Skip to main content

Home/ Indie Nation/ Group items tagged your

Rss Feed Group items tagged

John Lemke

Roxxxy the US$7,000 companion/sex robot (NSFW) - 0 views

  •  
    When it comes to technology, the sex industry is no laggard, and as robots become more human-like in their appearance and abilities, US-based company TrueCompany is poised to launch Roxxxy - the world's first sex robot - that has many more capabilities than your average sex doll. Apart from having better defined physical features than previous dolls, Roxxxy has been programmed with her own personality and her manufacturers say she can listen, talk, carry on a conversation, feel your touch and respond to it, as well as move her private areas inside when she is being "utilized" to deliver an unforgettable erotic experience. There are even plans for a male version - Rocky the Robot.
John Lemke

ground hum in studio a/c - Gearslutz.com - 0 views

  • The $30 20 minute fix. Go to home depot and get a run of 12 gauge green wire, a pair of wire strippers and a pipe ground. Attach the pipe ground to the cold water pipe in your basement that comes from the street. Attach the wire to the pipe ground and run it into your studio. Turn off the circuit breaker and open the outlet(s) and remove the ground that is there and replace it with the wire from the basement. Turn on the circuit breaker. Done and done.
  • your best bet it to drive an actual ground rod (theyre pretty cheap) in your basement 10' deep or so ... then use the grounding techniques as above.... consider using braided wire as well, the larger surface area is better at 'grabbing' and grounding RFI
John Lemke

Online Community Building and the Secret Sauce | Spin Sucks - 0 views

  • the real juice is in the content.
  • I read a blog post he wrote about community. He said (I’m paraphrasing) that you don’t have a community until people begin talking to one another without your participation. Until then, it’s just comments. And he’s right. You know you’ve hit community mecca when people come to your site to talk to one another, with your content as the conversation starter.
John Lemke

Surprise: ASCAP and Music Labels Colluded To Screw Pandora | Techdirt - 0 views

  • A key part of this was that the major labels, key members of ASCAP, suddenly started "dropping out" of ASCAP in order to do licensing directly. At first we thought this was a sign of how the labels might be realizing that ASCAP was obsolete and out of touch, but it has since become clear that these "removals" were all something of a scam to force Pandora into higher rates.
  • What happened was that ASCAP and Pandora had first negotiated a higher rate than Pandora had agreed to in the past -- reaching a handshake agreement. However, before that agreement could be finalized, these labels started "withdrawing" from ASCAP in order to negotiate directly. As part of that, both ASCAP and the labels refused to tell Pandora which songs had been withdrawn, meaning that if Pandora accidentally played one of the withdrawn songs (again, without knowing which songs were withdrawn),
  • Your Honor, by the time Pandora asked for this information on November 1st, both ASCAP and Mr. Brodsky [Sony Executive VP] had in their possession this very list. The deposition testimony from ASCAP was that this list as is could have been delivered to Pandora within 24 hours were it only to get the go-ahead from Sony to do so. ASCAP never received the go-ahead. We cited much of the internal back-and-forth on this in our briefs... My favorite is the following exchange between Mr. DeFilippis and Mr. Reimer of ASCAP on December 19th, 2013, PX 193. You see the question being asked by Mr. DeFilippis: why didn't Sony provide the list to Pandora? Mr. Reimer's response: Ask me tomorrow. Mr. DeFilippis: Right. With drink in hand. And the inference here is just incredible. This data was sitting there, your Honor, and nobody was willing to give it to Pandora.
  • ...1 more annotation...
  • There's a lot more in there, but it seems abundantly clear that these labels "withdrawing" from ASCAP had nothing to do with competition or market rates. It appears that it had little to do with even withdrawing from ASCAP. Instead, it seems to have been designed from the start to basically screw over Pandora, in what certainly smells an awful lot like collusion, by forcing Pandora to pay exorbitant rates or suddenly face a massive copyright liability because no one would tell them what songs were being "withdrawn" from an existing licensing agreement.
John Lemke

Amazon said to be negotiating Prime streaming music service | The Verge - 0 views

  • Last year, we reported that Amazon was talking to the labels about an on-demand music service, and Recode has essentially confirmed that a dialog is ongoing.
  • At this point, the novelty of music streaming services has largely worn off, but Amazon's business approach could prove interesting. Just as it does with movies and TV shows, the company would likely include music streaming as part your Amazon Prime subscription. And while all of that content may seem like a lot when you factor in Prime's $79 fee, Amazon has recently said it's considering upping the annual cost by as much as $40. Having both music and video at your fingertips could help make a price hike easier to swallow.
John Lemke

How LexisNexis and others may have unwittingly aided identity thieves | Ars Technica - 0 views

