Comment Re:New users don't know about CLI (Score 1) 383
findstr has POSIX basic regular expression support (almost) and has been available since Windows 2000.
findstr has POSIX basic regular expression support (almost) and has been available since Windows 2000.
You are in the category "I agree with you". I think DRM will prevent fair use of materials as well as prevent them from falling into the Public Domain at the end of the limited Copyright period, and there needs to be recognition of these problems right now in order to protect society's interests. A straightforward solution is to make technological protection an alternative to Copyright protection - you can chose either one, but not both.
(All DRM is purposely designed to break content. It provides absolutely no benefit to the user)
Breaking content in a standard way, which can then be unbroken in a standard way (likely to be cross platform and supported by your browser); as opposed to only being unbroken by a dodgy Windows-only rootkit supplied by the content distributor.
Indeed. Encrypted Media Extensions, W3C First Public Working Draft 10 May 2013:
This proposal extends HTMLMediaElement providing APIs to control playback of protected content.
The API supports use cases ranging from simple clear key decryption to high value video (given an appropriate user agent implementation). License/key exchange is controlled by the application, facilitating the development of robust playback applications supporting a range of content decryption and protection technologies.
This specification does not define a content protection or Digital Rights Management system. Rather, it defines a common API that may be used to discover, select and interact with such systems as well as with simpler content encryption systems. Implementation of Digital Rights Management is not required for compliance with this specification: only the simple clear key system is required to be implemented as a common baseline.
That rationale (as I've heard it explained) is that media (video/audio) content distributors are going to implement DRM, so the Hobson's choice is between giving them a standard interface (HTML EME) or having every distributor create their own proprietary media player (probably platform-specific with embedded rootkit).
If you believe that all media should be gratis, or you believe that all media should be open and consumers should be trusted to pay for non-gratis media absent any technological protection, then you will view EME as a bad thing.
If you believe that Copyright should be able to exist on media and that authors and/or distributors should be able to charge for the video/audio, and you believe that technological protection measures may have some impact to reduce non-paid use of such media, and you believe that it is in the interest of consumers to have standards for these sort of things, then you may view EME as a good thing.
Sounds more specifically like Role Based Access Control (RBAC). You can define RBAC with a Subject (identity-based access control with roles) or without a subject. In the latter case authentication is tied to authorising a role, rather than authenticating a subject who has (or can authorise) a role.
Certainly seems like a more promising idea than pupil dilation. Wikipedia has a comparison of BCI hardware.
More generally we need a consumer bill of rights for digital goods. When the copyright on these goods expires they must enter the public domain; the assumption that they do is part of the justification for granting a copyright monopoly. DRM prevents goods from entering the public domain. A consumer bill of rights should require that either (i) digital goods protected by copyright are free from DRM (conversely you can choose to use DRM but you lose the benefit of copyright protection); or (ii) any person or organisation that employs DRM to protect copyrighted digital goods must provide the digital good(s), DRM design specifications, source code and keys to a designated government office that will verify that the provided keys/source/tools can unlock the DRM and then hold everything in escrow for the term of the copyright. There would of course be an administrative fee associated with (ii), and if the fee is not paid then the information under escrow is released into the public domain.
At a glance the patent seems to be for a very specific approach to measuring pulse oximetry. The approach seems near identical to US patent 5737439 Anti-fraud biometric scanner that accurately detects blood flow. In any event the basic technique for using pulse oximetry for liveness testing is described in Sandstrom, "Liveness Detection in Fingerprint Recognition Systems", 2004 and Hill & Stoneham, "Practical applications of pulse oximetry", 2000. The use of two IR absorption measurements is not novel (see patent 5737439).
Thanks for the link, although it doesn't actually explain whether the formula is derived from observation or from physical principles. As it turns out (with a bit of digging): both. It's an approximation that is sensitive to your choice of C and C0 (in IPCC: current and pre-industrial CO2 concentrations) and fits well to both empirical observations and theoretical expectations within a reasonable range of CO2 concentration. A detailed explanation can be found at http://scienceofdoom.com/2010/02/19/co2-an-insignificant-trace-gas-part-seven-the-boring-numbers/
Used alone these devices can effectively prevent trojans from sniffing password entry, and can guarantee high entropy in the user secret which will prevent brute-force attacks (like password guessing).
Used alone these devices are ineffective against man-in-the-browser and various spear-phishing attacks, and (unlike passwords) are vulnerable to physical theft. Password protecting the device reduces the vulnerability to physical theft.
The minimum security requirement for an authentication device is that it has its own trusted user interface, and requires PIN or biometric authentication via that interface, per login/transaction.
"The annual and decadal land surface temperature from the BerkeleyEarth average, compared to a linear combination of volcanic sulfate emissions and the natural logarithm of CO2."
Why the natural logarithm? Do we have a hypothesis to explain why the overall forcing effect of CO2 follows the natural logarithm of atmospheric concentration? Why a linear combination with volcanic sulfate? Does the forcing of sulfate have a linear relationship to the natural logarithm of CO2? Or is this just the mathematical transformation that makes CO2+sulfate changes fit the plot of change in mean surface temperature?
In the absence of sound theoretical answers to these questions, these are interesting but not compelling plots. The IPCC4 report (for example) goes into far more detail about our theoretical understanding of climate forcing from different components, and how projections are built up from this understanding that apply correctly in retrospect, leading to a more compelling argument for climate change.
I've dealt with a similar problem on a smaller scale (500K files, 120Gb). I started by generating hashes over all my current properly-organised files using hashdeep, and parsed the output into a database (columns filesize, hash, path, filename, mtime) using a custom scripts. Then I wrote another script to walk through the archives finding and deleting files that matched those already in the database; the script also used the database to keep track of its walk so it could be stopped and restarted. This halved the size of the archive material before I had to start trying to understand what was there.
From there I identified pivotal directories in the archive - ones I could reasonable assume to be recent or more complete (for example, based on backup date) - and added them to the hash database, then walked the rest of the archives culling duplicates again. Lather, rinse, repeat and you rapidly reach a point where you have a small number of directories with a lot of de-duplicated data, and a large number of directories with small amounts of possibly-duplicated data that can be handled by a free dedup tool.
It stretches the eggs into multiple baskets, allowing an attacker to choose one of multiple points of attack.
FTFY
Some smart meters also track time of use, and use on different circuits (e.g. lights, plugs, and a fixed appliance circuit that can be remotely switched off to reduce load on the grid). Some people consider this sort of information to be private. For example if the meter communicated this information regularly and the communication and/or central storage was insecure, it could be used to determine when you are on holiday.
What you describe is an aspect of copyright law that needs to be fixed. In many jurisdictions photography is never a work for hire, so you get these ridiculous situations where your wedding photographer can hold you to random. The law needs to be clear that photography may be a work for hire, and the conditions under which it is a work for hire, then the owner is (correctly) the person or organisation that hired the photographer.
Where there's a will, there's a relative.