author and publisher are generally paid for such excerpts.

Back in the aisles of the exhibition floor Deal Safrit, a wiry bookseller from Salisbury, N.C., boasted of a well-worn method for coping with technological developments. “I don’t spend a lot of time worrying about it,” he said. “We just do what we can do well. We are determined to sell books that we think people should read.”
http://www.nytimes.com/2007/06/04/books/04book1.html





Book Publisher Resorts To Cheap Stunts: Steals Google Laptops
Mike Masnick

Just as Google is making it even more obvious how their book scanning project is helping publishers by helping them sell more books, it appears that at least one publisher doesn't seem to understand the difference between helping more people find your books and theft. Apparently the CEO of Macmillan Publishers decided to swipe two Google laptops from Google's booth at BookExpo America, wait for Google employees to notice the missing laptops (took about an hour) and then claim that he was just giving Google "a taste of their own medicine." Let's see. One is taking an expensive scarce item. The other is building an index so more people can find books. If Macmillan's CEO really thinks that's the same medicine, than someone ought to check what medication he's taking.
http://www.techdirt.com/articles/20070605/001005.shtml





Philip K. Dick: A Sage of the Future Whose Time Has Finally Come
Brent Staples

Philip K. Dick was still an obscure pulp novelist known mainly to teenage boys when a friend predicted that he would one day have more impact on the world than celebrated writers like William Faulkner, Norman Mailer and Kurt Vonnegut. The prediction seemed almost delusional in the 1960s, when Dick was popping pills around the clock and churning out novels in a science fiction ghetto from which he seemed destined never to escape.

He did get out, but only posthumously. And with his recent celebration as the sage of futurism, and his pervasiveness on bookshelves and in Hollywood, the early predictions about the growth of his influence have come to seem prescient.

Dick was largely unknown to the general public at the time of his death in 1982. Most of his novels and short stories were out of print and seemed destined to stay that way. Things began to change after his favorite and best written novel, “Do Androids Dream of Electric Sheep?,” was introduced to the country in the form of the now classic movie “Blade Runner.”

The plot deals with enslaved androids — “replicants” — who revolt in an attempt to claim free, human lives. Dick wrote about androids again and again, but generally thought of them as spiritually defective, and hazards to the real humans they were intended to serve.

The film struck a number of chords in the real world. Its vision of the polyglot, environmentally ruined Los Angeles spawned the phrase “Blade Runnerization” among urban planners who recognized it as a frighteningly likely vision of things to come. In recent years, movies based on Dick’s work —“Minority Report,” “A Scanner Darkly,” “Next” — have become a cottage industry in Hollywood. Numerous other projects, including a film based on his life, are said to be in the works.

The movie craze carried over into the book world, where publishers have pushed more than 30 of Dick’s novels and scores of his short stories back into print, this time with book covers and promotional material designed to appeal to mainstream readers. The rehabilitation hit a literary high note earlier this month, when the Library of America issued “Philip K. Dick: Four Novels of the 1960s,” which placed him in the company of Henry James, Saul Bellow, Faulkner and other heavyweights.

Dick wrote his share of bad novels, which is hardly surprising given that he wrote stoked up on drugs and suffered no end of paranoid delusions. His best books distinguish themselves from ordinary science fiction by focusing not on technology, but on the toll that technological advances often take on human values — and on the soul itself.

Dick died before the onset of the Internet age and never saw a BlackBerry, an iPod or a modern-day cellphone. Even so, the characters he created are routinely shackled and brought low by technological innovations that were ostensibly created to improve human existence. Dick was fully engaged in the science of cybernetics — which supposes a similarity between machine and human functioning — and deeply alarmed about what he saw as the encroachment of programmable machinery into human life.

His writing was shaped by the legitimate worry that human beings were merging with the technology that was supposed to be serving them and becoming less human (which is to say, more machine-like) in the bargain.

Androids in much of science fiction are cast as entertaining house pets. Dick’s androids are sinister and potentially dangerous, because they lack the leavening spark of humanity. By creating them, he writes, we would produce a race of cold and detached beings who would share no more with their makers — or with other androids — than one coffee maker shares with another. Of these machines, he writes “their handshake is the grip of death, and their smile is the coldness of the grave.”

The science fiction writer’s job is to survey the future and report back to the rest of us. Dick took this role seriously. He spent his life writing in ardent defense of the human and warning against the perils that would flow from an uncritical embrace of technology. As his work becomes more popular, readers who know him only from the movies will find it even darker and more disturbing — and quite relevant to the technologically obsessed present.
http://www.nytimes.com/2007/06/08/opinion/08fri4.html





Shopper Used as 'Bait' in Upskirt Photo Sting Sues Store
AP

A woman who claims she was used as unknowing bait to catch a man taking photographs up women's skirts is suing retailer T.J. Maxx.

Svetlana Van Buren said store personnel surreptitiously videotaped a man taking photos up her skirt while she was shopping for coffee at the company's store in Watertown on June 14, 2006.

It was only after the man committed the crime that store personnel told her the photos had been taken and that the act was caught on tape, said Van Buren, a psychologist who was working at a state-run facility for youths at the time and now lives in Omaha, Neb. The lawsuit was filed Wednesday in the Jefferson County Clerk's office.

Officials at TJX Companies, Inc., of Framingham, Mass., which operates the T.J. Maxx chain, were not immediately available for comment.

The lawsuit contends that the store and law enforcement officials knew the man "secretly stalked" female customers for the purpose of taking upskirt photos, but did nothing to prevent it from happening to Van Buren.

T.J. Maxx should have used either a private female detective, a policewoman or a female employee who consented to being photographed to set a trap for the man, the lawsuit said.

Van Buren claims the incident has caused her physical and psychological pain, suffering and loss of enjoyment of life. She said she has experienced sleeplessness, anxiety, depression and feelings of stress and violation, prompting her to seek professional help.

She blames T.J. Maxx for, among other things, making her the victim of a crime without her consent and violating her privacy rights. She claims the store failed to provide her with a safe environment and failed to stop a crime from being committed against her when it could have.

Her suit does not specify an amount in damages being sought.

The lawsuit does not name Jeremiah Williams, a Watertown man who was arrested outside T.J. Maxx the same day Van Buren was photographed. Williams was sentenced in February to two to four years in state prison for second-degree unlawful surveillance. Police accused Williams of taking more than 700 upskirt photos of women in public places with plans to start an Internet business with the shots.
http://hosted.ap.org/dynamic/stories...EAST&TEMPLATE=





MySpace Seeks Advice in Sex Offender Investigation
Caroline McCarthy

MySpace.com filed a request Monday in a Pennsylvania state court asking for guidance as the social-networking service responds to demands for information about convicted sex offenders using the site.

In the request, which was filed in the Court of Common Pleas in Dauphin County, home to the state capital of Harrisburg, MySpace said it is actively seeking advice on how it can legally provide authorities with registered sex offenders' contact information.

MySpace came under fire last month when a group of state attorneys general, including Tom Corbett of Pennsylvania, wrote an open letter to the social-networking site demanding that it turn over data pertaining to registered sex offenders who have profiles on the site. MySpace initially refused, citing federal and state privacy laws, including the Electronic Communications Privacy Act (ECPA) of 1986, that the company said prevented it from releasing such information.

But two weeks ago, MySpace announced that it planned to comply with the request to provide the states with sex offender data, acknowledging that it would have to deal with varying legal requirements in each state. The request filed in Pennsylvania is part of that ongoing plan.

"We're very pleased with how this process is working but our desire to provide certain information, such as the content of e-mail messages, is proving complicated under applicable law," the social network's executive vice president and general counsel, Michael Angus, said in a statement on Monday.
Now on News.com
Newsmaker: For F-Secure, it's all about the safety net Crave: It's the gear you've gotta see Extra: Don't call it a bubble

"Attorney General Corbett has requested we provide the content of e-mail messages of specific registered sex offenders identified by Sentinel Safe," Angus said, referring to the database that MySpace has developed through a partnership with identity verification firm Sentinel Tech Holding. "We want to provide those messages and today have filed a request with the state court in Pennsylvania, asking a judge for guidance on how best to provide the e-mail content without tainting any potential evidence that could help put a registered sex offender behind bars."

MySpace members can privately message each others' profiles through an e-mail system within the site.

According to MySpace, a federal court determined that the ECPA requires that a search warrant be issued before the social-networking service turns over the content of e-mail messages sent through the site, and that a positive identification through the Sentinel Safe database would not by itself suffice.
http://news.com.com/MySpace+seeks+ad...3-6188497.html





Child Porn Surfers Will go to Prison
Iain Thomson

British top cop vows to jail deliberate paedophile site users

The Child Exploitation and Online Protection Centre (CEOP) has pledged that those who deliberately view child pornography online will go to prison, but has suggested that non-custodial sentences may be suitable in some cases.

CEOP chief executive Jim Gamble said on BBC Radio 4's Today programme that the scale of the child abuse problem in Britain is such that not everyone who views an image could be sent to jail without a major prison building programme.

But he was clear that those who seek out such material will be jailed. "If someone deliberately goes to one of these sites and uses a credit card to buy child pornography, they should go to prison," he said. "It needs to act as a deterrent."

Ray Wyre, director of RWA, an independent child protection group that aims to help to rehabilitate sex offenders, said that not everyone who downloads child pornography is a paedophile because web page viewing can be inadvertent.

"They see a sentence under pictures that says 'three virgins', or something like that, and they get curious as to what that is, and they download it," he said. "It is that easy to have illegal images on your computer."

Wyre added that peer-to-peer services like Lime Wire are also catching people out with misnamed files.
http://www.itnews.com.au/newsstory.a...&src=site-marq





Local news

Judge Grants New Trial for Former Substitute Teacher in Porn Case

A judge granted a new trial today for a former Norwich substitute teacher convicted of allowing students to view pornography on a classroom computer.

Julie Amero, 40, of Windham, Connecticut was convicted in January of exposing students to pornography on her classroom computer. She faced up to 40 years in prison.

While prosecutors insisted she was guilty, some experts believe that the lewd images were caused by unseen spyware and adware programs, which critics call one of the top scourges of the Internet.

Her attorney, William F. Dow, filed the motion for a new trial Tuesday.

The motion claimed evidence gathered after Amero was convicted in January of four counts of risk of injury to a minor casts serious doubt on her guilt.
http://www.newstimeslive.com/news/story.php?id=1055981





8-Year-Old Charged For Sexual Conduct With Sitter

A mother is upset after a 14-year-old babysitter engaged in sexual conduct with her eight-year-old boy, and the eight-year-old was charged with lewd conduct.

Prosecutors have since dropped the charges against the boy, but his mother is still concerned.

The sexual conduct occurred during a game of “truth or dare” while the boy was being watched by the babysitter.

Prosecutors say that, while the babysitter initiated the contact, the young boy was a willing participant.

“She dared my son to touch her breasts,” says Michelle Grosbeck, the boy’s mother.

After hiring the teenager to baby sit, Grosbeck got the feeling something was wrong.

“It was just that sense that something wasn’t quite right with this 14-year-old girl,” she said. She asked her son what had happened. “He just came right out as if nothing was awry, and just started talking about what had happened.”

Grosbeck went to police and child protection workers, and the case went to the district attorney, after which her son, age eight, had been charged with an act of lewdness with a minor.

Grosbeck says the Salt Lake County District Attorney told her both the child and teenager were equal participants. But Mrs. Grosbeck didn’t believe that.

“My son is eight, he’s a little boy. He does not have the ability to participate on the same level as a fourteen-year-old,” she said.

Although the charges against her son were dropped, she is concerned that the same thing could happen to other victims of sexual abuse.

“I don’t want parents to be afraid to go to the state agencies that are supposed to be protecting our children when things like this happen, out of fear that their children are going to be charged

The district attorney’s office confirmed the charges had been made, and that they had been dropped. Other than that, they wouldn’t comment. The Division of Child and Family Services also declined to comment.
http://kutv.com/topstories/local_story_210004013.html





Hustler Offers $1 Million for Sex Smut on Congress

Hustler magazine is looking for some scandalous sex in Washington again -- and willing to pay for it.

"Have you had a sexual encounter with a current member of the United States Congress or a high-ranking government official?" read a full-page advertisement taken out by Larry Flynt's pornographic magazine in Sunday's Washington Post.

It offered $1 million (500,000 pounds) for documented evidence of illicit intimate relations with a congressman, senator or other prominent officeholder. A toll-free number and e-mail address were provided.

The last time Flynt made such an offer was in October 1998 during the drive to impeach President Bill Clinton over the Monica Lewinsky scandal.

In the following months, the pornographic publishing mogul threatened to expose one or tow members of the Republican Congress pushing for the impeachment, according to media reports at the time.

That long-awaited expose, published months after Clinton's trial, dropped no bombshells, according to a 1999 Slate.com article, but Flynt's efforts played a role in the resignation of House-speaker designate Bob Livingston of Louisiana.

Flynt's target this time, if he has one, was not immediately known.
http://news.yahoo.com/s/nm/20070603/...eCDFW5BvaA8 F





Palm to Sell Stake; Taps ex-iPod Chief
Franklin Paul

Smart-phone maker Palm Inc. said on Monday it will sell a 25 percent stake to private equity firm Elevation Partners for $325 million in a deal that brings in a former senior Apple Inc. executive as chairman.

Palm shares climbed 8.5 percent as investors hoped the cash infusion and the appointment of Jon Rubinstein, formerly senior vice president and general manager of Apple's iPod unit, as executive chairman will revive the Palm brand and perhaps develop a relationship with Apple.

Rubinstein's "role will be in strengthening and fine tuning our products engine," Palm Chief Executive Ed Colligan said on a conference call. "This is about allowing us to put a team in place to enable us to capture a leadership position."

The deal comes as Palm, which created the personal digital assistant, or PDA, in 1996, tries to regain its status as a top device maker amid stiff competition from the likes of much bigger phone rivals, such as Motorola Inc. and Nokia Oyj.

The announcement comes one week after Palm introduced a portable computer, Foleo, to lukewarm reviews.

Palm has long been viewed as an acquisition target, thanks to its well-known brand, operating system and its relationship with mobile-phone carriers.

Stock Upgraded

"While Palm has numerous near-term challenges, we are upgrading Palm shares ... in view of Palm's announcement that a private equity involvement by former Apple executives, as well as a valuation of around $17.50 (a share) for the Elevation Partners stake," Bear Stearns analyst Andy Neff said in a note to clients.

Neff raised his rating to "peer perform" from "underperform," adding that he expects alliance talks between Palm and Apple to emerge.

Elevation co-founders Fred Anderson, Apple's former chief financial officer, and Roger McNamee will join Palm's board, replacing Palm Chairman Eric Benhamou and director D. Scott Mercer, who will both resign once the deal closes.

The board will increase to nine from eight, including Rubinstein, who left Apple in 2006.

Palm plans to pay $9 per share in cash to stockholders, and will use the new proceeds along with existing cash and $400 million in new debt to finance the cash payout.

Monday's stock rise recoups some of the value Palm lost after a rumored deal to sell the company failed to materialize in late March. At the time, phone makers Nokia and Motorola were seen as possible suitors.

Palm shipped some 2.3 million units of its popular Treo smart phone in its last fiscal year, but the sales are dwarfed by those of Nokia, Motorola, Samsung Electronics and Sony Ericsson.

Elevation's founders include veteran venture capitalists from Silver Lake and Blackstone Group, Anderson, and Bono, the lead singer of rock group U2. The Menlo Park, California-based firm raised a $1.9 billion private equity funds in 2005 that focuses on media and entertainment.

Elevation said this is its largest investment to date. One of the firm's founders, Roger McNamee, said the company does not intend to take a larger stake in Palm.

Private equity firms typically take controlling stakes in companies, restructure the businesses, and sell them later. The Palm deal is another example of Elevation taking a minority stake in a company, as it did with its roughly $200 million deal with Forbes magazine. Buyout firms usually hold on to their investments for three to five years.

Anderson, the formerly Apple CFO, reached a settlement with the U.S. Securities and Exchange Commission in April over backdated stock options at the company.

Anderson had said he relied on Apple CEO Steve Jobs in handling 2001 stock option grants that became the subject of an investigation and civil lawsuit.

Palm stock rose $1.36 to $17.45 on Nasdaq.
http://www.reuters.com/article/busin...AS301020070604





Bottle Tech Aims to Foil Wine Pirates
AP

At Colgin Cellars, a kiss is not just a kiss.

For years, vintner Ann Colgin has sealed bottles of her sought-after wine headed for auction with a bright-red lipsticked kiss on the label, a charming, and undeniably personal, certificate of authenticity.

But with concerns growing about counterfeiters, she and other Napa Valley vintners are turning to high-tech fraud prevention so customers can feel confident they're taking home genuine wine.

Colgin, who hasn't yet had someone attempt to fake her wine and hopes to keep it that way, recently signed a deal with Eastman Kodak Co. on a system that employs invisible markers added to inks and other packaging components.

''Our wine is essentially a luxury good and I do believe that these rare and collectible luxury goods are targets,'' said Colgin, whose ultra-premium wines can fetch hundreds of dollars a bottle at auction.

With the new system, buyers at auctions and other secondary markets can ask the winery to scan their labels if they have any doubts, although the measures are primarily intended to put off counterfeiters.

It's hard to gauge how wide a problem counterfeits are in the U.S. wine industry, which according to a recent industry commissioned study pumps $162 billion a year into the economy, including grape-growing, tourism and other related impacts.

Wine Spectator magazine has reported that some experts believe as much as 5 percent of wines sold in secondary markets such as auctions may be counterfeit, although others consider that figure too high.

Unlike CD and DVD counterfeiting, wine piracy hasn't become a noticeable drain on the industry yet, so U.S. vintners are acting defensively.

There have been cases of counterfeit wines reported in Europe and China, and this spring there were reports that federal authorities in New York were investigating whether counterfeits were passed off as rare vintages, including some said to be part of Thomas Jefferson's collection. According to a lawsuit believed to have partly prompted the investigation, five bottles of wine -- including four said to be owned by Jefferson -- sold for $500,000.

Regardless of how many phony pinots are out there, it seems clear that interest in preventing fraud has spiked as new technology has become available, said Daniel Welty, marketing manager for Petaluma-based John Henry Packaging, which prints labels for wineries as well as other clients.

''It's more of a case the tools are becoming more available to combat the problem,'' he said.

Anti-fraud measures being explored include tamper-proof seals, radio-frequency identification chips sunk into corks and using inks that only show up under special lights.

The Kodak technology used by Colgin and three other high-end Napa wineries involves putting proprietary markers, which Kodak will describe only as a ''forensically undetectable material'' into things such as printing inks, varnishes, paper, etc., that can only be detected by a Kodak handheld reader, also proprietary, which incorporates laser technology.

The idea is to come up with something easy to use and hard to detect, meaning it's that much harder for counterfeiters to figure out and copy, said Steve Powell, general manager and director for Security Solutions, Kodak's Graphic Communications Group.

The John Henry packaging company is using technology developed by Hewlett-Packard Co. to develop multicolored codes or graphics into labels. Colors and character combinations can be constantly changed to thwart copycats, Welty said.

The codes can be microprinted, so they're visible only with magnification, or in type that can be easily read.

''It's really cool. It's really simple, and nobody can know what the next codes are,'' he said.

Fine wine can be expensive straight from the shelf, but when it comes to charity affairs, such as the Napa Valley annual wine auction going on this week, prices can go sky high.

Last year's high bid was $1.05 million for five large-format bottles of Staglin Family Vineyard Meritage blend, along with a trip to France.

Like Colgin, the Staglins haven't run across fakes so far, but they decided to take a preemptive step and use the Kodak system on large bottles that are likely to end up being traded, said Garen Staglin.

''We want to be sure that we can give our customers the assurance of the integrity of our brand and label after we spent so much time and effort to try to accomplish what we've done over the years,'' he said.

In San Francisco, Jerome Zech, CEO of WineBid.com, which had $22.5 million in sales last year, doesn't think wine fraud is prevalent.

But with some high-end wines starting at $500 a bottle for pre-release prices, he's all for the industry's move toward anti-counterfeiting measures. ''It'll help them and it'll help us as well.''

WineBid's officials authenticate wine by only dealing with people they trust and checking bottles against a vast database, Zech said. If something seems off, ''we just don't even question whether or not we would put it on our site. We would just reject the bottle.''

So when someone showed up with two bottles of a famous French wine -- and the glass was different for each bottle, ''We go, `Are you joking? Where did you get these things,'' Zech said. ''He had some story, and we just said, `Sorry.'''
http://www.nytimes.com/aponline/busi...uine-Wine.html





When Fakery Turns Fatal
David Barboza

They might be called China’s renegade businessmen, small entrepreneurs who are experts at counterfeiting and willing to go to extraordinary lengths to make a profit. But just how far out of the Chinese mainstream are they?

Here in Wudi in eastern China, a few companies tried to save money by slipping the industrial chemical melamine into pet food ingredients as a cheap protein enhancer, helping incite one of the largest pet food recalls ever.

In Taixing, a city far to the south, a small business cheated the system by substituting a cheap toxic chemical for pharmaceutical-grade syrup, leading to a mass poisoning in Panama. And in the eastern province of Anhui, a group of entrepreneurs concocted a fake baby-milk formula that eventually killed dozens of rural children.

The incidents are the latest indications that cutting corners or producing fake goods is not just a legacy of China’s initial rush toward the free market three decades ago but still woven into the fabric of the nation’s thriving industrial economy. It is driven by entrepreneurs who are taking advantage of a weak legal system, lax regulations and a business culture where bribery and corruption are rampant.

“This is cut-throat market capitalism,” said Wenran Jiang, a specialist in China who teaches at the University of Alberta. “But the question has to be asked: is this uniquely Chinese or is there simply a lack of regulation in the market?”

Counterfeiting, of course, is not new to China. Since this country’s economic reforms began to take root in the 1980s, businesses have engineered countless ways to produce everything from fake car parts, cosmetics and brand name bags to counterfeit electrical cables and phony Viagra. Counterfeiting rings are broken nearly every week; nonetheless, the government seems to be waging a losing battle against the operations.

Dozens of Chinese cities have risen to prominence over the last two decades by first specializing in fake goods, like Wenzhou, which was once known for selling counterfeit Procter & Gamble products, and Kaihua in Zhejiang province, which specialized in fake Philips light bulbs.

For a time, people even derided the entire province of Henan as the capital of substandard or fake goods, like medicines that could make you miraculously grow taller.

But the discovery of dangerous ingredients in foods and drugs has raised more serious questions.

One such operation is centered here in Wudi, about five hours southeast of Beijing. This is where the trail of the American pet food recall leads.

Regulators came to Wudi in early May and shut down one of the region’s biggest feed exporters, the Binzhou Futian Biology Technology Company. They also detained its manager, Tian Feng, after American officials identified Binzhou Futian as one of two Chinese companies responsible for shipping contaminated pet food ingredients to the United States.

Chinese authorities said that Binzhou Futian and a company in bordering Jiangsu province had intentionally doctored feed ingredients to generate bigger profits. Regulators in China called it an isolated incident.

But agricultural workers and experts in this region tell a different story. They say the practice of doctoring animal and fish feed with melamine and other ingredients is widespread in China. And Wudi, they say, has long been known as a center for such activity.

“Wudi became famous for fake fish powder almost 10 years ago,” said Chen Baojiang, a professor of animal nutrition at the Agricultural University of Hebei. (Fish powder is used as a protein additive to animal feed, including fish feed.)

“All kinds of fillers have been used. At the beginning it was vegetable protein, then urea. Now it’s feather powder.”

In small village workshops on the outskirts of Wudi, residents say hundreds of workers make animal feed doctored with fish scraps and cheap ingredients that are then packaged for sale to unsuspecting farmers and fish farms.

Much of the fish scrap comes from the nearby Bohai Bay area or imported from Peru and then blended with cheap fillers to bolster profits.

“About 90 percent of the fish powder on the market is fake,” said Xue Min, who works at the Feed Research Institute, a division of the China Academy of Agricultural Sciences in Beijing. “When it reaches the customer, he doesn’t know how many kinds of filler have been added.”

But recently, residents say more buyers have turned skeptical of Wudi’s fish powder. And that has forced some local manufacturers to switch to vegetable protein and search for new buyers.

“Customers are now suspicious about fish powder,” says Sun Hong Qiang, who operates a fish scrap supplier in Wudi. “Everyone knows there’s some fake fish powder out there.”

To reach bigger customers, feed producers from Wudi recently began calling themselves “technology” companies that sell protein powder. And they are using online trading Web sites like Alibaba.com to sell their goods.

But few companies here were as successful as Binzhou Futian, which in 2006 won contracts to ship pet food ingredients to major suppliers in the United States and South Africa.