  • Wednesday's report exposes serious risks in what banks, mortgage companies, and other financial services call "knowledge-based authentication." Representatives from these services frequently rely on a list of about 100 questions such as "What was your previous address?" or "Which company services your mortgage?" when trying to determine if the person on the phone or filling out an application is the individual he claims to be. Ready access to the data stored by the data aggregators can make the difference between a fraudulent application being approved or rejected. Krebs goes on to recount a story told by Gartner fraud analyst Avivah Litan about a fellow analyst who witnessed an identity thief in action.
John Lemke

Spy Babe Now Wants to Design Astronaut Outfits | Danger Room | Wired.com - 0 views

  •  
    Is your national space program fashion-forward enough? Astronauts getting a little frumpy after the Cold War? Having trouble getting that space plane off the ground? Why not lift morale and brighten up the place with some fierce new uniforms designed by planet Earth's most infamous ex-spy? Yes, Russia's famously outed sleeper agent Anna Chapman is back in yet another installment of her merciless publicity tour. This time, she's looking to help the ground crew at Khrunichev State Research and Production Space Center work it down the runway in style. Frilly epaulets for all! "Chapman told me that she intends to participate in designing clothing for the Khrunichev [Space] Center, in what capacity, designer or financially, she did not specify," the Gagarin Astronaut Training Center's top astronaut told Russian state media today.
John Lemke

A Car You Can Drive With Your Thoughts - Slashdot - 0 views

  •  
    A future soon themed news cast?
John Lemke

Another Loss For Righthaven: Court Explains That Its Demand For Domain Names Is Silly |... - 0 views

  •  
    Righthaven hasn't been having too much luck lately. We've already covered how its having a bad day for a few different reasons, and here's another one. As you may know, in nearly every lawsuit Righthaven files, it also demands that the defendant hand over his or her website, in addition to the $75,000 to $150,000 it usually asks for. This has left a bunch of folks scratching their heads, as there's simply no precedent for saying that if you infringe on someone's copyright, they get your domain. And, now, we have a court making that point clear. Eric Goldman points us to a ruling in Las Vegas by judge Roger Hunt (the same judge who unsealed the filing that may kill off most of Righthaven's lawsuits...), in which he points out that asking for the domain name has no basis in law:
John Lemke

Rep. Goodlatte Slips Secret Change Into Phone Unlocking Bill That Opens The DMCA Up For... - 0 views

  • Because of section 1201 of the DMCA, the "anti-circumvention" provision, companies have been abusing copyright law to block all sorts of actions that are totally unrelated to copyright. That's because 1201 makes it illegal to circumvent basically any "technological protection measures." The intent of the copyright maximalists was to use this section to stop people from breaking DRM. However, other companies soon distorted the language to argue that it could be used to block certain actions totally unrelated to copyright law -- such as unlocking garage doors, ink jet cartridges, gaming accessories... and phones
  • Separately, every three years, the Librarian of Congress gets to announce "exemptions" to section 1201 where it feels that things are being locked up that shouldn't be. Back in 2006, one of these exemptions involved mobile phone unlocking.
  • Every three years this exemption was modified a bit, but in 2012, for unexplained reasons, the Librarian of Congress dropped that exemption entirely, meaning that starting in late January of 2013, it was possible to interpret the DMCA to mean that phone unlocking was illegal. In response to this there was a major White House petition -- which got over 100,000 signatures, leading the White House to announce (just weeks later) that it thought unlocking should be legal -- though, oddly, it seemed to place the issue with the FCC to fix, rather than recognizing the problem was with current copyright law.
  • ...2 more annotations...
  • While this gives Goodlatte and other maximalists some sort of plausible deniability that this bill is making no statement one way or the other on bulk unlocking, it certainly very strongly implies that Congress believes bulk unlocking is, in fact, still illegal. And that's massively problematic on any number of levels, in part suggesting that the unlocker's motives in unlocking has an impact on the determination under Section 1201 as to whether or not it's legal. And that's an entirely subjective distinction when a bill seems to assume motives, which makes an already problematic Section 1201 much more problematic. Without that clause, this seemed like a bill that was making it clear that you can't use the DMCA to interfere with an issue that is clearly unrelated to copyright, such as phone unlocking. But with this clause, it suggests that perhaps the DMCA's anti-circumvention clause can be used for entirely non-copyright issues if someone doesn't like the "motive" behind the unlocker.
  • Unfortunately, the bill was deemed so uncontroversial that it's been listed on the suspension calendar of the House, which is where non-controversial bills are put to ensure quick passage. That means that, not only did Goodlatte slip in a significant change to this bill that impacts the entire meaning and intent of the bill long after it went through the committee process (and without informing anyone about it), but he also got it put on the list of non-controversial bills to try to have it slip through without anyone even noticing.
John Lemke

