autocast/cmdln_m4a.xml.orig

3573 lines
360 KiB
XML

<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">
<channel>
<title>The Command Line Podcast</title>
<link>http://thecommandline.net/</link>
<description>A regularly published podcast by a self-described hacker, curmudgeon and hacktivist about the practice and profession of programming drawing on over a decade of professional experience and a lifetime spent hacking, the intersection of politics and society with technology and anything else clever, elegant or funny that catches my mind as a die hard technology geek.</description>
<generator>Feeder 2.1.3(1344); Mac OS X Version 10.6.4 (Build 10F569) http://reinventedsoftware.com/feeder/</generator>
<docs>http://blogs.law.harvard.edu/tech/rss</docs>
<language>en</language>
<copyright>2005-2009</copyright>
<managingEditor>cmdln@thecommandline.net</managingEditor>
<webMaster>cmdln@thecommandline.net</webMaster>
<pubDate>Wed, 15 Sep 2010 21:30:43 -0400</pubDate>
<lastBuildDate>Wed, 15 Sep 2010 21:30:43 -0400</lastBuildDate>
<ttl>180</ttl>
<image>
<url>http://media.libsyn.com/media/cmdln/color_cover_art.jpg</url>
<title>The Command Line</title>
<link>http://thecommandline.net/</link>
<description>Logo thanks to Jared Axelrod of Free Planet X.</description>
</image>
<atom:link href="http://idisk.me.com/cmdln/Public/cmdln_m4a.xml" rel="self" type="application/rss+xml"/>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>The podcast of a self-proclaimed hacker-curmudgeon.</itunes:subtitle>
<itunes:summary>A regularly published podcast by a self-described hacker, curmudgeon and hacktivist about the practice and profession of programming drawing on over a decade of professional experience and a lifetime spent hacking, the intersection of politics and society with technology and anything else clever, elegant or funny that catches my mind as a die hard technology geek.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:image href="http://media.libsyn.com/media/cmdln/color_cover_art.jpg"/>
<itunes:owner>
<itunes:name>Command Line</itunes:name>
<itunes:email>cmdln@thecommandline.net</itunes:email>
</itunes:owner>
<itunes:new-feed-url>http://feeds2.feedburner.com/cmdln-enhanced</itunes:new-feed-url>
<itunes:block>no</itunes:block>
<itunes:category text="Technology"/>
<item>
<title>TCLP 2010-09-08 Creative Commons, Legal Issue Panel from Dragon*Con 2010 (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/09/08/dragoncon_cc_4/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a quick end of month update on the podcast's finances and you can find all my posts from Dragon*Con past and present using the <a href="http://thecommandline.net/tag/dragoncon/">dragoncon tag</a>.</p>
<p>There is no new hacker word of the week this week.</p>
<p>The feature this week is the panel audio from the Creative Commons and legal issues panel I moderated at Dragon*Con 2010. I was joined once again by Randy Chertkow of <a href="http://beatnikturtle.com/">Beatnik Turtle</a> and Courtney Perry, lawyer and now law professor. The new panelist this year was Brian Ibbott of <a href="http://coverville.com">Coverville</a> who was very generous in sharing his experiences as an early and still active music podcaster. In the discussion we mention both "<a href="http://www.amazon.com/gp/product/0143034650?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0143034650">Free Culture</a>", by Lawrence Lessig, and "<a href="http://www.amazon.com/gp/product/0300158343?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0300158343">The Public Domain</a>", by James Boyle.</p>
<p>More news and commentary and alternate feeds available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_09_08">detailed show notes online</a>. You can grab the <a href="http://www.archive.org/details/Tclp2010-09-08CreativeCommonsLegalIssuesPanelFromDragonCon2010">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 08 Sep 2010 19:22:18 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-09-08.m4a" length="51107513" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100908-creative-commons-legal-issue-pane</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a quick end of month update on the podcast's finances and you can find all my posts from Dragon*Con past and present using the dragoncon tag.
There is no new hacker word of the week this week.
The feature this week is the panel audio from the Creative Commons and legal issues panel I moderated at Dragon*Con 2010. I was joined once again by Randy Chertkow of Beatnik Turtle and Courtney Perry, lawyer and now law professor. The new panelist this year was Brian Ibbott of Coverville who was very generous in sharing his experiences as an early and still active music podcaster. In the discussion we mention both "Free Culture", by Lawrence Lessig, and "The Public Domain", by James Boyle.
More news and commentary and alternate feeds available at http://thecommandline.net/. View the detailed show notes online. You can grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>1:09:24</itunes:duration>
</item>
<item>
<title>TCLP 2010-08-25 Inner Chapter: Superstitions (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/08/25/superstitions/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, the last reminder of my impending travel to <a href="http://dragoncon.org/">Dragon*Con</a>. Also a quick review of Neil Netanel's "<a href="http://www.amazon.com/gp/product/0195137620?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0195137620">Copyright's Paradox</a>".</p>
<p>Listener feedback is a thoughtful and thought provoking email from Grant who wrote in response to my <a href="http://thecommandline.net/2010/08/01/news_220/">discussion</a> of ebooks in the developing world.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/finger-pointing-syndrome.html">finger-pointing syndrome</a>.</p>
<p>The feature this week is an Inner Chapter on the subject of superstitions.</p>
<p>More news and commentary and alternate feeds available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_08_25">detailed show notes online</a>. You can grab the <a href="http://www.archive.org/details/Tclp2010-08-25InnerChapterSuperstitions">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 25 Aug 2010 20:46:09 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-08-25.m4a" length="21328413" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100825-inner-chapter-superstitions-comm</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, the last reminder of my impending travel to Dragon*Con. Also a quick review of Neil Netanel's "Copyright's Paradox".
Listener feedback is a thoughtful and thought provoking email from Grant who wrote in response to my discussion of ebooks in the developing world.
The hacker word of the week this week is finger-pointing syndrome.
The feature this week is an Inner Chapter on the subject of superstitions.
More news and commentary and alternate feeds available at http://thecommandline.net/. View the detailed show notes online. You can grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>28:53</itunes:duration>
</item>
<item>
<title>TCLP 2010-08-22 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/08/22/news_223/</link>
<description><![CDATA[<p>This is news cast 222, an episode of The Command Line Podcast.</p>
<p>In the intro, an obligatory reminder there will be no new shows on the 29th, the 1st and the 5th because of <a href="http://dragoncon.org/">Dragon*Con</a>. Also, if you are in the north west of the UK, check out <a href="http://tinyurl.com/ucubed">U^3</a> an UnWorkShop being held the 28th of August.</p>
<p>This week's security alerts are <a href="http://tech.slashdot.org/story/10/08/17/138251/New-Firefox-iFrame-Bug-Bypasses-URL-Protections">a Firefox bug bypasses URL protection for embedded frames</a> and <a href="http://www.h-online.com/open/news/item/Root-privileges-through-Linux-kernel-bug-Update-1061563.html">an old Linux Kernel flaw allows exploits to acquire root privileges</a>.</p>
<p>In this week's news <a href="http://citizenlab.org/2010/08/the-end-of-online-privacy/">the end of privacy</a>, a new <a href="http://www.technologyreview.com/computing/26055/?ref=rss&amp;a=f">probabilistic</a> <a href="http://www.theregister.co.uk/2010/08/17/lyric_probability_processor/">processor</a> <a href="http://arstechnica.com/hardware/news/2010/08/probabilistic-processors-possibly-potent.ars">design</a>, <a href="http://www.technologyreview.com/blog/arxiv/25629/?ref=rss">a thirty year old crypto system is resistant to quantum cryptanalysis</a>, and <a href="http://bits.blogs.nytimes.com/2010/08/18/new-facebook-location-feature-sparks-privacy-concerns/">privacy concerns</a> (among <a href="http://www.readwriteweb.com/archives/details_details_facebook_responds_to_our_questions.php">others</a>) over Facebook's new Places feature. The EFF already has a <a href="http://www.eff.org/deeplinks/2010/08/how-protect-your-privacy-facebook-places">guide</a> to protecting your privacy against it.</p>
<p>Following up this week <a href="http://www.eff.org/deeplinks/2010/08/eff-files-appeal-warrantless-wiretapping-case">EFF appealing the Jewel v. NSA warrantless wiretapping case</a> and <a href="http://arstechnica.com/tech-policy/news/2010/08/negotiators-confirm-acta-not-really-a-counterfeiting-treaty.ars">negotiators concede ACTA isn't about counterfeiting after all</a>.</p>
<p>More news and commentary and alternate feeds available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_08_22">detailed show notes online</a>. You can also grab the <a href="http://www.archive.org/details/Tclp2010-08-22News">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 22 Aug 2010 18:47:03 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-08-22.m4a" length="24585715" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100822-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 222, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 222, an episode of The Command Line Podcast.
In the intro, an obligatory reminder there will be no new shows on the 29th, the 1st and the 5th because of Dragon*Con. Also, if you are in the north west of the UK, check out U^3 an UnWorkShop being held the 28th of August.
This week's security alerts are a Firefox bug bypasses URL protection for embedded frames and an old Linux Kernel flaw allows exploits to acquire root privileges.
In this week's news the end of privacy, a new probabilistic processor design, a thirty year old crypto system is resistant to quantum cryptanalysis, and privacy concerns (among others) over Facebook's new Places feature. The EFF already has a guide to protecting your privacy against it.
Following up this week EFF appealing the Jewel v. NSA warrantless wiretapping case and negotiators concede ACTA isn't about counterfeiting after all.
More news and commentary and alternate feeds available at http://thecommandline.net/. View the detailed show notes online. You can also grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>33:19</itunes:duration>
</item>
<item>
<title>TCLP 2010-08-18 Inner Chapter: Scalability (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/08/18/scalability/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a reminder about the upcoming <a href="http://copynightdc.wordpress.com/">CopyNight</a> here in DC and of my impending travel to <a href="http://dragoncon.org/">Dragon*Con</a>.</p>
<p>There is no new hacker word of the week this week.</p>
<p>The feature this week is an Inner Chapter on the subject of scalability. In it, I mention my previous discussion of <a href="http://thecommandline.net/2010/01/06/speed_performance/">speed and performance</a>.</p>
<p>More news and commentary and alternate feeds available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_08_18">detailed show notes online</a>. You can grab the <a href="http://www.archive.org/details/Tclp2010-08-18InnerChapterScalabiluity">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 18 Aug 2010 19:55:18 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-08-18.m4a" length="25408654" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100818-inner-chapter-scalability-commen</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a reminder about the upcoming CopyNight here in DC and of my impending travel to Dragon*Con.
There is no new hacker word of the week this week.
The feature this week is an Inner Chapter on the subject of scalability. In it, I mention my previous discussion of speed and performance.
More news and commentary and alternate feeds available at http://thecommandline.net/. View the detailed show notes online. You can grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:26</itunes:duration>
</item>
<item>
<title>TCLP 2010-08-15 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/08/15/news_222/</link>
<description><![CDATA[<p>This is news cast 222, an episode of The Command Line Podcast.</p>
<p>In the intro, letting everyone know <a href="http://dragoncon.org/">Dragon*Con</a> is coming up. I'll be taking a little more time this year off from the show to prepare for my travel there. There will be no news cast on either September 29th or the 5th. There will be no feature cast on the 1st and possibly the 8th, depending on what recordings I come back with and how much work they need.</p>
<p>This week's security alerts are <a href="http://www.computerweekly.com/Articles/2010/08/10/242321/android-phones-hit-by-text-based-trojan.htm">first Android SMS trojan</a> and <a href="http://www.h-online.com/open/news/item/Vulnerability-in-OpenSSL-1-0-x-1053147.html">a vulnerability in OpenSSL 1.0</a>.</p>
<p>In this week's news <a href="http://tech.slashdot.org/story/10/08/08/0110222/Artificial-Life-Forms-Evolve-Basic-Memory-Strategy">artificial life evolves a basic memory</a>, <a href="http://www.wired.com/threatlevel/2010/08/nsl-gag-order-lifted/">John Doe who challenged the FBI freed to speak</a>, <a href="http://tech.slashdot.org/story/10/08/11/128244/Touchscreens-Open-To-Smudge-Attacks">touch screens open to smudge attack</a>, and <a href="http://www.adafruit.com/blog/2010/08/09/scott-summit-on-the-future-of-3d-printing/">the state of 3D printing</a>. The book I mention in the a-life segment is "<a href="http://www.amazon.com/gp/product/0671872346?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0671872346">Complexity</a>" by Mitch Waldrop.</p>
<p>Following up this week <a href="http://googlepublicpolicy.blogspot.com/2010/08/joint-policy-proposal-for-open-internet.html">just the announcement of what Google and Verizon were up to</a>. There was an <a href="http://googlepublicpolicy.blogspot.com/2010/08/google-and-verizon-op-ed-path-to-open.html">op-ed from the two CEOs</a> though I don't think it added anything. There was also a ton of analysis and commentary though I am going to recommend that from <a href="http://www.eff.org/deeplinks/2010/08/google-verizon-netneutrality">EFF's Cindy Cohn</a>. Not surprisingly, Google has already posted a <a href="http://googlepublicpolicy.blogspot.com/2010/08/facts-about-our-network-neutrality.html">defense</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_08_15">detailed show notes online</a>. You can also grab the <a href="http://www.archive.org/details/Tclp2010-08-15News">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 15 Aug 2010 18:51:17 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-08-15.m4a" length="23174332" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100815-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 222, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 222, an episode of The Command Line Podcast.
In the intro, letting everyone know Dragon*Con is coming up. I'll be taking a little more time this year off from the show to prepare for my travel there. There will be no news cast on either September 29th or the 5th. There will be no feature cast on the 1st and possibly the 8th, depending on what recordings I come back with and how much work they need.
This week's security alerts are first Android SMS trojan and a vulnerability in OpenSSL 1.0.
In this week's news artificial life evolves a basic memory, John Doe who challenged the FBI freed to speak, touch screens open to smudge attack, and the state of 3D printing. The book I mention in the a-life segment is "Complexity" by Mitch Waldrop.
Following up this week just the announcement of what Google and Verizon were up to. There was an op-ed from the two CEOs though I don't think it added anything. There was also a ton of analysis and commentary though I am going to recommend that from EFF's Cindy Cohn. Not surprisingly, Google has already posted a defense.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online. You can also grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>31:24</itunes:duration>
</item>
<item>
<title>TCLP 2010-08-08 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/08/08/news_221/</link>
<description><![CDATA[<p>This is news cast 221, an episode of The Command Line Podcast.</p>
<p>In the intro, my thanks to Mike for his <a href="http://support/">donation</a> for which he has earned a merit badge. A final reminder there will not be a feature cast this coming week, I'll be out in San Francisco for most of the week. Also, a quick review of George Mann's "<a href="http://www.amazon.com/gp/product/0765323214?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0765323214">The Osiris Ritual</a>". I <a href="http://thecommandline.net/2010/06/16/why_programming_is_hard/">reviewed</a> his first novel, "The Affinity Bridge", earlier in the Summer.</p>
<p>This week's security alerts are <a href="http://www.theregister.co.uk/2010/08/02/long_range_rfid/">RFIDs can be provably read at over 60 meters</a> and <a href="http://it.slashdot.org/story/10/08/05/2054247/ReCAPTCHAnet-Now-Vulnerable-to-Algorithmic-Attack">an algorithmic attack on reCAPTCHA</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/science/news/2010/08/researchers-craft-algorithm-to-turn-mesh-networking-green.ars">an algorithm to improve the energy efficiency of mesh networks</a>, <a href="http://www.salon.com/news/opinion/glenn_greenwald/2010/08/02/privacy">concerns over a citizen vigilante group</a> monitor ISPs though <a href="http://www.salon.com/news/opinion/glenn_greenwald/2010/08/05/surveillance/index.html">the groups claims may be overstated</a>, <a href="http://googleblog.blogspot.com/2010/08/update-on-google-wave.html">Google ends Wave development</a> though is <a href="http://news.cnet.com/8301-13860_3-20012724-56.html">dedicated to learning from its failure</a> in this case probably from its <a href="http://www.readwriteweb.com/archives/google_wave_is_dead.php">complexity</a> despite adding more resources and opening up to more users, and <a href="http://voices.washingtonpost.com/posttech/2010/08/google_and_verizon_have_come.html">unpacking what exactly went on between Google and Verizon</a> especially <a href="http://www.pcmag.com/article2/0,2817,2367436,00.asp">as they deny claims of an anti-neutrality pact</a> (even on <a href="http://twitter.com/googlepubpolicy/statuses/20393606477">Twitter</a>). Odds are good they <a href="http://arstechnica.com/tech-policy/news/2010/08/google-verizon-deny-net-neutrality-rumors-but-still-meeting.ars">are still meeting and talking</a> to some end which may be why the NYT is <a href="http://www.wired.com/epicenter/2010/08/google-verizon-deny-deal/">sticking to its story</a>. Cringely has the most <a href="http://www.nytimes.com/2010/08/08/opinion/08cringeley.html?_r=2">intriguing guess at their possible goal</a>.</p>
<p>Following up this week <a href="http://www.eff.org/press/archives/2010/08/03">EFF offers assistance to targets of the US Copyright Group</a> and <a href="http://voices.washingtonpost.com/posttech/2010/08/fcc_stops_closed-door_internet.html?wprss=posttech">the FCC ends closed door discussions on its net neutrality plan</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_08_08">detailed show notes online</a>. You can also grab the <a href="http://www.archive.org/details/Tclp2010-08-08News">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 08 Aug 2010 20:19:25 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-08-08.m4a" length="24763343" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100808-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 221, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 221, an episode of The Command Line Podcast.
In the intro, my thanks to Mike for his donation for which he has earned a merit badge. A final reminder there will not be a feature cast this coming week, I'll be out in San Francisco for most of the week. Also, a quick review of George Mann's "The Osiris Ritual". I reviewed his first novel, "The Affinity Bridge", earlier in the Summer.
This week's security alerts are RFIDs can be provably read at over 60 meters and an algorithmic attack on reCAPTCHA.