The American and South African middlemen say that they found Binzhou Futian through online advertisements and commodity-trading Web sites. The companies did not bother to visit Binzhou’s factories or to investigate its background or its export record.

“I’m not sure of the introduction, but I think it was through Google search,” said Leon Ekermans, a marketing director at Bester Feed and Grain, a South African grain trader. “We were told by an intermediary that they were once a government company and made good feed.”

Asked whether Bester had researched the supplier’s record or visited China, Mr. Ekermans acknowledged that the answer was no. “We tested samples,” he said, “but it was very difficult to test for melamine.”

When investigators from the United States Food and Drug Administration visited China in early May, hoping to determine why melamine ended up in pet food ingredients, they saw little more than a shuttered Binzhou Futian factory.

“They’ve all been closed down, machinery dismantled, nothing to get access to,” said Walter Batts, an F.D.A. official.

Binzhou Futian was run by Tian Feng, a small-town entrepreneur who started out producing fish powder but later moved into vegetable protein, according to local residents.

Mr. Tian’s company shared a building with the county government’s cereal and grains bureau, an indication of its close ties to the government.

“Futian didn’t have any actual factory here,” said a guard who works at the Binzhou headquarters. “They hung a banner here because they wanted to look good in front of visitors. They had countless suppliers from the countryside.”

A spokesman for the county cereal bureau, however, denied having any relationship with Binzhou Futian and Mr. Tian, who has been detained by the authorities. Mr. Tian has denied knowing anything about melamine or how it got into the feed he exported.

And while the government said that it had not found any other companies exporting melamine-tainted goods overseas, regulators shut dozens of fish feed producers near Wudi.

Investigators say Mr. Tian’s company engaged in fraud: it mislabeled its feed exports as nonfeed goods, possibly to avoid food inspection; it also exported tons of pet food ingredients labeled as corn gluten and rice protein concentrate. Actually, they say, it was low-protein wheat powder. Analysts say Binzhou’s case is not unusual. This is how the counterfeiting system often evolves, they say.

For decades, small entrepreneurs have started out counterfeiting in emerging industries in China, seeking an early advantage and their first pot of gold.

Often, they try to get around regulations, or simply believe small-time cheating that involves adding cheap substitutes or low-grade ingredients will not cause much harm.

“Basically, for entrepreneurs, if something is not explicitly banned — it’s not banned,” said Dali Yang, who teaches at the University of Chicago and has studied China’s food safety regulations. “As long as people are not sick or dying, it’s O.K.”

Experts say counterfeiters are now moving to outlying areas of the country, where it is easier to evade regulation. The counterfeiters are also moving into food and agriculture, which are difficult to monitor because they involve small farmers and entrepreneurs.

Small-time entrepreneurs have played the same game over and over with other products, experts say, adding cheap substitute chemicals to toothpaste; using lower-grade materials to produce car parts, batteries and cellphones; and creating factories that specialize in counterfeit goods.

Last year, for instance, pirates were caught faking an entire company, setting up a “branch” of the NEC Corporation of Japan, including 18 factories and warehouses in China and Taiwan.

“We have to bear in mind they probably don’t think about the consequences at all,” said Steve Tsang, a China specialist who teaches at Oxford University. “They’re probably only thinking of making a fast buck.”
http://www.nytimes.com/2007/06/05/bu...s/05fakes.html





Anti - War Marine Blasts Military
AP

An Iraq War veteran accused the Marine Corps on Monday of causing a ''disgusting waste of government resources'' by holding a hearing about whether he should be punished for wearing his uniform during an anti-war protest.

Marine Corps officials argue they are enforcing military codes in the case of Cpl. Adam Kokesh.

Kokesh, 25, participated in an anti-war protest in Washington in March. When he was identified in a photo caption in The Washington Post, a superior officer sent him an e-mail saying he might have violated a rule prohibiting troops from wearing uniforms without authorization. Kokesh responded with a letter that contained an obscenity.

Kokesh is a member of the Individual Ready Reserve, which consists mainly of those who have left active duty but still have time remaining on their eight-year military obligations. His service is due to end June 18, but the Marine Corps is seeking to let him go two weeks early with a less-than-honorable discharge.

That could cut some of his health benefits and force him to repay about $10,800 he received to obtain his undergraduate degree on the GI Bill.

Kokesh's attorney, Lt. Jeremy Melaragno, said during an administrative separation board hearing that his client's free-speech rights are at stake.

''It has everything to do with freedom of speech,'' Melaragno said. ''Ask yourself, would we be here if he was advocating for the Bush administration?''

During a break in the hearing, Kokesh told reporters that the case appears to be punitive.

''More importantly, it's a case of fraud, waste and abuse and a disgusting waste of government resources,'' Kokesh said. ''While Marines are dying every day in Iraq, they are spending time investigating members of the individual ready reserves for political activity.''

Kokesh was honorably discharged following a combat tour in Iraq, but he remains part of the Individual Ready Reserve, comprised of those who have left active duty but still have time remaining on their eight-year military obligations.

His attorneys said Kokesh was not subject to military rules during the protest because he was not on active duty. They said the protest was a theatrical performance, which meant wearing a uniform was a not a violation of military rules. The military considered it a political event, at which personnel are not allowed to wear their uniforms without authorization.

The Marines' first witness, Maj. John R. Whyte, testified Monday he was the officers who wrote Kokesh the e-mail informing him the Marines were investigating the possible uniform violation.

On cross examination, the defense had Whyte read a memo he had written on how the Corps should respond to protests.

''There should be manpower assigned to search for and remediate misinformation by opposition groups and individuals,'' he read.

Whyte recommended Kokesh's discharge be ''other than honorable.''

Several Kokesh supporters turned out Monday at the Marine Corps Mobilization Command and stood in front of a bus painted with anti-war slogans.

Kokesh was a reservist in an artillery unit when he became disillusioned with the war during his first tour. He said he believes there is no way for Iraq to achieve rule of law with a foreign military imposing martial law.
http://www.nytimes.com/aponline/us/A...t-Hearing.html





As TV Coverage Feeds Protests, Musharraf Reacts
Griff Witte

Every day, Taj Mohammed Abbasi wheels his cart through dusty streets, selling the oranges, guavas and litchis that are the pride of this rural outpost in the shadow of the Himalayan foothills.

But what he's seen recently on television motivated him this weekend to take to the streets for a different reason: to join a movement with the audacious goal of ousting the military-led government and restoring democracy to Pakistan.

"Watching television, I have become very angry," said Abbasi, 33, swatting flies from his cart. "I am not a political person. I have not been to a lot of rallies. But this time, definitely, I am going."

Pakistan might be in the midst of its first televised revolution. For nearly three months, a handful of fledgling independent stations have been broadcasting minute-by-minute coverage of what at first seemed a relatively obscure issue: the suspension of Pakistan's chief judge by the president, Gen. Pervez Musharraf.

Since then, Pakistanis nationwide have been transfixed by live coverage of police beating lawyers, pro-Musharraf groups firing assault rifles at demonstrators and the chief justice speaking to ever-larger and more boisterous audiences about the dangers of autocratic rule.

As the cameras have rolled, opposition to Musharraf has surged, and he is considered more vulnerable now than at any time in his eight years in office. Even in rural areas where poverty is high, residents have gathered in hotels and barbershops around the few television sets available and watched the brewing crisis play out live.

Here in Haripur -- an hour's drive north of the capital, Islamabad, but a world away from its modern conveniences -- residents came out by the thousands on Saturday to demand that Musharraf step aside and allow elections to restore civilian rule.

Stung by the criticism, Musharraf has reacted by cracking down on what had been the government's signature defense against charges of authoritarianism: the independent television news networks.

The country's half-dozen networks all sprung up under his watch, and Musharraf has repeatedly bragged to the world about his efforts to free Pakistani television from state control and censorship for the first time in the country's history. But with his government teetering, Musharraf, a key U.S. ally, is threatening the networks' very existence.

"He allowed the genie out of the bottle. But he didn't realize how big it could become. Now he's trying to put it back," said Talat Hussain, director of news and current affairs for one of the channels, Aaj Television.

Aaj, along with others, has come under intense pressure in recent days to pull programming off the air and to cancel live coverage of opposition rallies. Aaj has continued to broadcast, but its transmission is being blocked throughout much of the country.
"I have no illusions about it," Hussain said. "They're going to shut us down."

Ayaz Amir, a political commentator who hosts a call-in program on rival channel ARY Oneworld, said his show was canceled this past week because of government pressure. "I've been branded as a person who's not favorably disposed to the government," he said.

Government officials deny they are censoring the news media. They say they are simply enforcing regulations that have been on the books for years but have often been ignored, including a requirement that stations get permission before they broadcast live.
"The independence of the media is something we take pride in," said Information Minister Mohammed Ali Durrani. "We'll take care of their independence."

Musharraf has made no secret of his displeasure with the way the controversy over the chief justice has been covered, and his top aides have accused the news media of exploiting the issue for ratings gains.

Last week, Durrani warned journalists against criticizing the army, an institution that has historically been revered in Pakistan but is increasingly attacked for denying the country a chance at civilian rule eight years after a military-led coup elevated Musharraf to power.

Durrani's remarks came after the independent channels broadcast marathon coverage of an anti-Musharraf rally at which demonstrators chanted slogans such as, "The generals are traitors" and "Save the country -- take Musharraf's skin off."

Since that rally, several of the channels have toned down their coverage of the crisis, and there is widespread speculation that they made deals with the government in order to continue broadcasting.

Until recent months, Musharraf had displayed an adeptness at using the media to his advantage -- giving occasional interviews and staging elaborate press events to showcase government accomplishments. The tactics worked: The president enjoyed widespread popularity and was considered virtually invincible.

But the chief justice, Iftikhar Mohammed Chaudhry, loomed as a potential obstacle because he was expected to rule on cases that could complicate Musharraf's plans to get himself elected for another five-year term by a lame-duck parliament.

On March 9, Musharraf invited cameramen to a meeting at which he expected Chaudhry to resign under pressure for alleged abuses of office. Instead, Chaudhry refused. The image of the judge moments before he stood up to the uniformed president became the first icon of the controversy.

The next came days later, when police raided Geo television's office in Islamabad as the station tried to film protesters demonstrating against Chaudhry's suspension. Tear gas filled the office, and police began beating journalists with batons, but the cameras continued to roll.

Two months later, in Karachi, Aaj's office came under attack as demonstrators clashed in the streets outside in violence that would ultimately claim more than 40 lives. During six hours of live coverage, Aaj's anchors repeatedly called for help from the police, to no avail, on a day when government security forces were widely blamed for standing by as the city burned.

A note on the Geo Web site Sunday said: "The government has blocked the transmission of the Geo News TV channel across the country due to the reasons best known to them. . . .

"The citizens, social and political circles have condemned the ban on transmission of Geo News and they have demanded of the government to immediately lift ban on the transmission of the Geo News and give complete freedom to media in the country," it said.

The chief justice and his supporters have used television to their advantage, staging exuberant, day-long parades from one city to the next, earning them hours of continuous coverage.

By contrast, political observers say, the government has tried to use force and intimidation to end the controversy, but has consistently misjudged how its efforts would play on television. As a result, Musharraf's problems have only intensified.

"What they did not take into account was that the crisis was going live to every bloody Pakistani household," said Aamer Ahmed Khan, Pakistan editor of the BBC World Service and a journalist here for more than two decades. "That is what is making them nervous now."
http://www.washingtonpost.com/wp-dyn...l?hpid=topnews





Reporter Arrested on Orders of Giuliani Press Secretary

Charged with criminal trespass despite protest of CNN staff and official event press credentials at GOP debate in New Hampshire
Aaron Dykes & Alex Jones

Freelance reporter Matt Lepacek, reporting for Infowars.com, was arrested for asking a question to one of Giuliani's staff members in a press conference. The press secretary identified the New York based reporter as having previously asked Giuliani about his prior knowledge of WTC building collapses and ordered New Hampshire state police to arrest him.

Jason Bermas, reporting for Infowars and America: Freedom to Fascism, confirmed Lepacek had official CNN press credentials for the Republican debate. However, his camera was seized by staff members who shut off the camera, according to Luke Rudkowski, also a freelance Infowars reporter on the scene. He said police physically assaulted both reporters after Rudkowski objected that they were official members of the press and that nothing illegal had taken place. Police reportedly damaged the Infowars-owned camera in the process.

Reporters were questioning Giuliani staff members on a variety of issues, including his apparent ignorance of the 9/11 Commission Report, according to Bermas. The staff members accused the reporters of Ron Paul partisanship, which press denied. It was at this point that Lepacek, who was streaming a live report, asked a staff member about Giuliani's statement to Peter Jennings that he was told beforehand that the WTC buildings would collapse.

Giuliani's press secretary then called over New Hampshire state police, fingering Lepacek.
http://www.jonesreport.com/articles/...ni_orders.html





Group Rips Microsoft Over Internet User Profiling Research
Gregg Keizer

Microsoft Corp. research on Internet user profiling could lead to tools that help repressive regimes identify anonymous dissidents, the Reporters Without Borders advocacy group warned last Friday.

In a paper presented at the International World Wide Web Conference last month in Calgary, Canada, four researchers at Microsoft's Beijing-based lab laid out work that predicted the age and gender ( PDF format) of unknown Web users based on the sites they visited. Their new algorithms correctly guessed the gender of a Web surfer 80% of the time, and his or her age 60% of the time.

"Demographic information is usually not easy to obtain," the researchers said. "Internet users are reluctant to expose this kind of personal data to public. The alternative way to predict users' demographic information is then of great interest." The Microsoft researchers said such predictions could be used to better personalize Web applications and fine-tune online advertising.

Paris-based Reporters Without Borders objected not only to the research, but also to where it was conducted. "The technologies Microsoft is working on would allow it to gather information about Internet users without their knowledge," the group said in a statement. "These technologies could eventually lead to the creation of programs that could identify 'subversive' citizens. We believe it is unacceptable to carry out this kind of sensitive research in a country such as China where 50 people are currently in prison because of what they posted online."

American companies such as Yahoo Inc., Google, Inc., and Microsoft gather "fantastic" amounts of data about their Web visitors, Reporters Without Borders said, but "this kind of data accumulation obviously poses even more ethical problems in a country such as China which has absolutely no respect for the private lives of Internet users."

Microsoft's researchers said they would expand their work to other demographic attributes, such as occupation, educational degree and geographic location, which has Reporters Without Borders even more worried.

"In China, it is conceivable that this type of technology would be used to spot Internet users who regularly access such 'subversive' content as news and information websites critical of the regime," the group said.

The Chinese government has regularly locked down domestic access to sections of the Internet, and recently proposed a rule that would compel bloggers to register their real names, eliminating anonymity. A government-associated organization backed away from the mandate 10 days ago, however, and instead pitched the idea of bloggers exercising "self-discipline."

That same day, Erik Bratt, a Microsoft marketing communications manager, fired a preemptive salvo about the company's age- and gender-guessing research. Bratt first downplayed the research results, saying: "[The researchers] actually found that they could not, with a high degree of accuracy, predict age from Web browsing activity." He also swore the Redmond, Wash. developer off using the resulting algorithms. "Microsoft currently has no plans to use the capabilities found through this research in our products and services," Bratt said.
http://www.computerworld.com/action/...icleId=9022918





"Unbreakable" Encryption Works in Real Time Over Long Distances, NIST Says
Submitted by News

In the internet age, when 120,000,000 smart people on Digg can see an article about your technology, it takes some real courage to use the term "unbreakable", but the guys at NIST are doing just that.

They say they have built a prototype high-speed quantum key distribution (QKD) system that can perform a theoretically unbreakable “one-time pad” encryption, transmission and decryption of a video signal in real-time over a distance of at least 10 kilometers.

Detection stage of the NIST prototype quantum key distribution system: Photons are "up-converted" from 1310 to 710 nm by one of the two NIST-designed converters at right, then sent to one of two commercial silicon avalanche photo diode units to the left. Credit: NIST

Key distribution — the problem of ensuring that both the sender and receiver of an encrypted message (and no one else) share the same long string of random digits (the so-called “key”) used to encode and decode the message — has always been one of the most important challenges in cryptography. Since the 1980’s it’s been recognized that the unique properties of quantum mechanics — the fact that certain measurements cannot be made without altering the thing measured — offered the possibility of a system that could transmit as long a key as desired between two people with no chance that it could be copied undetectably by a third party.

Since then the race has been on to build a fast, practical and reliable QKD system.

One important requirement for any candidate system is that it be compatible with existing fiber-optic telecom networks that transmit at wavelengths of either 1550 or 1310 nanometers (nm) to reach the greatest distance. Another requirement is a highly efficient photon detector that can detect single photons reliably without introducing significant amounts of “noise.” One of the best low-noise detectors, a silicon-based avalanche photo diode (Si-APD), does not function at the telecom wavelengths. Instead, it operates best at much shorter wavelengths around 700 nm. To take advantage of the Si-APD, the NIST group designed a sub-system to “up-convert” single photons from a transmission wavelength of 1310 nm to 710 nm for high-efficiency detection.

Their QKD system that incorporates this up-conversion technique, described in a recent paper,* generates and transmits secure keys at a rate of over half a million bits per second over 10 km of optical fiber, fast enough to encrypt streaming digital video using one-time pad in real time. The group also has transmitted secure keys at rates near 10 kilobits per second at five times that distance. The same team last year set a speed record for transmission of secure keys over a kilometer of fiber. This work improves the distance by at least 10 times.

Advantages of the new system, according to the research team, include high speed, high efficiency, low noise and convenience of operation. The fact that it uses a 1310 nm transmission wavelength somewhat limits the propagation distance but adds the advantage that the parallel “classical-quantum” communication, which is needed for a full QKD system, can be realized in a single fiber without significant interference. Details of NIST’s up-conversion QKD research are available at http://w3.antd.nist.gov/quin.shtml.

* H. Xu, L. Ma, A. Mink, B. Hershman and X. Tang. 1310-nm quantum key distribution system with up-conversion pump wavelength at 1550 nm. Optics Express, Vol. 15, Issue 12, pp. 7247-7260.
http://www.scientificblogging.com/ne...e s_nist_says





N.D. Bans Forced RFID Chipping
Judi McLeod

As expected, North Dakota has become the second state in the U.S. to ban the forced implanting of radio frequency identification (RFID) chips in people.

The two-sentence bill, passed by the state legislature, was signed into law by Gov. John Hoeven last Wednesday. Essentially, it forbids anyone from compelling someone else to have an RFID chip injected into their skin. The state follows in the steps of Wisconsin, which passed similar legislation last year.

"We need to strike a balance as we continue to develop this technology between what it can do and our civil liberties, our right to privacy," Hoeven said in an interview. He emphasized that the law doesn't prohibit voluntary chipping. Military personnel who want an RFID chip injected so they can be more easily tracked will still be allowed to get a chip. There are also potential uses for the technology in corrections or in monitoring animals, he noted.

Marlin Schneider, the state legislator who sponsored the Wisconsin law, said he is glad to see an antichipping legislation trend. However, such statutes don't go far enough to curb the ability of private sector retailers and manufacturers to "implant these things into everything we buy."

Ultimately, with RFID tagging systems, corporations "will be able to monitor everything we buy, everywhere we go and, perhaps as these technologies develop, everything we say."

But Michael Shamos, a professor who specializes in security issues at Carnegie Mellon University in Pittsburgh, believes the law is too vague to do much good. For instance, it only addresses situations where a chip is injected, even though RFID tags can also be swallowed. And it doesn't clearly define what a forced implant really is; someone could make chipping a requirement for a financial reward.

"Suppose I offer to pay you $10,000 if you have an RFID [chip] implanted?" he asked. "Is that 'requiring' if it's totally voluntary on your part?"

The idea behind the law isn't bad, but "it looks hastily drawn and will have unpredictable consequences," said Shamos.
http://www.computerworld.com/action/...ntsrc=hm_topic





Thousands of Protesters Foil Some German Security Measures and Clash With the Police
Mark Landler



KÜHLUNGSBORN, Germany, June 6 — They lurked in the woods, 50 strong, wearing black hoods and bandannas, and wielding tree limbs. At a signal, they sprang forward and threw their debris across one of the bigger roads here, creating a barricade that brought traffic to a halt.

That little insurgency, and dozens like it, kept tensions high on the first day of the Group of 8 meeting in northern Germany on Wednesday. Several thousand protesters clashed with riot police officers, who used tear gas and water cannons to disperse demonstrators blocking roads and railways leading to the site of the meeting.

Eight police officers were injured, and 15 demonstrators were detained, a police spokesman, Lüdger Behrens, told Reuters. He said the police used force after being pelted with stones.

While the protesters had little effect on the leaders of the top industrialized nations — who were flown by helicopter from Rostock to the meeting in the Baltic Sea resort of Heiligendamm, several miles from here — they did manage to foil the elaborate security precautions of the police.

The police had erected a $17 million, 8-foot-high, 7.5-mile-long fence topped with barbed and razor wire, completely cutting off the resort, and banned protests within 200 yards of the fence. By midday, though, an estimated 10,000 demonstrators — many in clown makeup and tinted wigs — had penetrated the restricted zone and massed at the fence.

Evading checkpoints by crossing through farmers’ fields, protesters also blocked main roads leading from the Rostock airport to Heiligendamm. After numerous standoffs, some lasting several hours, riot police officers clad in helmets waded into the crowd, occasionally swinging truncheons.

Organizers of the protest complained that the police response was heavy-handed, perhaps because a demonstration on Saturday in Rostock had turned violent and resulted in at least 400 police injuries.

“It’s not just the demonstrators who are being aggressive,” said Monty Schädel, a local organizer of the protests. “It’s the police who are escalating the trouble with their own aggression.”

Mr. Schädel expressed regret for the violence in Rostock. The majority of anti-globalization protesters, he said, were peaceful. They come from a wide array of social activist groups, including Attac, Greenpeace, Friends of the Earth, and the Global Call to Action Against Poverty.

But some of them, often those wearing the black hoods, are determined to disrupt the meeting, which they regard as illegitimate. At one point, the protesters forced the police to close all the entrances to Heiligendamm.

“I’m here because this so-called democratic meeting is not democratic,” said Lars, a 27-year-old German who declined to give his last name, for fear of arrest. “I didn’t want to just sit and do nothing about it.”

As a phalanx of riot police officers advanced toward Lars, he and his friends retreated. Earlier, they said, they had been in a clash in which several demonstrators were roughed up. In a nearby field, three protesters sat under the gaze of police officers, their hands cuffed behind their backs with plastic bands.

The German authorities expected trouble at this meeting, which has become an annual flash point for anti-globalization groups. The authorities spent more than $130 million on security, marshaling 16,000 police officers and 1,100 soldiers in what officials say is the most extensive such operation for a single event in Germany since World War II.

Last month, the police conducted a nationwide raid of the homes and offices of left-wing campaigners whom they suspected of planning to disrupt the meeting. At the time, the raid was sharply criticized by some opposition leaders, who said it was bullying and disproportionate.

Public sentiment has shifted, however, since the violence in Rostock. The police had talked about a strategy of “de-escalation,” which would defuse tensions between the police and the protesters. On Wednesday, a police spokesman said the de-escalation strategy had come to an end.

Chancellor Angela Merkel expressed sympathy for the police, saying to reporters that they “have my full support; it’s not an easy job.” She said meetings like the Group of 8 were “legitimate” exercises.

So far, the protests have mostly inconvenienced the news media. Journalists were forced to travel to Heiligendamm from the neighboring village of Kühlungsborn by boat, after the rail line was blocked.
http://www.nytimes.com/2007/06/07/wo...7protests.html





Secret CIA Jails Hosted by Poland, Romania: Watchdog
Jon Boyle

A European investigator said on Friday he had proof Poland and Romania hosted secret prisons for the Central Intelligence Agency in which it interrogated top al Qaeda suspects using methods akin to torture.

Swiss senator Dick Marty said Poland housed some of the CIA's most sensitive prisoners, including Khalid Sheikh Mohammed, who says he masterminded the September 11, 2001, attacks on the United States that killed almost 3,000 people.

"There is now enough evidence to state that secret detention facilities run by the CIA did exist in Europe from 2003-2005, in particular in Poland and Romania," Marty said in a report for the Council of Europe human rights watchdog.

He said U.S. intelligence and other sources told him the two European Union members hosted the secret jails under a special CIA program, created by President George W. Bush's administration after 9/11 "to 'kill, capture and detain' terrorist suspects deemed of 'high value."'

Marty said the former president of Poland and the current and former presidents of Romania knew and approved of their countries' roles in a "global spider's web" of secret CIA detentions and transfers, known as extraordinary renditions.