TSA agent confiscates sock monkey's toy pistol | KING5.com Seattle - 0 views

  • Rooster Monkburn" the cowboy sock monkey is without his pistol, thanks to a diligent TSA agent in St. Louis.
  • May said the TSA agent went through the bag, through the sewing supplies and found the two-inch long pistol. “She said ‘this is a gun,’” said May. “I said no, it’s not a gun it’s a prop for my monkey.” “She said ‘If I held it up to your neck, you wouldn’t know if it was real or not,’ and I said ‘really?’” said May.
John Lemke

Some NSA Officials Favor Giving Snowden Limited Amnesty For All The Wrong Reasons | Tec... - 0 views

  • JOHN MILLER: He's already said, "If I got amnesty, I would come back." Given the potential damage to national security, what would your thought on making a deal be? RICK LEDGETT: So, my personal view is, yes, it's worth having a conversation about. I would need assurances that the remainder of the data could be secured, and my bar for those assurances would be very high. It would be more than just an assertion on his part.
  • those documents have been spread out to a number of third parties already.
  • The reason for granting amnesty is as a recognition that Snowden was, in fact, a whistleblower
John Lemke

Ask Ethan #55: Could a Manned Mission to Mars Abort? - Starts With A Bang! - Medium - 0 views

  • No humans have ever traveled farther away from Earth than the crew of Apollo 13 did, as they circled around the far side of the Moon close to lunar apogee, achieving a maximum distance of 400,171 km above the Earth’s surface on April 15, 1970. But when the first manned spaceflight to another planet occurs, that record will be shattered, and in a mere matter of days.
  • The way we currently reach other worlds with our present technology — or any remote location in the Universe — involves three distinct stages:The initial launch, which overcomes the Earth’s gravitational binding energy and starts our spacecraft off with a reasonably large (on the order of a few km/s) velocity relative to the Earth’s motion around the Sun.On-board course corrections, where very small amounts of thrust accelerate the spacecraft to its optimal trajectory.And gravity assists, where we use the gravitational properties of other planets in orbit around the Sun to change our spacecraft’s velocity, either increasing or decreasing its speed with every encounter.It’s through the combination of these three actions that we can reach any location — if we’re patient and we plan properly — with only our current rocket technology.
    • John Lemke
       
      How we can do it now, if we plan right.
  • The initial launch is a very hard part right now. It takes a tremendous amount of resources to overcome the Earth’s gravitational pull, to accelerate a significant amount of mass to the Earth’s escape velocity, and to raise it all the way up through the Earth’s atmosphere.
  • ...2 more annotations...
  • The most optimal one for a one-way trip to Mars, for those of you wondering, that minimizes both flight time and the amount of energy needed, involves simply timing your launch right.
    • John Lemke
       
      The cheapest and the fastest. The one way ticket option.
  • When a planet orbits the Sun, there’s a lot of energy in that system, both gravitational energy and kinetic energy. When a third body interacts gravitationally as well, it can either gain some energy by stealing it from the Sun-planet system, or it can lose energy by giving it up to the Sun-planet system. The amount of energy performed by the spacecraft’s thrusters is often only 20% (or less) of the energy either gained-or-lost from the interaction!
    • John Lemke
       
      The transfer of energy involved to change speeds.
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

Comcast Declares War on Tor? - Deep Dot Web - 0 views

  • Comcast agents have contacted customers using Tor and instructed them to stop using the browser or risk termination of service. A Comcast agent named Jeremy allegedly called Tor an “illegal service.” The Comcast agent told its customer that such activity is against usage policies.
  • Users who try to use anonymity, or cover themselves up on the internet, are usually doing things that aren’t so-to-speak legal. We have the right to terminate,   fine, or suspend your account at anytime due to you violating the rules. Do you have any other questions? Thank you for contacting Comcast, have a great day.
  • Comcast previously corroborated with the FBI by providing information on alleged Silk Road mastermind Ross Ulbricht’s internet usage. Ulbricht’s legal defense without a warrant. Ulbricht was most certainly never given a warning by Comcast or given time to contact a lawyer before he was arrested in a San Francisco library last October. Comcast already monitors its customers internet usage to prevent them from downloading pirated media in violation of copyright laws. Under the “Six Strikes” plan, Comcast customers who are caught by Comcast pirating copy-written material are emailed by Comcast and told to cease the activity. Comcast will continue monitoring them, and if they violate the “Six Strikes” plan five more times, their internet service will be terminated.
1 - 20 of 25 Next ›
Showing 20 items per page