In this week's news an algorithm to improve the energy efficiency of mesh networks, concerns over a citizen vigilante group monitor ISPs though the groups claims may be overstated, Google ends Wave development though is dedicated to learning from its failure in this case probably from its complexity despite adding more resources and opening up to more users, and unpacking what exactly went on between Google and Verizon especially as they deny claims of an anti-neutrality pact (even on Twitter). Odds are good they are still meeting and talking to some end which may be why the NYT is sticking to its story. Cringely has the most intriguing guess at their possible goal.
Following up this week EFF offers assistance to targets of the US Copyright Group and the FCC ends closed door discussions on its net neutrality plan.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online. You can also grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>33:34</itunes:duration>
</item>
<item>
<title>TCLP 2010-08-04 Habits of an Infovore (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/08/04/infovore/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, sharing Steve's <a href="http://thecommandline.net/2010/08/04/another-badge-finds-its-home/">badge photo</a>, last month's <a href="http://thecommandline.net/2010/08/04/revenue-update-for-july/">revenue update</a>, and a reminder there will be no feature cast next week as I'll be <a href="http://thecommandline.net/2010/07/30/ill-be-in-san-francisco-aug-9th-through-11th-for-cassandra-summit-2010/">out of town</a>.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/finger-trouble.html">finger trouble</a> .</p>
<p>The feature this week is a monologue my habits as an infovore. How I consume information is very much informed by <a href="http://thecommandline.net/2010/06/07/the-effect-of-multitasking-on-the-brain/">current thinking on multitasking</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_08_04">detailed show notes online</a>. You can grab the <a href="http://www.archive.org/details/Tclp2010-08-04HabitsOfAnInfovore">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 04 Aug 2010 21:43:27 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-08-04.m4a" length="15754028" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100804-habits-of-an-infovore-comment-lin</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, sharing Steve's badge photo, last month's revenue update, and a reminder there will be no feature cast next week as I'll be out of town.
The hacker word of the week this week is finger trouble .
The feature this week is a monologue my habits as an infovore. How I consume information is very much informed by current thinking on multitasking.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online. You can grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>21:18</itunes:duration>
</item>
<item>
<title>TCLP 2010-08-01 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/08/01/news_220/</link>
<description><![CDATA[<p>This is news cast 220, an episode of The Command Line Podcast.</p>
<p>In the intro, an apology for missing the last two shows, though I had <a href="http://thecommandline.net/2010/07/28/power-restored/">good reason</a>. I will be <a href="http://thecommandline.net/2010/07/30/ill-be-in-san-francisco-aug-9th-through-11th-for-cassandra-summit-2010/">in San Francisco from August 9th to the 11th</a> for Cassandra Summit and a training day. If anyone is interested in a meet up Monday or Tuesday night, let me know. And if you don't read the web site, I am a <a href="http://thecommandline.net/2010/07/29/parsec-finalist/">finalist for a Parsec award</a>.</p>
<p>This week's security alerts are <a href="http://www.zdnet.com/blog/security/apple-patches-safari-auto-fill-security-hole/6991">Apple fixes the autofill bug in Safari</a> that I didn't get to discuss <a href="http://thecommandline.net/wiki/2010_07_25#alert1">last week</a> and <a href="http://it.slashdot.org/story/10/07/28/2210217/ATampT-Wont-Block-Black-Hat-Eavesdropping-Demo">AT&amp;T said it wouldn't interfere with a Black Hat demo</a> and <a href="http://www.wired.com/threatlevel/2010/07/intercepting-cell-phone-calls/">was true to its word</a>.</p>
<p>In this week's news <a href="http://www.wired.com/threatlevel/2010/07/intercepting-cell-phone-calls/">EFF wins three DMCA exemptions</a> with deeper analysis from both <a href="http://www.eff.org/deeplinks/2010/07/breaking-down-2009-dmca-rulemaking-part-1-victory">them</a> and <a href="http://www.publicknowledge.org/blog/library-congresss-drm-exceptions-not-just-abo">Public Knowledge</a>. There were <a href="http://www.readwriteweb.com/archives/fair_use_legalized_says_eff.php">two additional exemptions granted</a> and <a href="http://thecommandline.net/2010/07/27/what-the-dmca-exemption-rulemaking-left-out/">many others</a> that <a href="http://www.groklaw.net/article.php?story=2010072612452020">were not</a>. I get why most of the coverage is so <a href="http://www.readwriteweb.com/archives/fair_use_not_just_acceptable_its_essential_for_the.php">positive</a> but I cannot help but give voice to my inner cynic. Also, the <a href="http://voices.washingtonpost.com/posttech/2010/07/sen_kerry_to_introduce_interne.html?wprss=posttech">Senate prepares privacy legislation</a> as <a href="http://voices.washingtonpost.com/posttech/2010/07/senate_online_privacy_hearing.html?wprss=posttech">industry discusses self regulation</a>, a <a href="http://www.readwriteweb.com/archives/e-readers_help_literacy_in_ghana.php">couple</a> of <a href="http://www.wired.com/gadgetlab/2010/07/humane-wikipedia-reader/">stories</a> about e-books in developing nations, and <a href="http://www.readwriteweb.com/archives/slashdot_struggles_to_remain_relevant_in_the_socia.php">Slashdot is losing relevance on the social web</a>.</p>
<p>Following up this week <a href="http://yro.slashdot.org/story/10/07/26/1536223/Al-Frankens-Warning-On-Net-Neutrality">Al Franken frames net neutrality as key free speech issue</a> and <a href="http://techdirt.com/articles/20100726/17374910366.shtml">Canadian C-32 is clearly following the US DMCA</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_08_01">detailed show notes online</a>. You can also grab the <a href="http://www.archive.org/details/Tclp2010-08-20News">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 01 Aug 2010 19:19:08 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-08-01.m4a" length="25425660" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100820-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 220, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 220, an episode of The Command Line Podcast.
In the intro, an apology for missing the last two shows, though I had good reason. I will be in San Francisco from August 9th to the 11th for Cassandra Summit and a training day. If anyone is interested in a meet up Monday or Tuesday night, let me know. And if you don't read the web site, I am a finalist for a Parsec award.
This week's security alerts are Apple fixes the autofill bug in Safari that I didn't get to discuss last week and AT&amp;amp;T said it wouldn't interfere with a Black Hat demo and was true to its word.
In this week's news EFF wins three DMCA exemptions with deeper analysis from both them and Public Knowledge. There were two additional exemptions granted and many others that were not. I get why most of the coverage is so positive but I cannot help but give voice to my inner cynic. Also, the Senate prepares privacy legislation as industry discusses self regulation, a couple of stories about e-books in developing nations, and Slashdot is losing relevance on the social web.
Following up this week Al Franken frames net neutrality as key free speech issue and Canadian C-32 is clearly following the US DMCA.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online. You can also grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:28</itunes:duration>
</item>
<item>
<title>TCLP 2010-07-21 The True Burden of Forking (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/07/21/burden_of_forking/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a quick review of the tabletop game, "<a href="http://www.boardgamegeek.com/boardgame/37696/the-stars-are-right">The Stars are Right</a>".</p>
<p>Listener feedback this week is from Andrew and <a href="http://dcprivacylaw.com/blog/">Carey</a>, both of home responded to the last feature on <a href="http://thecommandline.net/2010/07/07/complex_privacy/">complex privacy</a> .</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/Finagles-Law.html">Finagle's Law</a>.</p>
<p>The feature this week is a monologue considering the true burden of forking. It was inspired by my recent reading of Clay Shirky's excellent, "<a href="http://www.amazon.com/gp/product/1594201536?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=1594201536">Here Comes Everybody</a>".</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_07_21">detailed show notes online</a>. You can grab the <a href="http://www.archive.org/details/Tclp2010-07-21TheTrueBurdenOfForking">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 21 Jul 2010 20:43:08 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-07-21.m4a" length="25561888" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100721-the-true-burden-of-forking-commen</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a quick review of the tabletop game, "The Stars are Right".
Listener feedback this week is from Andrew and Carey, both of home responded to the last feature on complex privacy .
The hacker word of the week this week is Finagle's Law.
The feature this week is a monologue considering the true burden of forking. It was inspired by my recent reading of Clay Shirky's excellent, "Here Comes Everybody".
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online. You can grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:39</itunes:duration>
</item>
<item>
<title>TCLP 2010-07-18 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/07/18/news_219/</link>
<description><![CDATA[<p>This is news cast 219, an episode of The Command Line Podcast.</p>
<p>In the intro, an admission of a mistake around correctly observing the licenses of some works I used after I stopped using the non-commercial clause in the license for the podcast. The net effect should be none to you, the listener, but it seemed like a good teaching moment and a reminder that as easy as Creative Commons makes it to understand their licenses, that doesn't prevent making honest mistakes. Thanks, Randal.</p>
<p>This week's security alerts are <a href="http://blog.mozilla.com/addons/2010/07/13/add-on-security-announcement/">Mozilla blocking an add on that was nabbing passwords</a> (via <a href="http://www.zdnet.com/blog/security/mozilla-blacklists-password-theft-add-on/6841">ZDNet</a>) including <a href="http://news.slashdot.org/story/10/07/15/1223234/How-the-Mozilla-Sniffer-Backdoor-Was-Discovered">how the backdoor was discovered</a> and <a href="http://news.slashdot.org/story/10/07/16/1753232/OAuth-OpenID-Password-Crack-Could-Affect-Millions">a crack that could affect libraries used to implement OAuth and OpenID</a>.</p>
<p>In this week's news <a href="http://appinventor.googlelabs.com/about/">Android App Inventor</a>, in keeping with Google's spirit of <a href="http://thecommandline.net/2010/07/15/feeds-grep-links-charging-isps-for-piracy-insights-on-room-temperature-super-conductors-couchdb-on-android-and-more/">developer</a> <a href="http://thecommandline.net/2010/07/16/feeds-grep-links-php-on-android-shoring-up-4th-amendment-protection-of-email-and-more/">inclusion</a> vs. Apple's puzzling <a href="http://thecommandline.net/2010/04/15/apple-removes-scratch-from-the-app-store/">decisions</a>, promises creating apps without coding though <a href="http://www.readwriteweb.com/archives/5_big_questions_about_googles_app_inventor.php">some interesting questions remain</a>, <a href="http://www.boingboing.net/2010/07/14/under-surveillance-a.html">a comic book on digital civil rights in Europe</a> produce by <a href="http://www.edri.org">EDRi</a> among others that I think would be a good companion to Cory Doctorow's "<a href="http://craphound.com/littlebrother">Little Brother</a>", <a href="http://www.wired.com/threatlevel/2010/07/thomas-drake/">NSA whistle blower exhausted all official channels to raise a complaint</a>, and <a href="http://googlepublicpolicy.blogspot.com/2010/07/our-op-ed-regulating-what-is-best-in.html">consider the question</a> of <a href="http://thecommandline.net/2009/12/29/a-call-for-search-neutrality/">search neutrality</a> and whether <a href="http://searchengineland.com/regulating-the-new-york-times-46521">co-opting the rhetoric of net neutrality is wise</a>.</p>
<p>Following up this week <a href="https://christianengstrom.wordpress.com/2010/07/12/acta-negotiators-inform-the-parliament-in-secret/">European ACTA negotiators update the EP in secret</a> and <a href="http://www.michaelgeist.ca/content/view/5199/125/">ACTA is coming down to a fight between the US and the EU</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_07_18">detailed show notes online</a>. You can also grab the <a href="http://www.archive.org/details/Tclp2010-07-18News">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 18 Jul 2010 19:43:52 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-07-18.m4a" length="26063557" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100718-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 219, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 219, an episode of The Command Line Podcast.
In the intro, an admission of a mistake around correctly observing the licenses of some works I used after I stopped using the non-commercial clause in the license for the podcast. The net effect should be none to you, the listener, but it seemed like a good teaching moment and a reminder that as easy as Creative Commons makes it to understand their licenses, that doesn't prevent making honest mistakes. Thanks, Randal.
This week's security alerts are Mozilla blocking an add on that was nabbing passwords (via ZDNet) including how the backdoor was discovered and a crack that could affect libraries used to implement OAuth and OpenID.
In this week's news Android App Inventor, in keeping with Google's spirit of developer inclusion vs. Apple's puzzling decisions, promises creating apps without coding though some interesting questions remain, a comic book on digital civil rights in Europe produce by EDRi among others that I think would be a good companion to Cory Doctorow's "Little Brother", NSA whistle blower exhausted all official channels to raise a complaint, and consider the question of search neutrality and whether co-opting the rhetoric of net neutrality is wise.
Following up this week European ACTA negotiators update the EP in secret and ACTA is coming down to a fight between the US and the EU.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online. You can also grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>35:20</itunes:duration>
</item>
<item>
<title>TCLP 2010-07-11 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/07/11/news_218/</link>
<description><![CDATA[<p>This is news cast 218, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to new donor, Scott, and a request that existing donor Ryan contact me so I can send him his merit badge. Also, there will be new feature cast this week. I need to catch up on writing features for the show and I will be attending two events in DC this week: <a href="http://googlepublicpolicy.blogspot.com/2010/07/google-dc-talk-july-14-chef-jose-andres.html">What Does Light Taste Like</a> and <a href="http://www.newamerica.net/events/2010/decoding_digital_activism">Decoding Digital Activism</a>.</p>
<p>This week's security alerts are <a href="http://www.theregister.co.uk/2010/07/06/ms_spurned_research_collective/">researchers form collective in response to Microsoft's dismissal of a security concern</a> and <a href="http://threatpost.com/en_us/blogs/new-linux-os-remnux-designed-reverse-engineering-malware-070910">REMnux, a linux distro designed for reverse engineering malware</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/science/news/2010/07/silicon-semiconductor-able-to-occupy-new-quantum-states.ars">new quantum states could lead to new approaches to quantum computing</a>, <a href="http://shareable.net/blog/a-tale-of-a-tale-of-a-shareable-future-part-3-apache-web-server-conquers-the-world">the Apache web server conquers the world</a>, <a href="http://infovegan.com/2010/07/01/how-transparency-fails-and-works-too/">another constructive criticism of transparency</a>, and <a href="http://www.theregister.co.uk/2010/07/08/perfect_citizen/">the NSA is looking</a> to <a href="http://www.readwriteweb.com/enterprise/2010/07/nsa-perfect-citizen.php">implement domestic surveillance of our infrastructure</a> though they are <a href="http://www.theregister.co.uk/2010/07/09/nsa_response_perfect_citizen/">quick to deny any active monitoring</a>.</p>
<p>Following up this week, <a href="http://torrentfreak.com/uk-isps-take-digital-economy-act-to-high-court-100708/">two UK ISPs are taking the Digital Economy Act to High Court</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_07_11">detailed show notes online</a>. You can also grab the <a href="http://www.archive.org/details/Tclp2010-07-11News">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 11 Jul 2010 19:31:35 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-07-11.m4a" length="19536724" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100711-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 218, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 218, an episode of The Command Line Podcast.
In the intro, thanks to new donor, Scott, and a request that existing donor Ryan contact me so I can send him his merit badge. Also, there will be new feature cast this week. I need to catch up on writing features for the show and I will be attending two events in DC this week: What Does Light Taste Like and Decoding Digital Activism.
This week's security alerts are researchers form collective in response to Microsoft's dismissal of a security concern and REMnux, a linux distro designed for reverse engineering malware.
In this week's news new quantum states could lead to new approaches to quantum computing, the Apache web server conquers the world, another constructive criticism of transparency, and the NSA is looking to implement domestic surveillance of our infrastructure though they are quick to deny any active monitoring.
Following up this week, two UK ISPs are taking the Digital Economy Act to High Court.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online. You can also grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>26:27</itunes:duration>
</item>
<item>
<title>TCLP 2010-07-07 Will We Ever Have Effective Complex Privacy Controls? (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/07/07/complex_privacy/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>Listener feedback this week is from quite a few folks. Matt wrote in about outliners, asking what I do in particular to bend vim to this task. I use a vimrc line like "autocmd BufEnter,BufNew *.notes set sw=4 ts=4 expandtab spell tw=0 foldmethod=indent smartindent". Colin posted a <a href="http://thecommandline.net/2010/06/23/linux_switch/#comment-5828">comment</a> about AAC and chapter marks. John had a much more incisive comment on my switching to an open stack segment. Ian also wrote about outliners, suggesting <a href="http://orgmode.org/">org-mode</a> and in particular a <a href="http://orgmode.org/talks/index.html#sec-2">couple</a> of <a href="http://www.nf.mpg.de/orgmode/guest-talk-dominik.html">screencasts</a>. And Max shared his experiences switching to Linux not once, but twice.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/filter.html">filter</a>.</p>
<p>The feature this week is a rant digging into the question of whether we'll ever develop effective controls that match our complex expectations of privacy and digging into the source of that complexity. I mention <a href="http://www.zephoria.org/thoughts/archives/2010/05/14/facebook-and-radical-transparency-a-rant.html">a couple</a> <a href="http://www.zephoria.org/thoughts/archives/2010/05/15/facebook-is-a-utility-utilities-get-regulated.html">of posts</a> by danah boyd, some <a href="http://www.theregister.co.uk/2010/06/18/facebook_hoofnagle_podcast/">criticism</a> of the demands made of Facebook by privacy advocates, my reading of Clay Shirky's "<a href="http://www.amazon.com/gp/product/0143114948?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0143114948">Here Comes Everybody</a>", and <a href="http://en.wikipedia.org/wiki/Small-world_network">small world networks</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_07_07">detailed show notes online</a>. You can grab the <a href="http://www.archive.org/details/Tclp2010-07-04ADeclarationOfIndependenceForCyberspace">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 07 Jul 2010 21:01:38 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-07-07.m4a" length="24307052" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100707-will-we-ever-have-effective-comple</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
Listener feedback this week is from quite a few folks. Matt wrote in about outliners, asking what I do in particular to bend vim to this task. I use a vimrc line like "autocmd BufEnter,BufNew *.notes set sw=4 ts=4 expandtab spell tw=0 foldmethod=indent smartindent". Colin posted a comment about AAC and chapter marks. John had a much more incisive comment on my switching to an open stack segment. Ian also wrote about outliners, suggesting org-mode and in particular a couple of screencasts. And Max shared his experiences switching to Linux not once, but twice.