He said the proof of his charges was confirmed in interviews with over 30 serving, retired or contract workers for U.S. or European intelligence services, but he had not seen the text of any U.S. agreement with Poland or Romania on secret prisons.

Germany and Italy had used "state secrecy" to obstruct investigations, said Marty. His report, after a 19-month probe, could embarrass European governments, which have criticized the detention without trial of suspects at Guantanamo Bay.

Political Approval

Marty's report was issued as 26 Americans, mostly suspected CIA agents, went on trial in absentia in Italy for kidnapping a Muslim there in 2003 and flying him to Egypt as part of Washington's rendition policy.

The Council of Europe's evidence could be valid in some courts if rules allowed judges to accept it while guaranteeing the confidentiality of the source.

The report found Poland's then-president Aleksander Kwasniewski and three other named officials were aware of and could be held accountable for the CIA secret prisons in Poland.

Suspects were flown from Kabul and elsewhere to Szymany airport in northern Poland, with dummy flight logs submitted to disguise the destination, Marty said. They were met at the runway by teams of Americans in vans and driven through a pine forest to the alleged detention centre at nearby Stare Kiejkuty.

Marty said CIA sources confirmed to him that Khalid Sheikh Mohammed and another top al Qaeda captive, Abu Zubaydah, were held in Poland and subjected to "enhanced interrogation techniques," which he called a euphemism for torture.

The Polish Foreign Ministry said there were no such secret centers and former Defense Minister Jerzy Szmajdzinski, one of those named, told Reuters:

"Marty's work is pure political fiction...It is a waste of time and a waste of money."

Romanian President Traian Basescu, former president Ion Iliescu and former defense minister Ioan Mircea Pascu were among those who "knew about, authorized and stand accountable" for Romania's role in the CIA program, Marty said.

The Romanian Foreign Ministry said the report contained "no evidence to confirm these allegations, except for unnamed sources, whose credibility cannot be estimated."

The European Commission said it was "very concerned indeed" and urged Romania and Poland to hold independent investigations.

Marty said the facilities were run directly and exclusively by the CIA, which exploited NATO's granting of blanket overflight clearance and access to airfields to carry out clandestine operations in a broad range of countries.

Bush confirmed in September the CIA had run secret interrogation centers abroad but named no country.

A CIA spokesman said Europe had been the source of "grossly inaccurate allegations about the CIA."

Marty told reporters: "Hundreds and hundreds of people were kidnapped, tortured, detained illegally, some of them for year after year, then released without a word of apology, with no compensation."

"I find that indecent, I find that intolerable in a free and democratic society."

(Additional reporting by Mark Trevelyan in London, Dave Graham in Berlin, Natalia Reiter in Warsaw, Luiza Ilie in Bucharest)
http://www.reuters.com/article/topNe...70585420070608





The Tortured Lives of Interrogators

Veterans of Iraq, N. Ireland and Mideast Share Stark Memories
Laura Blumenfeld

The American interrogator was afraid. Of what and why, he couldn't say. He was riding the L train in Chicago, and his throat was closing.

In Iraq, when Tony Lagouranis interrogated suspects, fear was his friend, his weapon. He saw it seep, dark and shameful, through the crotch of a man's pants as a dog closed in, barking. He smelled it in prisoners' sweat, a smoky odor, like a pot of lentils burning. He had touched fear, too, felt it in their fingers, their chilled skin trembling.

But on this evening, Lagouranis was back in Illinois, taking the train to a bar. His girlfriend thought he was a hero. His best friend hung out with him, watching reruns of "Hawaii Five-O." And yet he felt afraid.

"I tortured people," said Lagouranis, 37, who was a military intelligence specialist in Iraq from January 2004 until January 2005. "You have to twist your mind up so much to justify doing that."

Being an interrogator, Lagouranis discovered, can be torture. At first, he was eager to try coercive techniques. In training at Fort Huachuca, Ariz., instructors stressed the Geneva Conventions, he recalled, while classmates privately admired Israeli and British methods. "The British were tough," Lagouranis said. "They seemed like real interrogators."

But interrogators for countries that pride themselves on adhering to the rule of law, such as Britain, the United States and Israel, operate in a moral war zone. They are on the front lines in fighting terrorism, crucial for intelligence-gathering. Yet they use methods that conflict with their societies' values.

The border between coercion and torture is often in dispute, and the U.S. government is debating it now. The Bush administration is nearing completion of a new executive order setting secret rules for CIA interrogation that may ban waterboarding, a practice that simulates drowning. Last September, President Bush endorsed an "alternative set of procedures," which he described as "tough," for questioning high-level detainees. And in Iraq last month, Gen. David H. Petraeus, the top U.S. commander, warned troops that the military does not sanction "torture or other expedient methods to obtain information."

The world of the interrogator is largely closed. But three interrogators allowed a rare peek into their lives -- an American rookie who served with the 202nd Military Intelligence Battalion and two veteran interrogators from Britain and Israel. The veterans, whose wartime experiences stretch back decades, are more practiced at finding moral balance. They use denial, humor, indignation. Even so, these older men grapple with their own fears -- and with a clash of values.

That clash, said Darius Rejali, a political scientist who has studied torture and democracy, can torment interrogators: "Nothing is more toxic than guilt, which is typical with democratic interrogators. Nazis, on the other hand, don't have these problems."

For Lagouranis, problems include "a creeping anxiety" on the train, he said. The 45-minute ride to Chicago's O'Hare airport "kills me." He feels as if he can't get out "until they let me out." Lagouranis's voice was boyish, but his face was gray. The evening deepened his 5 o'clock shadow and the puffy smudges under his eyes.

Not long ago in Iraq, he felt "absolute power," he said, over men kept in cages. Lagouranis had forced a grandfather to kneel all night in the cold and bombarded others in metal shipping containers with the tape of the self-help parody "Feel This Book: An Essential Guide to Self-Empowerment, Spiritual Supremacy, and Sexual Satisfaction," by comedians Ben Stiller and Janeane Garofalo. ("They hated it," Lagouranis recalled. "Like, 'Please! Just stop that voice!' ")

Now Lagouranis's power had dissolved into a weakness so fearful it dampened his upper lip. Sometimes, on the train, he has to get up and pace. But he can't escape.

An Island in the Mediterranean

James, an amiable man with a red-to-white beard, shook his head when told of Lagouranis: "He's full of self-pity."

James, 65, was one of Britain's most experienced interrogators in Northern Ireland. Starting in 1971, James said, he worked for the Special Branch of the Royal Ulster Constabulary (RUC), interrogating Irish nationalists Gerry Adams, Bobby Sands and others whom the British government suspected of being terrorists. Peter Taylor, a leading historian of the conflict in Northern Ireland, said he believes that "James's account is entirely credible."

Late one night in 1993, three Irish Republican Army gunmen crept up to James's door. "They came to get me," James said. Given a 20-minute warning following a tip to the RUC, he and his wife escaped, ultimately to an island in the Mediterranean. James agreed to talk if his last name and location were withheld. "They haven't a clue I'm here."

Driving along winding, stony roads, past goats and grapevines, James had this advice for Lagouranis in Chicago: "You've got to get up and get on with it -- that's what we did."

James had had no training, but the 18-hour days that made his neck ache taught him what he needed: good rapport, good intelligence, great fear. "Yes, a bloke would get a cuff in the ear or he might brace against the wall. Yes, they had sleep deprivation," he said. "But we did not torture."

Once, IRA leader Brendan Hughes claimed that James had cocked a gun to his head. James does not deny it. "You fight fire with fire," he said, the memory igniting his blue eyes.

He noted that the sectarian killings dropped off: "If it's going to save lives, you're entitled to use whatever means you can." How do you fight bad guys and stay good? "You don't. You can't."

The only interrogation James regrets was of Patrick McGee, under arrest for IRA activity. McGee did not crack, which meant he would go free. As McGee walked out, "he just stared at you," James recalled. "Evil was hanging out of him." James spat in his face. "He never even blinked. It was not satisfying, it was humiliating. I lost my cool."

James stopped his car at the edge of the ocean. According to Greek mythology, a god frolicked on this beach. Vacationers drank iced coffee and oiled the air with coconut lotion. But James seemed to be somewhere else, cloudy and turbulent, in his head.

"My friend once saw a guy planting a bomb," he said. He laughed. "My friend tied a rope around the guy's ankle, and made him defuse it. Now t hat's how to deal with a ticking bomb."

Chicago, 8 p.m.

"All of Iraq was a ticking time bomb," Lagouranis said, downing his fourth of seven beers. He had joined the Army before 9/11 to learn Arabic. He didn't expect to go to war.

He was sitting on a night off at the California Clipper bar, where he works as a bouncer. The bartender joked that Lagouranis should be tougher on customers: "You should 'go Abu Ghraib.' "

At Iraq's Abu Ghraib prison, the site of the 2003-04 abuse scandal, Lagouranis used to relax in the old execution chamber. He and a friend would sit near the trapdoor and read the Arabic scratched into the wall. They found a dirty brown rope. It was the hangman's noose. "If there is an evil spot in the world, that was one of them," Lagouranis said.

At Abu Ghraib and sometimes at the facilities in Mosul, north Babil province and other places where Lagouranis worked, the Americans were shot at and attacked with mortar fire. "Then I get a prisoner who may have done it," he said. "What are you going to do? You just want to get back at somebody, so you bring this dog in. 'Finally, I got you.' "

Lagouranis's tools included stress positions, a staged execution and hypothermia so extreme the detainees' lips turned purple. He has written an account of his experiences in a book, "Fear Up Harsh," which has been read by the Pentagon and will be published this week. Stephen Lewis, an interrogator who was deployed with Lagouranis, confirmed the account, and Staff Sgt. Shawn Campbell, who was Lagouranis's team leader and direct supervisor, said Lagouranis's assertions were "as true as true can get. It's all verifiable." John Sifton, a senior researcher for Human Rights Watch, said the group investigated many of Lagouranis's claims about abuses and independently corroborated them.

"At every point, there was part of me resisting, part of me enjoying," Lagouranis said. "Using dogs on someone, there was a tingling throughout my body. If you saw the reaction in the prisoner, it's thrilling."

In Mosul, he took detainees outside the prison gate to a metal shipping container they called "the disco," with blaring music and lights. Before and after questioning, military police officers stripped them and checked for injuries, noting cuts and bumps "like a car inspection at a parking garage." Once a week, an Iraqi councilman and an American colonel visited. "We had to hide the tortured guys," Lagouranis said.

Then a soldier's aunt sent over several copies of Viktor E. Frankel's Holocaust memoir, "Man's Search for Meaning." Lagouranis found himself trying to pick up tips from the Nazis. He realized he had gone too far.

At that point, Lagouranis said, he moderated his techniques and submitted sworn statements to supervisors concerning prisoner abuse.

"I couldn't make sense of the moral system" in Iraq, he said. "I couldn't figure out what was right and wrong. There were no rules. They literally said, 'Be creative.' "

Lagouranis blames the Bush administration: "They say this is a different kind of war. Different rules for terrorists. Total crap."
Tel Aviv

"You have to play by different rules," the Israeli interrogator told an American visitor. "The terrorists want to use your own system to destroy you. What your president is doing is right."

The Israeli, who spoke on condition that he be identified by his code name, Sheriff, recently retired as chief of interrogations for Shin Bet, Israel's security service, which is responsible for questioning Palestinian terrorism suspects. The former head of the service, Avi Dichter, and the former chief terrorism prosecutor, Dvorah Chen, called Sheriff "the best."

"To persuade someone to confess feels better than beating him up," Sheriff said. "It's a mental orgasm."

Sheriff is short and chubby, with thin, reddish skin that turns yellow in the folds when he furrows his brow. He keeps an electric razor in his car so he can shave his head while driving. He wears a cap from the Kentucky Department of Homeland Security.

"Interrogation is a beautiful world," Sheriff said. When Sheriff's 2-year-old was sick and his wife couldn't be at home, he brought the toddler to work and laid him in an interrogation room, on a mattress on the floor: "I put the phone next to the baby and said, 'When you want Daddy, push this button.' "

Another interrogator walked in and exclaimed, "My suspect shrank!"

For Sheriff, interrogation was more psychological than physical. He used flattery on Palestinians who put bombs under playground benches: "You say, 'Hey! Wow! How did you connect these wires? Did you manufacture this explosive? This is good!' "

He played good cop, and bad: "One day I was good. Next day I was bad. The prisoner said, 'Yesterday you were good. What happened today?' I told him we were short on manpower."

Sheriff hugged his suspects, he said, poured them tea and kissed their cheeks. As his former boss, Dichter, put it: "You try to become friends with someone who murdered a baby. That's your job. It's the most difficult feeling." When he came home, Sheriff said, his wife would make him change. "You could smell the guy on your shirt."

But when the pressure mounted for intelligence, Sheriff said, the best method was "a very little violence." Enough to scare people but not so much that they'd collapse. Agents tried it on themselves. "Not torture."

Sometimes a prisoner would accuse Sheriff of torture. He tried to shift the moral burden by blaming the prisoner: "I would tell him this: 'I'm sorry. We prefer it the nice way. You leave us no choice.' "

Chicago, 10:15 p.m.

Lagouranis apologized to his prisoners, too.

"Two brothers, they could've died because we were inducing hypothermia," he said. As Lagouranis was leaving Abu Ghraib, he told one of the brothers: " 'I'm sorry. I'll always consider you a friend,' He gave me a look -- he probably wanted to kill my entire family. I spent a lot of time torturing him, but also talking."

"I could see you trying to comfort him," said Amy Johnson, Lagouranis's girlfriend, sitting at the bar. Johnson likes Lagouranis, she said, because he is gentle.

She was also attracted by the mystery of his job, although she'd never heard the details, until this night. The scars on his ankles from sand-flea bites were visible. Of the unseen scars, Johnson said, "I'm afraid to ask."

"That's the most confusing thing -- people don't hate me," he said.

"But you're trying to fight the bad guys," she said. She knows he is haunted. He got an honorable discharge after a diagnosis of "adjustment disorder." He startles awake, she said: "Last night you had a dream --"

"I never saw a ghost in Abu Ghraib," he said. "But I saw a ghost last night. It was me."

"Seeing innocent people being tortured is hard," she said.

"Not the things I saw, but the things I did. You keep saying 'torturing the innocent,' but the two brothers I tortured were guilty. It doesn't mean you should torture them."

Johnson said nothing. She twisted her hair up into a knot.

Lagouranis kept talking, this time about his Gerber knife with the black handle and five-inch blade: "I'd been interrogating this guy all night." But the prisoner, unafraid, looked Lagouranis in the eye. "I had this idea --"

"That he was guilty?" she said.

"No, at worst he smuggled a can of benzene. It was pure insanity. I wanted to take out my Gerber knife and chop off his fingers."

Johnson blanched, pressed her fingers against her lips.

"I don't know if I comprehend it," she said. "It's not a good place to go."

A Tel Aviv Suburb

The best place to go to unwind, Sheriff said, was the municipal garbage dump. After work, he'd set up a beach chair on top of the landfill, under the Israeli sun.

Now Sheriff was high up on the dump, safe from vindictive prisoners, boiling water on a portable gas burner to make some tea. "Sugar?" he offered. Sheriff stretched, relaxed. "I've got a clean conscience because I rarely use it."

Israeli society, however, has been conflicted. After more than a decade of debate in legal and security circles, the Supreme Court ruled in 1999 that torture is illegal.

Sheriff's concerns, however, aren't legal, they're mortal. He carries a Beretta. In cafes, he faces the door. He ran into a former subject -- "a bit scary" -- knocking on the window of his car.

For all his bravado, quips and denials, Sheriff is afraid to have his full name published.

"I would not like to die in pain."

An Island in the Mediterranean

Pain, for James -- the interrogator tucked away on a Mediterranean island -- was what made the attempt on his life so frightening. The IRA had shot his partner in the heart, he said, but when the gunmen came for him, they brought a sledgehammer.

"They would have tortured me and extracted information," James said.

Britain, like Israel, reformed its interrogation practices. In 1979, the British government acknowledged that Northern Ireland police had mistreated IRA suspects. It introduced restrictions.

"Every time they changed the rules, it was to benefit murdering terrorists," James said, grinding the word "terrorists" with his teeth. "We got no protection. Next we'll be tried as war criminals."

Even today, James bolts awake when the wind knocks over a plant. His wife said, "One night I woke up, and his hands were around my throat, shaking me. I said, 'What are you doing?' He said, 'There are people in the house.' "

James misses his Irish garden. Give him a few brandies and he'll wistfully sing "The Fields of Athenry." His eyes turned red and watery as he said, "The people of Northern Ireland will never know how many lives were saved."

Worse yet, the people he interrogated "are now running the bloody country." They used to glare, with "venomous looks," and say in Gaelic, "Our day will come."

Chicago, 11:50 p.m.

Lagouranis stares at their faces when he cannot sleep. He stole a CD with pictures of the prisoners he interrogated in north Babil. He ponders the brown-skinned men with mustaches:

"This guy looted an American supply truck. He was waterboarded by a Marine."

Click.

"That guy was old as dirt. I don't know why he was there."

Click.

"This guy -- you can see the contusions around his head."

Click.

Alone in his apartment, awake most nights, he sits in rumpled jeans and desert combat boots, throwing his Gerber knife at his coffee table. Dirty clothes and beer cans litter the floor. His refrigerator is bare, but his footlocker is full of empty bottles of pills the military doctors prescribed for anxiety.

"It feels like fear. Of what? I'm not sure," Lagouranis said. "You know what I think it is? You don't know if you'll ever regain a sense of self. How could Amy love me? I used to have a strong sense of morals. I was on the side of good. I don't even understand the sides anymore."

Next to a mattress on the floor where he sleeps hang his dog tags. Beside it, in the closet, lies a thick brown rope. He has tied it into a noose.

Staff researcher Julie Tate in Washington contributed to this report.
http://www.washingtonpost.com/wp-dyn...l?nav=hcmodule





Democrats May Subpoena N.S.A. Documents
James Risen

Senior House Democrats threatened Thursday to issue subpoenas to obtain secret legal opinions and other documents from the Justice Department related to the National Security Agency’s domestic wiretapping program.

If the Democrats take that step, it would mark the most aggressive action yet by Congress in its oversight of the wiretapping program and could set the stage for a constitutional showdown over the separation of powers.

The subpoena threat came after a senior Justice Department official told a House judiciary subcommittee on Thursday that the department would not turn over the documents because of their confidential nature. But the official, Steven G. Bradbury, principal deputy assistant attorney general and head of the Justice Department’s office of legal counsel, did not assert executive privilege during the hearing.

The potential confrontation over the documents comes in the wake of gripping Senate testimony last month by a former deputy attorney general, James B. Comey, who described a confrontation in March 2004 between Justice Department and White House officials over the wiretapping program that took place in the hospital room of John Ashcroft, then attorney general. Mr. Comey’s testimony, disclosing the sharp disagreements in the Bush administration over the legality of some N.S.A. activities, has increased Congressional interest in scrutinizing the program.

At the same time, the Bush administration is seeking new legislation to expand its wiretapping powers under the Foreign Intelligence Surveillance Act. Democratic lawmakers in both the House and the Senate have argued that they do not want to vote on the issue without first seeing the administration’s legal opinions on the wiretapping program.

“How can we begin to consider FISA legislation when we don’t know what they are doing?” asked Representative Jerrold Nadler, Democrat of New York, who heads the subcommittee.

On May 17, after Mr. Comey’s testimony, Mr. Nadler and Representative John Conyers Jr., Democrat of Michigan, who is the chairman of the full Judiciary Committee, wrote to Attorney General Alberto R. Gonzales requesting copies of Justice Department legal opinions used to support the N.S.A. wiretapping program, as well as later documents written by top Justice Department officials that raised questions about the program’s legality in 2004. The letter also asked Mr. Gonzales to provide his own description of the 2004 confrontation.

Mr. Conyers said he had not received a response from the Justice Department. “We’re going to give him two more weeks, and then, as somebody said, it’s about time process kicks in somewhere around here,” Mr. Conyers said.

In an interview after the subcommittee hearing on Thursday, Mr. Bradbury said his refusal to provide the documents was not the final word from the Justice Department on the matter.

But Mr. Nadler made it clear that he did not expect the administration to comply and said he thought he would soon have to push for subpoenas.

In January, the Bush administration announced that it was placing the program under FISA, meaning that it would no longer conduct domestic wiretapping operations without seeking court approval, and officials said they were ending eavesdropping without warrants.

Since then, the White House has said that the debate over the program is moot because it has been brought under court supervision, and the Democrats, focused on Iraq war policy, had done little to challenge such assertions. Mr. Bradbury even said Thursday that the N.S.A. program was “no longer operational.”
http://www.nytimes.com/2007/06/08/washington/08nsa.html





Bird on your wire

Eavesdropping Comes Naturally to Young Song Sparrows

Long before the National Security Agency began eavesdropping on the phone calls of Americans, young song sparrows were listening to and learning the tunes sung by their neighbors.

University of Washington researchers exploring how male song sparrows (Melospiza melodia) acquire their song repertoires have found the first evidence that young birds choose many of their songs by eavesdropping on the tuneful interactions between other sparrows.

In laboratory experiments, the young sparrows were exposed to two adult “tutors,” one of which they directly interacted with vocally and a second one that they only overheard singing with another young bird. Even though they learned from both tutors, the young birds acquired more than twice as many songs from the tutor on which they eavesdropped, said Michael Beecher, lead author of the study and a UW psychology and biology professor.

Scientists study song learning in songbirds in part because it has a number of parallels with human language learning, and Beecher thinks eavesdropping also could play a role in how infants learn language.

Sparrows in the wild are thought to learn their songs in two phases. The first phase occurs in their first summer, when they hear and memorize songs sung by adult birds. The following spring, when the young birds are establishing their own territory, they modify and prune their repertoire so their songs are more similar to their neighbors’. A song sparrow’s repertoire crystallizes at around 10 to 11 months of age and does not change.

Beecher and his colleagues earlier proposed that eavesdropping and interactive singing are critical in song learning. However, they could not determine if the young birds learned more by direct interaction with a tutor or by eavesdropping.

To answer that question, the researchers collected and raised eight baby sparrows for a two-part experiment. When they were about 15 days old, the birds were exposed to four adult sparrows for two months. Song sparrows typically have repertoires of about 10 songs, and the tutors in the study had no song types in common. That meant the young birds heard 40 different songs. The young birds were rotated between two rooms, each of which housed two of the adult tutors. The young sparrows, which had not begun to sing, were exposed to the tutor for four days and then rotated to the other room where they heard the songs of the other two tutors for four days. At the end of two months the young birds were isolated from hearing one another or the tutors.

The second phase of the study began when the birds were about 8 months old. This time only two of the adult tutors were used. Each young bird was paired up with an adult in a large chamber and their vocal interactions were recorded and played to a second young bird in a separate chamber. The next day, the second young bird was paired with a second tutor and the first young sparrow, now in a separate chamber by himself, overhead their interactions.

The songs of all of the young sparrows were recorded when they were nearly a year old, as were the songs of the tutors. Analysis showed that 51 percent of the young birds’ songs were learned from tutors they overheard interacting with another sparrow in the second phase of the study. Just 19 percent came from interacting directly with a tutor. The remaining 30 percent of songs were acquired when they were listening to tutors early in life.

Beecher thinks the young birds learn more by eavesdropping because it is less threatening than interacting face-to-face with an adult. In a parallel line of research, Beecher and his colleagues are tracking song sparrows by radio in the field. Preliminary analysis of the tracking data suggests that young birds don’t have many direct interactions with adults, and so are likely to be learning their songs by eavesdropping.

When it comes to research about how babies learn language, most work has focused on interactions between a parent and an infant, but infants may learn language in part by eavesdropping on conversations between their parents or a sibling, Beecher said.

“Do kids learn from parents talking to them or from other people talking and interacting? We don’t know. We do know that children’s comprehension is much farther ahead than their language production ability, certainly in the first couple of years of life. They can’t say very much, but they can understand a good deal,” he added.

Co-authors of the National Science Foundation funded study are John Burt and Adrian O’Loghlen; UW research scientists, Christopher Templeton, a UW biology doctoral student; and Elizabeth Campbell, a research technician. The on-line edition of the journal Animal Behaviour published the paper. It will appear in the June print issue of the journal.
http://www.newswise.com/articles/view/530405/?sc=swtn





Celebrity Justice Cuts Both Ways for Paris Hilton
Sharon Waxman

The national obsession with celebrity collided head-on with the more serious issue of the equal application of justice on Friday, as a judge sent the socialite Paris Hilton back to jail some 36 hours after she was released for an unspecified medical problem.

Judge Michael T. Sauer ordered Ms. Hilton to serve the rest of her sentence in a county lockup after the city attorney, whose office had prosecuted her, filed a petition asking that the sheriff’s department be held in contempt or explain why it had released her with an ankle monitor on Thursday, after she had served just five days.

Ms. Hilton had been sentenced to 45 days in jail for violating the terms of her probation in an alcohol-related reckless driving case. With time off for good behavior, she had been expected to serve 23 days.

Ms. Hilton, 26, wearing no makeup and with her hair disheveled, sobbed and screamed, “Mom, this isn’t right,” as she was taken from the packed courtroom by deputies.

It was a rare moment in this star-filled city, where badly behaving celebrities can seemingly get away with anything — or at least D.U.I. But Ms. Hilton, for all her money and celebrity, seems to have been caught between battling arms of the justice system here, with prosecutors and Judge Sauer determined to make a point by incarcerating her, only to have the sheriff’s office let her go.

“She’s a pawn in a turf fight right now,” said Laurie Levenson, a law professor at Loyola Law School Los Angeles. “It backfired against her because she’s a celebrity. She got a harsher sentence because she was a celebrity. And then when her lawyer found a way out of jail, there was too much public attention for it to sit well with the court.”

The struggle between the judge and the Los Angeles Sheriff’s Department, which runs the jail, incited indignation far beyond the attention normally paid to a minor criminal matter.

Judicial and police officials here said they were inundated with calls from outraged residents and curious news media outlets from around the country and beyond. The Rev. Al Sharpton, the civil rights activist, decried Ms. Hilton’s release as an example of “double standards,” saying consideration was given to a pampered rich girl that would never have been accorded an average inmate.

Even the presidential candidate John Edwards found himself drawn into the debate. When asked about Ms. Hilton’s release on Thursday he said, “Without regard to Paris Hilton, we have two Americas and I think what’s important is, it’s obvious that the problem exists.”

California has been struggling to comply with a federal order to ease crowding in its jails and prisons, and Sheriff Lee Baca of Los Angeles County has carried out a program of early release. But that has frustrated prosecutors who believe that early release undermines their efforts to punish those found to have broken the law.

At a news conference on Friday, Sheriff Baca said: “The special treatment appears to be her celebrity status. She got more time in jail.” Under the normal terms of the early release program, he said, Ms. Hilton would not have served “any time in our jail.”

The city attorney whose office prosecuted Ms. Hilton’s case, Rocky Delgadillo, said preferential treatment had led to her being sent home with an ankle bracelet. In the original order sentencing Ms. Hilton to jail, the judge had stated that Ms. Hilton would not be allowed a work furlough, work release or an electronic monitoring device in lieu of jail time. “We cannot tolerate a two-tiered jail system where the rich and powerful receive special treatment,” Mr. Delgadillo said after learning of the release.
In a news conference on Friday, Mr. Baca said Ms. Hilton “had a serious medical condition,” though he declined to say what it was.

In a scene that seemed a parody of O. J. Simpson’s low-speed chase more than a decade ago, news cameras on Friday followed a police cruiser containing a sobbing Ms. Hilton as it drove slowly down the Los Angeles highway to Superior Court from her home.

The issue became nonstop fodder for channels like CNN and Fox News, as legal experts debated how rare the decision was to release her, and whether doing so neutralized, negated or otherwise neutered the judge’s original order.

Amid the debate over serious questions of equal justice under the law came speculation over the nature of Ms. Hilton’s “medical situation,” which Mr. Baca cited as the reason for her release. On television, commentators questioned whether she was a suicide risk or if she was eating properly in jail.

Judge Sauer had ordered the hearing for 9 a.m. When Ms. Hilton did not appear, apparently believing that she could participate by telephone, he sent sheriff’s deputies to escort her from her home.

When she arrived and the hearing began, the judge said he had received a call on Wednesday from an undersheriff informing him that Ms. Hilton had a medical condition and that the sheriff’s office would submit papers to the judge to consider releasing her early. The judge said the papers describing a “psychological” problem had not arrived, and he interrupted Friday’s court session every few minutes to state the time and note that the papers had still not shown up.

In ordering her return to jail, Judge Sauer said there were adequate medical facilities within the system to deal with Ms. Hilton’s problems.

Ms. Hilton was not the only high-profile defendant whose celebrity prompted a raised eyebrow from a judge this week. Also on Friday, the judge who sentenced I. Lewis Libby Jr. to prison this week issued an order dripping with sarcasm after receiving a supporting brief from a dozen prominent legal scholars, including Alan M. Dershowitz of Harvard and Robert H. Bork, the former Supreme Court nominee.

The judge, Reggie B. Walton of Federal District Court in Washington, said he would be pleased to see similar efforts for defendants less famous than Mr. Libby, the former chief of staff to Vice President Dick Cheney.

“The court trusts,” Judge Walton wrote, in a footnote longer than the order itself, that the brief for Mr. Libby “is a reflection of these eminent academics’ willingness in the future to step up to the plate and provide like assistance in cases involving any of the numerous litigants, both in this court and throughout the courts of our nation, who lack the financial means to fully and properly articulate the merits of their legal positions.”

“The court,” he added, “will certainly not hesitate to call for such assistance from these luminaries.”

Adam Liptak and Maria Newman contributed reporting from New York, and Ana Facio Contreras from Los Angeles.
http://www.nytimes.com/2007/06/09/us/09hilton.html?hp





School to Prison Pipeline
Bob Herbert

The latest news-as-entertainment spectacular is the Paris Hilton criminal justice fiasco. She’s in! She’s out! She’s — whatever.

Far more disturbing (and much less entertaining) is the way school officials and the criminal justice system are criminalizing children and teenagers all over the country, arresting them and throwing them in jail for behavior that in years past would never have led to the intervention of law enforcement.

This is an aspect of the justice system that is seldom seen. But the consequences of ushering young people into the bowels of police precincts and jail cells without a good reason for doing so are profound.

Two months ago I wrote about a 6-year-old girl in Florida who was handcuffed by the police and taken off to the county jail after she threw a tantrum in her kindergarten class.

Police in Brooklyn recently arrested more than 30 young people, ages 13 to 22, as they walked toward a subway station, on their way to a wake for a teenage friend who had been murdered. No evidence has been presented that the grieving young people had misbehaved. No drugs or weapons were found. But they were accused by the police of gathering unlawfully and of disorderly conduct.

In March, police in Baltimore handcuffed a 7-year-old boy and took him into custody for riding a dirt bike on the sidewalk. The boy tearfully told The Baltimore Examiner, “They scared me.” Mayor Sheila Dixon later apologized for the arrest.

Children, including some who are emotionally disturbed, are often arrested for acting out. Some are arrested for carrying sharp instruments that they had planned to use in art classes, and for mouthing off.

This is a problem that has gotten out of control. Behavior that was once considered a normal part of growing up is now resulting in arrest and incarceration.

Kids who find themselves caught in this unnecessary tour of the criminal justice system very quickly develop malignant attitudes toward law enforcement. Many drop out — or are forced out — of school. In the worst cases, the experience serves as an introductory course in behavior that is, in fact, criminal.

There is a big difference between a child or teenager who brings a gun to school or commits some other serious offense and someone who swears at another student or gets into a wrestling match or a fistfight in the playground. Increasingly, especially as zero-tolerance policies proliferate, children are being treated like criminals for the most minor offenses.

There should be no obligation to call the police if a couple of kids get into a fight and teachers are able to bring it under control. But now, in many cases, youngsters caught fighting are arrested and charged with assault.

A 2006 report on disciplinary practices in Florida schools showed that a middle school student in Palm Beach County who was caught throwing rocks at a soda can was arrested and charged with a felony — hurling a “deadly missile.”

We need to get a grip.

The Racial Justice Program at the American Civil Liberties Union has been studying this issue. “What we see routinely,” said Dennis Parker, the program’s director, “is that behavior that in my time would have resulted in a trip to the principal’s office is now resulting in a trip to the police station.”

He added that the evidence seems to show that white kids are significantly less likely to be arrested for minor infractions than black or Latino kids. The 6-year-old arrested in Florida was black. The 7-year-old arrested in Baltimore was black.

Shaquanda Cotton was black. She was the 14-year-old high school freshman in Paris, Tex., who was arrested for shoving a hall monitor. She was convicted in March 2006 of “assault on a public servant” and sentenced to a prison term of — hold your breath — up to seven years!

Shaquanda’s outraged family noted that the judge who sentenced her had, just three months earlier, sentenced a 14-year-old white girl who was convicted of arson for burning down her family’s home. The white girl was given probation.

Shaquanda was recently released after a public outcry over her case and the eruption of a scandal involving allegations of widespread sexual abuse of incarcerated juveniles in Texas.

This issue deserves much more attention. Sending young people into the criminal justice system unnecessarily is a brutal form of abuse with consequences, for the child and for society as a whole, that can last a lifetime.
http://select.nytimes.com/2007/06/09...erbert.html?hp





Arrested
From the Mind of Charles

On April 18th, I was arrested. This normally wouldn’t be big news, but the situation arround which I was arrested brings up serious questions. I was arrested at Kutztown University, where I am a student, because I decided to try to liven the mood after the Life and Liberty Ministries began to upset students. They came on campus with signs that featured aborted fetuses, lists of people who will be going to hell, and catchy phrases such as “JESUS OR HELL”. I have friends who are gay, and these people who came onto Kutztown University’s campus without permission or prior notice were upsetting students all over campus.

I decided not to simply let them upset people, so I went to the bookstore and purchased a posterboard and sharpie marker and made my own sign. It said “Equal Rights for Robots”, a saying I thought no one would be able to take the wrong way. The protesters had been on campus for about two hours at this time, and the whole time the police were protecting them from the students. To my knowledge, the protesters at this time had not been asked to leave. With my sign in hand, I walked out and waved my sign in the air.

I had some small support from students around me, as most saw the attempt at humor to lighten a rough situation. However, within about two or three minutes a police officer came over to me and told me to come with him. I was dropped off at the police area, searched and taken to the local precinct where I was held for an hour and a half. One of the protesters was held there with me, but I do not know why he was arrested.

I was charged with Disorderly Conduct with intent to “alarm or annoy” and in the citation it says I was “warned repeatedly” to stop. Neither is true, and when I pointed this out to the officer who wrote it out for me he said something along the lines of I don’t care and made a comment along the lines of tell it to the judge. I plead not guilty and face a three hundred dollar fine or up to 90 days in jail if found guilty.

After it happened, I tried to contact the local news and the school newspaper. Only one newspaper bother to contact me, the others didn’t believe me.

The Morning Call - http://www.mcall.com/news/local/all-...,2550072.story

WFMZ - http://www.wfmz.com/view/?id=86577

The Reading Eagle - It’s in the web archive, and you need to buy access to it.

The Keystone, the school newspaper was initially interested in running my side of the story, but then quickly backed down from it when the school decided not to support me. In fact, according to one student who spoke to school officials right after my arrest, the school had me arrested because “We didn’t want any jokers.” Now, I cannot verify that quote myself, but this student is one I would trust to tell me the truth.

This is what happened, and here are some pictures to verify the truth.





http://hngkong.wordpress.com/2007/06/08/arrested/





Laws Threaten Security Researchers
Kelly Jackson Higgins

What if a Web researcher found a bug on your Website today -- but was too afraid of the law to tell you?

The Computer Security Institute (CSI) recently formed a working group of Web researchers, computer crime law experts, and U.S. Department of Justice agents to explore the effects of laws that might hinder Web 2.0 vulnerability research. And the CSI group's first report -- which it will present on Monday at CSI's NetSec conference in Scottsdale, Ariz. -- has some chilling findings.

In the report, some Web researchers say that even if they find a bug accidentally on a site, they are hesitant to disclose it to the Website's owner for fear of prosecution. "This opinion grew stronger the more they learned during dialogue with working group members from the Department of Justice," the report says.

That revelation is unnerving to Jeremiah Grossman, CTO and founder of WhiteHat Security and a member of the working group. "That means only people that are on the side of the consumer are being silenced for fear of prosecution," and not the bad guys.

Unlike other security researchers -- who are mostly free to ferret out bugs in operating systems, device drivers, or other applications via their own machines -- Web researchers focus their efforts on live Web servers -- walking a tightrope of laws designed to prevent hackers from tampering with those machines.

"[Web] researchers are terrified about what they can and can't do, and whether they'll face jail or fines," says Sara Peters, CSI editor and author of the report. "Having the perspective of legal people and law enforcement has been incredibly valuable. [And] this is more complicated than we thought."

The group's goal is to air the legal, ethical, social, and technological issues, not to take a position per se. The CSI report looks at both sides of the issues.

Lee Tien, a member of the working group and a senior staff attorney for the Electronic Frontier Foundation, says Website vulnerabilities must be exposed so people's data and identities are secured. "The fewer vulnerabilities, the better."

The report discusses several methods of Web research, such as gathering information off-site about a Website or via social engineering; testing for cross-site scripting by sending HTML mail from the site to the researcher's own Webmail account; purposely causing errors on the site; and conducting port scans and vulnerability scans.

Interestingly, DOJ representatives say that using just one of these methods might not be enough for a solid case against a [good or bad] hacker. It would take several of these activities, as well as evidence that the researcher tried to "cover his tracks," they say. And other factors -- such as whether the researcher discloses a vulnerability, writes an exploit, or tries to sell the bug -- may factor in as well, according to the report.

Billy Hoffman, lead researcher for SPI Dynamics's labs and a member of the working group, says the laws cover the "means," not the intent, which makes this even more complicated: "The Computer Fraud and Abuse Act deals with methods," he says.

Hoffman says in his research, he occasionally won't fill out a required Web form field to see how the application reacts. "At one point [in the working group discussions], one of the federal people said as soon as you knowingly start using a site the way it wasn't intended to be used, you've crossed the line into where you're doing something wrong."

That caught Hoffman by surprise. "It struck me that by not filling in required fields, I was knowingly doing something the site told me not to do... Is that illegal? I walked away with the impression it is." But in the end, it depends on whether the site operator wants to come after you or not, he says.

Hoffman suggests Web operators could amend their privacy policies, inviting researchers to notify them of bug discoveries. "I'd like to just try to raise awareness that there are Good Samaritan security researchers who want to try to help people who are developing Web apps. But we are not able to help them like the rest of the industry is able to help security vendors."

Meanwhile, researchers continue to worry about the legal ramifications of their activities. "Good and experienced researchers will seriously curtail their discovery and disclosure practices," WhiteHat's Grossman says. "And newcomers with little experience will get busted because they don't know any better. And bad guys will continue to 'game' the system at the expense of the consumer."

The CSI working group's next step is to explore disclosure policy guidelines and mirrored site, or honeypot, guidelines for Website owners. The group is also developing a matrix of Web vulnerability research methods so lawmakers and law enforcement can better understand the methods researchers use. Its next report will be released in November.
http://www.darkreading.com/document....WT.svl=news1_1





H0ly Sh17! Appeals Court: Says "Fleeting Expletives" Ok on Network TV
Eric Bangeman

The US Court of Appeals for the Second Circuit has overturned a Federal Communications Commission indecency ruling, sending the case back down to the FCC for further deliberation. At issue were an f-bomb dropped by pop diva Cher during the 2002 Billboard Music Awards along with a couple of choice expletives voiced by reality show star Nicole Ritchie during the 2003 show, both of which were televised live on Fox.

In November 2006, the FCC ruled that "fleeting expletives" during prime time violated the Commission's indecency and profanity prohibitions. Fox, with the support of the other broadcast networks, challenged the ruling, arguing that the FCC does not issue clear standards outlining acceptable content on TV and radio.

In a 2-1 ruling, the court found that the FCC's policy against fleeting expletives is "arbitrary and capricious under the Administrative Procedure Act for failing to articulate a reasoned basis for its change in policy." It cited the FCC's own history of distinguishing between material that "dwells" on indecent content vs. material that was "fleeting and isolated."

After U2 frontman Bono said "this is really, really, fucking brilliant. Really, really, great" during an acceptance speech during the 2003 Golden Globe Awards televised live on NBC, the FCC was hit with a complaints from the Parents Television Council. The FCC's Enforcement Bureau denied the complaints, saying that Bono's comments were "fleeting and isolated" and didn't describe "sexual or excretory organs or activities." The full Commission later overturned the Enforcement Bureau's decision, saying that f-bombs were "patently offensive under contemporary community standards."

The Court disagreed with the Commission's reasoning that allowing fleeting curse words would result in a 24-hour barrage of expletives, saying that the Commission was "divorced from reality." It is important to note that the Court's decision is limited to fleeting curse words, and should not be intepreted as a blanket license to allow swearing on TV.

FCC Chairman Kevin Martin is not happy with the Court's decision. "I completely disagree with the Court's ruling and am disappointed for American families," said Martin in a statement. "I find it hard to believe that the New York court would tell American families that 'shit' and 'fuck' are fine to say on broadcast television during the hours when children are most likely to be in the audience."

Martin also believes that the Court is the entity with a tenuous grip on the real world. "The court even says the Commission is 'divorced from reality,'" argues Martin. "It is the New York court, not the Commission, that is divorced from reality in concluding that the word 'fuck' does not invoke a sexual connotation."

Sen. Daniel Inouye (D-HI), Chairman of the Senate Commerce Committee also weighed in on the ruling, saying that he hoped that the FCC appeals the case to the Supreme Court. "It is disappointing that a divided Second Circuit panel chose to invalidate the FCC's efforts to combat the gratuitous use of offensive language on broadcast television," said the senator.

Fox is quite pleased with the ruling, saying that it feels that "that government regulation of content serves no purpose other than to chill artistic expression in violation of the First Amendment."

The FCC has been on an indecency kick as of late, spurred in part by activist groups like the Parents Television Council. During the third quarter of 2006, the FCC saw a 40,000 percent increase in indecency complaints after a large-scale campaign to flood the FCC with complaints began. After singer Janet Jackson exposed herself during Super Bowl XXXVIII in 2004, the Parents Television Council was responsible for over 99 percent of the subsequent complaints.

The ruling comes as FCC is seeking authority to increase its regulatory power over both broadcast and cable TV. If it gets approval from Congress, the Commission would like to clamp down on TV violence, and Chairman Martin believes that regulating cable is necessary. "We can't just deal with the three or four broadcast channels," Martin said. "We have to be looking at what's on cable as well." Barring an act of Congress, Appeals Court's decision is likely to put the brakes on the FCC's regulatory urges when it comes to television—unless the Supreme Court overturns today's decision.
http://arstechnica.com/news.ars/post...etwork-tv.html





FCC Beefs Up Emergency Alert System

Commission ready to upgrade EAS with "next-generation" technology.
FMQB

The FCC has adopted an order that will strengthen the Emergency Alert System (EAS). The Commission plans to promote developing "fully digital Next Generation technologies and delivery systems" to better serve the American public.

The FCC order requires EAS participants to accept messages using Common Alerting Protocol (CAP), the groundwork for the next gen EAS delivery systems, no later than 180 days after FEMA announces its adoption of standards. The use of CAP is expected to ensure efficient and rapid transmission of EAS alerts via text, audio and video through broadcast, cable, satellite and other networks.

The EAS enhancements also will assist in access for the disabled and non-English speaking people. The FCC order also requires EAS participants to transmit state and local alerts originated by their governors.
http://fmqb.com/Article.asp?id=416504





Shot Clock Starts on XM - Sirius Merger
John Dunbar

After 3 1/2 months of industry lobbying, congressional hearings and intensive Wall Street analysis, the public will have a chance to weigh in on whether it thinks the proposed merger of the nation's only two satellite radio companies is a good idea.

The Federal Communications Commission issued a public notice Friday seeking comment on the proposed merger of licensees Sirius Satellite Radio Inc. and XM Satellite Radio Holdings Inc.

The FCC will decide whether it is in the public interest for both licenses to be controlled by a single company.

The merger, valued at $4.7 billion when it was announced on Feb. 19, is also subject to approval by the Department of Justice, which will examine any competitive harm that may result from the combination.

The acceptance of the applications for filing starts an informal ''shot clock'' at the FCC, which tries to finish its review of mergers within 180 days. That would put a decision potentially sometime in December.

The merger faces some steep challenges.

To succeed, the Department of Justice will have to decide that the combination of the only two companies in the satellite radio business will somehow not be considered anticompetitive.

The FCC will have to decide whether to allow the companies to break a condition of the licenses that made the business possible 10 years ago.

The agency, at the time, said one licensee will ''not be permitted to acquire control'' of the other. The clause was inserted to ensure ''sufficient continuing competition'' in the new business.

Lawyers, lobbyists and executives for Sirius and XM have said the market has changed since 1997 -- that competition extends beyond satellite radio and includes all forms of ''audio entertainment,'' including Apple iPods, digital ''high definition'' radio and even cell phones.

''The combination of our companies will lead to more choices and better pricing for consumers, and result in a stronger competitor in the rapidly evolving audio entertainment market,'' Sirius and XM said in a statement late Friday.

Consumer groups have generally opposed the merger. Opposition from the National Association of Broadcasters has been relentless.

The FCC says that interested parties must file initial comments by July 9. Replies to comments are due by July 24. Comments may be filed via e-mail and should include docket number 07-57.
http://www.forbes.com/feeds/ap/2007/...ap3804602.html





Big Ed

Humorous take on the ex-chief of SBC/ATT.
http://www.savetheinternet.com/blog/...not-forgotten/





Selling City Halls on Wireless as a Utility
Candace Lombardi

At this week's MuniWireless New England conference, leaders in municipal broadband are extolling the benefits of their technology to urban officials. But is the pitch falling on deaf ears?

On Monday morning, "MuniWireless 101" panelists said that high-bandwidth broadband infrastructures become public safety tools for law enforcement and first responders, help alleviate costs for public schools, aid the rising population of telecommuters, back future entertainment for personal computers, and support public wireless networks.

The U.S. isn't exactly in the lead when it comes to building such infrastructures, though. Some at the two-day conference here pointed to Asian countries that compete economically with the U.S., such as India and Malaysia, as being far ahead of the U.S. when it comes to building high-bandwidth broadband infrastructure nationwide.

"Is it happening? Yes. Is it happening in the U.S.? No. I'm sorry to say it's a bloody mess," said Ken DiPietro, the chief technology officer of NextGen Communications.

Although public wireless networks are one of the benefits of high-bandwidth broadband, there are numerous others. DiPietro said that the popularity of the Joost video-on-demand program, for example, points to an inevitable switch to IPTV in lieu of traditional television and that such a change will put even more strain on broadband networks, unless they are built to be upgradeable every three to five years.

The rise of telecommuting and the increase in video conferencing on the part of companies are other reasons that panelists gave as a reason for municipalities to build, or beef-up their networks.

Cisco Systems is offering relatively inexpensive options for tele-presence, for example, "but you still need the continuous bandwidth to go with it," DiPietro said.

For cash-strapped municipalities, however, the main issue is price.

"I am from a town with 25,000 people. How can we do this for free without using any tax dollars?" asked one municipal leader.

The question provoked a visible smiles and audible sighs among the panelists--and chuckles from the audience. That's because the question embodied one of the issues that the industry is up against: convincing municipalities to invest.

"It comes down to: Do you consider it a service or a utility? I consider it a utility," said Ash Dyer, a researcher at MIT involved in program in Cambridge, Mass., to bring wireless to 95 percent of the city.

Dyer suggested that both companies and municipalities should look at past government models in this instance. He cited the U.S. highway infrastructure built under the Eisenhower administration as one example the federal government should consider adopting.

"They built stretches of highway in the middle of nowhere, between major areas and cities and then told them 'OK, you have to build your stretch if you want to be connected," Dyer said.
http://news.com.com/Selling+city+hal...3-6188539.html





Ex-Cisco Executive to Lead Joost, Internet TV Provider
Brad Stone

Michelangelo Volpi spent 5 of his 13 years at Cisco Systems selling networking equipment to the companies like Comcast and Time Warner Cable that bring television into living rooms.

Now he is trying to do an end run around those same companies.

The high-profile Internet start-up Joost plans to announce today that it has hired Mr. Volpi, 40, as its new chief executive. Joost, which is based in London, is building a global television network of full-length TV shows and movies and sending it to viewers over the Internet.

Joost is still testing its technology with half a million viewers who can watch about 100 channels. The Joost player, which users must download to their PCs, now provides access to niche material like “The Martial Arts Channel,” as well as programs from better-known channels like CNN, MTV and the Cartoon Network that are properties of the media companies Time Warner and Viacom. Both were early investors in Joost.

The challenge for Mr. Volpi, who is known as Mike, will be to build the service into something that regular people will want to watch, and to make it available wherever they want to watch it — meaning places other than their computer screens.