The hacker word of the week this week is filter.
The feature this week is a rant digging into the question of whether we'll ever develop effective controls that match our complex expectations of privacy and digging into the source of that complexity. I mention a couple of posts by danah boyd, some criticism of the demands made of Facebook by privacy advocates, my reading of Clay Shirky's "Here Comes Everybody", and small world networks.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online. You can grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>32:56</itunes:duration>
</item>
<item>
<title>TCLP 2010-07-04 A Declaration of Independence for Cyberspace (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/07/04/cyberspace_independence/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>Rather than try to shoe horn a full news cast in, amongst the weekend's festivities, I figured I would share a reading of a piece inspired by the Holiday here in the US but more appropriate to an audience on the net: <a href="https://w2.eff.org/Censorship/Internet_censorship_bills/barlow_0296.declaration">A Declaration of Independence for Cyberspace</a>, original penned by John Perry Barlow in 1996. The music I used underneath it is track 34 from Nine Inch Nails' <a href="http://ghosts.nin.com/main/home">Ghosts</a>, used under a CC BY-NC-SA license.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. There are no detailed show notes for this episode. You can grab the <a href="http://www.archive.org/details/Tclp2010-06-30CoryDoctorowAtCopynightDc">flac encoded audio</a> from the Internet Archive.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 04 Jul 2010 16:54:27 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-07-04.m4a" length="7486688" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100704-a-declaration-of-independence-for</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
Rather than try to shoe horn a full news cast in, amongst the weekend's festivities, I figured I would share a reading of a piece inspired by the Holiday here in the US but more appropriate to an audience on the net: A Declaration of Independence for Cyberspace, original penned by John Perry Barlow in 1996. The music I used underneath it is track 34 from Nine Inch Nails' Ghosts, used under a CC BY-NC-SA license.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. There are no detailed show notes for this episode. You can grab the flac encoded audio from the Internet Archive.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>10:03</itunes:duration>
</item>
<item>
<title>TCLP 2010-06-30 Cory Doctorow at CopyNight DC (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/06/30/doctorow_copynight/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to my friend <a href="http://intotheblender.com/">Chooch</a> for saving my bacon with the event audio I am sharing as this week's feature. Also, with regards to the show's 5th anniversary, I realize I pretty much said my peace on the subject last week. Just trying to keep that spirit of being receptive to surprise alive going forward.</p>
<p>I will save this week's feedback, of which there is rather a lot, until next week.</p>
<p>There is no hacker word of the week this week.</p>
<p>The feature this week is a recording of the talk Cory Doctorow gave at this month's CopyNight, here in DC.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. There are no detailed show notes for this episode.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 30 Jun 2010 22:17:16 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-06-30.m4a" length="35598564" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100630-cory-doctorow-at-copynight-dc-com</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, thanks to my friend Chooch for saving my bacon with the event audio I am sharing as this week's feature. Also, with regards to the show's 5th anniversary, I realize I pretty much said my peace on the subject last week. Just trying to keep that spirit of being receptive to surprise alive going forward.
I will save this week's feedback, of which there is rather a lot, until next week.
There is no hacker word of the week this week.
The feature this week is a recording of the talk Cory Doctorow gave at this month's CopyNight, here in DC.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. There are no detailed show notes for this episode.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>48:18</itunes:duration>
</item>
<item>
<title>TCLP 2010-06-27 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/06/27/news_217/</link>
<description><![CDATA[<p>This is news cast 217, an episode of The Command Line Podcast.</p>
<p>In the intro, an apology for missing the last news cast.</p>
<p>This week's security alerts are <a href="http://news.bbc.co.uk/2/hi/technology/10349001.stm">attacking the attackers</a> and <a href="http://krebsonsecurity.com/2010/06/anti-virus-is-a-poor-substitute-for-common-sense/">anti-malware is a poor substitute for common sense</a>.</p>
<p>In this week's news <a href="http://craphound.com/?p=2976">NY meet Silicon Valley</a>, <a href="http://www.wired.com/threatlevel/2010/06/copyright-czar-report/">the first report</a> from the new IP enforcement czar and <a href="http://torrentfreak.com/piracy-is-theft-clean-and-simple-us-vice-president-says-100622/">some</a> <a href="http://arstechnica.com/tech-policy/news/2010/06/ip-boss-calls-for-transparency-in-copyright-enforcement.ars">analysis</a> and <a href="http://www.boingboing.net/2010/06/22/us-ip-czars-report-s.html">some</a> <a href="http://www.eff.org/deeplinks/2010/06/ipec-releases-strategic-plan-intellectual-property">reactions</a>, <a href="http://developers.slashdot.org/story/10/06/23/1320221/How-HTML5-Will-Change-the-Web">looking at HTML5 beyond video</a>, and <a href="http://blog.okfn.org/2010/06/24/why-share-alike-licenses-are-open-but-non-commercial-ones-arent/">an explanation why Share Alike is open and Non Commercial is not</a>.</p>
<p>Following up this week, <a href="http://www.michaelgeist.ca/content/view/5138/125/">the debate around C-32</a> turns <a href="http://www.michaelgeist.ca/content/view/5139/125/">adversarial</a> and <a href="http://www.wired.com/threatlevel/2010/06/dmca-protects-youtube/">judge rules in Viacom case that YouTube is protected by DMCA safe harbors</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_06_27">detailed show notes online</a>.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 27 Jun 2010 18:59:50 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-06-27.m4a" length="22744568" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100627-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 217, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 217, an episode of The Command Line Podcast.
In the intro, an apology for missing the last news cast.
This week's security alerts are attacking the attackers and anti-malware is a poor substitute for common sense.
In this week's news NY meet Silicon Valley, the first report from the new IP enforcement czar and some analysis and some reactions, looking at HTML5 beyond video, and an explanation why Share Alike is open and Non Commercial is not.
Following up this week, the debate around C-32 turns adversarial and judge rules in Viacom case that YouTube is protected by DMCA safe harbors.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>30:49</itunes:duration>
</item>
<item>
<title>TCLP 2010-06-23 Switching Back to an Open Stack (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/06/23/linux_switch/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to Paul, Steve and Ryan for their new monthly donations starting this week. Badges are on their way or should be soon. I also remark on my upcoming 5th anniversary as a podcaster for those that don't read the blog.</p>
<p>Listener feedback this week is from Jed in response to the Inner Chapter on why programming is hard. I mention the <a href="http://thecommandline.net/2010/06/13/news_216/">news cast</a> from the 13th, the piece Bruce Sterling mentions about smart-aleck programmers by Jonathan Edwards.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/fence.html">fence</a>.</p>
<p>The feature this week is a monologue discussing my decision to move back to an open stack here in the lab. I mention Dan Gillmor's <a href="http://www.salon.com/technology/dan_gillmor/2010/06/20/from_mac_to_linux/index.html">Salon article</a> discussing the very same thing and my <a href="http://thecommandline.net/2009/11/18/nowhere_to_go/">Nowhere to Go</a> rant.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_06_23">detailed show notes online</a>. </p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 23 Jun 2010 21:14:00 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-06-23.m4a" length="24556587" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100623-switching-back-to-an-open-stack-c</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, thanks to Paul, Steve and Ryan for their new monthly donations starting this week. Badges are on their way or should be soon. I also remark on my upcoming 5th anniversary as a podcaster for those that don't read the blog.
Listener feedback this week is from Jed in response to the Inner Chapter on why programming is hard. I mention the news cast from the 13th, the piece Bruce Sterling mentions about smart-aleck programmers by Jonathan Edwards.
The hacker word of the week this week is fence.
The feature this week is a monologue discussing my decision to move back to an open stack here in the lab. I mention Dan Gillmor's Salon article discussing the very same thing and my Nowhere to Go rant.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>33:17</itunes:duration>
</item>
<item>
<title>TCLP 2010-06-16: Inner Chapter: Why Programming is Hard (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/06/16/why_programming_is_hard/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a mention of the merit badges arriving and <a href="http://thecommandline.net/2010/06/15/first-merit-badge-picture/">the first pictures</a>.</p>
<p><a href="http://thecommandline.net/files/IMAG0084.jpg"><img class="alignnone size-thumbnail wp-image-2988" title="IMAG0084" src="http://thecommandline.net/files/IMAG0084-150x150.jpg" alt="" width="150" height="150" /></a></p>
<p>Also a quick review of "<a href="http://www.amazon.com/gp/product/0765323222?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0765323222">The Affinity Bridge"</a> by George Mann.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/feetch-feetch.html">feetch feetch</a>.</p>
<p>The feature this week is an Inner Chapter consider the question of why programming is hard. In it, I mention "<a href="http://www.amazon.com/gp/product/1400082471?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=1400082471">Dreaming in Code</a> " by Scott Rosenberg, <a href="http://www.infoq.com/articles/Interview-Johnson-Standish-CHAOS">an interview about the CHAOS reports</a>, <a href="http://en.wikipedia.org/wiki/Kolmogorov_complexity">Kolmogorov complexity</a>, <a href="http://www.tvo.org/TVOsites/WebObjects/TvoMicrosite.woa?bi?1273957200000">Jordan Peterson's talk on TVO's Big Ideas</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_06_16">detailed show notes online</a>.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 16 Jun 2010 22:07:31 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-06-16.m4a" length="17354747" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100616-inner-chapter-why-programming-is</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a mention of the merit badges arriving and the first pictures.
Also a quick review of "The Affinity Bridge" by George Mann.
There is no listener feedback this week.
The hacker word of the week this week is feetch feetch.
The feature this week is an Inner Chapter consider the question of why programming is hard. In it, I mention "Dreaming in Code " by Scott Rosenberg, an interview about the CHAOS reports, Kolmogorov complexity, Jordan Peterson's talk on TVO's Big Ideas.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>23:29</itunes:duration>
</item>
<item>
<title>TCLP 2010-06-13 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/06/13/news_216/</link>
<description><![CDATA[<p>This is news cast 216, an episode of The Command Line Podcast.</p>
<p>In the intro, an <a href="http://thecommandline.net/2010/06/12/the-charter-merit-badges-are-in-the-mail/">update</a> on the badge experiment.</p>
<p>This week's security alerts are <a href="http://threatpost.com/en_us/blogs/botnets-using-ubiquity-security-060710">diffusing botnet control makes them more robust</a> and <a href="http://arstechnica.com/security/news/2010/06/content-providers-phishing-for-demographic-data-via-logins.ars">bad passwords and the economics around perpetuating them</a>.</p>
<p>In this week's news <a href="http://www.technologyreview.com/computing/25480/?ref=rss&amp;a=f">open source could make attackers' jobs easier</a>, <a href="http://arstechnica.com/open-source/news/2010/06/ars-explains-android-fragmentation.ars">understanding the real risks of Android fragmentation</a>, <a href="http://www.wired.com/beyond_the_beyond/2010/06/programmers-should-stop-being-such-smart-alecks/">programmers should stop being smart-alecks</a>, and <a href="http://arstechnica.com/science/news/2010/06/heated-atomic-force-microscope-makes-12nm-graphene-circuits.ars">heated atomic force microscopes for 12nm graphene elements</a>.</p>
<p>Following up this week, <a href="http://cfp.acm.org/wordpress/?p=341">another social network bill of rights</a> and <a href="http://arstechnica.com/tech-policy/news/2010/06/judge-may-dismiss-4576-of-4577-p2p-defendants-from-lawsuit.ars">judge may dismiss most defendants from US Copyright Group suits</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the <a href="http://thecommandline.net/wiki/2010_06_13">detailed show notes online</a>.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 13 Jun 2010 18:02:46 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-06-13.m4a" length="21810708" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100613-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 216, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 216, an episode of The Command Line Podcast.
In the intro, an update on the badge experiment.
This week's security alerts are diffusing botnet control makes them more robust and bad passwords and the economics around perpetuating them.
In this week's news open source could make attackers' jobs easier, understanding the real risks of Android fragmentation, programmers should stop being smart-alecks, and heated atomic force microscopes for 12nm graphene elements.
Following up this week, another social network bill of rights and judge may dismiss most defendants from US Copyright Group suits.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/. View the detailed show notes online.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>29:33</itunes:duration>
</item>
<item>
<title>TCLP 2010-06-09 Free Yourself: Open Source Software for Everyday Use (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/06/09/balticon_44_2/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>I will save listener feedback for the next show.</p>
<p>There is no hacker word of the week this week due to the length of the feature.</p>
<p>The feature this week is the second of two panel recordings I captured at <a href="http://balticon.org/">Balticon 44</a>. The panel was titled, "Free Yourself: Open Source Software for Everyday Use". My co-panelists were <a href="http://secondshiftpodcast.com/wiki/index.php?title=Brad_Smith">Brad Smith</a> and none other than Eric Raymond. I found ESR to be especially fascinating on this panel, with some thought provoking ideas and fun stories.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 09 Jun 2010 21:38:35 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-06-09.m4a" length="46996238" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100609-free-yourself-open-source-softwar</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
I will save listener feedback for the next show.
There is no hacker word of the week this week due to the length of the feature.
The feature this week is the second of two panel recordings I captured at Balticon 44. The panel was titled, "Free Yourself: Open Source Software for Everyday Use". My co-panelists were Brad Smith and none other than Eric Raymond. I found ESR to be especially fascinating on this panel, with some thought provoking ideas and fun stories.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>1:03:49</itunes:duration>
</item>
<item>
<title>TCLP 2010-06-06 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/06/06/news_215/</link>
<description><![CDATA[<p>This is news cast 215, an episode of The Command Line Podcast.</p>
<p>In the intro, just a pointer to my <a href="http://thecommandline.net/2010/06/01/thoughts-on-balticon-44/">thoughts on Balticon 44</a> and a recap on advertising, the badge experiment, and Flattr so far.</p>
<p>This week's security alerts are <a href="http://www.zdnet.com/blog/security/operating-system-choice-does-not-equal-security/6572">OS choice does not equal security</a> and <a href="http://news.cnet.com/8301-1009_3-20006596-83.html?tag=mncol;title">an Android rootkit</a>.</p>
<p>In this week's news <a href="http://www.ft.com/cms/s/2/d2f3f04e-6ccf-11df-91c8-00144feab49a.html">Google drops Microsoft for internal use</a> citing security reasons though <a href="http://www.zdnet.com/blog/security/google-ditching-windows-over-security-makes-little-sense/6546">some</a> <a href="http://www.zdnet.com/blog/security/microsoft-plays-defense-against-google-windows-migration-report/6561">are</a> <a href="http://arstechnica.com/security/news/2010/06/mac-os-x-and-linux-are-no-magic-security-bullet-for-google.ars">skeptical</a>, <a href="http://www.wired.com/threatlevel/2010/06/wikileaks-documents/">figuring out if Wikileaks spun up using documents intercepted from Tor</a> with thoughts from both the <a href="https://blog.torproject.org/blog/plaintext-over-tor-still-plaintext">Tor project</a> and <a href="http://www.theregister.co.uk/2010/06/02/wikileaks_tor_snooping_denial/">Wikileaks</a> itself, <a href="http://entertainment.slashdot.org/story/10/06/01/206212/The-Muppets-1967-IBM-Sales-Films">IBM's 40 year old Muppet sales films</a>, and <a href="http://arstechnica.com/science/news/2010/06/magic-quantum-wand-does-not-vanish-hard-maths.ars">a new paper debunks certain suggested advantages</a> of <a href="http://thecommandline.net/2007/02/14/reporting-on-d-wave-demo/">quantum computing</a>.</p>
<p>Following up this week, if you are tired of Facebook then check out <a href="http://www.dhanjani.com/blog/2010/06/initiating-the-privacy-armsrace-against-facebook-the-antisocial-firefox-extension.html">a Firefox extension that aims to help preserve your privacy</a> while using it and <a href="http://arstechnica.com/tech-policy/news/2010/06/india-vows-to-sabotage-acta.ars">India tries</a> to <a href="http://www.michaelgeist.ca/content/view/5076/125/">gather opposition to ACTA</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 06 Jun 2010 15:41:04 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-06-06.m4a" length="26197254" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100606-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 215, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 215, an episode of The Command Line Podcast.
In the intro, just a pointer to my thoughts on Balticon 44 and a recap on advertising, the badge experiment, and Flattr so far.
This week's security alerts are OS choice does not equal security and an Android rootkit.
In this week's news Google drops Microsoft for internal use citing security reasons though some are skeptical, figuring out if Wikileaks spun up using documents intercepted from Tor with thoughts from both the Tor project and Wikileaks itself, IBM's 40 year old Muppet sales films, and a new paper debunks certain suggested advantages of quantum computing.
Following up this week, if you are tired of Facebook then check out a Firefox extension that aims to help preserve your privacy while using it and India tries to gather opposition to ACTA.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>35:31</itunes:duration>
</item>
<item>
<title>TCLP 2010-06-02 Art, Music and Literature in the Age of Digital Reproducibility (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/06/02/balticon_44_1/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>I will save listener feedback for the next show or the one after that.</p>
<p>There is no listener feedback this week due to the length of the feature.</p>
<p>The feature this week is the first of two panel recordings I captured at <a href="http://balticon.org/">Balticon 44</a>. The panel was titled, "Art, Music and Literature in the Age of Digital Reproducibility", and was a fantastic, far ranging discussion. My co-panelists where Norm Sherman of <a href="http://web.mac.com/normsherman/Site/Podcast/Podcast.html">The Drabblecast</a>, Dave Slusher of <a href="http://www.evilgeniuschronicles.org/">Evil Genius Chronicles</a>, <a href="http://www.philrossi.net/">Phil Rossi</a>, and Dan Tabor of <a href="http://geekadelphia.com/author/dan/">Geekadelphia</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 02 Jun 2010 21:07:39 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-06-02.m4a" length="46697058" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100602-art-music-and-literature-in-the-a</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
I will save listener feedback for the next show or the one after that.
There is no listener feedback this week due to the length of the feature.