“Traditional television as we know it is gradually going to go away,” Mr. Volpi said in his first interview as Joost’s chief executive. “We hope to capture the hearts and minds of users who have turned away from TV as a form of entertainment.”

Mr. Volpi said that Joost would ultimately be available in many places. “Joost is a piece of software and it can reside on a variety of platforms,” he said. “It could be on a television set-top box. Or potentially it could be imbedded in a TV set with an Ethernet connection, or on a mobile phone, or in some alternative device that might come out in the future. The flexibility is really high.”

Joost was founded last year by Janus Friis and Niklas Zennstrom, creators of the Internet telephone company Skype. Five years ago, as an executive at Cisco, Mr. Volpi flew to London to meet the young founders and was intrigued by the way Skype circumvented traditional phone companies. He joined the Skype board in the fall of 2004 and left after the company was sold to eBay in 2005 for $2.6 billion.

Last year, citing the spread of speedy broadband Internet service and the opportunity to build a global TV network, the pair from Skype started Joost, originally known as the Venice Project.

In an interview, Mr. Friis said that Mr. Volpi was the only candidate they considered to head their new company. “What you really want in these kinds of situations is someone you have had a good relationship with, who you’ve known for years, who you can trust and get along with,” he said.

Quincy Smith, the president of CBS Interactive, which invested in Joost, said that Mr. Volpi is “pound for pound one of the best operators in Silicon Valley.” He added: “It is a huge win for Joost and a great tribute to them that they landed him.”

Mr. Volpi was born in Milan and grew up in Japan. As head of Cisco’s mergers and acquisitions team for seven years, he was responsible for the company’s first 70 acquisitions. Before he left Cisco this year, he was frequently mentioned as a possible successor to the chief executive, John Chambers.

His border-crossing résumé is appropriate for Joost, a service that aspires to weave together programs from around the globe. Joost carries shows from incongruous sources like the Bollywood network Saavn; the Brazilian Music Channel; Fútbol de Nicaragua, and the National Hockey League, and it lets users personalize their channel listings.

“People in China might want to watch ‘Survivor,’ ” Mr. Volpi said “People in Japan might be interested in the latest episodes of ‘C.S.I.’ We offer that capability in a much easier way than it has historically been offered,”.

Though his family is moving to London, Mr. Volpi said he would spend most of his time on a plane, shuttling among Joost’s offices in Amsterdam, London and New York. One challenge: trying to forge closer ties among Joost’s 100 employees, many of whom come from the disparate worlds of media and technology.

Another challenge Mr. Volpi will face is finding other major media companies to distribute their shows on Joost alongside those of Viacom and Time Warner.

“Eventually our hope is that other prime-time providers like NBC, Fox and Disney will come on board, because we are an attractive place given the numbers of users we have,” Mr. Volpi said. “Content owners don’t care where content is distributed so long as it reaches a larger number of users who can be monetized.”

Mr. Volpi said he expected Joost to remain in test mode for the rest of this year, growing to around a million viewers, and then to open its doors more broadly next year.

One focus for the company will be advertising. The company has signed partnerships with companies like United Airlines, Microsoft and Sony Electronics. In addition to showing 15- or 30-second ads during programs (the commercials cannot be skipped “for now,” Mr. Volpi said), Joost will focus on tailoring ads to individual users based partly on the information they provide when they sign up for the service.

The company will also try some creative experiments. For example, after a 15-second commercial for toothpaste, a small graphic called an “ad bug” will float in the corner of the screen reminding users of the brand that was just advertised. If users click on the graphic, a new browser window will open to the Web site of the product.

“From an advertising point of view, this is a paradigm shift,” Mr. Volpi said. “It is not a banner ad or a text ad or a 15-second spot that used to be shown on television. It’s a hybrid that allows you to target the ad to individual viewers and let them act on it.”

Mr. Volpi said he had other opportunities after leaving Cisco, but was drawn to the wide-open frontier of Internet television. “Television is a massive market, and when you put it together with the Internet, and to be on the ground floor of that, there weren’t many other opportunities to do something this big.”
http://www.nytimes.com/2007/06/05/te...y/05joost.html





How Big Will the iPhone Be?

The new must-have smartphone may be a $10 billion business—and could send Apple shares even higher
Peter Burrows

Few stocks trade on emotion the way Apple Inc. does. Its rip-roaring initial public offering in 1980 created the template for modern tech mania, while making Steve Jobs a gazillionaire. When the company fell on hard times in the mid-1990s, no amount of good news could pierce the cloud of doom hanging over investors. Now, with the launch of the hugely hyped iPhone in a few weeks, momentum investors are driving Apple (AAPL) shares to unexplored territory. The stock has doubled in the past year, to 122. Apple's market cap recently topped $100 billion for the first time.

Hard as it is to believe, all the excitement surrounding Jobs and his new toy may actually understate the impact of this device on Apple's fortunes. Beyond the hysteria surrounding its June 29 launch, the iPhone has the potential for adding a totally new, $10 billion-a-year business within just a few years. If Apple can expand so-called smartphones from a luxury carried by corporate road warriors into an everyday tool for the masses—combining the functions of a BlackBerry and an iPod—Apple could soon see a new growth tear.

Up, Up, and Away

That's the kind of thinking that has some analysts pegging Apple's stock price at 160 and up. They contend that the blazing success of Apple's Mac and iPod lines on their own justify much of Apple's current value. JMP Securities' Ingrid Ebeling used conservative price-earnings ratio projections for 2008 to calculate that the Mac business, with revenues of $11.7 billion and net margins of 11%, would be worth $42.70 on its own. The iPod, with $10.8 billion in revenues, 12% margins, and a slightly lower multiple given slowing growth, would be worth $38.87. Add in $6.36 for other music products, $6.76 for peripherals such as Apple TV, $5.91 for software, and $14.18 per share in cash. You're already at $114.78—with no help from iPhone.

What the iPhone adds is a chance to grab prime position in a much bigger, faster-evolving business. Apple is trying to use its design and software expertise to win consumers who mostly buy Plain Jane phone models from entrenched players. The success of the iPod has been remarkable, with 100 million sold since 2001. But more than 1 billion cell phones are sold each year.

If Apple's goal of selling 10 million iPhones by the end of 2008 seemed ambitious to some back in January when Jobs first unwrapped his new baby, few doubt it now. Wall Street speculation has gone from how much market share it can steal, to how much it can expand the overall smartphone market, based on Apple's entry and the competitive response it will elicit from incumbents such as Nokia (NOK), Palm (PALM), and Research In Motion (RIMM).

Price Barrier

The answer may not come until 2009. By then, Apple should have begun creating lower-cost iPhone variants to reach consumers scared off by the introductory $499 price. It also will probably have moved into overseas markets and cut deals with more carriers to utilize higher-speed wireless networks. So while most analysts look for Apple to sell around 3 million units this year and 10 to 12 million in 2008, many figure that 20 million will move in 2009. Piper Jaffray Cos. (PJC) analyst Gene Munster thinks Apple could sell more than 40 million iPhones in 2009—enough to lift revenues more than 30% that year, and earnings by 40%.

Still, Apple will need to execute flawlessly. In units built and shipped, the iPhone launch will dwarf anything Apple has attempted. It plans to have 3 million iPhones ready for sale on June 29, two sources say. (Apple won't comment.) And with its touch-screen keyboard, powerful battery-sapping processors, and a panoply of new applications, the iPhone is far more complex than the iPod. Glitches could lead to costly recalls and returns if buyers find the phone buggy or confusing.

It's easy to forget that the iPod wasn't an immediate hit when it rolled out. Apple had years to ramp up production. Jobs did so expertly, often creating a sense of scarcity by running slightly short of demand. With all the buildup over the iPhone, pumping up demand will be the least of his concerns.
http://www.businessweek.com/technolo..._ top+stories





Lawyer Altered Docs in Best Buy Case
Gene Johnson

A lawyer for Best Buy Co. has acknowledged that he falsified e-mails and a memo before turning them over to plaintiffs in a nationwide class-action lawsuit -- a development that could prompt the judge to find the company liable for tens of millions of dollars in damages.

King County Superior Court Judge Douglass A. North Jr. has previously scolded Best Buy for not being forthcoming with documents related to the case, so last month's revelations about the actions of Minneapolis attorney Timothy Block do not bode well for the company.

The lawsuit, filed in 2003, accuses Best Buy of signing up at least 100,000 customers for trial subscriptions to Microsoft Corp.'s MSN Internet service from 1999 to 2003, in many cases without their knowledge. Once the trial period ended, the customers began incurring credit card charges they had not approved.

Microsoft, which paid Best Buy for each customer it signed up, is accused of allowing Best Buy's practice to continue even after receiving complaints. The lawsuit aims to hold Best Buy, Microsoft or both financially liable; if the judge enters a default judgment against Best Buy, Microsoft would essentially be off the hook, said Beth Terrell, a Seattle-based attorney for the plaintiffs.

For now, the case has been stayed while Best Buy finds new outside counsel. Block's firm, the prominent Minneapolis firm of Robins, Kaplan, Miller and Ciresi, asked to withdraw after he admitted May 23 to redacting or otherwise altering the documents. A hearing on the withdrawal motion is set for June 22.

"Mr. Block confirmed that no other person at RKMC, and no person at Best Buy, were aware that he had changed documents," the firm said in a court filing the next day. "RKMC has begun its investigation into the number of documents that were altered and is attempting to locate the original (pre-alteration) documents."

Block reported his wrongdoing to Minnesota's Board of Professional Responsibility as well as the three other states where he is licensed to practice, and is on medical leave for stress and depression, said his attorney, Richard Thomas.

The altered documents are limited to two e-mails and one memo, Thomas said. The documents have not been publicly released.

Asked why Block falsified the documents, Thomas said, "I don't know that even he can tell you that. ... I don't think he is going to claim his actions were motivated by Best Buy."

But given the extent of Best Buy's foot-dragging regarding document production in the case, Terrell and another attorney for the plaintiffs, Dan Girard of San Francisco, wondered aloud whether Block felt pressured by the company to withhold or redact documents that could prove damaging. A senior partner at Block's firm, Elliott Kaplan, is a director at Best Buy.

"Best Buy has been violating court orders willfully. This is sort of the last step," Terrell said.

Steven Schumeister, managing partner at Robins Kaplan, said it is clearly a case of individual wrongdoing by someone going through a difficult time. The firm remains concerned for Block and his family, he said.

"We and Best Buy have acted promptly and properly to make all of the required disclosures and to work to resolve this matter," Schumeister said.

Best Buy spokeswoman Dawn Bryant emphasized that the company "had absolutely no knowledge of the inappropriate and unethical actions the attorney took."

At a hearing in March, the judge scolded Best Buy and its lawyers for failing to follow orders directing them to turn over documents requested by the plaintiffs, and to identify and log any documents they believed were not subject to disclosure. North said he was hoping to avoid entering a default judgment against the company, but that he would have little choice if Best Buy didn't start playing ball.

"I don't know and I don't really care at this point whether it's you, some functionary in your firm, or your legal team, but I do know that somebody in your camp is interfering with discovery in this case," North said, according to a transcript.

In response, Block said Best Buy spent more than $250,000 to create an electronic system to search documents. He told North that he felt "great trepidation" and "almost a feeling of personal failure" that the judge still believed Best Buy was not cooperating.
http://www.businessweek.com/ap/finan.../D8PIT9301.htm





New Zero-Day Bugs Crop up in IE, Firefox

Critical flaw in Internet Explorer and a major bug in Firefox
Gregg Keizer

A noted security researcher disclosed four new zero-day vulnerabilities in Microsoft and Mozilla's browsers, including a critical flaw in Internet Explorer (IE) and a major bug in Firefox.

Michael Zalewski, who regularly publishes browser flaw findings, posted details on the Full-disclosure mailing list for cookie-stealing, keystroke-snooping, malicious downloading and site-spoofing bugs.

The most serious of the four, said Zalewski, is an IE6 and IE7 flaw he rated "critical." Dubbing it a "bait-and-switch" vulnerability, he said that the Microsoft browser gives hackers a window of opportunity to run malicious Javascript to hijack the PC.

"The entire security model of the browser collapses like a house of cards and renders you vulnerable to a plethora of nasty attacks," Zalewski claimed in notes that accompanied a demonstration of the IE bug. Up-to-date IE6 and IE7 are both at risk, he said, although Firefox is not.

But Mozilla's browser also suffered at Zalewski's hands. A new IFrame vulnerability in Firefox 2.0 can let attackers plant keyloggers or drop malicious content into a legitimate web site. The flaw, rated as "major," is related to a similar bug discovered last year; although Mozilla patched that problem, Zalewski said the fix hadn't plugged all the holes.

Zalewski posted information about two other bugs, both rated "medium." A Firefox vulnerability could lead to unauthorised downloads, while IE6 is open to yet another address bar-spoofing flaw. "IE7 is not affected because of certain high-level changes in the browser," Zalewski said of the fourth vulnerability.

Mozilla is aware of both Firefox bugs — they have been posted to its Bugzilla management system — and a Microsoft spokeswoman said the company's security team is looking into Zalewski's claims. "Upon completion of this investigation, Microsoft will take the appropriate action, which may include issuing a security advisory or providing a security update," she added.

Microsoft also said it knows of no ongoing attacks using the vulnerabilities.
http://reseller.co.nz/reseller.nsf/n...2572F000834E7F





Competing as Software Goes to Web
John Markoff

Can two bitter rivals save the desktop operating system?

In the battle between Apple and Microsoft, Bertrand Serlet and Steven Sinofsky are the field generals in charge of competing efforts to ensure that the PC’s basic software stays relevant in an increasingly Web-centered world.

The two men are marshaling their software engineers for the next encounter, sometime in 2009, when a new generation of Macintosh and Windows operating systems is due. Their challenge will be to avoid refighting the last war — and to prevent finding themselves outflanked by new competitors.

Many technologists contend that the increasingly ponderous PC-bound operating systems that currently power 750 million computers, products like Microsoft’s Windows Vista and Apple’s soon-to-be-released Mac OS X Leopard, will fade in importance.

In this view, software will be a modular collection of Web-based services — accessible by an array of hand-held consumer devices and computers — and will be designed by companies like Google and Yahoo and quick-moving start-ups.

“The center of gravity and the center of innovation has moved to the Web, where it used to be the PC desktop,” said Nova Spivack, chief executive and founder of Radar Networks, which is developing a Web service for storing and organizing information.

Faced with that changing dynamic, Apple and Microsoft are expected to develop operating systems that will increasingly reflect the influence of the Web. And if their valuable turf can be preserved, it will largely reflect the work of Mr. Serlet and Mr. Sinofsky, veteran software engineers with similar challenges but contrasting management styles.

Their rivalry took a personal tone last summer when Mr. Serlet publicly poked fun at Windows Vista by highlighting features that seemed derivative of Apple’s OS X.

“We hung in the hallways of the conference a big banner that said, ‘Redmond, start your photocopiers,’ ” he said, recalling an event the year before. “It was all a joke, but they actually took us seriously.”

One software developer who has worked at both companies — and asked not to be identified because he still consults for Microsoft — compared the two men’s approaches to the difference between martial marching band music and jazz.

Mr. Sinofsky’s approach, he said, is meticulously planned out from the beginning, with a tight focus on meeting deadlines — a crucial objective after the delay-plagued Vista project — but with little room for flexibility. In contrast, the atmosphere inside Apple’s software engineering ranks has been much more improvisational.

Mr. Serlet, a French computer scientist who was drawn to Silicon Valley two decades ago, has developed a loyal following among Apple’s rank-and-file programmers. He has a quirky personality, according to several members of his team, and takes a certain amount of teasing inside the company.

“Bertrand Serlet likes the process to be a little chaotic,” said one Apple programmer, who insisted he not be identified because of company restrictions on public statements by employees. “There’s a strong dependence on people making the right judgment calls the first time.”

Mr. Serlet and Mr. Sinofsky said they were too busy to give interviews.

Mr. Sinofsky, 41, who joined Microsoft in 1989, is the senior vice president for the Windows and Windows Live engineering group, a position he assumed a year ago after running the company’s Office team of programmers. Mr. Serlet, 46, Apple’s senior vice president for software engineering, left Xerox’s fabled Palo Alto Research Center to join Steven P. Jobs at Next Software in the late 1980s and has headed software development at Apple since 2003.

Both men are the best of a technical elite. “Bertrand is wicked smart,” said Dan’l Lewin, a Microsoft corporate vice president who worked with Mr. Serlet at Next. “He was one of the bright lights.”

Mr. Lewin now works with Mr. Sinofsky, who he said had brought needed discipline to the company’s largest development project. “His ability is in understanding the end-to-end process and architecture and knowing every nook — it’s amazing,” Mr. Lewin said.

People who know both men say that their contrasting management styles play out in the organization of the armies of software developers that are necessary to design complex operating systems.

“Under Sinofsky, the culture is, you plan and stick to the plan,” said Steven Capps, a former Apple and Microsoft programmer who has designed operating systems at both companies. “At Apple you see what you’ve got.”

The potential risk in the Microsoft approach, he said, is that “they’re like the test pilots who won’t pull up when they see the tarmac.”

As a technical assistant to Bill Gates, Microsoft’s chairman, in 1994, Mr. Sinofsky was one of the Microsoft employees who alerted Mr. Gates to the Internet challenge, after seeing students using the Web at his alma mater, Cornell University.

Now in charge of the company’s most important development project, Mr. Sinofsky has proved to be far more secretive than his predecessor, Jim Allchin, who retired from Microsoft this year. Shortly after the consumer release of Vista in January, the company took the unusual step of issuing a statement saying that it had nothing to say about its plans for future operating systems.

After struggling for more than half a decade with Vista, its most ambitious development project ever, Microsoft has begun work on a reportedly less ambitious successor under Mr. Sinofsky’s leadership. The new operating system effort has in the past been referred to alternately as Vienna and Windows 7.

Microsoft is trying again to reconcile the PC operating system with the Internet. It calls the new strategy Windows Live, an effort to leverage its desktop monopoly onto the Web. That effort can be seen in Mr. Sinofsky’s dual role. He is in charge of development for both the next version of the Windows operating system and the new Internet services.

The company has hinted recently that Mr. Sinofsky’s team may be trying to keep the PC operating system relevant by redesigning it to take full advantage of next-generation processing chips from Intel and Advanced Micro Devices that will have dozens of internal processors.

The company’s chief executive, Steven A. Ballmer, refers to the new approach as “integrated innovation.” But it is less clear yet whether Mr. Sinofsky will have the agility to respond to what is being called an era of “loosely coupled innovation” — an agility that has been the hallmark of nimble Web services developers.

Small groups of programmers have been using the Internet to introduce services far quicker than the slow-moving operating systems projects have been able to respond.

“The challenge for Steve is to get Windows in that mode,” said Michael A. Cusumano, a professor of management at the Sloan School of Management of the Massachusetts Institute of Technology. In the future, he added, Windows will most likely be broken into “smaller pieces released more frequently or put up as a Web service.”

That will mean that the era of big software releases may have come to an end.

“I think that you won’t think about big new releases in the future,” said John Seely Brown, the former director of the Palo Alto Research Center. “You really want to be able to make lots of incremental improvements in ways that things just get better and better.”

The rise of the Web presents similar challenges for Apple. While the company has been extremely successful with iTunes, its online audio and video service, efforts like .Mac, a suite of Web-based applications that was intended to be an integrated part of the Mac OS X operating system, have lain fallow for several years.

Now Mr. Serlet’s programmers are planning to integrate Apple’s consumer products and its personal computers more closely with the Internet, according to several people briefed on the company’s plans. Indeed last week, at an industry conference, Mr. Jobs said that an infusion of Web services for Macintosh users was imminent.

Apple is expected to add a networking capability to its next-generation iPod music players. In addition, the software for its next big product, the iPhone, is based on the core of OS X, the operating system for the Macintosh. The approach further blurs the line between the computer and other devices — as well the distinction between the device and the Internet as the place where programs and data reside.

That shift is likely to be the distinctive feature of both companies’ operating- system efforts.

“It’s a very important, longer-term trend of incremental innovation,” said David B. Yoffie, a professor at the Harvard Business School. Software will be “increasingly componentized and offered over the Web.”

Still, there are those in the industry who believe that the very nature of software will assure both Mr. Sinofsky and Mr. Serlet comfortable careers for the foreseeable future.

“Software is like the tax code,” said Jean-Louis Gassée, a venture capitalist and a former Apple executive, who in the 1990s developed an operating system called Be. “You add lines, but you never take anything away.”

Daniel D. Turner contributed reporting.
http://www.nytimes.com/2007/06/05/te...05compute.html





A Makeover at Ask.com: A New Look and More
Miguel Helft

Jim Lanzone, the chief executive of Ask.com, the fourth-most-used Internet search engine in the United States, believes that it is time to move beyond the 10 blue links — the standard way to display Web search results.

Starting today, Ask.com, which plans to spend close to $100 million this year to promote its service, will present answers to queries in a three-panel screen that includes standard links to search results but also lists of related searches and results from blogs, as well as video, photo, news and shopping sites.

The service, which the company calls Ask3D, is being described as a radical change to the presentation of answers by a major search engine. It is aimed at making it easier for users to find what they are looking for and comes amid a race by search engines to integrate new forms of online content into search results in an attempt to attract more users.

“There are a lot more types of content online than there were a few years ago,” Mr. Lanzone said. “But the search experience still looks like it did in 1996.”

In recent years, all major search engines, including those of Google, Yahoo and Microsoft, have tried to bring new types of content into search results. Last month, for instance, Google unveiled a service it calls universal search that intersperses videos, photos, news and other content into traditional search results.

But while Google, Yahoo and Microsoft have introduced changes gradually and have largely stuck with the traditional presentations, Ask.com, which is owned by IAC/InterActiveCorp, is taking a different, if riskier, approach.

“It’s a pretty radical change,” said John Battelle, the chief executive of Federated Media, a blog ad network, and author of “The Search,” a book about Google. “Most of the big players have a lot to lose, so they don’t want to shock the system. Ask has less to lose.”

Ask.com’s novel approach begins as a user types in a query: the service suggests ways to refine it. Type “Bill Cl” and it will suggest “Bill Clinton Memoir,” “Bill Clinton Scandal,” “Bill Clinton Biography” and other alternatives.

But it is the results page that truly distinguishes Ask.com from others. In addition to the traditional search results, which are displayed in a central panel on about half the screen, the left quarter of the page is dedicated to suggestions on how to expand or narrow the search or for related searches.

The right quarter is reserved for different types of content depending on the query. A search for Bill Clinton, for example, will include photos, news photos, news articles, videos and even songs about him. A search for Buenos Aires will deliver photos along with the weather forecast and current time for that city, as well as a Wikipedia entry.

Mr. Lanzone hopes that the new service, which it has been testing on a site called AskX for several months, will lift the company’s share of all searches, which has been hovering at about 5 percent for much of the last year, according to comScore Inc., a Web measuring service. But, Mr. Lanzone said, to succeed, Ask.com does not necessarily have to take customers from Google or other search engines.

“The way we will grow is by increasing the frequency of use of the 30 million monthly users we already have in the U.S.,” Mr. Lanzone said, adding that on average, those users visit Ask.com three times a month.
http://www.nytimes.com/2007/06/05/technology/05ask.html





Navy CIO 'Recognizes the Importance of OSS to the Warfighter'
Joe Barr

John Weathersby, executive director of the Open Source Software Institute, told Linux.com today that, effective immediately, the Department of the Navy has adopted a new policy which requires that open source software must be considered in every software acquisition the Navy makes.

Department of the Navy CIO Robert J. Carey signed a memorandum (pdf download) today entitled "DEPARTMENT OF THE NAVY OPEN SOURCE SOFTWARE GUIDANCE" which first notes that misconceptions about whether or not open source software qualifies as COTS (commercial off-the-shelf) or GOTS (government off-the-shelf) software has hindered the Navy's ability to fully utilize open source software.

The new guidance memo unequivocally states that the Navy will now "treat OSS as COTS when it meets the definition of a commercial item" in an enclosure to the memorandum. The enclosure offers several definitions, the first of which follows:

(A) Any item, other than real property, which is of a type customarily used by the general public or by nongovernmental entities for purposes other than governmental purposes, and that

(i) has been sold, leased, or licensed to the general public; or
(ii) has been offered for sale, lease, or license to the general public.

Weathersby notes on the OSSI website that "The 'User Guidance Memorandum' is the first in a series of guidance documents to be developed by the DON (Department of the Navy) to address issues regarding 'Users' of open source software within all Navy IT systems." He added that "Future guidance memorandums will address 'development' and 'distribution' issues regarding open source within Navy IT environments."