The feature this week is the first of two panel recordings I captured at Balticon 44. The panel was titled, "Art, Music and Literature in the Age of Digital Reproducibility", and was a fantastic, far ranging discussion. My co-panelists where Norm Sherman of The Drabblecast, Dave Slusher of Evil Genius Chronicles, Phil Rossi, and Dan Tabor of Geekadelphia.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>1:03:24</itunes:duration>
</item>
<item>
<title>TCLP 2010-05-26 Inner Chapter: Legacy Code (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/05/26/legacy_code/h</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a reminder there will be no news show this Sunday as I'll be at <a href="http://balticon.org/">Balticon</a>. Also, a quick review of "<a href="http://www.amazon.com/gp/product/1400082471?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=1400082471">Dreaming in Code</a>", by Scott Rosenberg.</p>
<p>Listener feedback this week is from Randal on the Dr. Who as a hacker and DeepGeek in response to my discussion of Danah Boyd's essay on Facebook as a utility.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/featurectomy.html">featurectomy</a>.</p>
<p>The feature this week is an Inner Chapter on the subject of legacy code.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 26 May 2010 21:32:28 -0400</pubDate>
<enclosure url="http://traffic.libsyn.com/cmdln/cmdln.net_2010-05-26.m4a" length="22261513" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100526-inner-chapter-legacy-code-commen</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a reminder there will be no news show this Sunday as I'll be at Balticon. Also, a quick review of "Dreaming in Code", by Scott Rosenberg.
Listener feedback this week is from Randal on the Dr. Who as a hacker and DeepGeek in response to my discussion of Danah Boyd's essay on Facebook as a utility.
The hacker word of the week this week is featurectomy.
The feature this week is an Inner Chapter on the subject of legacy code.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>30:09</itunes:duration>
</item>
<item>
<title>TCLP 2010-05-23 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/05/23/news_214/</link>
<description><![CDATA[<p>This is news cast 214, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to new monthly donor, John Taylor Williams and his wife, Mia. Thank you to fellow Flattr beta testers who have been flattring my posts. I should have an update on how this service compares to donations and ads at the end of the month. My Balticon schedule is <a href="http://thecommandline.net/2010/05/21/balticon-44-schedule/">up</a>, if you are going to be there, come and say high. Better yet, join me for the <a href="http://thecommandline.net/2010/05/21/floss-and-tech-geek-bof-at-balticon-44/">unofficial FLOSS and Tech Geek BoF</a>. There will be no news show that Sunday but should be feature casts before and after the weekend.</p>
<p>This week's security alerts are <a href="http://yro.slashdot.org/story/10/05/18/1523250/Chrome-Private-Mode-Not-Quite-Private">Chrome's private mode leaks info</a> and <a href="http://voices.washingtonpost.com/posttech/2010/05/ftc_probes_privacy_concerns_wi.html?wprss=posttech">FTC looks into privacy concerns with digital copiers</a>.</p>
<p>In this week's news <a href="http://webmproject.blogspot.com/2010/05/introducing-webm-open-web-media-project.html">opening of VP-8 video codec becomes so much more</a> including news <a href="http://arstechnica.com/web/news/2010/05/google-opens-vp8-codec-aims-to-nuke-h264-with-webm.ars">event Microsoft will support it</a> (kind of) and <a href="http://www.theregister.co.uk/2010/05/19/google_chrome_announcement/">YouTube will switch to it for larger videos</a> going forward, <a href="http://x264dev.multimedia.cx/?p=377">a technical analysis of VP-8 now that it is open</a>, <a href="http://www.zephoria.org/thoughts/archives/2010/05/15/facebook-is-a-utility-utilities-get-regulated.html">Facebook's urge towards social utility will invite regulation</a>, and <a href="http://www.schneier.com/blog/archives/2010/05/history_of_nsa.html">an early, official history of NSA computers</a>.</p>
<p>Following up this week <a href="http://torrentfreak.com/the-pirate-party-becomes-the-pirate-bays-new-host-100518/">The Pirate Party steps in to host The Pirate Bay</a> and <a href="http://www.eff.org/deeplinks/2010/05/time-google-grow-make-open-wi-fi-privacy-mistake">EFF issues a strong criticism of Google's latest privacy mistake</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 23 May 2010 20:23:05 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-05-23.m4a" length="26341040" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100523-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 214, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 214, an episode of The Command Line Podcast.
In the intro, thanks to new monthly donor, John Taylor Williams and his wife, Mia. Thank you to fellow Flattr beta testers who have been flattring my posts. I should have an update on how this service compares to donations and ads at the end of the month. My Balticon schedule is up, if you are going to be there, come and say high. Better yet, join me for the unofficial FLOSS and Tech Geek BoF. There will be no news show that Sunday but should be feature casts before and after the weekend.
This week's security alerts are Chrome's private mode leaks info and FTC looks into privacy concerns with digital copiers.
In this week's news opening of VP-8 video codec becomes so much more including news event Microsoft will support it (kind of) and YouTube will switch to it for larger videos going forward, a technical analysis of VP-8 now that it is open, Facebook's urge towards social utility will invite regulation, and an early, official history of NSA computers.
Following up this week The Pirate Party steps in to host The Pirate Bay and EFF issues a strong criticism of Google's latest privacy mistake.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>35:42</itunes:duration>
</item>
<item>
<title>TCLP 2010-05-19 Interview: Cory Doctorow, "For the Win" (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/05/19/cory_doctorow_ftw/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a few quick announcements. I will be at <a href="http://balticon.org">Balticon</a> Memorial Day weekend and posting my speaking schedule soon. If you are going to be there, come and say, "Hi". May's CopyNight will be next Tuesday, the 25th, with special guest Carl Malamud. Next month's CopyNight will also have a special guest, Cory Doctorow as it happens. That CopyNight will be June 28th, a Monday. For more details about the DC CopyNight, visit the <a href="http://copynightdc.wordpress.com">web site</a>.</p>
<p>Due to the length of the interview, I didn't get to any listener feedback this week. There also is no new hacker word of the week for the same reason.</p>
<p>The feature this week is an interview with <a href="http://craphound.com/">Cory Doctorow</a> discussing the issues explored in his latest book just released from Tor, "<a href="http://craphound.com/ftw/">For the Win</a>". I caught up with him over Skype on his current <a href="http://craphound.com/?p=2849">book tour</a>. We mention quite a bit of material, roughly in chronological order:</p>
<ul>
<li>"<a href="http://en.wikipedia.org/wiki/Amerika_%28novel%29">Amerika</a>"</li>
<li>"<a href="http://en.wikipedia.org/wiki/English_As_She_Is_Spoke">English as She Is Spoken</a>"</li>
<li><em><a href="http://craphound.com/?p=187">Anda's Game</a></em></li>
<li><em><a href="http://www.ethanzuckerman.com/blog/2010/02/22/internet-freedom-beyond-circumvention/">Beyond Circumvention</a><span style="font-style: normal;">, by Ethan Zuxker</span></em></li>
<li><em><a href="http://www.douglasadams.com/dna/19990901-00-a.html">How to Stop Worrying and Love the Internet</a><span style="font-style: normal;">, by Douglas Adams</span></em></li>
<li>It was Michael Weinberg, from Public Knowledge, on <a href="http://twit.tv/twil58">This Week in Law</a> who proposed thinking about three strikes with the telephone</li>
<li>"<a href="http://craphound.com/content/">Content</a>" is the essay collection containing <em>World of Democracycraft</em></li>
<li><a href="http://www.zephoria.org/thoughts/archives/2010/05/15/facebook-is-a-utility-utilities-get-regulated.html"><em>Facebook is a Utility, All Utilities are Regulated</em></a>, by Danah Boyd</li>
<li><a href="http://joindiaspora.com/">Diaspora</a>*, <a href="http://www.kickstarter.com/">Kickstarter</a>, and <a href="http://www.quitfacebookday.com/">Quit Facebook Day</a></li>
<li><a href="http://en.wikipedia.org/wiki/Jane_McGonigal">Jane McGonigal</a> created <a href="http://www.superstructgame.net/">Superstruct</a> and the other game I couldn't remember properly is <a href="http://www.urgentevoke.com/">Evoke</a></li>
<li>Alice commissioned the award winning game, <a href="http://www.smokescreengame.com/">Smokescreen</a></li>
<li>Power Punctuation! in three parts: <a href="http://craphound.com/?p=1713">part 1</a>, <a href="http://craphound.com/?p=1715">part 2</a>, <a href="http://craphound.com/?p=1721">part 3</a></li>
<li>The Geertz mentioned is anthropologist, <a href="http://en.wikipedia.org/wiki/Clifford_Geertz">Clifford Geertz</a></li>
<li>io9 scooped me and has more details on "<a href="http://io9.com/5540991/cory-doctorow-and-charles-stross-team-up-for-rapture-of-the-nerds">Rapture of the Nerds</a>"</li>
</ul>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 19 May 2010 21:32:19 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-05-19.m4a" length="40940599" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100519-interview-cory-doctorow-for-the</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a few quick announcements. I will be at Balticon Memorial Day weekend and posting my speaking schedule soon. If you are going to be there, come and say, "Hi". May's CopyNight will be next Tuesday, the 25th, with special guest Carl Malamud. Next month's CopyNight will also have a special guest, Cory Doctorow as it happens. That CopyNight will be June 28th, a Monday. For more details about the DC CopyNight, visit the web site.
Due to the length of the interview, I didn't get to any listener feedback this week. There also is no new hacker word of the week for the same reason.
The feature this week is an interview with Cory Doctorow discussing the issues explored in his latest book just released from Tor, "For the Win". I caught up with him over Skype on his current book tour. We mention quite a bit of material, roughly in chronological order:
* "Amerika"
* "English as She Is Spoken"
* Anda's Game
* Beyond Circumvention, by Ethan Zuxker
* How to Stop Worrying and Love the Internet, by Douglas Adams
* It was Michael Weinberg, from Public Knowledge, on This Week in Law who proposed thinking about three strikes with the telephone
* "Content" is the essay collection containing World of Democracycraft
* Facebook is a Utility, All Utilities are Regulated, by Danah Boyd
* Diaspora*, Kickstarter, and Quit Facebook Day
* Jane McGonigal created Superstruct and the other game I couldn't remember properly is Evoke
* Alice commissioned the award winning game, Smokescreen
* Power Punctuation! in three parts: part 1, part 2, part 3
* The Geertz mentioned is anthropologist, Clifford Geertz
* io9 scooped me and has more details on "Rapture of the Nerds"
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>55:34</itunes:duration>
</item>
<item>
<title>TCLP 2010-05-12 Review: Postsingular and Hylozoic (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/05/12/postsingular_hylozoic/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>Listener feedback this week is Philip, Jed and Brad who all commented on my Dr. Who monologue. <a href="http://identi.ca/notice/31379688">Sergio</a>, <a href="http://identi.ca/conversation/31325968#notice-31432392">Claudio</a>, and <a href="http://identi.ca/conversation/31536179#notice-31750258">Curtis</a> also chatted up the segment on Identi.ca. Mr wrote in about my NoSQL rant. And pseudomorph wrote in response to the Mozilla Account Manager story from the 2nd news cast. He shared a couple of links on <a href="http://newmatilda.com/2010/05/05/when-computer-owns-your-name">digital identity</a> and <a href="http://newmatilda.com/2010/05/03/how-intellectual-property-making-us-dumb">whether intellectual monopoly is making us dumb</a>.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/fear-and-loathing.html">fear and loathing</a>.</p>
<p>The feature this week is an in depth book review of "<a href="http://www.amazon.com/gp/product/0765318725?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0765318725">Postsingular</a>" and "<a href="http://www.amazon.com/gp/product/0765320746?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0765320746">Hylozoic</a>" by Rudy Rucker. In the review, I mention the <a href="http://www.asimovs.com/_issue_0609/postsingular.shtml">two</a> <a href="http://www.asimovs.com/_issue_0606/Chu.shtml">short stories</a> from which the first book was developed, Rucker's <a href="http://www.rudyrucker.com/blog/2008/03/03/fundamental-limits-to-virtual-reality/">blog post</a> questioning the wisdom of computronium, my earlier review of one of <a href="http://thecommandline.net/2006/11/26/the-command-line-75-listener-comment-line-360-252-7284/">Rucker's non-fiction works</a>, the <a href="http://en.wikipedia.org/wiki/Internet_of_Things">internet of things</a>, and the <a href="http://www.rudyrucker.com/postsingular/">free download edition</a> of "Postsingular".</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 12 May 2010 20:55:55 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-05-12.m4a" length="21891316" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100512-review-postsingular-and-hylozoic</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
Listener feedback this week is Philip, Jed and Brad who all commented on my Dr. Who monologue. Sergio, Claudio, and Curtis also chatted up the segment on Identi.ca. Mr wrote in about my NoSQL rant. And pseudomorph wrote in response to the Mozilla Account Manager story from the 2nd news cast. He shared a couple of links on digital identity and whether intellectual monopoly is making us dumb.
The hacker word of the week this week is fear and loathing.
The feature this week is an in depth book review of "Postsingular" and "Hylozoic" by Rudy Rucker. In the review, I mention the two short stories from which the first book was developed, Rucker's blog post questioning the wisdom of computronium, my earlier review of one of Rucker's non-fiction works, the internet of things, and the free download edition of "Postsingular".
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>29:39</itunes:duration>
</item>
<item>
<title>TCLP 2010-05-09 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/05/09/news_213/</link>
<description><![CDATA[<p>This is news cast 213, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to new monthly donor, Jamie. Also, I was <a href="http://thecommandline.net/2010/05/08/interview-on-hacker-public-radio/">interviewed</a> for Uber Leet Hacker Force Radio, part of Hacker Public Radio. My part starts around minute twenty-three. Lastly, I will be interviewing Cory Doctorow about his latest YA novel, "<a href="http://www.amazon.com/gp/product/0765322161?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0765322161">For the Win</a>". I'm scheduled to do so on Thursday, the 13th, so if you have any questions for him, get them to me before then.</p>
<p>This week's security alerts are <a href="http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/">a new attack technique that bypasses most common antivirus programs</a> demonstrated by <a href="http://www.matousec.com/">matousec.com</a> and <a href="http://developers.slashdot.org/story/10/05/07/1811238/Choice-of-Programming-Language-Doesnt-Matter-For-Security">study that shows programming language choice doesn't affect security</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/tech-policy/news/2010/05/ralph-124c-41-a-century-later.ars">Hugo Gernsback as futurist</a> (I've <a href="http://www.amazon.com/gp/product/0465036570?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0465036570">read</a> more about him as a publisher) including some <a href="http://en.wikipedia.org/wiki/Brian_Aldiss">criticism of his views of the place of science in science fiction</a>, <a href="http://www.physorg.com/news192128818.html">why computers crash but biology does not</a>, <a href="http://www.forbes.com/2010/04/29/moores-law-computing-processing-opinions-contributors-bill-dally.html">a rallying cry for parallelism</a> even though <a href="http://arstechnica.com/business/news/2010/05/moores-law-is-not-dead-its-merely-pining-for-the-fjords.ars">the trend is well established and the challenges hard then first supposed</a>, and Google releases a <a href="http://googleonlinesecurity.blogspot.com/2010/05/do-know-evil-web-application.html">code lab</a> and <a href="http://google-opensource.blogspot.com/2010/04/dont-copy-this-code.html">sources</a> to teach and learn security through reading code and hands on exercises.</p>
<p>Following up this week <a href="http://thecommandline.net/2010/05/06/details-on-fccs-third-way/">the FCC's third way to pursue network neutrality</a> and <a href="http://www.publicknowledge.org/node/3054">the FCC allows selectable output control with some qualifications</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 09 May 2010 22:06:18 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-05-09.m4a" length="24001166" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100509-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 213, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 213, an episode of The Command Line Podcast.
In the intro, thanks to new monthly donor, Jamie. Also, I was interviewed for Uber Leet Hacker Force Radio, part of Hacker Public Radio. My part starts around minute twenty-three. Lastly, I will be interviewing Cory Doctorow about his latest YA novel, "For the Win". I'm scheduled to do so on Thursday, the 13th, so if you have any questions for him, get them to me before then.
This week's security alerts are a new attack technique that bypasses most common antivirus programs demonstrated by matousec.com and study that shows programming language choice doesn't affect security.
In this week's news Hugo Gernsback as futurist (I've read more about him as a publisher) including some criticism of his views of the place of science in science fiction, why computers crash but biology does not, a rallying cry for parallelism even though the trend is well established and the challenges hard then first supposed, and Google releases a code lab and sources to teach and learn security through reading code and hands on exercises.
Following up this week the FCC's third way to pursue network neutrality and the FCC allows selectable output control with some qualifications.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>32:31</itunes:duration>
</item>
<item>
<title>TCLP 2010-05-05 Dr. Who as a Hacker (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/05/05/dr_who_hacker/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to Graham and [si]dragon for their donations. Also, a quick review of "<a href="http://www.amazon.com/gp/product/B000F6Z75W?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=B000F6Z75W">Permanence</a>", by Karl Schroeder.</p>
<p>Listener feedback this week is from Robert who <a href="http://thecommandline.net/2010/04/28/rant_nosql/#comment-4691">posted a comment</a> in response to my NoSQL rant.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/chaff.html#block-transfer-computations">block transfer computations</a>.</p>
<p>The feature this week is a monologue consider Dr. Who as a hacker. In it, I mention a section from <a href="http://en.wikipedia.org/wiki/Regeneration_%28Doctor_Who%29#Romana.27s_regeneration">the Wikipedia page on Dr. Who</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 05 May 2010 21:15:19 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-05-05.m4a" length="18403868" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100505-dr-who-as-a-hacker-comment-line</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, thanks to Graham and [si]dragon for their donations. Also, a quick review of "Permanence", by Karl Schroeder.
Listener feedback this week is from Robert who posted a comment in response to my NoSQL rant.
The hacker word of the week this week is block transfer computations.
The feature this week is a monologue consider Dr. Who as a hacker. In it, I mention a section from the Wikipedia page on Dr. Who.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>24:55</itunes:duration>
</item>
<item>
<title>TCLP 2010-05-02 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/05/02/news_212/</link>
<description><![CDATA[<p>This is news cast 212, an episode of The Command Line Podcast.</p>
<p>In the intro, a quick update on the advertising experiment.</p>
<p>This week's security alerts are <a href="http://www.theregister.co.uk/2010/04/29/symantec_buys_pgp/">Symantec plans to PGP</a> and <a href="http://it.slashdot.org/story/10/04/26/1527215/Massive-Number-of-Godaddy-Wordpress-Blogs-Hacked">a massive quantity of GoDaddy hosted WordPress sites are under attack</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/tech-policy/news/2010/04/bill-tries-to-protect-user-privacy-opens-door-to-abuse.ars">Cyber Privacy Act introduced that would use takedowns against personal info</a> <a title="incuding the flaws that would go along with it" href="http://techdirt.com/articles/20100426/0034189166.shtml">including the flaws that would go along with it</a>, <a href="http://www.wired.com/threatlevel/2010/04/fairuse-economy/">new report shows trillions contributed to the economy by fair use</a> <a href="http://googlepublicpolicy.blogspot.com/2010/04/47-trillion-reasons-for-well-designed.html">with specific examples of what that means</a> <a href="http://techdirt.com/articles/20100427/1646069201.shtml">though the point is how the report was produced</a>, <a href="http://www.readwriteweb.com/archives/firefox_steps_up_to_challenge_facebooks_claim_to_i.php">Mozilla releases first code for its identity system</a> (which I <a href="http://thecommandline.net/2009/11/25/effs-terms-of-abuse-tool-launches-mozillas-integrated-login-and-more/">briefly wrote about earlier</a> ), and <a href="http://www.boingboing.net/2010/04/29/raised-by-radio-shac.html">raised by Radio Shack</a> inspired by a <a href="http://www.wired.com/magazine/2010/04/ff_radioshack/">Wired article</a> and resonating with <a title="previously reviewed" href="http://thecommandline.net/2009/04/15/levys_hackers/">Levy's "Hackers"</a>.</p>
<p>Following up this week <a href="http://techdirt.com/articles/20100427/0107569189.shtml">USTR claims official ACTA draft proves prior rumors were false</a> and <a href="http://arstechnica.com/microsoft/news/2010/04/html5-video-in-internet-explorer-9-h264-and-h264-alone.ars">MSIE9 to support HTML5 video but only with H.264</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 02 May 2010 19:50:51 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-05-02.m4a" length="26530749" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100502-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 212, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 212, an episode of The Command Line Podcast.
In the intro, a quick update on the advertising experiment.
This week's security alerts are Symantec plans to PGP and a massive quantity of GoDaddy hosted WordPress sites are under attack.
In this week's news Cyber Privacy Act introduced that would use takedowns against personal info including the flaws that would go along with it, new report shows trillions contributed to the economy by fair use with specific examples of what that means though the point is how the report was produced, Mozilla releases first code for its identity system (which I briefly wrote about earlier ), and raised by Radio Shack inspired by a Wired article and resonating with Levy's "Hackers".
Following up this week USTR claims official ACTA draft proves prior rumors were false and MSIE9 to support HTML5 video but only with H.264.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>35:58</itunes:duration>
</item>
<item>
<title>TCLP 2010-04-28 Rant: NoSQL (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/04/28/rant_nosql/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to Josh for his donation and a call for ideas for a premium for larger donations. I'm looking for something as unique and distinctive as the merit badges that would be appropriate for $50 or more and monthly donations of $5 or more.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/fat-finger.html">fat-finger</a> .</p>
<p>The feature this week is a rant where I try to get to exactly what it is that bugs me about NoSQL. In it, I refer to my hacking 101 piece on <a href="http://thecommandline.net/2010/03/10/databases/">databases</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 28 Apr 2010 20:38:29 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-04-28.m4a" length="22129949" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100428-rant-nosql-comment-line-240949</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, thanks to Josh for his donation and a call for ideas for a premium for larger donations. I'm looking for something as unique and distinctive as the merit badges that would be appropriate for $50 or more and monthly donations of $5 or more.
There is no listener feedback this week.
The hacker word of the week this week is fat-finger .
The feature this week is a rant where I try to get to exactly what it is that bugs me about NoSQL. In it, I refer to my hacking 101 piece on databases.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>29:59</itunes:duration>
</item>
<item>
<title>TCLP 2010-04-21 EFF on the Recent Al Haramain Ruling (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/04/21/eff_al_haramain/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a reminder that CopyNight here in DC is <a href="http://copynightdc.wordpress.com/2010/04/20/copynight-will-be-tuesday-427-at-630pm-at-teaism/">next Tuesday</a>. Also, an <a href="http://thecommandline.net/2010/04/21/merit-badge-prototype/">update</a> on the badge experiment. And thanks to Kevin M. and George for their donations this past week.</p>
<p>Listener feedback this week is from Robert. He recommends the radio show and podcast, <a href="http://will.illinois.edu/mediamatters/">Media Matters</a>.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/fat-electrons.html">fat electrons</a>.</p>
<p>The feature this week is an interview with Lee Tien, senior staff attorney at EFF. We discuss the <a href="http://www.wired.com/threatlevel/2010/03/bush-spied/">recent ruling in the Al Haramain case</a>, one of the many wrestling with the warrantless wire taps conducted under the Bush administration. I mention my <a href="http://thecommandline.net/2008/07/16/eff_on_fisa/">previous interview</a> with EFF's Rebecca Jeschke about the FISA Amendments Act. I also mention EFF's resource pages on the <a href="http://www.eff.org/cases/hepting">Hepting case</a>, the <a href="http://www.eff.org/cases/jewel">Jewel case</a>, and on <a href="http://www.eff.org/cases/al-haramain">this case</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 21 Apr 2010 21:51:45 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-04-21.m4a" length="26886890" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100421-eff-on-the-recent-al-haramain-ruli</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a reminder that CopyNight here in DC is next Tuesday. Also, an update on the badge experiment. And thanks to Kevin M. and George for their donations this past week.
Listener feedback this week is from Robert. He recommends the radio show and podcast, Media Matters.
The hacker word of the week this week is fat electrons.
The feature this week is an interview with Lee Tien, senior staff attorney at EFF. We discuss the recent ruling in the Al Haramain case, one of the many wrestling with the warrantless wire taps conducted under the Bush administration. I mention my previous interview with EFF's Rebecca Jeschke about the FISA Amendments Act. I also mention EFF's resource pages on the Hepting case, the Jewel case, and on this case.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>36:27</itunes:duration>
</item>
<item>
<title>TCLP 2010-04-14 Free Press on Comcast-NBC Acquisition (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/04/14/comcast_nbc/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to Robert for his donation. Also an announcement, that there will be no news show this weekend due to time constraints resulting from family and personal commitments.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/fascist.html">fascist</a> .</p>
<p>The feature this week is an interview Josh Stearns of <a href="http://freepress.net/">Free Press</a> about the Comcast-NBC acquisition. In it, we mention the Free Press <a href="http://www.freepress.net/comcast">resource page</a> on the deal as well as the <a href="http://www.comcast.com/nbcutransaction/">page</a> from Comcast. This interview was prompted by an email from Josh about a <a href="http://thecommandline.net/2010/03/18/fcc-soliciting-comments-on-comcast-nbc-merger/">story</a> I posted on the FCC docket as part of their review of the deal.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 14 Apr 2010 21:33:38 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-04-14.m4a" length="20895119" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100414-free-press-on-comcastnbc-acquisit</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, thanks to Robert for his donation. Also an announcement, that there will be no news show this weekend due to time constraints resulting from family and personal commitments.
There is no listener feedback this week.
The hacker word of the week this week is fascist .
The feature this week is an interview Josh Stearns of Free Press about the Comcast-NBC acquisition. In it, we mention the Free Press resource page on the deal as well as the page from Comcast. This interview was prompted by an email from Josh about a story I posted on the FCC docket as part of their review of the deal.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>28:18</itunes:duration>
</item>
<item>
<title>TCLP 2010-04-11 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/04/11/news_211/</link>
<description><![CDATA[<p>This is news cast 211, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to new donor this week, David.</p>
<p>This week's security alerts are <a href="http://news.stanford.edu/news/2010/april/whatapp-review-site-040210.html">a new site collecting privacy and security info on apps and services</a> and <a href="http://www.boingboing.net/2010/04/08/blink-tag-considered.html">a vulnerability in WebKit's handling of the blink tag</a>.</p>
<p>In this week's news <a href="http://io9.com/5510040/designer-reverse+engineers-face+detection-tech-to-develop-camouflage-makeup">reverse engineering facial recognition to develop dazzle camouflage</a> (a story I also <a href="http://thecommandline.net/2010/04/05/anti-face-recognition-camouflage/">wrote up on the web site</a>), <a href="http://arstechnica.com/open-source/news/2010/04/ibm-breaks-oss-patent-promise-targets-mainframe-emulator.ars">asking whether IBM broke its open source patent pledge</a> with <a href="http://blogs.zdnet.com/open-source/?p=6212">their response</a> and <a href="http://webmink.com/2010/04/08/reptile-attack/">clarifying</a> <a href="http://www.groklaw.net/article.php?story=20100408153953613">commentary</a> from a couple of knowledgeable folks, <a href="http://arstechnica.com/software/news/2010/04/new-memory-management-method-give-multicore-boost-to-apps.ars">a new memory management technique that could boost performance for multiple cores</a>, and <a href="http://arstechnica.com/tech-policy/news/2010/04/format-shifting-dead-trees-can-e-book-piracy-be-ethical.ars">contending format shifting a book you own is ethical</a> with <a href="http://whatever.scalzi.com/2010/04/07/on-how-many-times-i-should-get-paid-for-a-book/">supporting</a> and <a href="http://scholarlykitchen.sspnet.org/2010/04/08/the-ethics-of-versions-why-buying-one-experience-doesnt-permit-you-all-experiences/">dissenting</a> responses.</p>
<p>Following up this week <a href="http://www.publicknowledge.org/node/2987">court rules against FCC in Comcast case</a> <a href="http://www.eff.org/deeplinks/2010/04/court-rejects-fcc-authority-over-internet">barring neutrality regulation on ancillary authority</a> but not through other means and <a href="http://thecommandline.net/2010/04/07/digital-economy-bill-is-passed/">the Digital Economy Bill has been passed</a> including <a href="http://www.openrightsgroup.org/blog/2010/what-we-do-next">what we should do now</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 11 Apr 2010 19:32:07 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-04-11.m4a" length="27732786" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100411-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 211, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 211, an episode of The Command Line Podcast.
In the intro, thanks to new donor this week, David.
This week's security alerts are a new site collecting privacy and security info on apps and services and a vulnerability in WebKit's handling of the blink tag.
In this week's news reverse engineering facial recognition to develop dazzle camouflage (a story I also wrote up on the web site), asking whether IBM broke its open source patent pledge with their response and clarifying commentary from a couple of knowledgeable folks, a new memory management technique that could boost performance for multiple cores, and contending format shifting a book you own is ethical with supporting and dissenting responses.
Following up this week court rules against FCC in Comcast case barring neutrality regulation on ancillary authority but not through other means and the Digital Economy Bill has been passed including what we should do now.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>37:36</itunes:duration>
</item>
<item>
<title>TCLP 2010-04-07 Java, the Gray Lady (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/04/07/java_gray_lady/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, an update on the <a href="http://thecommandline.net/2010/02/25/advertising-experiment/">advertising experiment</a>.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/farm.html">farm</a> .</p>
<p>The feature this week is a monologue on Java, the Gray Lady. In it, I mention <a href="http://en.wikipedia.org/wiki/Component_Object_Model">COM</a>, specifically <a href="http://en.wikipedia.org/wiki/Component_Object_Model#Criticisms">criticisms</a> against it. I also mention a <a href="http://infoworld.com/d/developer-world/geriatric-java-struggles-stay-relevant-700">timely piece</a> by Neil McAllister and <a href="http://www.python.org/dev/peps/pep-0020/">the Zen of Python</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 07 Apr 2010 21:06:27 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-04-07.m4a" length="25248151" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100407-java-the-gray-lady-comment-line</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, an update on the advertising experiment.
There is no listener feedback this week.
The hacker word of the week this week is farm .
The feature this week is a monologue on Java, the Gray Lady. In it, I mention COM, specifically criticisms against it. I also mention a timely piece by Neil McAllister and the Zen of Python.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:13</itunes:duration>
</item>
<item>
<title>TCLP 2010-03-31 Why CopyNight is Important (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/03/31/why_copynight_is_important/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a call for help with topics for programming focused segments for the next few weeks and an announcement that there will be no news show this Sunday.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/faradize.html">faradize</a> .</p>
<p>The feature this week is a monologue on why <a href="http://copynight.org/">CopyNight</a> is important. In it I mention cultural critic, <a href="http://www.markdery.com/">Mark Dery</a>, and Christine Harold's book, "<a href="http://thecommandline.net/2007/07/05/ourspace/">OurSpace</a>".</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 31 Mar 2010 19:18:50 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-03-31.m4a" length="18697130" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100328-why-copynight-is-important-commen</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a call for help with topics for programming focused segments for the next few weeks and an announcement that there will be no news show this Sunday.
There is no listener feedback this week.
The hacker word of the week this week is faradize .
The feature this week is a monologue on why CopyNight is important. In it I mention cultural critic, Mark Dery, and Christine Harold's book, "OurSpace".
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>25:18</itunes:duration>
</item>
<item>
<title>TCLP 2010-03-28 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/03/28/news_210/</link>
<description><![CDATA[<p>This is news cast 210, an episode of The Command Line Podcast.</p>
<p>In the intro, thanks to new donors this week, Rhonda and Jonathan. Also a very quick update on the badge experiment.</p>
<p>This week's security alerts are <a href="http://socialmediasecurity.com/2010/03/23/we-use-layered-safeguards-but-so-do-attacker/">attackers using attack-in-depth</a> and <a href="http://googleonlinesecurity.blogspot.com/2010/03/detecting-suspicious-account-activity.html">security alerts for Gmail</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/tech-policy/news/2010/03/cleaning-the-barnacles-from-the-ss-copyright.ars">a detailed proposal for copyright reform</a>, <a href="http://www.freedom-to-tinker.com/blog/felten/side-channel-leaks-web-applications">a side channel info leak despite web encryption</a>, <a href="http://en.wikipedia.org/wiki/Christopher_Soghoian">Chris Soghoian</a> and Sid Stamm <a href="http://www.wired.com/threatlevel/2010/03/packet-forensics/">publish a paper on SSL spoofing</a> and <a href="http://www.eff.org/deeplinks/2010/03/researchers-reveal-likelihood-governments-fake-ssl">EFF proposes some means to deal with it</a>, and <a href="http://science.slashdot.org/story/10/03/25/0312233/Math-Skills-For-Programmers---Necessary-Or-Not">considering whether math skills are essential for programmers</a>.</p>
<p>Following up this week <a href="http://www.michaelgeist.ca/content/view/4909/196/">constitutional concerns over ACTA</a> and <a href="http://www.guardian.co.uk/technology/2010/mar/25/digital-economy-bill-commons">the Digital Economy Bill is set to go to vote</a> <a href="http://thecommandline.net/2010/03/26/digital-economy-bill-to-be-rushed-through-without-debate/">without further public debate</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 28 Mar 2010 19:38:01 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-03-28.m4a" length="28869712" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20100328-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 210, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 210, an episode of The Command Line Podcast.
In the intro, thanks to new donors this week, Rhonda and Jonathan. Also a very quick update on the badge experiment.
This week's security alerts are attackers using attack-in-depth and security alerts for Gmail.
In this week's news a detailed proposal for copyright reform, a side channel info leak despite web encryption, Chris Soghoian and Sid Stamm publish a paper on SSL spoofing and EFF proposes some means to deal with it, and considering whether math skills are essential for programmers.
Following up this week constitutional concerns over ACTA and the Digital Economy Bill is set to go to vote without further public debate.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>39:09</itunes:duration>
</item>
<item>
<title>TCLP 2010-03-24 Rant: I Am Not a Pirate (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/03/24/i_am_not_a_pirate/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a correction on the rant (I recorded it previously) based on further explanation by Cory in the <a href="http://craphound.com/?p=2736">Lab Out Loud interview</a> about price discrimination and demand elasticity. Also, <a href="http://findingada.com">Happy Ada Lovelace Day</a>. As pledged, I've written a <a href="http://thecommandline.net/2010/03/24/ada-lovelace-day-2010/">blog post</a> for the day. I also share a <a href="http://thecommandline.net/2010/03/24/ordering-the-badges/">badge</a> <a href="http://thecommandline.net/2010/03/21/badge-proof/">update</a>. And thanks go to new monthly donor, Andrew.</p>
<p>Listener feedback this week is from an anonymous correspondent agreeing with my thoughts on the Apple developer license. Also, David shares another <a href="http://www.viplugin.com/viplugin/">vim/eclipse plugin</a> and <a href="http://blog.bitratchet.com/2010/03/19/diffed-and-merged-and-ported/">Jed</a> and <a href="http://www.johndcook.com/blog/2010/03/22/ford-chevy-arguments-in-tech/">John</a> share their thoughts in response to the Inner Chapter of Tools.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/fandango-on-core.html">fandango on core</a>.</p>
<p>The feature this week is a rant entitled, I Am Not a Pirate. (Although big content is starting to <a href="http://thecommandline.net/2010/03/18/ip-terrorism-rhetoric-takes-a-new-turn/">agree</a> though for very different reasons.) Mostly this is in response to Ars Technica's <a href="http://thecommandline.net/2010/03/08/is-ad-blocking-choking-sites-to-death/">ad blocking experiment</a>, in particular my friend Nuri's thoughts on that story. I mention Mike Masnick, of <a href="http://techdirt.com/">Techdirt</a>, who champions a model he calls connect with fans plus reason to buy. I also mention <a href="http://flattr.com/beta/">Flattr</a> and the <a href="http://www.thesecretlair.com/main/2010/03/07/episode-0031-free-content-vs-paying-the-creator/">recent roundtable on free content versus paying the author</a> on The Secret Lair podcast. I also refer to ideas explained by Cory Doctorow on <a href="http://beyondthebookcast.com/cory-doctorow-plays-the-price-is-right-for-ebooks/">an episode of the Beyond the Book podcast</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 24 Mar 2010 20:29:53 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-03-24.m4a" length="21405874" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100324-rant-i-am-not-a-pirate-comment-l</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a correction on the rant (I recorded it previously) based on further explanation by Cory in the Lab Out Loud interview about price discrimination and demand elasticity. Also, Happy Ada Lovelace Day. As pledged, I've written a blog post for the day. I also share a badge update. And thanks go to new monthly donor, Andrew.