The working group included representatives from the Navy, Marine Corps, the IT Industry, vendors, and the open source community. Weathersby was a part of that working group and said, “It was truly a group effort, but as a representative of the Open Source Community and commercial IT industry, I offer the men and women who worked on this project a sincere and heartfelt thanks and a special recognition for their vision, fortitude, and leadership.”

Bravo Zulu, DONCIO!

(Bravo Zulu is a Naval signal meaning "Well Done!)
http://www.linux.com/article.pl?sid=07/06/06/0135204





Microsoft Trounces Pro-ODF Forces in State Battles Over Open Document Formats
Eric Lai and Gregg Keizer

In a resounding victory for Microsoft Corp., bills seeking to mandate the use of open document formats by government agencies have been defeated in five states, and only a much-watered-down version of such legislation was signed into law in a sixth state.
The proposed bills would have required state agencies to use freely available and interoperable file formats, such as the Open Document Format (ODF) for Office Applications, instead of Microsoft Corp.'s proprietary Office formats. The legislation was heavily backed by supporters of ODF such as IBM, which uses the file format in its Notes 8 software, and Sun Microsystems Inc., which sells the ODF-compliant StarOffice desktop application suite.

But a bill introduced in Connecticut earlier this year met a quick death. And in Florida, Texas and Oregon, would-be laws were all killed off within the past month while being debated in legislative committees, following fierce opposition from Microsoft lobbyists and allies of the software vendor.

The most recent defeat occurred last Thursday in California, where a toned-down version of a bill in favor of open formats was declared to be stalled in the state assembly's Committee on Appropriations -- even though the bill's sponsor, Mark Leno a Democratic assemblyman for San Francisco, chairs the committee.

A spokesman for Leno declined to comment on the fate of the bill, which was introduced in February. But Microsoft also fought the proposal in California (download YouTube video).

The only recent victory for advocates of open formats was a Pyrrhic one. In Minnesota, a bill that would require state agencies to begin using an open, XML-based format by July 2008 was eventually transformed into a call for the state's IT department to study the issue. That language was attached to another bill that has been signed by Gov. Tim Pawlenty, according to Don Betzold, a Democratic state senator who was the original sponsor of the open formats proposal.

Betzold said he got interested in the topic of ensuring long-term access to state documents after observing the difficulty of accessing old data stored in mainframes and on floppy disks.

Too much technology

But during the ensuing policy debate, Betzold and other politicians quickly felt overwhelmed by the technical jargon presented by each side. "I wouldn't know an open document format if it bit me on the butt," he said. "We're public policy experts. [Deciding technical standards] is not our job."

Microsoft didn't respond to requests for comment about the legislative results in the various states. But one of its close allies said they showed the unpopularity of technical mandates.

"The media stories you were reading [about the introduction of the bills] made it sound like there was some sort of revolution on the ODF front," said Melanie Wyne, executive director of the Initiative for Software Choice in Washington. "But in each case, they were completely killed, stalled indefinitely or, in the case of Minnesota, turned from an outright mandate into a study bill."

Wyne's group is the lobbying arm of the Computing Technology Industry Association, or CompTIA, which worked closely with Microsoft to fight the pro-ODF legislation.

Despite the string of defeats, Marino Marcich, executive director of the Washington-based ODF Alliance, said the legislative fight has only begun.

"We had more bills than we ever anticipated," Marcich said. "In three years, we expect open document formats to be a requirement by most states, whether that arrives via legislation or by executive policy decision."

Massachusetts stands alone

National governments in countries such as Norway, Belgium, Denmark and France are all testing or have approved moves to open file formats. But in the U.S., the only state that currently has a policy requiring the use of open formats is Massachusetts. Its policy was developed by state executive branch officials and adopted in late 2005, via an order issued by then-CIO J. Peter Quinn.

Even in Massachusetts, though, technical and political realities have limited the impact of the open formats policy.

Microsoft lobbied heavily against the policy in the state legislature, and advocates for people with disabilities complained that ODF-compliant applications don't work with screen readers and other tools used by the blind as well as Office does. Last year, Massachusetts officials said the state planned to adopt plug-in software that would let its Office users create and save files in ODF, enabling agencies to continue using the Microsoft applications.

Microsoft has fought the various state bills even though the company is putting forward Office Open XML -- the file format used in its new Office 2007 software -- as an open standard in its own right.

The software vendor's hardball lobbying tactics also played a part in the outcome of the debate over the open formats bill that was proposed in Minnesota, Betzold said. But he added that neither side was innocent. "IBM had their own interest, and Microsoft had their own interest," he noted.

Both camps have tried to play up evidence of grass-roots support, from blogs on the pro-ODF side to letters written by small businesses against the proposed legislation -- letters that turned out to have been penned by Microsoft resellers and partners.

A heavyweight brawl

But, Wyne said, "this really is a battle among large commercial interests" -- a comment that was echoed by other people engaged in the political fighting.

In Texas, corporate lobbying was also behind both the creation and eventual demise of HB1794, a bill in favor of open formats. The bill's sponsor, state Rep. Marc Veasey, acknowledged that he became interested in the issue only after being approached by former political colleagues who now work for IBM.

But he insisted that the deciding factor in convincing him to propose the bill was a conversation with officials at the Texas Department of Information Resources (DIR) who told him they would welcome such legislation. The DIR officials "said that while there was nothing to prevent us from immediately going to open document formats, they would prefer, for a variety of reasons, for the legislature to say, 'We're going to this format,'" Veasey said.

That isn't the way it was recalled by Jonathan Mathers, though. Mathers is chief clerk for the Committee on Government Reform in the Texas House of Representatives and is in charge of researching bills for the committee, which considered and eventually quashed HB1794.

"The committee wanted a flat-out answer from the DIR," he said. "Was [moving to open document formats] something we should be doing right now? And did they need the backing of the committee to do it? The answer in both cases was no."

Keeping it private

The other problem, Mathers said, was the jargon-laden disinformation that committee members felt they were being fed by lobbyists for both IBM and Microsoft. Although lobbyists would tell the committee one thing in private, they got cold feet when asked to verify the information publicly under oath. "Suddenly, nobody wanted to sign witness affirmation forms and testify," he said.

That undermined the credibility of each side, but it particularly damaged the position of ODF proponents. After Wyne testified publicly that in Massachusetts, only a handful of computers had thus far been converted over to using ODF. IBM declined to dispute her claims, Mathers said -- despite having earlier given "gleaming" reports on the progress of ODF in Massachusetts. "That's when I really started to question the whole bill," he said.

Veasey blamed other factors. For example, he claimed that the reform committee has a historical bias against government mandates. He also cited Microsoft's tactics. According to Veasey, the software vendor cooperated with him on initial drafts of the bill but then refused to sign off at the last moment. He said said Microsoft also hired a top local lobbying firm that went to the expense of bringing in witnesses from other states and countries.

All of that was unnecessary, Veasey said. The bill's language put Office Open XML on a level playing field with ODF, even though the former is still seeking the approval from the international standards organization ISO that the latter already has. "From my perspective, Open XML would have fit now," said Veasey, who added that he plans to continue pushing for open document formats when the Texas legislature meets for its next biennial session in 2009.

Bottled bills

Oregon's attempt to push state agencies toward open document formats -- officially known as House Bill 2920 -- met the same fate of dying in committee.

"There was heavy opposition from a certain large software company in Redmond, Wash.," a spokesman for Rep. Peter Buckley said Friday. "But we don't name names." Buckley, a Democrat, sponsored the bill in the state legislature.

His spokesman said Oregon's secretary of state also questioned the cost of converting to applications that support open formats. Buckley plans to reintroduce his bill in the next legislative session. But as in Texas, the earliest that could happen is January 2009.

In Florida, a bill that landed on the desk of Gov. Charlie Crist last Friday once included language that touted open document standards. But that section never made it out of the committee process. "It was added as an amendment but struck by the members in committee," confirmed Ray Wilson, staff director of the state senate's committee on governmental operations.

The amendment to Senate Bill 1974 would have required state agencies be able to receive documents in open formats but would not have automatically banned proprietary formats. Even so, Microsoft's reaction was swift.

According to a story posted in late April on the MarketWatch Web site, Rep. Ed Homan, the Republican legislator from Tampa who tried to amend the bill, said that Microsoft lobbyists pressured committee members to yank the addition. "They were here lickety-split," he told MarketWatch.
http://www.computerworld.com/action/...icleId=9022878





After Ubuntu, Windows Looks Increasingly Bad, Increasingly Archaic, Increasingly Unfriendly

The Changing Trajectory of Software
Paul Nowak

My recent switch to a single-boot Ubuntu setup on my Thinkpad T60 simply floors me on a regular basis. Most recently it's had to do with the experience of maintaining the software. Fresh from a very long Windows 2000 experience and a four-month Windows XP experience along with a long-time Linux sys admin role puts me in a great position to assess Ubuntu. Three prior attempts over the years at using Linux as my daily desktop OS had me primed for failure. Well, Ubuntu takes Linux where I've long hoped it would go - easy to use, reliable, dependable, great applications too but more on that later. It has some elegance to it - bet you never heard that about a Linux desktop before.

There are many night-and-day differences between Windows and Ubuntu and, for a guy that does 80% standard office tasks and the rest of the time I'm doing Linux admin tasks, it was nearly all in favor of Ubuntu after the first few weeks of the transition. Overall, my productivity and the scope of things I can do with Ubuntu far exceed what I could do with Windows and just as importantly Ubuntu (like any Linux would) lets me easily create my own productivity shortcuts of a variety of sorts.

One of the things that's become clear as I've gotten used to the appliance-like experience of Ubuntu is that the future of software in an open source-dominated world is going to be significantly different than the world dominated by Microsoft. So what distant point on the horizon has Ubuntu shone a light on for me? Simple. Software will increasingly compete on ease of use in the total software experience more than on features. The future will be more about being simple than about any other dimension.

Here are some recent use cases:

_ I needed to rebuild my T60 with a fresh OS. Which was easier? MS Windows with a factory install disk, separate disks for Office and for Virus protection and then a lot of hunt-and-peck downloading for various apps like Thunderbird, Firefox, SSH, and Calendar or....Ubuntu with one CD and an OS that includes an integrated, extensible, and slick software package manager where all the software is approved and tailored to the installation?

_ I needed to rebuild a T43. I tried to use the rebuild partition included on the HD but it was corrupt. So I tried to make factory-install disks but the corrupt partition prevented it. Next option? Call Lenovo and get disks sent for $51. That process took five days and eight CD-ROMs from start to finish. With Ubuntu, this process takes three hours max, not four days and there's no software keys or other things to track down. The labor involved is less than a fifth with Ubuntu and the delivered product is a lot more productive - for my use models anyway.

_ I needed to resubscribe to Symantec on a Windows machine. Again this is a 30-60 minute timeout from production AND a $49 charge AND a hassle with product keys and sending data about my machine and purchases around to companies that I'd choose not have it if I had a choice. But I didn't since Windows XP needs Symantec's products badly even though these scanning and cleaning products degrade machine performance badly - even with a gig of RAM.

_ And I now hear that Windows Vista renames the partition it's installed on what used to be the C: partition. I need to check out this story but the very idea of automatic partition renaming is insane to even contemplate.


So my machine sings with Ubuntu. Having no virus scanning alone unleashes a responsiveness that makes the power of the T60's Intel dual-core shine. And what am I noticing most about all of this?

Well, first off Ubuntu is good as a productivity platform. Without that, the rest wouldn't matter a bit. But since Ubuntu is not only good on features but reliability then at least some of us would crawl over broken glass to get it installed.

But, in fact, there's no broken glass in the picture. It's the opposite. Ubuntu's installation is so easy, and maintaining it once it's installed is so simple that Ubuntu nearly falls into your machine like a ying to the hardware's yang. Once there, Ubuntu happily makes a home in your head with hardly a blip. I think Ubuntu actually dropped my blood pressure. Not something you typically find when switching ALL your software for something that's about as alien to Windows as it possibly can be.

Once that major hurdle is cleared, then the other big issues come into focus. Ease of install, easy updates, easy software maintenance, easy data backups. After experiencing Ubuntu, the world of Windows looks increasingly bad, increasingly archaic, increasingly like a neighborhood that makes life hard. Why should I put up with what Windows makes me go through if I don't have to?

I've used rsync for backups for years. I back up my mail, my Thunderbird data, and "my document" directory (i.e., /home/xxxx/). One of these backup commands looks like this and sits in a single shell script and runs from cron once a day (I've already sent the ssh key to the backup target server so no need to manually login to the backup server for this command to run):

rsync -avgz /home/xxxx/.mozilla-thunderbird/ root@mycomcastipnumber:/hdb/ibmt60-ubuntu-mozilla-tbird/ >>
/home/xxxx/backup-.txt

That little command executes in a few seconds to a few minutes no matter where I am on the Internet and even if I've added some decently sized files to my computer. I've got my home router set up to pass the ssh port 22 through to a Linux server sitting in my attic. Quick and painless backups run without a hitch. It's a thing of beauty. I use the same solution for my servers so having a single platform from server to desktop has benefits and this is but one of them. I used to sweat about my Windows backups in the old days - if I did them every two weeks, I was happy. Ubuntu dropped my blood pressure on backups alone by 10% and now I have to decide how often is too often to do a backup. Also, I'm up on the MIRRA product but, trust me, you don't want to forget a password there.

Through a similar setup, I can also print to my home printer from any Internet connection. This is not a Windows- or Linux-specific feature but it's nice to have and I use it more than I expected. This is just good fun but it may also drop my blood pressure a point or two.

So far, none of this is news to those in the know about Ubuntu. It's not news but it is a big deal. A very big deal. Ubuntu is getting rave reviews: it's a productive platform, it's a reliable platform, it's a durable platform, it's an upgradeable platform, it's an easy-to-install platform, and adoption is through the roof.

What's changing in all this?

In my view, once you realize the platform is viable from a daily productivity standpoint (exceedingly so), the #1 thing that Ubuntu is then changing is ease of access to software. If I had decided to rebuild my PC with Windows XP - we won't even talk about Vista - this is what I was looking at:

1) Buy OEM Install disks from Lenovo because my rebuild partition was corrupt - $51.

2) Buy a Symantec subscription because I was done with the 90-day free trial - $49.

3) Buy an extra 512MB of RAM because XP couldn't run Firefox, Thunderbird, MS Word, MS Excel, and SSH all at once with 512MB of installed RAM - $104.

4) Install all of the above with product keys along the way - four hours? Maybe six? Maybe more because the tools for getting 2GB-3GB of mail data back into Thunderbird in Windows aren't nearly as good as the same tools in Linux.

That's $204 just to get me back to where I thought I was two months back - i.e., a machine with XP and Office on it. Symantec alone is going to want to pick my pocket again at some point.

Ubuntu releases me from these costs and from these long-term headaches:

1) Viruses - I no longer worry and I no longer need to check my PC - that's a relief. You can pick nits here about security but the bottom line is Ubuntu is orders of magnitude better.

2) Vulnerabilities - Windows is like Swiss cheese with so many vulnerabilities that it's sick - you can't connect XP to a public Internet connection (i.e., behind a router is OK but direct to the net isn't). Ubuntu? It's Linux - no worries.

3) Thanks to #1 and #2, I'm free from products like Symantec and Norton and the dollar expense, the complexity of administering them (those pop-ups are annoying and a productivity hit), and wondering when they expire next.

4) Software updates for the entire collection of software on the machine are simple in Ubuntu.

5) Backups are automatic.

That's batting for the cycle. Am I missing anything? Anything at all? Yes. Printing is easier in Ubuntu for older printers like the HP Laserjet 4 on a D-Link print server in the office and the HP 6L on an SMC print server in the home office. Multifunction printers are more of a challenge. A little care in printer purchases going forward takes this issue off the plate and I'm fine with the printer solution in place that has largely been stumbled upon.

The one bit of software that was Windows-related was a QuickBooks Timer. I haven't needed it because I began editing the output of that program in Excel six months ago because the QuickBooks Timer was too much of a clod interface to be productive. When I switched from Microsoft Office to OpenOffice on Windows XP, I continued not using the QuickBooks Timer. Doing the same manual editing of these QuickBooks Timer output files in OpenOffice Calc on Linux is a breeze. If there were a QuickBooks Timer for Linux, I wouldn't use it so I haven't checked for it.

In sum, what's changing about software? The installation, maintenance, and use of software in Windows have become a burden. A huge burden. And I don't think the average Windows user realizes how much out of their way they are going to keep their Windows PCs working. Windows challenges users and makes for a very expensive user experience in time and dollars if users follow the book and use the latest virus protection, keep that protection updated, and avoid the pitfalls that are squarely on the path that normal users use. In the best case, you end up with a machine that has a lot of crapware installed on it and is slow and clunky to use. In the more typical case, you end up with a machine that spirals to a grinding halt over six to 12 months - like the T43 I'm working on right now. A machine that has trouble opening an Excel file in three minutes because it has so much software competing for disk access and CPU cycles.

My experience with Linux on the server with its multi-hundred day uptimes broken by hardware upgrades, not software reboots, and with no performance degradation even at high disk utilizations tells me Ubuntu isn't taking me down with it. My blood pressure is truly low now.

I'm literally running out the door to get the word rolling on this changing dynamic. It's that big. And a word to IBM and Lenovo: if you're listening, Ubuntu as an OEM install on your Thinkpad T and X series would be a huge win for you and for the the OSS adoption curve. This is a classic case of experience changing perception and it's got me to thinking about a seamless platform from server to desktop to phone - think about it.
http://linux.sys-con.com/read/382946.htm





Microsoft Aims to Ignite Careers of New Artists
Ed Oswald

Microsoft is launching a new program that will give new music artists an opportunity to get discovered by 30 million Zune, MSN, and Xbox users through a program it calls "Ignition."

Participants in the offering will receive a month's worth of prominent placement on Zune Marketplace, Zune.net, MSN's entertainment Web site, and Xbox Live Marketplace. The first band to participate is UK based Maximo Park.

However, Microsoft has strict policies about what content it will use. The bands must agree to an exclusive contract with the Redmond company, and promise to provide exclusive content to Microsoft's entertainment properties.

"Consumers are looking for ways to find new music, and Ignition helps connect artists with potential new fans by giving them multiple opportunities to listen to, watch or read about the artist across Microsoft's online platforms," Zune music marketing head Christina Calio said.

For example, with Maximo Park, Microsoft will allow its users to download free music through Zune.net and the Marketplace, access videos on Xbox Live, and promotional streams and content through its entertainment Web sites.

More information on the band and the program can be found on the Zune Web site.
http://www.betanews.com/article/Micr...sts/1180981954





Lala.com to Send Songs Directly to iPods


Lala.com’s John Kuch

Agreement with Warner Music Group is first step
AP

Entrepreneurs behind Silicon Valley startup Lala.com hope to transform the CD-swapping site into a music portal where members can download songs directly to their iPods, bypassing the computer hard drives where most music is stored.

The Palo Alto-based company has an agreement in principle to sell nearly 200,000 songs from Warner Music Group Corp. for 99 cents each, starting Tuesday.

Members will also be able to play the Warner songs for free, and the company will pay Warner a penny each time someone listens to a song.

“This is a turning point for music companies and the entire industry,” said co-founder Bill Nguyen, 36, who founded six previous startups, including several that went public and one that sold for $850 million. “I have no idea if it will work — this is a bet.”

Most other sites that provide streaming music charge a subscription fee or stream 30-second samples. Napster Inc., which has 830,000 members, has subscription fees and advertisements.

Lala.com contains no advertisements; revenue comes from members who buy new CDs or swap used CDs with each other for a fee of $1 per disc. The site has about 300,000 members and is backed by venture firms Bain Capital and Ignition Partners.

Nguyen estimated the 23-person company would pay $140 million for licensing fees over the next two years if member numbers grow as projected. Executives are talking with the other big labels: Sony BMG, EMI and Universal.

“We’ll be reporting some crazy losses at first but we’re prepared to weather the storm,” said Nguyen, who sports a boyish grin and flip-flops.

Huge risk?
Analysts said Lala is taking a huge risk. As a full-service music site, it will compete not only against Apple Inc.’s iTunes, which sells 5 million songs a day, but e-commerce powerhouses Amazon.com Inc. and eBay Inc.

“It’s an audacious plan,” said Mike McGuire, vice president of research at Gartner Inc. “They’re not saying what a lot of new media companies say — ‘We want to leverage your content without taking on any of the cost or risk.’ They’re saying to the labels, ‘We’ll deal with you, we’ll license the content and we’ll pay for it.’ It’s an old school move.”

To download songs to an iPod, members must download a 3-megabyte plug-in that runs on all major browsers on Windows and Macintosh computers. Because the songs aren’t stored on the PC hard drive, the primary source for files pirated on peer-to-peer networks, Lala will dispense with traditional digital rights management, which controls which devices can play a song.

Founders were secretive about how the technology works, noting that they’ve filed for numerous patents. The technology worked well in demonstrations last week.

Susan Kevorkian, a consumer audio analyst with research firm IDC, said Lala could cut into iTunes’ base but would most likely be a windfall for Apple.

“ITunes has historically been about driving hardware sales,” she said. “If there’s another compelling source of music for the iPod, it makes the experience of owning an iPod that much more compelling.”
http://www.msnbc.msn.com/id/19045703/





'Stubborn' PC Owner Takes on Gateway

El Dorado resident fights to avoid arbitration over a new computer he says is defective.
Hudson Sangree

As Grizzly Flats resident Dennis Sheehan tells his story, he has lived a computer buyer's worst nightmare after purchasing a defective PC from Gateway last year.

Gateway wouldn't fix the machine, replace it or refund his money, he alleges, so he filed a small claims case in El Dorado County against the multibillion-dollar corporation.

"I could've bought another computer, but I'm a little bit stubborn," said the 46-year-old Sheehan, who describes himself as a retired real estate investor.

As Gateway tells it in court filings, the company replaced Sheehan's computer a few months after he first complained, and he kept both machines.

The company's bigger concern, however, is that Sheehan sued in court and did not arbitrate the case, as required by Gateway's sales agreement.

In that regard, the case highlights a reality for today's consumers.

Arbitration clauses -- slipped into sales agreements and scroll-down boxes on computer screens -- require a dispute to be settled in private forums chosen by companies instead of in public courtrooms.

Often unaware, consumers agree to arbitration -- with the click of a mouse or even simply by using a product -- and give up their right to sue.

Corporations contend that private arbitration saves everyone time and money, allowing disputes to be decided in one session by a neutral arbiter and avoiding lengthy and costly litigation in far-flung locations.

But some critics say arbitration allows companies to avoid consumer lawsuits, including multimillion-dollar class actions. With the bottom line at stake, corporations such as Gateway will go to great lengths to defend those agreements, they say.

"We are at a point now where every large corporation that has the ability to say 'take it or leave it' is opting out of the civil justice system," said Cliff Palefsky, a San Francisco trial lawyer and expert on arbitration agreements. "Some do it in a straightforward manner. Others do it in an underhanded manner."

According to court papers and interviews, Sheehan's story started in January 2006 when he ordered a Gateway desktop computer with a widescreen monitor, intending to use it to start a sign-making business.

Right out of the box, he says, the computer displayed scattered graphics and wouldn't work properly.

He says he called a Gateway salesman five times and sent him an e-mail to get an authorization number to send the computer back, but his phone calls and message were never returned.

Then, over the course of months, Sheehan said he called Gateway technical support dozens of times. Technicians kept telling him the problems could be fixed, but they never were, he says.

Eventually, Gateway refused to provide him with any more technical support, and despite his repeated demands, the company would not return his money or replace his computer, Sheehan contends.

So, Sheehan said he decided to file a case against Gateway in small claims court, where lawyers are banned and citizens can seek basic justice. A March trial was scheduled in Placerville.

Gateway responded with a Bay Area lawyer and a 2-inch thick stack of legal documents.

The company had the case moved to a higher court and then tried to compel private arbitration on its own terms.

Sheehan argued in a court filing that he had never accepted Gateway's arbitration agreement.

He didn't receive any paperwork with the computer that explained the agreement, he said. And the computer's graphics were so scattered that he says he couldn't read the box of terms and conditions or click the "accept" button.

A Gateway technician had him bypass the screen altogether, he said.

Gateway responded in court papers that its terms of sale and warranty are included with every shipment, and that it was impossible for Sheehan to use the computer without accepting its terms and conditions or to bypass the screen.

In a tentative ruling on May 24, El Dorado Superior Court Judge Daniel Proud sided with Sheehan and said the dispute should remain in small claims court.

"The court finds that based on the evidence submitted, the respondent has met his burden to prove there was no agreement to arbitrate the subject dispute," Proud wrote in his ruling.