Listener feedback this week is from an anonymous correspondent agreeing with my thoughts on the Apple developer license. Also, David shares another vim/eclipse plugin and Jed and John share their thoughts in response to the Inner Chapter of Tools.
The hacker word of the week this week is fandango on core.
The feature this week is a rant entitled, I Am Not a Pirate. (Although big content is starting to agree though for very different reasons.) Mostly this is in response to Ars Technica's ad blocking experiment, in particular my friend Nuri's thoughts on that story. I mention Mike Masnick, of Techdirt, who champions a model he calls connect with fans plus reason to buy. I also mention Flattr and the recent roundtable on free content versus paying the author on The Secret Lair podcast. I also refer to ideas explained by Cory Doctorow on an episode of the Beyond the Book podcast.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>28:59</itunes:duration>
</item>
<item>
<title>TCLP 2010-03-17 Inner Chapter: Tools (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/03/17/tools/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, my thanks to Lee and <a href="http://craphound.com/">Cory</a> for their generous support through their donations this past week. Both qualify for the limited edition cmdln merit badges. I also share an <a href="http://thecommandline.net/2010/03/17/update-on-badge-experiment/">update</a> on the badge experiment for the benefit of those who don't read the web site.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/fall-through.html">fall through</a> .</p>
<p>The feature this week is a new Inner Chapter on tools. In it, I mention <a href="http://www.pragprog.com/titles/tpp/the-pragmatic-programmer">The Pragmatic Programmers</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 17 Mar 2010 20:42:44 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-03-17.m4a" length="23399521" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100317-inner-chapter-tools-comment-line</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, my thanks to Lee and Cory for their generous support through their donations this past week. Both qualify for the limited edition cmdln merit badges. I also share an update on the badge experiment for the benefit of those who don't read the web site.
There is no listener feedback this week.
The hacker word of the week this week is fall through .
The feature this week is a new Inner Chapter on tools. In it, I mention The Pragmatic Programmers.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>31:42</itunes:duration>
</item>
<item>
<title>TCLP 2010-03-14 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/03/14/news_209/</link>
<description><![CDATA[<p>This is news cast 209, an episode of The Command Line Podcast.</p>
<p>In the intro, a call for help with my new <a href="http://thecommandline.net/2010/03/13/another-experiment-this-time-to-reward-donors/">experiment</a>, this time with a way to <a href="http://nerdmeritbadges.com">reward</a> and encourage donors. Also, <a href="http://www.piday.org/">happy Pi Day</a>.</p>
<p>This week's security alerts are <a href="http://blogs.zdnet.com/security/?p=5607">researchers build an 8K smart phone botnet</a> and <a href="http://blogs.zdnet.com/security/?p=5681">share their motivations for doing so and some findings</a> and <a href="http://www.zdnet.com.au/news/security/soa/Apache-bug-prompts-update-advice/0,130061744,339301617,00.htm">a serious Apache exploit is discovered</a>.</p>
<p>In this week's news <a href="http://www.technologyreview.com/blog/arxiv/24899/?ref=rss">theoretical breakthrough for quantum crypto</a>, <a href="http://www.eff.org/deeplinks/2010/03/iphone-developer-program-license-agreement-all">Apple iPhone developer agreement comes to light</a> leading to my own moment of principle where I've decided once my iPod Touch <a href="http://lastyearsmodel.org/">is worn out</a> I will be buying an Android based PMP, <a href="http://developers.slashdot.org/story/10/03/10/0348241/The-Value-of-BASIC-As-a-First-Programming-Language">the value of BASIC as a first language</a>, and <a href="http://arstechnica.com/science/news/2010/03/pushing-the-speed-limits-of-quantum-memory.ars">improving the bandwidth of quantum memory</a>.</p>
<p>Following up this week <a href="http://www.tuaw.com/2010/03/08/remote-webcam-activation-now-disabled-in-software-that-led-to-co/">web cames disabled in PA school laptops</a> and <a href="http://opensourceforamerica.org/opensource-attack">Open Source for America rebuts</a> <a href="http://webmink.com/2010/03/12/osfa-ustr/">IIPA's petition to the USTR including a post, a paper and a personal meeting</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 14 Mar 2010 19:46:35 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-03-14.m4a" length="26024749" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100314-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 209, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 209, an episode of The Command Line Podcast.
In the intro, a call for help with my new experiment, this time with a way to reward and encourage donors. Also, happy Pi Day.
This week's security alerts are researchers build an 8K smart phone botnet and share their motivations for doing so and some findings and a serious Apache exploit is discovered.
In this week's news theoretical breakthrough for quantum crypto, Apple iPhone developer agreement comes to light leading to my own moment of principle where I've decided once my iPod Touch is worn out I will be buying an Android based PMP, the value of BASIC as a first language, and improving the bandwidth of quantum memory.
Following up this week web cames disabled in PA school laptops and Open Source for America rebuts IIPA's petition to the USTR including a post, a paper and a personal meeting.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>35:16</itunes:duration>
</item>
<item>
<title>TCLP 2010-03-10 Hacking 101: Databases (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/03/10/databases/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, my thanks to <a href="http://chuckchat.com/technorama">Kreg Steppe</a> and <a href="http://cafejosti.net/">Geoff</a> for their generous support through their donations this past week. Also, if you have not taken the <a href="http://findingada.com/">Ada Lovelace Day Pledge</a> <a href="http://blog.findingada.com/blog/2010/03/10/two-weeks-to-ald10/">please do so</a>. Sydney Padua's madcap <a href="http://2dgoggles.com/">web comic</a> has my favorite depiction of Ada, one I'll bear in mind as I choose my subject to blog on the day.</p>
<p>Listener feedback this week is from Eric and Jon in response to my <a href="http://thecommandline.net/2010/02/24/nina_paley/">interview with Nina Paley</a>, specifically our discussion of the non-commercial option with the <a href="http://creativecommons.org">Creative Commons</a> licenses. Jon shared a <a href="http://www.johndcook.com/blog/2010/02/18/noncommercial-is-fuzzy/">blog post on the fuzzy nature of non-commercial</a>.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/F/fairings.html">fairings</a>.</p>
<p>The feature this week is a new Hacking 101 on databases.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 10 Mar 2010 20:13:44 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-03-10.m4a" length="25001080" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100310-hacking-101-databases-comment-li</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, my thanks to Kreg Steppe and Geoff for their generous support through their donations this past week. Also, if you have not taken the Ada Lovelace Day Pledge please do so. Sydney Padua's madcap web comic has my favorite depiction of Ada, one I'll bear in mind as I choose my subject to blog on the day.
Listener feedback this week is from Eric and Jon in response to my interview with Nina Paley, specifically our discussion of the non-commercial option with the Creative Commons licenses. Jon shared a blog post on the fuzzy nature of non-commercial.
The hacker word of the week this week is fairings.
The feature this week is a new Hacking 101 on databases.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>33:53</itunes:duration>
</item>
<item>
<title>TCLP 2010-03-07 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/03/07/news_208/</link>
<description><![CDATA[<p>This is news cast 208, an episode of The Command Line Podcast.</p>
<p>In the intro, a huge thank you to <a href="http://unquietdesperation.com/">Chris Miller</a> for his ongoing donation. Also inspired by my latest appearance on <a href="http://www.thesecretlair.com/main/2010/03/07/episode-0031-free-content-vs-paying-the-creator/">The Secret Lair</a> to discuss free content and supporting artists, some brief thoughts on my own views towards the show and earning something from it.</p>
<p>This week's security alerts are <a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">a several OpenSSL flaw</a> and <a href="http://www.lightbluetouchpaper.org/2010/03/04/evaluating-statistical-attacks-on-personal-knowledge-questions/">research on statistical attacks on security questions</a>. I recommend treating security answers where they are required like passwords, storing them in a password vault and <a href="http://www.adel.nursat.kz/apg/">securely, randomly generating them</a>.</p>
<p>In this week's news <a href="http://games.slashdot.org/story/10/03/01/0546238/8-Year-Fan-Made-Game-Project-Shut-Down-By-Activision">a fan sequel to King's Quest is shutting down</a> (the original publisher playing a large role in Steven Levy's "Hackers" which I <a title="previously reviewed" href="http://thecommandline.net/2009/04/15/levys_hackers/">reviewed previously</a>), <a href="http://googlepublicpolicy.blogspot.com/2010/03/senate-hearing-on-global-internet.html">a hearing was schedule last week</a> to <a href="http://arstechnica.com/tech-policy/news/2010/03/senate-calls-companies-to-task-for-ignoring-internet-freedom.ars">discuss internet freedom abroad</a> including <a href="http://www.ethanzuckerman.com/blog/2010/02/22/internet-freedom-beyond-circumvention/">circumvention</a> though we might do well <a href="http://techdirt.com/articles/20100303/0212398384.shtml">to apply the same standards at home</a>, two storied about <a href="http://www.theregister.co.uk/2010/03/03/plugless_brain_jack/">plugless</a> <a href="http://singularityhub.com/2010/03/07/intendix-the-brain-computer-interface-goes-commercial-video/">brain-computer interfaces</a> with a compelling <a href="http://www.pcpro.co.uk/blogs/2010/03/03/my-brain-can-type/">first hand account of one</a>, and <a href="http://www.readwriteweb.com/archives/google_developing_real_time_index.php">Google search index to go real time</a>.</p>
<p>Following up this week <a href="http://wyden.senate.gov/newsroom/ustr_acta_response.pdf">the USTR responds</a> to <a href="http://thecommandline.net/2010/01/08/another-senator-writes-ustr-about-acta/">Senator Wyden's letter</a> about ACTA with <a href="http://techdirt.com/articles/20100303/0128078382.shtml">some</a> good <a href="http://keionline.org/node/792">analysis</a> and <a href="http://www.boingboing.net/2010/03/04/libdem-lords-seek-to.html">the problems with a revised censorship amendment to the DEB that now targets weblockers</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 07 Mar 2010 19:43:33 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-03-07.m4a" length="25433985" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100307-news</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 208, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 208, an episode of The Command Line Podcast.
In the intro, a huge thank you to Chris Miller for his ongoing donation. Also inspired by my latest appearance on The Secret Lair to discuss free content and supporting artists, some brief thoughts on my own views towards the show and earning something from it.
This week's security alerts are a several OpenSSL flaw and research on statistical attacks on security questions. I recommend treating security answers where they are required like passwords, storing them in a password vault and securely, randomly generating them.
In this week's news a fan sequel to King's Quest is shutting down (the original publisher playing a large role in Steven Levy's "Hackers" which I reviewed previously), a hearing was schedule last week to discuss internet freedom abroad including circumvention though we might do well to apply the same standards at home, two storied about plugless brain-computer interfaces with a compelling first hand account of one, and Google search index to go real time.
Following up this week the USTR responds to Senator Wyden's letter about ACTA with some good analysis and the problems with a revised censorship amendment to the DEB that now targets weblockers.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:28</itunes:duration>
</item>
<item>
<title>TCLP 2010-03-03 Chris Miller on PyCon 2010 (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/03/03/pycon_2010/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>No listener feedback this week.</p>
<p>Due to the length of the interview, there is also no new hacker word of the week this week.</p>
<p>The feature this week is an interview with my <a href="http://www.unquietdesperation.com/">good friend</a> and <a href="http://thesecretlair.com/">fellow podcaster</a>, Chris Miller. Chris has provided me with conference reports twice before, for <a href="http://thecommandline.net/2008/06/05/google_io/">Google I/O</a> in 2008 and <a href="http://thecommandline.net/2009/03/04/scale7x/">SCALE 7x</a> in 2009. This time he joins me to report on his experience at <a href="http://us.pycon.org/2010/about/">PyCon 2010</a>. In the course of the discussion, we mention his <a href="http://www.aginteractive.com/">employer</a>, <a href="http://linuxoutlaws.com/">The Linux Outlaws</a>, Watts Humphrey's <a href="http://en.wikipedia.org/wiki/Personal_Software_Process">Personal Software Process</a>, David Beazley's <a href="http://www.dabeaz.com/python/GIL.pdf">presentation on the Python GIL</a>, <a href="http://www.canonical.com/">Mark</a> <a href="http://ubuntu.com">Shuttleworth</a>, and <a href="http://catherinedevlin.blogspot.com/">Catherine Devlin's</a> presentation on <a href="http://www.assembla.com/wiki/show/python-cmd2">cmd2</a>.</p>
<p>If you want to hear more conversation between Chris and myself on less technical but still crunchy subjects, check out <a href="http://www.thesecretlair.com/main/2009/06/25/episode-0024-hard-sci-fi/">episode 24</a> of The Secret Lair.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 03 Mar 2010 20:44:38 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-03-03.m4a" length="25742931" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100303-chris-miller-on-pycon-2010-commen</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
No listener feedback this week.
Due to the length of the interview, there is also no new hacker word of the week this week.
The feature this week is an interview with my good friend and fellow podcaster, Chris Miller. Chris has provided me with conference reports twice before, for Google I/O in 2008 and SCALE 7x in 2009. This time he joins me to report on his experience at PyCon 2010. In the course of the discussion, we mention his employer, The Linux Outlaws, Watts Humphrey's Personal Software Process, David Beazley's presentation on the Python GIL, Mark Shuttleworth, and Catherine Devlin's presentation on cmd2.
If you want to hear more conversation between Chris and myself on less technical but still crunchy subjects, check out episode 24 of The Secret Lair.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:53</itunes:duration>
</item>
<item>
<title>TCLP 2010-02-28 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/02/28/news_207/</link>
<description><![CDATA[<p>This is news cast 207, an episode of The Command Line Podcast.</p>
<p>In the intro, explaining my advertise experiment, a change to the podcast's license going forward, and <a href="http://oggcamp.org/start">OggCamp 10</a>.</p>
<p>This week's security alerts are <a href="http://blog.opendns.com/2010/02/23/opendns-dnscurve/">OpenDNS adopts and explains DNSCurve</a> and <a href="http://developers.slashdot.org/story/10/02/26/0542206/Anatomy-of-a-SQL-Injection-Attack">anatomy of a SQL injection attack</a>.</p>
<p>In this week's news <a href="http://tech.slashdot.org/story/10/02/22/1653234/New-Method-for-Random-Number-Generation-Developed">a new technique for improve random number generation</a>, <a href="http://www.ethanzuckerman.com/blog/2010/02/22/internet-freedom-beyond-circumvention/">circumvention is not enough to foil censorship</a>, <a href="http://www.guardian.co.uk/technology/blog/2010/feb/23/opensource-intellectual-property">trade association wants USTR to equate open source with piracy</a> (I've talked about <a href="http://thecommandline.net/2010/02/18/why-canadian-copyright-is-strong-than-us/">the watch list being abused previously</a> and Jesse Brown at Search Engine has an <a href="http://www.tvo.org/cfmx/tvoorg/searchengine/index.cfm?page_id=613&amp;action=blog&amp;subaction=viewPost&amp;post_id=12069&amp;blog_id=485">excellent discussion</a>), and <a href="http://www.boingboing.net/2010/02/25/golden-age-computer.html">an early computer manual encourage bypassing proto-DRM</a>.</p>
<p>Following up this week <a href="http://www.michaelgeist.ca/content/view/4808/125/">the internet chapter of ACTA has leaked</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 28 Feb 2010 18:38:14 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-02-28.m4a" length="25042844" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100228-news-comment-line-2409492638</guid>
<itunes:author>Thomas Gideon</itunes:author>
<itunes:subtitle>This is news cast 207, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 207, an episode of The Command Line Podcast.
In the intro, explaining my advertise experiment, a change to the podcast's license going forward, and OggCamp 10.
This week's security alerts are OpenDNS adopts and explains DNSCurve and anatomy of a SQL injection attack.
In this week's news a new technique for improve random number generation, circumvention is not enough to foil censorship, trade association wants USTR to equate open source with piracy (I've talked about the watch list being abused previously and Jesse Brown at Search Engine has an excellent discussion), and an early computer manual encourage bypassing proto-DRM.
Following up this week the internet chapter of ACTA has leaked.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>33:56</itunes:duration>
</item>
<item>
<title>TCLP 2010-02-24 Interview: Nina Paley (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/02/24/nina_paley/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>No listener feedback this week.</p>
<p>Due to the length of the interview, there is also no new hacker word of the week this week.</p>
<p>The feature this week is an interview with cartoonist and animator, <a href="http://ninapaley.com">Nina Paley</a>, creator of "<a href="http://sitasingstheblues.com">Sita Sings the Blues</a>". I've spoken and written about Nina's story before, <a href="http://questioncopyright.org/sita_distribution">the troubles</a> clearing her use of Annette Hanshaw's torch songs that led her to work with Karl Fogel at <a href="http://questioncopyright.org">QuestionCopyright.org</a>. In the course of the interview, we also mention the <a href="http://sitasingstheblues.com/store">store for "Sita" merchandise</a> , <a href="http://questioncopyright.org/creator_endorsed">the creator endorsed mark</a>, "<a href="http://questioncopyright.org/minute_memes">Minute Memes</a>", the <a href="http://toddmichaelsen.com/homesitasoundtrack.cfm">"Sita" soundtrack</a> by Todd Michaelsen, <a href="http://www.youtube.com/watch?v=j61mRq9Q4JE">"Sita" on a persistence of vision wheel based display</a>, and <a href="http://www.cheswick.com/ches/mrthumbnail.html">Bill Cheswick's poster made from every frame of "Sita"</a>. Sadly, by the time you hear this, you'll have missed her talk at AU but I discuss it a bit in the intro to this episode.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/cc-by-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/us/">Creative Commons Attribution-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 24 Feb 2010 22:36:07 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-02-24.m4a" length="35596504" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100224-interview-nina-paley-comment-lin</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
No listener feedback this week.
Due to the length of the interview, there is also no new hacker word of the week this week.