Gateway's lawyers asked the judge to hear them again in the matter.

On Monday, Attorney William Portello, a partner in a Concord law firm, and Sheehan, a high-school dropout who has argued his own case, faced off in a Cameron Park courtroom.

Portello tried to persuade Proud to change his ruling and send the case to arbitration, where he said it belonged.

"This is no different from virtually every other software and computer company in America," Portello told the judge.

Sheehan again said he had never received the arbitration agreement via written materials or his computer screen, and told the judge he never received a replacement computer.

Gateway insisted to Proud that the company had delivered a new PC.

Proud, who urged the parties to settle their case, said he would take the matter under submission. He has 90 days to issue a final ruling.

Portello could not talk about the case outside of court, and David Hallisey, Gateway's director of communications, said the company does not discuss pending litigation.

Sheehan says he will continue to fight the case as long as Gateway refuses to give him justice.

"I started the battle," he said. "I don't want to be the one who walks away because they're muscling me."

Palefsky said that it is ultimately up to Gateway to show that a customer accepted their arbitration agreement.

"Gateway has the burden of proving the existence of a contract," he said.

If Sheehan continues to be successful in the trial court, Palefsky said, he can look forward to a protracted appeal process, with hundreds of pages of legal filings and years of delay.

At some point, he will likely be overwhelmed by the vast legal and financial resources of Gateway.

"This poor guy now faces daunting reality of having to litigate this on appeal against Gateway," Palefsky said. "By winning, he's lost."
http://www.sacbee.com/291/story/209144.html





P2P Defendant Settles With RIAA After Motion for Sanctions Backfires
Eric Bangeman

A federal judge in Texas has sanctioned the attorney of a defendant in one of the RIAA's countless file-sharing lawsuits after the attorney himself requested sanctions for the RIAA's counsel. Not long afterwards, the parties agreed to the settlement and the case will be dismissed.

Atlantic v. Heslep started like every other case, and after the defendant Diane Heslep decided not to avail herself of the record labels' settlement offer, the case went to court. Heslep denied infringement, choosing to fight against the RIAA's allegations. Unlike other cases we have reported on, the RIAA's case that Heslep had directly infringed the labels' copyrights was relatively strong.
The evidence

On January 6, 2005, the RIAA's investigative arm, MediaSentry, discovered an AOL user sharing files on Kazaa's network under the username "mke@KaZaA." One of the files in her shared directory was a Kazaa playlist file named Diane.kpl. AOL subsequently identified the user in question as Diane Heslep and confirmed that a screen name assigned to her was logged into AOL at the time that MediaSentry came across the shared files.

Heslep offered to let the RIAA examine her hard drive on a couple of conditions. First, the allegations of "continuing infringement" would have to be dropped from the lawsuit. She also demanded a $10,000 payment and dismissal of claims if a forensic investigation showed no evidence of infringement. The RIAA responded by dropping the continuing infringement claims—only alleging infringement at the time and date MediaSentry found the files along with "other occasions before January 6, 2006"—but declining her terms for a forensic inspection.

Heslep said that she was at work during the time of the alleged infringement, but her attorney declined to respond to the plaintiff's request for information on who else might have been using her account at the time. Her attorney also failed to turn over an e-mail from AOL confirming that her screen name was indeed in use under the IP address noted by MediaSentry.
The end game

Heslep then accused the RIAA's attorneys of violating Rule 11 of the Federal Rules of Civil Procedure, saying that they violated the prohibition against filing motions for the purposes of harassment and unnecessarily increasing the cost of litigation in a motion noticed by Declan McCullagh at Cnet. The court agreed that sanctions were appropriate, but against Heslep's attorney, not the RIAA's. "The Court also notes that it has already sanctioned [Heslep's attorney Thomas] Kimble for opposing discovery unreasonably, in bad faith, and in violation of Dondi Properties Corp. v. Commerce Savings & Loan Assoc." wrote Judge Terry R. Means in an order. "For this reason, frivolous motions for sanctions that harass the opposing party’s attorney, chill that attorney’s zealous representation of his client, and needlessly increase the cost of litigation cannot go unpunished. Accordingly, the Court concludes that sanctions are appropriate against Kimble."

The sanction against Kimble was apparently the death knell for Heslep's defense. Just nine days after the judge ruled on the motion of sanctions, the plaintiffs and defendant filed a Joint Notice of Settlement. Terms of the settlement are not known, other than the fact that Heslep will be permanently enjoined from infringing the record labels' copyrights in the future. Each party will be responsible for their own attorneys' fees except for those due to Heslep's request for sanctions; she will have to foot the bill there.

Atlantic v. Heslep shows that if there is strong indication of direct infringement by the defendant, it's going to be hard to convince a judge otherwise. Arguments that the damages sought by the RIAA are excessive, that making files available does not equal infringement, and that the music industry is barred from recovering further damages for infringement under the $115 million settlement with Kazaa may amount to nothing if there is compelling evidence that the RIAA does indeed have the right person in its legal cross-hairs.
http://arstechnica.com/news.ars/post...backfires.html





Suing Children, the Elderly and the Dead - A Brief History of Music & DRM
Kirsten DeHaan

Introduction

DRM can stand for a couple different things depending on how you feel about the subject. Those who believe DRM’s primary purpose is to protect the rights of copyright holders say it stands for “Digital Rights Management.” Those who believe DRM serves to restrict the rights of consumers refer to it as “Digital Restrictions Management.” The only real difference in the two terms is that one implies protection, while the other connotes restriction. And because DRM is an economic issue whose parties have varying levels of involvement, one could reason that both have some truth to them.

In the beginning…

DRM is the term used to describe the technologies used by publishers or copyright owners to control access or usage of digital data or hardware. It can also refer to restrictions associated with a specific instance of a digital work or device. The purpose of DRM is to prevent unauthorized duplication of a copyright holder’s work to ensure a steady revenue stream.

But the issue has stretched beyond DRM, as parties on both sides are beginning to agree that DRM is an unreliable form of copyright protection/restriction at best. In order to understand why this is, one must look at what DRM had hoped to accomplish.

In the days before digital music, copying CDs, tapes or records required a certain amount of ambition to accomplish. There were issues of acquiring the equipment, choosing a medium on which to copy and usually a loss in quality as songs were transferred using analog technology.

The digital age changed everything. Suddenly, users could copy music with very little effort and expense without sacrificing quality. The music industry obviously realized the potential for copyright troubles and needed a method for controlling the distribution of music. Enter DRM. DRM was never intended to be the evil technology that many see it as today, but as you know, the path to technology hell is paved with good intentions.

On December 7, 1999, Napster sealed its fate as the catalyst for the creation of modern day DRM. The P2P network garnered the RIAA’s attention by allowing users to share music files in increasingly larger numbers. And instead of adjusting their business model to keep up with changes in technology, the RIAA viewed the program as a rogue threat and went into attack mode. Napster was methodically dismembered as the RIAA used its many media connections to drown out any hope for Napster to advance its position as a possible legitimate music distribution channel. The RIAA’s answer to any future attempts at illegal music distribution became DRM and judicial warfare.

RIAA

So what is the RIAA? The RIAA (Recording Industry Association of America) is a trade group that represents the recording industry. Its members consist primarily of private organizations and corporate entities like record labels and distributors. It was founded in 1952, primarily to maintain the standard technical standards that were applied to vinyl records. Since then, they have expanded to become the ad hoc legal arm of the recording industry.

Ostensibly, the RIAA’s primary purpose is to collect and administer the distribution of music licenses and royalties. It certifies “gold” and “platinum” albums and generally ensures that the recording industry maintains a tight grip on its business model.
Unfortunately, in recent years DRM has been a hard wall that the RIAA has been unable to overcome. Since 2006, the RIAA has initiated over 20,000 lawsuits and has settled about 2,500 of them.

DRM & CDs

Their problems began in 2002 when Bertelsmann became the first corporation to use DRM on audio CDs. Although initially just installed on promotional CDs, all CDs from Bertelsmann labels would eventually include DRM software. The problem soon became apparent, as many consumers could no longer play the CDs in certain devices, including some car CD players. DRM had left mainstream music users, many of whom may or may not have had experience with digital music, with a bitter taste.

In 2005, Sony BMG found itself in hot water when its CDs were found to install DRM software to the user’s computer without notification. The software even included a rootkit, leaving consumers computers open to security vulnerabilities. The news led to a massive recall on Sony’s CDs, and once again left consumers disappointed in DRM.

In January of 2007, EMI became the last major publisher to stop publishing audio CDs with DRM. The publisher stated that the costs of DRM did not measure up to the results.

Fair Use

So what’s the big deal? Well, in the United States, Fair Use is the crux under which the opposition to DRM can be built. Fair use is a doctrine in copyright law that allows for a limited use of copyrighted material. Fair use is based on the free speech rights enumerated in the United States constitution and is exclusively found in the U.S. In other countries, a similar concept known as “fair dealing” is in place.

The short version is that to determine whether something is subject to fair use, one has to look at four factors that were codified by Joseph Story in Folsom v. Marsh.

1. the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;
2. the nature of the copyrighted work;
3. the amount and substantiality of the portion used in relation to the copyrighted work as a whole;
4. the effect of the use upon the potential market for or value of the copyrighted work.

If it is found that the use of the copyrighted material does not detract from the owners copyright and does not unfairly benefit the user, then it is almost always within the rights of that user. For example, if you wanted to burn a copy of your favorite CD to be used in your CD player at home and in your car, as long as you made the initial purchase this is well within your rights as the CDs owner.

Other uses of Fair Use include: copying from a copyrighted work in order to criticize or comment on it; using a piece of copyrighted material in the teaching process; making derivative works from copyrighted material purely for personal use. But laws can be fuzzy. The RIAA has used this to launch a series of lawsuits against everyone ranging from small children to the dead.

Court Cases

The RIAA launched a massive crusade to seek out and prosecute individuals who it suspected had been involved in music piracy. By the time Patricia Santangelo, a divorced mother of five living in Wappingers Falls, New York, decided to take her case to trial in 2005, the RIAA had launched nearly 14,800 lawsuits. Up until Elektra v. Santangelo, the RIAA had been content with settling lawsuits in the $3,000 to $4,000 range. Santangelo claimed that a friend’s child was likely the one who actually downloaded the files and refused to settle. The RIAA disagreed, claiming that their methods for tracking illegal downloads were relatively error-free.

But the RIAA doesn’t have the track record to back up an error-free methodology for tracking copyright infringers. In 2003, the RIAA falsely accused Sarah Ward of illegally sharing music. The lawsuit claimed that the 66-year-old sculptor had illegally shared more than 2,000 songs through Kazaa and threatened to make her liable for up to $150,000 per song. It was found, among other things, that Ward used a Macintosh computer, and therefore could not run Kazaa, which was built to run on Windows based systems. The RIAA was forced to withdraw the lawsuit.

In another mistaken case, the RIAA filed a lawsuit in which 83-year-old Gertrude Walton was names as a defendant. Walton was accused of sharing over 700 songs on P2P networks. The only problem was that Mrs. Walton had passed away in December 2004. The RIAA concluded that Walton was most likely not the person they had been looking for and dismissed the case.

Opponents Of DRM

EFF

The Electronic Frontier Foundation is an organization that was founded in 1990 by Mitch Kapor, John Gilmore and John Perry Barlow. In recent history, it has come out strongly against DRM. It makes sense; their entire operation was created around the concept of protecting the First Amendment and preserving free speech. DRM, in some of its more crippling forms, destroys “fair use” and undermines property rights.

Historically, the EFF has had as its main goal to educate the press, policy makers and public at large about issues of technology and to act to defend civil liberties as they relate to the digital age.

The EFF opposes the way that the RIAA defends its copyrights, and has funded legal defenses for those who have been wrongfully litigated against for “illegal” downloads. Given that the RIAA has been known to sue children, the elderly and even the dead — the EFF is often successful in these cases.

Defective By Design

Unlike the EFF, which focuses on the entire gamut of digital policies, Defective by Design has as its focus on DRM (as they call, Digital Restrictions Management). Like their name implies, DBD believes that DRM as it is used today is by its nature flawed and wants to abolish its use. Their stated goals are to bring public awareness to DRM as an issue and to increase participation in the fight to rid the world of it.

Defective By Design sponsors protests against DRM, supports “tagging” campaigns on products that contain DRM, initiated the “Day Against DRM” outside of Apple stores in the US and abroad and is supported by the Free Software Foundation amongst others.

Free Software Foundation

Founded in 1985 by Richard Stallman, FSF is the organization primarily responsible for the GNU movement. The goal of the GNU project is to create a sufficient body of free software to allow a person to survive without any software that is not free. They are a major force behind many Linux projects, including GNOME.

Where do they fit into the DRM landscape? They are staunch opponents to it and have come out in support of organizations like Defective By Design.

DRM-free alternatives

As the digital music scene slowly comes to grips with the fact that people want to do what they please with the music they purchase, DRM-free alternatives are becoming more readily available. Each promises reasonable prices, a slick interface and tons of music, and each hopes to lead us into a world free from the shackles of DRM. Today, where the Googles, Myspaces and Facebooks reign supreme, which music service will take its place as leader of the digital music revolution?

To answer this, we must look at a few of the other sources of DRM-free music that are currently available. It appears Amie Street, eMusic, We7 and Grooveshark all fit this criteria, each providing its own solution to providing legal, yet reasonable music downloads.

Amie Street has a unique strategy in which songs start off free and rise in price depending on the number of times a song is downloaded. The more a song is downloaded, the more its price increases. The thought is that users will be more likely to explore music in hopes of discovering a song before it rises in price. Currently, the service is limited to independent music, which shouldn’t be a problem as I’m sure you’ll spend most of your time sifting through all those free songs anyway.

The eMusic download service is another alternative, providing users with the option to subscribe to a monthly plan in which users have a set number of downloads per month at a set price. Downfalls include a lack of mainstream music and no music streaming. Come to think of it, subscribing to a monthly plan in which users have a set number of downloads per month should probably be considered a downfall also.

We7 takes a balanced approach to music downloading. It takes something you love, DRM-free music, and combines it with something you hate, advertisements. And when I say combine, I mean literally. The company attaches advertisements to the front of downloaded songs. Don’t worry though. The advertisements are based on a consumer’s personal demographics such as age, location and gender, which I’m sure you’ll agree, ensures a quality listening experience.

That leaves us with Grooveshark. I’m not here to tell you Grooveshark is the end all, perfect DRM-free music downloading site, but that’s what it aspires to be. Grooveshark goes beyond creating a music downloading service and instead seeks to create a music-sharing community. It’s Facebook meets LimeWire without the poking and RIAA lawsuits. Users are not only encouraged, but rewarded for contributing to the community by being paid for the music they share. And with music ranging from trendy pop to Bambuco, Grooveshark is P2P the way it should be; music as varied as the people that comprise it.

Timeline

1952 – RIAA founded primarily to maintain the standard technical standards that were applied to vinyl records.

1985 – Free Software Foundation founded.

1990 – The Electronic Frontier Foundation founded with the goal to educate the press, policy makers and public at large about issues of technology and to act to defend civil liberties as they relate to the digital age.

1999 – Napster launches P2P music sharing network in June. RIAA sues Napster in for copyright infringement in December.

2001 – Judge ruled that Napster had to stop distributing copyrighted material through its network, effectively shutting it down.

2002 – Bertelsmann (BMG, Arista and RCA) becomes the first corporation to use DRM on audio CDs.

2003 – RIAA falsely accuses 66-year-old Sarah Ward of illegally sharing music.

2005 – Sony BMG added DRM technology on over 20 million CDs that automatically installed a software program on users’ computers. The software and End User Licensing Agreement severely limited users’ rights to fair use and leads to massive CD recall.

RIAA files lawsuit against deceased Grandmother, to no avail.

Elektra v. Santangelo goes to court after RIAA’s launch of nearly 14,800 lawsuits in the previous two years.

2006 – Defective By Design Campaign launched with anti-DRM protest at Windows Hardware Engineering Conference.

2007 – EMI stopped using DRM on audio CDs, because “the costs of DRM do not measure up to the results.” Audio CDs containing DRM are no longer released by major publishers.
http://www.grooveshark.com/blog/2007...-of-drm-music/





Does Digital Fingerprinting Work?: An Investigative Report
Liz Gannes

Audio and visual fingerprinting of copyrighted video is seen as the best way to combat infringement, but in NewTeeVee’s testing this week across multiple sites, it did not work. We were surprised to be able to upload multiple times the exact same copyrighted file, even after we explicitly told the hosting site and the fingerprinting provider about it and they took it down.

What follows is a description of our procedure, accompanied by the vehement disclaimer that we were doing this only for educational purposes.

Microsoft recently took its Soapbox user-contributed video site out of the public eye until it could implement filtering technology from Audible Magic. Last Friday, it relaunched, supposedly armed and ready to fend off copyrighted content. So we asked our intrepid reporter Craig Rubens to test how the system worked by uploading a Daily Show clip.

Surprise, surprise, the clip went up like a charm (screenshot). We called Microsoft to ask what was going on. You should talk to Audible Magic, they said; our system is only as good as their index. We called Audible Magic, who essentially blamed Microsoft, for only implementing the audio version of its software. The reps then set off to nail down statements from their companies, a process that took most of the week.

Only sometime last night did the clip finally get taken off Soapbox, replaced with a copyright violation notice. To see if the system had been corrected we uploaded it again today, and again it appeared about 40 minutes later. At this point, if all went as it was supposed to, the video should have been automatically added to the index of banned clips, and then rejected when we uploaded a duplicate. But again, we had no problem.

Concerns about whether digital fingerprinting is ready for action have persisted, and market leader YouTube has hesitated to deploy its “Claim Your Content” system while it is being perfected. However, confidence in fingerprinting has moved past the optimism stage. “This technology works,” says MPAA Vice-President Dean Garfield, as reported by BusinessWeek.

Audible Magic has bagged most every high profile deal in video filtering: MySpace, Dailymotion, Break.com, and GoFish/Bolt.

The Audible Magic representative insinuated the company’s technology was deployed in fuller form on MySpace — which recently launched its “Take Down Stay Down” and filtering system using AM’s system — so we also tried uploading the clip there. Interestingly, that also posed no problem. See it in action here.

Below is Craig’s description of the procedure he used to upload his clip to Soapbox. He says after about 50 minutes of “processing” the video went live and was playable. The MySpace experiment was even quicker, taking about five minutes.

1. Search for “Daily Show” on YouTube
2. Select first clip of actual Daily Show with Jon Stewart content and download it via KeepVid.com (selected video)
3. Convert the video to a Soapbox approved format (shockingly, Microsoft doesn’t like .flv)
4. Upload Daily Show clip to Soapbox
5. Allow time for Soapbox to process, convert, and (supposedly) scan for copyrighted material.

Here are the official statements Microsoft and Audible Magic sent yesterday after days of deliberation and phone calls about the issue.

“We are continuing to work with Audible Magic to fine tune our implementation of their proactive automatic filtering services to best meet the needs of our content partners. The fact that a clip of any unauthorized copyright material slipped through is unfortunate, but that’s why we also provide rich notice and takedown tools to content owners to automate and expedite the process of identifying and removing unauthorized content. We are committed to working in partnership with the industry to continue to evolve our technologies and solutions for customers and partners.” — Rob Bennett, general manager for Entertainment and Video Services at MSN

“Audible Magic’s technology has the ability to identify content such as ‘The Daily Show’ clip in question. We are working closely with Microsoft to customize our solution in order to meet the business needs of their Soapbox service.” — Vance Ikezoye, founder and CEO of Audible Magic

Though all these systems, as advertised, depend largely on identifying content once in order to block it future times, we made no bones about identifying our uploads as Daily Show clips. We also had no problem uploading the exact same file after we had informed the proper people about it and they had taken it down.

Of all the videos on the web, Comedy Central clips are a huge bone of contention, figuring into Viacom’s pending $1 billion-plus lawsuit against YouTube and its parent Google. Funnily enough, the original Daily Show video is still live on YouTube.
http://newteevee.com/2007/06/08/does...gative-report/





Why DRM Won't Ever Work
Jeremy Allison

Scotty the Engineer was always my favorite character in the original "Star Trek". Sure, Captain Kirk was the hero, he was at the heart of all the action, and got to romance all the green-skinned women, but if he wanted that amazing ship to actually do anything, he had to ask Scotty. He had to ask him nicely. If you think about it, Scotty had all the real power in that show. If he told Kirk the dilithium crystals were drained, there was never any real argument, the captain would cry like a whining child, but in the end he had to face reality and wait for Scotty to fix it.

I always thought Scotty should have said "no" to the captain more often, especially when Kirk would ask for something completely outrageous that, more often than not, violated the laws of physics. But engineers don't like saying no to management, and poor Scotty would end up having to make the magic happen week after week, until even as a child I began to suspect that his skills had more to do with the scriptwriters than his deep understanding of the laws of the universe. Still, he did end up with a reputation as a miracle worker, which can't be so bad.

Trying to make Digital Rights Management (DRM) work in the real world is like asking engineers to do "Star Trek" style magic, rather than real engineering. DRM simply cannot work. For less technical readers who might be wondering what I'm going on about, DRM is the attempt to control copying on a digital file, or sometimes even to add a restriction on how many times such a file can be copied. It's usually applied to online music or movies, but it's never sold to the consumer for what it actually is, an added restriction on what can be done with something they've paid for. DRM is always explained as the "wonderful new technology that will help protect your medical records from thieves." The truth is, it can't even do that.

DRM is often spoken about in conjunction with encryption, which actually is a massively useful technology that can protect your medical records from thieves. DRM uses encryption, but encryption isn't the same thing as DRM. Encryption is based on secrets, usually known only to two communicating parties. People snooping encrypted traffic end up with what appears to be random noise, only the people who have the secret key can make sense of it. Decades of real scientific research goes into creating sophisticated encryption algorithms and methods such as public-key cryptography, on which almost all Internet commerce is based, which allows a secret key to be derived from publicly available information. But the point of all encryption is that the key is a secret. It has to be a secret, as it's the basis of the privacy between the two parties.

Now let's consider DRM. DRM is applied to digital data by one party, usually the vendor of a music or movie, and encrypts the data to be protected using an encryption algorithm and a key. The other party in the transaction, the consumer of the music or movie, is then given the encrypted data, knowledge of what algorithm is used to encrypt the data, and a copy of the encryption key used to encrypt the data. All of these things must be supplied to the consumer in order for them to be able to use the data; without them, there's no way the consumer can listen to or watch the data they've just bought. Yet DRM is supposed to be able to restrict what the customer can do with the data. How can this be done given the fundamental reality of the situation described above? The magic of dilithium crystals?

Sure, there's gobs and gobs of extra software in the process which is usually run at the consumer end of the deal, trying to obfuscate and hide the fact that the consumer possesses all the information needed to decrypt the file they've just been given. They have to have been given this, else they can't listen to the song or watch the movie. Claiming that this process can ever be made secure from the people you've just given all this information to is like believing you can create a secure bank vault by drawing chalk lines on the pavement, piling the money inside and asking customers to "respect these boundaries". The media industries are trying to sell what they consider to be valuable data without any means of prohibiting access to it. This is not a business model that is ever going to work.

The recent case of the release of the hidden encryption keys for high-definition format DVD's is the perfect illustration of this fantasy engineering approach to the realities of the Internet age. This new "super-secure" DRM system has now been broken twice. Ironically, the breaking of the DRM might be the push that causes the popular adoption of these new HD-DVD formats. Data formats that can't easily be copied to other devices tend to end up being unpopular, as the physical devices that store digital media are subject to wear and tear. One curious child with sharp fingernails could accidentally ruin an entire HD-DVD movie collection. The only DRM systems that don't end up ultimately being broken are the ones that don't have any content published in them that people want to watch. It really doesn't matter how clever the layers of software being added to the system are, it only takes one smart person with a debugger, or logic analyzer, to dig through them and discover the underlying truth that any version of DRM just doesn't have any secrets.

Engineers know that DRM doesn't work, that it can't possibly work. Yet just like Scotty when Captain Kirk calls from the bridge asking for the impossible, they can't seem to help producing ever more complicated versions of the same broken system. Companies keep trying to create and sell DRM systems to the content industry. Having lots of money thrown at them to do this probably helps, just like Scotty liked to be thought of as a miracle worker.

In a recent talk at Google, Cory Doctorow. the Electronic Freedom activist, science fiction author, and creator of the popular geek news aggregation site Boing Boing said that engineers should simply refuse to create DRM systems for customers. A request for a DRM system is a sign that the customer is in denial, and isn't dealing rationally with reality. They still believe in the businesses model of the "Underpants Gnomes" from the "South Park" TV show.