The feature this week is an interview with cartoonist and animator, Nina Paley, creator of "Sita Sings the Blues". I've spoken and written about Nina's story before, the troubles clearing her use of Annette Hanshaw's torch songs that led her to work with Karl Fogel at QuestionCopyright.org. In the course of the interview, we also mention the store for "Sita" merchandise , the creator endorsed mark, "Minute Memes", the "Sita" soundtrack by Todd Michaelsen, "Sita" on a persistence of vision wheel based display, and Bill Cheswick's poster made from every frame of "Sita". Sadly, by the time you hear this, you'll have missed her talk at AU but I discuss it a bit in the intro to this episode.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>48:18</itunes:duration>
</item>
<item>
<title>TCLP 2010-02-21 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/02/21/news_206/</link>
<description><![CDATA[<p>This is news cast 206, an episode of The Command Line Podcast.</p>
<p>In the intro, a reminder that <a href="http://copynightdc.wordpress.com/2010/02/21/copynight-will-be-monday-222-at-630pm-at-teaism/">CopyNight is Monday</a> and that <a href="http://www.facebook.com/event.php?eid=302378381007">Nina Paley is speaking at American on Wednesday, the 24th</a>.</p>
<p>This week's security alerts are <a href="http://tech.slashdot.org/story/10/02/15/026239/Was-This-the-First-Denial-of-Service-Attack">the first denial of service attack</a> and <a href="http://www.schneier.com/blog/archives/2010/02/botnets_attacki.html">botnets attacking each other</a>.</p>
<p>In this week's news <a href="http://en.wikipedia.org/wiki/Lower_Merion_Township,_Montgomery_County,_Pennsylvania#Demographics">PA school district</a> <a href="http://www.boingboing.net/2010/02/17/school-used-student.html">caught spying on students via laptop web cams</a> (which may <a href="http://techdirt.com/articles/20100218/1056378228.shtml">be part of a larger trend</a>) resulting in <a href="http://www.lmsd.org/sections/news/default.php?m=0&amp;t=today&amp;p=lmsd_anno&amp;id=1138">a letter from the school officials</a> who <a href="http://www.wired.com/threatlevel/2010/02/school-district-halts-webcam-surveillance/">feel they did no wrong</a> though <a href="http://yro.slashdot.org/story/10/02/20/1445216/FBI-Probing-PA-School-Webcam-Spy-Case">now the FBI and DA are looking into the incidents</a>, <a href="http://www.aaronsw.com/weblog/usefultransparency">an essay on when transparency is useful</a> which is similar to <a href="http://thecommandline.net/2009/10/18/news_193/">Lessig's thoughts on the subject</a>, and <a href="http://www.wired.com/thisdayintech/2010/02/0216cbbs-first-bbs-bulletin-board">the 32nd anniversary of the BBS</a> which is clearly <a href="http://en.wikipedia.org/wiki/Bulletin_board_system#Networks">a prescursor to the modern internet</a>.</p>
<p>Following up this week <a href="http://www.michaelgeist.ca/content/view/4795/125/">leak of details on last ACTA negotation round</a> and <a href="http://rss.slashdot.org/~r/slashdot/eqWf/~3/fBBTWH15Hkw/Jacobsen-v-Katzer-Settled-mdash-Victory-For-FOSS">the Jacobsen case is finally settled</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 21 Feb 2010 20:11:43 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-02-21.m4a" length="22284609" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100221-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 206, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 206, an episode of The Command Line Podcast.
In the intro, a reminder that CopyNight is Monday and that Nina Paley is speaking at American on Wednesday, the 24th.
This week's security alerts are the first denial of service attack and botnets attacking each other.
In this week's news PA school district caught spying on students via laptop web cams (which may be part of a larger trend) resulting in a letter from the school officials who feel they did no wrong though now the FBI and DA are looking into the incidents, an essay on when transparency is useful which is similar to Lessig's thoughts on the subject, and the 32nd anniversary of the BBS which is clearly a prescursor to the modern internet.
Following up this week leak of details on last ACTA negotation round and the Jacobsen case is finally settled.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>30:11</itunes:duration>
</item>
<item>
<title>TCLP 2010-02-17 Copyright, Copywrong (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/02/17/copyright_copywrong/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>There is no listener feedback this week.</p>
<p>There is no hacker word of the week this week, due to the length of the feature.</p>
<p>The feature this week is audio I recorded from a panel I moderated this past weekend at <a href="http://farpointcon.com/">Farpoint</a>. Farpoint was the first convention where I was invited as a participant, four years ago. The panel audio is from the Copyright, Copywrong discussion panel I moderated.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 17 Feb 2010 21:14:06 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-02-17.m4a" length="40526198" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100217-copyright-copywrong-comment-line</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
There is no listener feedback this week.
There is no hacker word of the week this week, due to the length of the feature.
The feature this week is audio I recorded from a panel I moderated this past weekend at Farpoint. Farpoint was the first convention where I was invited as a participant, four years ago. The panel audio is from the Copyright, Copywrong discussion panel I moderated.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>55:00</itunes:duration>
</item>
<item>
<title>TCLP 2010-02-09 Unscheduled Hiatus (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/02/08/unschedule_hiatus/</link>
<description><![CDATA[<p>This is just a quick meta-cast for the benefit of those who do not read the web site.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Tue, 09 Feb 2010 19:40:11 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-02-09.m4a" length="3796372" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100209-unschedule-hiatus-comment-line-24</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is just a quick meta-cast for the benefit of those who do not read the web site.</itunes:subtitle>
<itunes:summary>This is just a quick meta-cast for the benefit of those who do not read the web site.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>5:07</itunes:duration>
</item>
<item>
<title>TCLP 2010-02-03 Inner Chapter: Politics (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/02/03/politics/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a quick review of Ed Piskor's latest installment in his WIZZYWIG series, <a href="http://edpiskor.com/wizzy3.html">Volume 3: Fugitive</a>.</p>
<p>Listener feedback this week is from Marc, Hugh and Joel who commented on my iPad remarks and yareckon who commented on the Hacker Hero monologue. Both of those segments were part of the <a href="http://thecommandline.net/2010/01/27/hacker_hero/">episode from January 27th</a>. MArc and Hugh shared their thoughts <a href="http://thecommandline.net/2010/01/27/ipad-is-yet-another-drm-crippled-device/#comments">on the web site</a>. Joel sent me <a href="http://diveintomark.org/archives/2010/01/29/tinkerers-sunset">Mark Pilgrim's post on iPad</a> and I mention <a href="http://speirs.org/blog/2010/1/29/future-shock.html">Fraser Speirs'</a> in my response as well as <a href="http://thecommandline.net/2010/02/02/open-closed-or-the-middle-way/">my follow up blog post</a>. yareckon sent his thoughts via <a href="http://identi.ca/conversation/20667999#notice-20668495">Identi.ca</a> including a clarification on <a href="http://identi.ca/notice/20668814">Major Barbara</a>.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/eyeball-search.html">eyeball search</a>.</p>
<p>The feature this week is an Inner Chapter on politics.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 03 Feb 2010 18:42:45 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-02-03.m4a" length="20246659" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100203-inner-chapter-politics</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a quick review of Ed Piskor's latest installment in his WIZZYWIG series, Volume 3: Fugitive.
Listener feedback this week is from Marc, Hugh and Joel who commented on my iPad remarks and yareckon who commented on the Hacker Hero monologue. Both of those segments were part of the episode from January 27th. MArc and Hugh shared their thoughts on the web site. Joel sent me Mark Pilgrim's post on iPad and I mention Fraser Speirs' in my response as well as my follow up blog post. yareckon sent his thoughts via Identi.ca including a clarification on Major Barbara.
The hacker word of the week this week is eyeball search.
The feature this week is an Inner Chapter on politics.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>27:25</itunes:duration>
</item>
<item>
<title>TCLP 2010-01-31 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/01/31/news_205/</link>
<description><![CDATA[<p>This is news cast 205, an episode of The Command Line Podcast.</p>
<p>In the intro, information about a couple of great upcoming events: <a title="Untitled" href="http://conference.freeculture.org/schedule/">Free Culture X</a> and the <a href="http://www.socallinuxexpo.org/scale8x/">Southern California Linux Expo</a>.</p>
<p><a href="http://www.socallinuxexpo.org/scale8x/"><img src="http://thecommandline.net/files/125x125_8x_generic.gif" border="0" alt="125x125_8x_generic.gif" width="125" height="125" /></a></p>
<p>This week's security alert are <a href="http://www.boingboing.net/2010/01/25/fighting-spam-with-c.html">fighting spam with captured botnets</a> and <a href="http://www.krebsonsecurity.com/2010/01/a-peek-inside-the-eleonore-browser-exploit-kit/">examining an exploit kit</a>.</p>
<p>In this week's news <a href="http://www.0xdeadbeef.com/weblog/2010/01/html5-video-and-h-264-what-history-tells-us-and-why-were-standing-with-the-web/">what history can tell us about HTML5, open video and h.264</a> with <a href="http://lwn.net/Articles/371751/">confirmation that patented codecs aren't compatible with free software</a>, <a href="http://craphound.com/?p=2618">a framework for a folk or para-copyright</a>, <a href="http://www.boingboing.net/2010/01/29/amazon-and-macmillan.html">Amazon and Macmillan go to war</a> <a href="http://www.publishersmarketplace.com/lunch/macmillan_30jan10.html">over a price point</a> at the expense of their customers though <a href="http://www.antipope.org/charlie/blog-static/2010/01/amazon-macmillan-an-outsiders.html">the fate of an open e-book market may be at stake</a>, and <a href="http://www.readwriteweb.com/archives/google_proposes_to_extend_dns_protocol.php">Google proposes extending DNS</a>.</p>
<p>Following up this week <a href="http://feeds.wired.com/~r/wired/index/~3/3UZGb3jYSCc/">Jammie Thomas is offered a settlement but she refuses</a> as the <a href="http://yro.slashdot.org/story/10/01/30/0013201/RIAA-To-Appeal-Thomas-Rasset-Ruling">RIAA appeals the judge's reduction of their damage award against her</a> and <a href="http://www.michaelgeist.ca/content/view/4742/125/">a guide to speaking out against ACTA</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 31 Jan 2010 19:30:41 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-01-31.m4a" length="25700357" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100131-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 205, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 205, an episode of The Command Line Podcast.
In the intro, information about a couple of great upcoming events: Free Culture X and the Southern California Linux Expo.
This week's security alert are fighting spam with captured botnets and examining an exploit kit.
In this week's news what history can tell us about HTML5, open video and h.264 with confirmation that patented codecs aren't compatible with free software, a framework for a folk or para-copyright, Amazon and Macmillan go to war over a price point at the expense of their customers though the fate of an open e-book market may be at stake, and Google proposes extending DNS.
Following up this week Jammie Thomas is offered a settlement but she refuses as the RIAA appeals the judge's reduction of their damage award against her and a guide to speaking out against ACTA.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:50</itunes:duration>
</item>
<item>
<title>TCLP 2010-01-27 The Hacker Hero (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/01/27/hacker_hero/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>No listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/eye-candy.html">eye candy</a>.</p>
<p>The feature this week is a monologue on the hacker hero in literature. I mention the myths of <a href="http://en.wikipedia.org/wiki/Enki">Enki</a> and <a href="http://en.wikipedia.org/wiki/Prometheus">Prometheus</a>. I refer to <a href="http://www.amazon.com/gp/product/1892391759?ie=UTF8&amp;tag=thecommandl0a-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=1892391759">the Steampunk anthology</a> and <a href="http://www.amazon.com/gp/redirect.html?ie=UTF8&amp;location=http%3A%2F%2Fwww.amazon.com%2FSteampunk-Trilogy-Di-Filippo-Paul%2Fdp%2F1568581025%2F&amp;tag=97adc0c819be084e0d60ba7afcbc8ea3-20&amp;linkCode=ur2&amp;camp=1789&amp;creative=9325">Paul diFilippo's Steampunk trilogy</a>. I also cite the works of both Charlie Stross and Rudy Rucker. I even touch on Disney's Wall-E.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 27 Jan 2010 21:50:10 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-01-27.m4a" length="22519951" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100127-the-hacker-hero-comment-line-240</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
No listener feedback this week.
The hacker word of the week this week is eye candy.
The feature this week is a monologue on the hacker hero in literature. I mention the myths of Enki and Prometheus. I refer to the Steampunk anthology and Paul diFilippo's Steampunk trilogy. I also cite the works of both Charlie Stross and Rudy Rucker. I even touch on Disney's Wall-E.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>30:30</itunes:duration>
</item>
<item>
<title>TCLP 2010-01-24 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/01/24/news_204/</link>
<description><![CDATA[<p>This is news cast 204, an episode of The Command Line Podcast.</p>
<p>This week's security alert are <a href="http://arstechnica.com/web/news/2010/01/facebook-att-play-fast-and-loose-with-user-authentication.ars">an odd interaction between AT&amp;T's mobile network and Facebook</a> with <a href="http://www.readwriteweb.com/archives/more_details_on_atts_network_glitch_which_compromised_facebook_security.php">some clarification</a> and <a href="http://arstechnica.com/microsoft/news/2010/01/microsoft-investigates-17-year-old-windows-flaw.ars">a seventeen year old Windows flaw</a>.</p>
<p>In this week's news <a href="http://www.boingboing.net/2010/01/18/cbs-uncovers-rare-ja.html">CBS keeps some public domain videos locked away in its vault</a> though <a href="http://www.jackbenny.org/biography/other/copyright_status_of_jack_benny_t.htm">the status of the video seems clear</a> but <a href="http://techdirt.com/articles/20100118/1050427800.shtml">the situation may have been exaggerated</a>, <a href="http://identi.ca/notice/19425486">another proposal to re-write HTTP</a>, <a href="http://arstechnica.com/open-source/news/2010/01/googles-mapreduce-patent-what-does-it-mean-for-hadoop.ars">consequences of Google's map, reduce patent</a>, and <a href="http://arstechnica.com/tech-policy/news/2010/01/hillary-clinton-slams-information-curtain-of-censorship.ars">US secretary of state's speech on censorship</a> and <a href="http://arstechnica.com/tech-policy/news/2010/01/china-to-us-stop-accusations-on-so-called-internet-freedom.ars">the Chinese response</a>.</p>
<p>Following up this week <a href="http://blog.sunlightfoundation.com/2010/01/20/time-running-short-to-meet-first-ogd-deadlines/">OGD deadline came</a> for which <a href="http://blog.sunlightfoundation.com/2010/01/22/open-govt-directive-large-data-set-release-today/">the first data sets were released</a> and you can <a href="http://sunlightlabs.com/open/">track progress to the next deadline</a> and <a href="http://www.eff.org/press/archives/2010/01/21">warrant-less wiretapping case is dismissed</a> though EFF says it will appeal.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 24 Jan 2010 18:04:19 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-01-24.m4a" length="28824580" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100124-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 204, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 204, an episode of The Command Line Podcast.
This week's security alert are an odd interaction between AT&amp;amp;T's mobile network and Facebook with some clarification and a seventeen year old Windows flaw.
In this week's news CBS keeps some public domain videos locked away in its vault though the status of the video seems clear but the situation may have been exaggerated, another proposal to re-write HTTP, consequences of Google's map, reduce patent, and US secretary of state's speech on censorship and the Chinese response.
Following up this week OGD deadline came for which the first data sets were released and you can track progress to the next deadline and warrant-less wiretapping case is dismissed though EFF says it will appeal.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>39:05</itunes:duration>
</item>
<item>
<title>TCLP 2010-01-20 Interview: Danny O'Brien on ACTA (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/01/20/danny_obrien_acta/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>No listener feedback this week.</p>
<p>Due to the length of the interview, there is also no new hacker word of the week this week.</p>
<p>The feature this week is an interview with Danny O'Brien on ACTA. I was inspired to contact Danny after hearing him on <a href="http://twit.tv/floss95">FLOSS Weekly</a>. In the course of the interview, we mention <a href="http://www.michaelgeist.ca/">Michael Geist</a>, <a href="http://keionline.org/">Knowledge Ecology</a> and <a href="http://www.publicknowledge.org/">Public Knowledge</a>. Visit <a href="http://www.eff.org/">EFF</a> to learn more about ACTA and the other issues on which Danny is working and <a href="http://www.eff.org/action">take action at their action center</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 20 Jan 2010 20:37:33 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-01-20.m4a" length="42610241" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100120-interview-danny-obrien-on-acta-</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
No listener feedback this week.
Due to the length of the interview, there is also no new hacker word of the week this week.
The feature this week is an interview with Danny O'Brien on ACTA. I was inspired to contact Danny after hearing him on FLOSS Weekly. In the course of the interview, we mention Michael Geist, Knowledge Ecology and Public Knowledge. Visit EFF to learn more about ACTA and the other issues on which Danny is working and take action at their action center.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>57:50</itunes:duration>
</item>
<item>
<title>TCLP 2010-01-17 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/01/17/news_203/</link>
<description><![CDATA[<p>This is news cast 203, an episode of The Command Line Podcast.</p>
<p>In the intro a quick overview on my convention schedule for this year.</p>
<p>This week's security alert is just <a href="http://www.boingboing.net/2010/01/11/interview-with-faceb.html">an in depth discussion of a concerning interview that revealed some internal privacy issues at Facebook</a>.</p>
<p>In this week's news I spend more time on <a href="http://googlepublicpolicy.blogspot.com/2010/01/new-approach-to-china.html">Google's announcement that it is reviewing its operations in China</a>. Wired has <a href="http://www.wired.com/threatlevel/2010/01/google-censorship-china/">more details from an inside source</a>. Glyn Moody suggests a <a href="http://opendotdotdot.blogspot.com/2010/01/going-googly-in-china.html">reasonable hypothesis of why now</a>. And <a href="http://radar.oreilly.com/2010/01/google-and-china-whats-the-rea.html">Mac Slocum has a bevy of opinions at O'Reilly Radar</a>. China has also already <a href="http://www.wired.com/threatlevel/2010/01/china-responds-to-google">responded</a>. The other stories this week are <a href="http://www.boingboing.net/2010/01/11/view-source-consider.html">an essay on the benefit of viewing HTML source and its potentially endangered future</a> and <a href="http://arstechnica.com/gadgets/news/2010/01/shuttle-hints-at-build-your-own-laptop-with-spa-format-ready.ars">a new initiative that may ultimately allow users to build their own laptops</a>.</p>
<p>Following up this week <a href="http://identi.ca/notice/18732495">a further refinement of the FLOSS license icons</a> and <a href="http://www.michaelgeist.ca/content/view/4687/196/">the UK offers a compromise on the pirate catcher powers in the Digital Economy Bill</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 17 Jan 2010 18:39:14 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-01-17.m4a" length="25613076" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100117-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 203, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 203, an episode of The Command Line Podcast.