Step 1: Create a DRM system.
Step 2: ???
Step 3: Profit!

Unfortunately, he also pointed out that the US government also seems to be living in this fantasy world -- and, to a lesser extent, the UK government. One of the most misguided things going on in the world at the moment is the attempt by the US government to force other countries to adopt what they call US-style "Intellectual Property Rights". The underlying economic theory for this appears to be that the US and UK can lose their industrial manufacturing base, outsourcing it to India or China, and still maintain their primary positions in the world by controlling the information used to design the products manufactured by this cheap labor, or by selling digital content to the newly affluent consumers in these countries. This comes down to a bet that in the future digital bits will be easier to control, and become harder to copy. In the age of the Internet, this is a bet against reality, as the whole history of digital computing is that bits always become easier to copy, and harder to control.

Believing in a DRM business model is like joining Star Fleet security, putting on your red shirt, and volunteering to beam down to the new unexplored plant with Kirk, Spock and McCoy. Someone will be coming back from that mission, it's just not likely to be the security guard. Always a true engineer, Scotty had the good sense to stay safely on board the ship.
http://news.zdnet.com/2102-9588_22-6189011.html





Our Letter

Dear BBC,

We are deeply concerned about the BBC's use of "Digital Rights Management" (DRM) to manage content delivered to users over the Internet. There are dozens of arguments against DRM, however we believe these are the most important and relevant to the BBC.

1. DRM simply doesn't work.

Producers of DRM technology tell copyright holders that DRM will protect their content from unauthorized copying and commercial piracy. This is completely false. All DRM systems, including new technologies like HD-DVD and Blu-ray, have been circumvented. DRM relies on users not knowing an encryption key that is widely distributed to devices that play content. Cracking DRM is then as simple as discovering the encryption key. In such a situation, the entire DRM system is circumvented and the argument to "protect copyrighted materials" is removed. In addition, many programs that may use DRM are already broadcast over-the-air and this content can easily be converted into unprotected digital format. Even if DRM worked it would not protect BBC content.

DRM's defectiveness, is part of the reason that Steve Jobs, CEO of Apple, called on the music industry to release DRM-free music. ("Thoughts on Music", February 6, 2007)

2. DRM strips consumers of their rights.

By using DRM, the BBC is telling users that they are criminals. DRM assumes that a user will use the content they are provided with to violate copyright law and in response strips users of their normal consumer rights. In the United Kingdom, the fair dealing privilege is meant to provide an exception to copyright for "private study and criticism and review and news reporting" (Copyright, Designs and Patents Act 1988 s. 29, 30). DRM makes it illegal to extract portions of a work for criticism or review. Fair dealing is meant to allow, among other things, private copies for research purposes, or extraction of portions for a film review. DRM attempts to make both of these impossible, thereby depriving citizens of rights guaranteed to them by British law. Other countries, such as the United States, grant similar rights under other fair dealing or fair use doctrines. The BBC would also be similarly depriving citizens of those countries of their statutory rights.

Since the BBC is a public corporation, it should be acting in the interest of the general public. Any action that removes the rights of the general public is not acting in their interest.

3. DRM directly violates the BBC Royal Charter.

The BBC royal charter establishes a number of goals and operating conditions including "promoting education and learning", "stimulating creativity and cultural excellence", and "bringing the UK to the world". DRM runs contrary to all of these purposes. DRM limits education by restricting copying for public educational purposes, and even inhibits private study. It stifles creativity by trying to make even incidental remixing impossible. Finally, it arbitrarily limits the BBC's reach by forcing viewers to use particular proprietary software applications. DRM advances corporate interests over the public interest, which is in flagrant opposition to the charter.

4. DRM is a poor business decision.

If people are unable to take content they have purchased and use it for their own personal purposes, then they will choose other locations to receive that content. This is one of the reasons why EMI recently agreed to sell their music without DRM.

Additionally, the data is formatted to restrict access to Windows users. The BBC has decided to release content under the Windows Media Format. The Windows Media Format (WMF) is a proprietary system. As licenses for other operating systems are not available, users have to buy Microsoft Windows. This choice would restrict BBC content to a portion of the population, excluding users of operating systems such as GNU/Linux (which is powering the one laptop per child system). The BBC is also considering the use of REAL media, which has players for other operating systems. However, REAL is still unacceptable, because there are no libre/open source software that can play REAL media with DRM. This is an insurmountable problem common to all DRM systems. The BBC is a public corporation and its funding comes from public sources. If people pay for a service, they should only have to pay for it once. With WMF, REAL, and DRM, they are having to pay twice (once to have the content created and once to have it shown to them through WMF or REAL). In addition, since both systems require particular proprietary software applications, BBC is in effect subsidizing unrelated private enterprises.

5. The Industry has Ditched it

The media industry is already stopping the use of DRM. Apple iTunes, Amazon Music, PBS, C-SPAN, NPR, and many other large media outlets will soon offer DRM-free content or already offer it. Seeing as this is the way the industry is moving, it is an irresponsible use of public funds to force the use of a technology the industry is moving away from.

In conclusion, DRM is not the right path for the BBC to take. DRM violates the royal charter, attacks users, adds cost to production, subsidizes private enterprises, and simply does not work. We urge you to drop all plans to lock away content with DRM and to choose public interest instead. This is an issue of viewer's rights, free culture and the future of the BBC. Please respect the public interest, and your viewer interests, by not using DRM.

Sincerely,
The Undersigned
(See us on a map)

Ringo Kamens
Project Coordinator
Binary Freedom Boston(binaryfreedom.info)
Centennial, Colorado, USA
2600denver@gmail.com

Chris Fernandez
Binary Freedom Boston
Boston MA 02215
rek2@binaryfreedom.info

Neal McBurnett
Software Engineer
Boulder, CO, USA
neal at bcn.boulder.co.us
303-494-6493
The BBC should overturn the decision to adopt a Microsoft-only, DRM
approach, especially in light of recent decisions to drop DRM by
big players in the music industry. Their reasoning applies well
to the BBC's situation. Users don't like DRM, it takes away their
normal fair dealing protections, and ultimately it doesn't work.

This decision will simply diminish the role and reputation of the BBC.
Please revoke it.
Neal McBurnett http://mcburnett.org/neal/

Timothy Richard Musson
University student
New Zealand
trmusson at ihug.co.nz
The copyright system exists to encourage creativity and improve the
public's access to knowledge. "Digital Rights Management" technology
does the opposite.

Matthew Flaschen
Student
Wynnewood, PA, USA
matthew.flaschen at gatech.edu
610-574-8513
I strongly oppose the BBC's plans to provide content under a DRM scheme.
The BBC's programming is designed to serve the public trust, and DRM
clearly runs contrary to this mission.

Lam YongXian
Student
Singapore
adolf at adolflam dot com
+65-81270502
How could your users trust you when you don't even trust them?

Felix Ker
HR Manager
Singapore/Singapore
felix [at] ker.sg
+65-91456635
It's time to give the world more freedom.

Kevin Kane
Software Developer / Analyst
Portland,OR,USA
deviatornexus at yahoo dot com

Petr Břeň
Student
Brno, Czech Republic
bren at upcmail dot cz
I was listening to the BBC on the air from 2001 to 2005 when its frequencies in my country were sold to another radio station. I was hoping to continue listening to the BBC via the internet and so I was very disappointed to see that the content was only available in non-free formats. I mean, even the Czech public service radio station has been
offering content optionally in Ogg Vorbis for some time now. So hopefully the BBC, too, can choose a solution which will not be discriminatory against users of media players other than the ones made by Microsoft and RealNetworks.

Axel Stevens
Support Engineer for a Financial Newspaper - Macintosh,
Unix-Linux and Windows
Flierke 94 bus 15 2870, Puurs, Belgium
003238892187
I am a great admirer of the BBC especially the fact that the BBC, in Europe, is almost always at the forefront of technological innovation and mediabroadcast progress and techniques, including digital media content.The BBC could lead the way in Europe with the distribution of DRM-Free content and not lock people in in propriatry formats.I know from the past a similar discussion arose concerning the use of .ogg and the Theora codec(s) for audio.In my view it would not be a wise desicsion to choose DRM enabled content -) maybe it will work for some time...But, the viewer, the client ultimately will not like it.People
want to be able to play content that they have paid for and own on different players be it on a computer a dvd-player, ipod, mp3-player, you name it
I fully understand the BBC's concern for piracy and unauthorized use but in my opinion enforcing DRM on users (viewers) will not solve that issue, it will just inflame people - they will take their business elsewhere in the end.

Oisín Feeley
GNU/Linux systems administrator
Québec, Canada
oisinPeriodfeeleyDutchApenstaartgmailPeriodcom
I agree with the letter's two central assertions: 1)DRM is contrary to the philosophy of public broadcasting; 2)DRM has already failed as a business model.

Unfortunately the BBC is already using RealPlayer/WMP to deliver quite a bit of content (ontrary to Section4 of the letter: "The BBC is also considering the use of REAL media, which has players for other operating systems.") If you try to listen to some of the excellent archived radio content at the BBC7 "ListenAgain" page then those two formats are all that's on offer. This is rather disappointing. It is of course trivial for a motivated individual to capture the stream and convert it to e.g. Ogg Vorbis [1] or FLAC [2] for later playback, but it would be nicer if the BBC removed this pointless hurdle.

There is obviously a pool of technical talent at the BBC that understands the importance of non-patent encumbered codecs (see for example the creation of the "Dirac" video codec [3]) and the trial streaming of selected material in Ogg Vorbis. It would be nice to see the BBC leading the broadcast world again using the innovations of its own engineers instead of making foolish deals with US corporations.
[1] http://www.vorbis.com/

[2] http://flac.sourceforge.net/

[3] http://www.bbc.co.uk/opensource/projects/dirac/

Iain Cheyne
Business Analyst
London, UK
iain at cheyne dot net
07941574338

Simon Whiteley
Wortley, Leeds
United Kingdom
I wish to sign the letter to the BBC about unethical DRM usage. I have sent two email complaints to the BBC in the past and have had no reply. I also sent a letter asking why they gave so much air time to Microsoft when there was so much free(libre) software available, still
no reply. Thanks for standing up for my rights as a licence payer. I also sent emails to the BBC complaining about this issue and received no acknowledgment, when I phoned them after signing this letter they said they had no trace of my email address in their database.

I remember sending the BBC an email congratulating them on releasing their content in ogg format a few years ago.

Mark William Darbyshire
High school student
Te Puke, Bay of Plenty, New Zealand
http://markdarb.googlepages.com/
I generally regard the BBC as a respectable broadcaster of quality content. The BBC is without a doubt a world leader in broadcasting. The BBC should therefore lead the rest of the world in ethical distribution of content using DRM-free formats. A container format such as ogg is preferable because it can be played on virtually any operating system using free (as in freedom) software; no proprietary format can do so (or at least not legally
or easily). To force people to pay for and use particular software to be able to play content is unethical and wrong. The world's digital revolution needs to move away from its current proprietary nature, instead using open software and formats. I hope to see the BBC at the fore of such a movement.
Please!

Brian Rowe
Activist, Founder of Freedom for IP
Seattle, WA
Brian at freedomforip dot org
(206)335-8577
Locking the BBC's content behind DRM interferes with the greater social values of educating the public. Access to knowledge is essential for political freedom please open your content be providing it in a neutral form that does not take away peoples rights.

Matt Woodward
Software Engineer
6 Timberdene
Bristol
BS16 1TL
07786 674193
DRM is meant to be a way of preventing piracy. However, the pirates that actually harm sales figures are found in markets with stands full of dodgy DVDs. Those people need to be dealt with by the police, not a piece of software.
As it stands, DRM serves only to restrict what the general, non-copyright-infriging public can do. In my case, because I run a Linux based system, I am completely denied access to these restricted products. It is to say the least, deeply insulting to be treated like a criminal when I have never engaged in piracy.

Robert Barat
Student; Musician
New Rochelle, NY, 10804
rwbarat at gmail dot com
9146376262
DRM is bad for customers AND musicians

http://www.freethebbc.info/node/5





Other People's Porn

Watching my neighbors watch on-demand television.
Josh Levin

I have a magical box that allows me to watch other people watch TV—their movies, their sports, their cartoons, and their hour-long procedural dramas. And sometimes, usually around 11:30 on Friday nights, their soft-core pornography.

My career as a TV freeloader began when I threw together an HDTV setup a few months ago. To pull in locally broadcast HD channels, I bought a Samsung HD tuner and a set of rabbit ears. This setup was unstable—breathing on the antenna made the picture vanish. My girlfriend suggested that I try plugging in the Comcast cable line. (I get Comcast service but I don't have a cable box.) I screwed the cable in, and after performing the tuner's "auto channel search," I got all the D.C. and Baltimore broadcast networks in super-sharp HD.

But that wasn't all. Further up the dial, past PBS and the CW, I found a big clump of hyphenated channels. Channel 86-4 delivered an episode of The Sopranos—odd considering that I don't subscribe to HBO. The Leonardo DiCaprio movie Blood Diamond appeared on 87-5. And on 89-11 ... whoa, is that a nipple? These "premium" shows tended to appear and disappear in a flash—that Sopranos episode on 86-4 stayed on for five minutes, then transmogrified into The Devil Wears Prada. These programs also sometimes fast-forwarded and rewound spontaneously, as if an invisible hand were operating the remote.

At first, I assumed our tuner had formed a mind meld with a cable box a few apartments over. My girlfriend regaled our visitors with tales of our TV-obsessed neighbor, a heterosexual male who loved large-chested women and Hollywood blockbusters. But even the most ravenous viewer couldn't have this kind of appetite—some evenings I was getting free movies and porn on 20 channels at once.

I solved the mystery by consulting online message boards. At tech-y sites like AVS Forum, other voyeurs described their adventures in freeloading. Apparently, I was intercepting video-on-demand channels through the power of my Samsung's QAM tuner.

To explain how my tuner harvested a TV bonanza, I need to give a short primer on cable-television tech. Generally speaking, if you subscribe to basic-cable service—a $10 per month plan for around 20 channels, or a plan that gives you, say, channels 2 through 70—you receive nothing but analog signals. For more channels, you've got to go digital.

Depending on your cable company, "digital cable" service typically includes a mix of analog channels and channels sent digitally. QAM, or quadrature amplitude modulation, is the "modulation scheme" that cable companies use to transmit digital channels. Set-top boxes leased out by cable TV companies allow viewers to tune in to "QAM-ed" channels. The number of channels you receive depends on what level of service you've subscribed for and what switches they've thrown at the cableco for your account.

If you don't have a cable box but do subscribe to cable, you can usually receive some digital cable if your television or TV receiver has built-in QAM support. A standalone QAM tuner, however, will let you tune in only unencrypted digital channels.

Which digital channels are unencrypted? Most cable companies don't encrypt the digital signals that they pick up from local broadcasters. That explains why I get the HD versions of Fox, CBS, ABC, NBC, CW, and PBS. My tuner also fields unencrypted digital channels that aren't broadcast in HD, like the local NBC affiliate's 24-hour weather radar and a music-video channel called The Tube. Cable companies encrypt premium channels like HBO, ESPN-HD, and BBC America to prevent nonsubscribers from getting a free ride. The reason I can watch all that hot on-demand stuff is because Comcast doesn't encrypt it.

Here's how VOD works: If you want to watch an old Sopranos episode, you click a button that tells your set-top box to transmit a message to a server at the local cable facility. The box receives a message back from the server identifying the frequency—say, channel 86-4—where the stream will start playing. Only this particular cable box gets the message about the frequency, but the show itself still gets transmitted to other people in your service area. According to Comcast, each of its cable "nodes" serves roughly 450 houses. So, when Joe Blow dials up Episode 67 of The Sopranos, the signal goes to 449 of his neighbors. They could watch along if the cable company doesn't encrypt the show (which Comcast doesn't here in D.C.), they know what channel to flip to, and they have a QAM tuner. If someone in my node makes an on-demand request for The Sopranos, all I have to do is scroll around in the upper-80s region of my tuner, and I'll find it.

Here's a taste of what on-demand subscribers in my neighborhood watched during two recent one-hour sampling periods: an old episode of Scooby-Doo, several episodes of The Office, a Cinemax women-in-prison movie that was hard to follow plotwise thanks to the fast-forwarding, The Da Vinci Code, another soft-core movie (frequently fast-forwarded to the dirty parts) that focused on the salutary effects of bubble baths, an exercise show ("let's circle the rib cage up to the right"), a scare-movie channel called FEARnet, the Wilco documentary I Am Trying to Break Your Heart, Something's Gotta Give, Just Like Heaven, The Break-Up, The 40-Year-Old Virgin, Children of Men, Borat, The Wicker Man (Nicolas Cage version), The Queen, The Good Shepherd, Deja Vu, Derailed, ATL, and episodes of the HBO series Big Love, The Sopranos, Sex and the City, Real Time With Bill Maher, and Da Ali G Show.

Comcast insists that it scrambles all pay-per-view adult movies—that encompasses hard-core titles like Exxxtasy Island and Co-Ed Nymphos 31 (both cost $11.99 to order). According to a Comcast spokesperson, the company has "begun to scramble VOD channels and is working toward scrambling all of our content on VOD in the future." The company's spokespeople also want me to tell you that its customers' privacy is not under siege—that it's impossible for QAM users to identify who requested the VOD content they're watching. (I should make it clear that I don't mean to single out Comcast. They just happen to be my cable provider. An acquaintance of mine who gets Time Warner Cable filches on-demand movies, too. According to Internet forums, most cable companies occasionally provide unencrypted content that QAM users can grab.)

Why doesn't Comcast encrypt all of its VOD streams? Again according to a spokesperson, it's not that it's more technically challenging than encrypting a regular channel. Rather, it's an issue of volume: Comcast has 9,000 programs in its VOD system each month, and that's a lot of stuff to scramble. Encryption also can't be implemented by fiat from corporate headquarters—it has to be done market–by-market at each local cable facility.

Perhaps the main reason cable companies haven't bothered to close the QAM loophole is that so few people know or care about it. Ken Holsgrove, an audio/video consultant and the lead moderator of the HDTV sections on AVS Forum, says there are three barriers to entry for the wannabe on-demand swiper. First, you have to know what a QAM tuner is. (That eliminates roughly 100 percent of the U.S. population.) The Week in Review is edited and published by Jack Spratts. Second, you have to buy either a standalone QAM tuner (mine cost $170) or a TV with built-in QAM. Third, as cable companies add channels to their lineups, they tend to change QAM channel designations—the on-demand stream that appears on 86-4 today could be on a different channel tomorrow. In order to keep up with this movement, QAM users must rescan their channel lineup frequently. How many people have the patience to do that?

Besides, Holsgrove argues, it isn't that satisfying to watch secondhand on-demand. "The odds of you actually seeing a movie from beginning to end are virtually impossible to predict," he says. "That's stabbing an avid TV viewer right through the eyeball."
Other downsides: You can't control what's on. Not much of the content is in HD, which is unfortunate for those of us with HDTV setups. The show you're watching also might suddenly stop or fast-forward, like you've wandered inside someone else's TiVo. If your neighbor pauses Entourage to go to the bathroom, you'll just have to wait until he finishes. If he wants to skip the exposition and go right to the sex scenes, then you're going to the sex scenes, too. And if he stops watching Stranger Than Fiction with five minutes to go—well, you're just screwed.

But you can't beat the price (free), and sometimes it's fun to cede control. My friend who grabs on-demand stuff from Time Warner calls it "mystery cable"—it's fun to flip around the channels and hope you get lucky.

There is a science to watching other people's on-demand. If you want to catch the latest Sopranos or Entourage, start looking on Monday night—some of your neighbors will be catching up because they missed their shows on Sunday. Browsing during prime time will yield more programs than snooping in the middle of the day. If you start looking around 9 o'clock on a weeknight and 11 p.m. on Fridays and Saturdays, you'll generally find a well-stocked buffet of recent movies.

On-demand voyeurism works the best for guilty pleasures or movies that you've already seen. If you're dying to see The Queen, get the DVD. If you're in the mood for popcorn fare like Deja Vu or Derailed, you probably won't mind if the movie starts in the middle or if the action pauses for a few minutes. And don't worry: In my experience, only the porn viewers really lean on the fast-forward button. If you sit back on a Friday night to watch someone else's movie, there's a great chance you'll see it all the way through.

My magical box will eventually stop working. Comcast plans to scramble the VOD content from premium networks (HBO, Showtime, Cinemax) first and move on from there. In the meantime, I encourage the people of Washington, D.C., to continue to order on-demand movies. For one thing, I still haven't seen the beginning of Deja Vu. If someone could queue that up for me tonight, I'd appreciate it.
http://www.slate.com/id/2167389/





A Travesty Of Justice Averted

It was a remarkable occurrence in New London Superior Court Wednesday when a judge threw out the conviction of a 40-year-old Norwich woman who had allegedly exposed seventh-graders to pornography on a classroom computer.

This was a national news story, attracting attention from coast to coast, both when she was convicted, and again, when her case was overturned.

Substitute teacher Julie Amero had always professed her innocence, explaining that while students were working at the computer at the Kelly Middle School in Norwich in October 2004, pornographic images began to pop up and she was unable to prevent them.

Ms. Amero went to trial after refusing an offer of accelerated rehabilitation. She was steadfast in proclaiming her innocence. If she had taken the plea deal, she would have emerged with a clear criminal record after meeting certain conditions, including admitting criminal intent. But she preferred to make her case to a jury, which she and her legal counsel reasoned would understand the predicament she found herself in and find her innocent.

Instead, jurors bought the story of police and prosecutors, who seemed hell-bent on making an example of Ms. Amero. She was convicted as a felon, and was facing up to 40 years in prison Wednesday; one for each of the four counts of risk of injury to a minor of which she was convicted.

Then Wednesday Judge Hillary B. Strack-bein delivered a major surprise. She overturned the jury's conviction, citing new evidence presented belatedly by the state that suggested jurors received erroneous information. It was computer geeks who helped Ms. Amero.

Following her January conviction they petitioned Chief State's Attorney Kevin T. Kane and asked his office to take a second look at the information. They argued that a Norwich detective who testified that Ms. Amero intentionally accessed pornographic Web sites and failed to turn off the computer when the illicit images flashed on the screen, was wrong on both counts. She could not stop the pop-ups, and she had been told not to shut the computer down, and did as directed.

Furthermore, the computer experts argued that Ms. Amero, and other teachers, were not trained to deal with such circumstances, and therefore should not be held accountable.

Perhaps the most alarming finding in Judge Strackbein's ruling Wednesday was the disclosure that a forensic examination of the classroom computer conducted by the state after Ms. Amero's conviction revealed that the pornographic images observed in the classroom that day were indeed from pop-ups.

The state made its case against Ms. Amero based on false information and erroneous testimony. It never did a thorough investigation of the computer in question until after she was convicted. It nearly ignored the flood of experts who literally shouted that Ms. Amero was getting snookered.

Thank goodness that the computer experts came to her defense. And that new counsel brought the conflicting evidence to the court's attention. Those actions led to Wednesday's overturned conviction.

Ms. Amero has lived with this tragedy since 2004. Her reputation has been ruined and the anxiety of the thought of spending years in jail has likely weighed on her. That is a travesty.

If prosecutors are considering retrying the case, they would be advised to pay careful attention to details this time. What happened to Ms. Amero shouldn't happen to anyone — nor should it ever happen again.
http://www.theday.com/re.aspx?re=27a...c-c4720a2fda2d


















Until next week,

- js.



















Current Week In Review





Recent WiRs -

June 2nd, May 26th, May 19th, May 12th, May 5th

Jack Spratts' Week In Review is published every Friday. Submit letters, articles and press releases in plain text English to jackspratts (at) lycos (dot) com. Submission deadlines are Thursdays @ 1400 UTC. Please include contact info. Questions or comments? Call 213-814-0165, country code U.S..


"The First Amendment rests on the assumption that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public."
- Hugo Black
JackSpratts is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Peer-To-Peer News - The Week In Review - May 19th, '07 JackSpratts Peer to Peer 1 16-05-07 09:58 AM
Peer-To-Peer News - The Week In Review - December 9th, '06 JackSpratts Peer to Peer 5 09-12-06 03:01 PM
Peer-To-Peer News - The Week In Review - September 16th, '06 JackSpratts Peer to Peer 2 14-09-06 09:25 PM
Peer-To-Peer News - The Week In Review - July 22nd, '06 JackSpratts Peer to Peer 1 20-07-06 03:03 PM
Peer-To-Peer News - The Week In Review - June 24th, ’06 JackSpratts Peer to Peer 1 22-06-06 12:02 PM






All times are GMT -6. The time now is 01:43 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)