In the intro a quick overview on my convention schedule for this year.
This week's security alert is just an in depth discussion of a concerning interview that revealed some internal privacy issues at Facebook.
In this week's news I spend more time on Google's announcement that it is reviewing its operations in China. Wired has more details from an inside source. Glyn Moody suggests a reasonable hypothesis of why now. And Mac Slocum has a bevy of opinions at O'Reilly Radar. China has also already responded. The other stories this week are an essay on the benefit of viewing HTML source and its potentially endangered future and a new initiative that may ultimately allow users to build their own laptops.
Following up this week a further refinement of the FLOSS license icons and the UK offers a compromise on the pirate catcher powers in the Digital Economy Bill.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:43</itunes:duration>
</item>
<item>
<title>TCLP 2010-01-13 Inner Chapter: Accomplishment (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/01/13/accomplishment/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a quick recap of my experiences at <a href="http://wfud.info/">World's Fair Use Day</a>. I may share a longer blog post or podcast segment once I finally get a chance to sift through my notes.</p>
<p>Listener feedback is from Philippe who mentions <a href="http://xdebug.org">Xdebug</a> and Philip who mentions <a href="http://search.cpan.org/perldoc?Devel::NYTProf">Devel::NYTProf</a> which just had a <a href="http://perlbuzz.com/2009/12/develnytprof-30-is-out-more-mindblowing-than-ever.html">recent release</a>. Both wrote in response to my Hacking 101 on speed and performance, specifically to my open question about profilers. Thanks for the leads.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/Exploder.html">Exploder</a>.</p>
<p>The feature this week is an Inner Chapter on accomplishment.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 13 Jan 2010 20:06:49 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-01-13.m4a" length="20423499" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100113-inner-chapter-accomplishment-com</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a quick recap of my experiences at World's Fair Use Day. I may share a longer blog post or podcast segment once I finally get a chance to sift through my notes.
Listener feedback is from Philippe who mentions Xdebug and Philip who mentions Devel::NYTProf which just had a recent release. Both wrote in response to my Hacking 101 on speed and performance, specifically to my open question about profilers. Thanks for the leads.
The hacker word of the week this week is Exploder.
The feature this week is an Inner Chapter on accomplishment.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>27:39</itunes:duration>
</item>
<item>
<title>TCLP 2010-01-10 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/01/10/news_202/</link>
<description><![CDATA[<p>This is news cast 202, an episode of The Command Line Podcast.</p>
<p>In the intro a shout out to <a href="http://slug.org.au/">SLUG</a> and a huge thank you to Holger for his ongoing donation.</p>
<p>Also, if you are a listener, reader or acquaintance of Tee Morris' and want to know how you can help in his time of need, you can <a href="http://teeandserena.chipin.com/tee-and-sonic-boom">donate to a fund for his daughter</a>, <a href="http://www.theboomeffect.org/">participate in an auction schedule for next month</a>, or <a href="http://teemorris.com/">buy one of his many excellent books</a>.</p>
<p>This week's security alerts are <a href="http://blogs.zdnet.com/security/?p=5178">Adobe finally working on a software updater</a> and <a href="http://arstechnica.com/security/news/2010/01/768-bit-rsa-cracked-1024-bit-safe-for-now.ars">768-bit RSA modulus factored</a>.</p>
<p>In this week's news <a href="http://news.slashdot.org/story/10/01/04/089219/Jaron-Lanier-Rants-Against-The-World-of-Web-20">Jaron Lanier's Web 2.0 rant</a>, <a href="http://yro.slashdot.org/story/10/01/05/1728216/Does-Cheap-Tech-Undermine-Legal-Privacy-Protections">whether cheap tech undermines legal protections</a> including <a href="http://yro.slashdot.org/story/10/01/09/1630227/The-Gradual-Erosion-of-the-Right-To-Privacy">broader ramifications for online privacy</a>, <a href="http://www.theregister.co.uk/2010/01/06/firefox_3_7_speed/">testing the first build</a> of Mozilla's <a href="https://wiki.mozilla.org/Content_Processes">multi-process project</a> which I first mentioned <a href="http://thecommandline.net/2009/05/10/news_176/">over six months ago</a>, and <a href="http://arstechnica.com/tech-policy/news/2010/01/commerce-department-wireless-alone-wont-make-broadband-more-competitive.ars">the government is skeptical</a> of an earlier <a href="http://thecommandline.net/2010/01/04/doj-appeals-fcc-to-release-more-wireless-spectrum/">suggestion that more wireless spectrum will increase broadband competition</a>.</p>
<p>Following up this week <a href="http://www.wired.com/threatlevel/2010/01/riaa-verdict-is-unreasonable/">Tenenbaum P2P case defending seeking to overturn damages as unconstitutional</a> and <a href="http://voices.washingtonpost.com/posttech/2010/01/the_federal_communications_com_1.html">FCC seeks extension for broadband plan</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 10 Jan 2010 21:39:08 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-01-10.m4a" length="21227591" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100110-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 202, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 202, an episode of The Command Line Podcast.
In the intro a shout out to SLUG and a huge thank you to Holger for his ongoing donation.
Also, if you are a listener, reader or acquaintance of Tee Morris' and want to know how you can help in his time of need, you can donate to a fund for his daughter, participate in an auction schedule for next month, or buy one of his many excellent books.
This week's security alerts are Adobe finally working on a software updater and 768-bit RSA modulus factored.
In this week's news Jaron Lanier's Web 2.0 rant, whether cheap tech undermines legal protections including broader ramifications for online privacy, testing the first build of Mozilla's multi-process project which I first mentioned over six months ago, and the government is skeptical of an earlier suggestion that more wireless spectrum will increase broadband competition.
Following up this week Tenenbaum P2P case defending seeking to overturn damages as unconstitutional and FCC seeks extension for broadband plan.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>28:45</itunes:duration>
</item>
<item>
<title>TCLP 2010-01-06 Hacking 101: Speed and Performance (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2010/01/06/speed_performance/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, some thoughts on the loss of a friend.</p>
<p>There is no listener feedback this week.</p>
<p>There is no hacker word of the week this week.</p>
<p>The feature this week is a Hacking 101 on speed and the practice of performance tuning. I mention my previous Inner Chapters on <a href="http://thecommandline.net/2008/05/07/complexity/">complexity</a> and <a href="http://thecommandline.net/2005/12/27/podcast-27/">debugging</a> though I referred to it incorrectly as trouble shooting or problem solving. I also refer to <a href="http://en.wikipedia.org/wiki/Big_Oh_notation#Orders_of_common_functions">Wikipedia's entry of Big O notation</a>, specifically the orders of common functions section.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 06 Jan 2010 20:55:38 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2010-01-06.m4a" length="24721012" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20100106-hacking-101-speed-and-performance</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, some thoughts on the loss of a friend.
There is no listener feedback this week.
There is no hacker word of the week this week.
The feature this week is a Hacking 101 on speed and the practice of performance tuning. I mention my previous Inner Chapters on complexity and debugging though I referred to it incorrectly as trouble shooting or problem solving. I also refer to Wikipedia's entry of Big O notation, specifically the orders of common functions section.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>33:30</itunes:duration>
</item>
<item>
<title>TCLP 2009-12-20 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/12/20/news_201/</link>
<description><![CDATA[<p>This is news cast 201, an episode of The Command Line Podcast. Apologies if you received a flood of old episodes as if they are new. This may be the result of some needed feed maintenance.</p>
<p>This week's only security alerts is <a href="http://www.theregister.co.uk/2009/12/14/microsoft_cofee_vs_decaf/">development of a counter tool to a forensics suite, COFEE, that Micrsoft offers</a> but was leaked and <a href="http://tech.slashdot.org/story/09/12/18/1810250/DECAF-Was-Just-a-Stunt-Now-Over">the announcement to that counter tool, DECAF, was just a stunt</a>.</p>
<p>In this week's news <a href="http://www.ajc.com/business/ap-investigation-monsanto-seed-240072.html">an investigation into Monsanto's predatory patent licensing practices</a> brought to my attention <a href="http://opendotdotdot.blogspot.com/2009/12/monsoft-or-microsanto.html">via Glyn Moody's comparison of the agri-giant to Microsoft</a>, <a href="http://www.computerworlduk.com/community/blogs/index.cfm?entryid=2698&amp;blogid=14">the latest developments with the Australian plan to filter net access</a> including <a href="http://arstechnica.com/tech-policy/news/2009/12/aussie-content-filters-work-if-you-dont-count-im-p2p-ftp.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">analysis of the test results they are claiming as a success</a>, <a href="http://blogs.fsfe.org/adridg/?p=542">composeable icons for free software and open source licenses</a>, and <a href="http://arstechnica.com/tech-policy/news/2009/12/sneak-peek-of-fcc-national-broadband-plan-gets-mixed-reviews.ars">the first draft of the FCC's broadband plan</a>.</p>
<p>Following up this week <a href="http://www.michaelgeist.ca/content/view/4622/125/">just the news that the three strikes plan has returned in New Zealand</a> despite <a href="http://www.boingboing.net/2009/12/16/three-strikes-law-re.html">its fundamental flaws</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 20 Dec 2009 16:40:51 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-12-20.m4a" length="24146997" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20091220-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 201, an episode of The Command Line Podcast. Apologies if you received a flood of old episodes as if they are new. This may be the result of some needed feed maintenance.</itunes:subtitle>
<itunes:summary>This is news cast 201, an episode of The Command Line Podcast. Apologies if you received a flood of old episodes as if they are new. This may be the result of some needed feed maintenance.
This week's only security alerts is development of a counter tool to a forensics suite, COFEE, that Micrsoft offers but was leaked and the announcement to that counter tool, DECAF, was just a stunt.
In this week's news an investigation into Monsanto's predatory patent licensing practices brought to my attention via Glyn Moody's comparison of the agri-giant to Microsoft, the latest developments with the Australian plan to filter net access including analysis of the test results they are claiming as a success, composeable icons for free software and open source licenses, and the first draft of the FCC's broadband plan.
Following up this week just the news that the three strikes plan has returned in New Zealand despite its fundamental flaws.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>32:43</itunes:duration>
</item>
<item>
<title>TCLP 2009-12-16 Hacking 101: Distributed Version Control (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/12/16/distributed_vcs/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, I urge you to consider <a href="http://creativecommons.org/weblog/entry/19697">Creative Commons</a> and <a href="http://www.publicknowledge.org/node/2807">Public Knowledge</a> in your year end giving as well as EFF. Also, I will be on hiatus after the show on the 20th. That will be the last show of the year and the first show of next year will be the feature cast on the 6th of January.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/exercise--left-as-an.html">exercise, left as an</a>.</p>
<p>The feature this week is a Hacking 101 considering the merits and demerits of distributed version control, in response to <a href="http://cohpodcast.com/">Chooch's</a> question on the subject. You can listen to my <a href="http://thecommandline.net/2008/11/26/source_control/">earlier episode on source control</a> as well as the other episodes I mentioned on <a href="http://thecommandline.net/2009/04/01/team_dynamics/">team dynamics</a> and <a href="http://thecommandline.net/2009/03/25/code_style/">code style</a>. I also mention <a href="http://help.github.com/forking/">github's help document on forking</a> using that site.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 16 Dec 2009 21:22:59 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-12-16.m4a" length="21800255" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20091216-hacking-101-distributed-version-c</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, I urge you to consider Creative Commons and Public Knowledge in your year end giving as well as EFF. Also, I will be on hiatus after the show on the 20th. That will be the last show of the year and the first show of next year will be the feature cast on the 6th of January.
There is no listener feedback this week.
The hacker word of the week this week is exercise, left as an.
The feature this week is a Hacking 101 considering the merits and demerits of distributed version control, in response to Chooch's question on the subject. You can listen to my earlier episode on source control as well as the other episodes I mentioned on team dynamics and code style. I also mention github's help document on forking using that site.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>29:31</itunes:duration>
</item>
<item>
<title>TCLP 2009-12-13 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/12/13/news_200/</link>
<description><![CDATA[<p>This is news cast 200, an episode of The Command Line Podcast.</p>
<p>This week's security alerts are <a href="http://www.theregister.co.uk/2009/12/10/twitter_domain_generator/">attackers improve on techniques to use Twitter to conceal their efforts</a> and <a href="http://linux.slashdot.org/story/09/12/09/2215253/Malware-Found-Hidden-In-Screensaver-On-Gnome-Look?from=rss&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+slashdot%2FeqWf+%28Slashdot%3A+Slashdot%29&amp;utm_content=Google+Reader">malware found in a Gnome screen saver</a>.</p>
<p>In this week's news <a href="http://www.michaelgeist.ca/content/view/4596/135/">a massive class action suit against the labels for copyright infringement</a>, <a href="http://www.wired.com/epicenter/2009/12/white-house-orders-agencies-to-open-up/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29&amp;utm_content=Google+Reader">a new open government directive from the Obama administration</a> though it <a href="http://www.eff.org/deeplinks/2009/12/white-house-takes-another-step-toward-greater-tran">notably doesn't include making the White House's practices transparent</a> and <a href="http://blog.sunlightfoundation.com/2009/12/11/three-misconceptions-about-the-open-government-directive/">may present certain loop holes</a>, <a href="http://arstechnica.com/science/news/2009/12/sharing-a-secret-key-via-the-mere-possibility-of-communication.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">quantum key distribution through possibility of sending a particle</a>, and <a href="http://www.boingboing.net/2009/12/11/artificial-intellige-1.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+boingboing%2FiBag+%28Boing+Boing%29&amp;utm_content=Google+Reader">AI to undergo rebirth at MIT</a> with <a href="http://mmp.cba.mit.edu/">new ambitious five year project</a>.</p>
<p>Following up this week <a href="http://arstechnica.com/tech-policy/news/2009/12/how-team-tenenbaum-missed-a-chance-to-shape-p2p-fair-use-law.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">the final ruling in the Tenenbaum P2P case</a> which may be an unrealized opportunity for fair use reform or <a href="http://www.wired.com/threatlevel/2009/12/nesson-2/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29&amp;utm_content=Google+Reader">may not</a>. Defense lawyer and Harvard law professor Nesson is <a href="http://techdirt.com/articles/20091209/0357087263.shtml">seeking a retrial regardless</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 13 Dec 2009 15:18:36 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-12-13.m4a" length="25350607" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20091213-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 200, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 200, an episode of The Command Line Podcast.
This week's security alerts are attackers improve on techniques to use Twitter to conceal their efforts and malware found in a Gnome screen saver.
In this week's news a massive class action suit against the labels for copyright infringement, a new open government directive from the Obama administration though it notably doesn't include making the White House's practices transparent and may present certain loop holes, quantum key distribution through possibility of sending a particle, and AI to undergo rebirth at MIT with new ambitious five year project.
Following up this week the final ruling in the Tenenbaum P2P case which may be an unrealized opportunity for fair use reform or may not. Defense lawyer and Harvard law professor Nesson is seeking a retrial regardless.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:21</itunes:duration>
</item>
<item>
<title>TCLP 2009-12-09 Monologue: Social Gravity Well (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/12/09/social_gravity_well/</link>
<description><![CDATA[<p>This is a feature cast, an episode of The Command Line Podcast.</p>
<p>In the intro, a quick review of the film, "<a href="http://www.imdb.com/title/tt0375568/">Astro Boy</a>", based on the original manga by <a href="http://en.wikipedia.org/wiki/Osamu_Tezuka">Osamu Tezuka</a>. I also highly recommend Dan's <a href="http://geekadelphia.com/2009/10/19/geeks-on-film-dan-reviews-astro-boy/">review of the film</a> on Geekadelphia.</p>
<p>Listener feedback this week is from Philip who wrote in to comment on <a href="http://thecommandline.net/2009/11/18/nowhere_to_go/">my nowhere to go rant</a>.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/exec.html">exec</a>.</p>
<p>The feature this week is a monologue on the social gravity well.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 09 Dec 2009 21:00:34 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-12-09.m4a" length="16359124" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20091209-monologue-social-gravity-well-co</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is a feature cast, an episode of The Command Line Podcast.
In the intro, a quick review of the film, "Astro Boy", based on the original manga by Osamu Tezuka. I also highly recommend Dan's review of the film on Geekadelphia.
Listener feedback this week is from Philip who wrote in to comment on my nowhere to go rant.
The hacker word of the week this week is exec.
The feature this week is a monologue on the social gravity well.
[display_podcast]
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>22:07</itunes:duration>
</item>
<item>
<title>TCLP 2009-12-06 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/12/06/new_199/</link>
<description><![CDATA[<p>This is news cast 199, an episode of The Command Line Podcast.</p>
<p>This week's security alerts are <a href="http://it.slashdot.org/story/09/12/04/0413235/Malware-Could-Grab-Data-From-Stock-iPhones?from=rss&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+slashdot%2FeqWf+%28Slashdot%3A+Slashdot%29&amp;utm_content=Google+Reader">malware may start affecting non-jailbroken iPhones</a> and <a href="http://tech.slashdot.org/story/09/12/04/1532258/A-Look-At-the-Safety-of-Google-Public-DNS?from=rss&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+slashdot%2FeqWf+%28Slashdot%3A+Slashdot%29&amp;utm_content=Google+Reader">testing whether Google's new DNS resolver is secure</a>. I wrote about Google's new offering <a href="http://thecommandline.net/2009/12/03/google-launches-its-own-public-dns-resolver/">earlier in the week</a>.</p>
<p>In this week's news <a href="http://www.michaelgeist.ca/content/view/4575/125/">latest ACTA leak seems to confirm the worst</a> exceeding EU and <a href="http://www.michaelgeist.ca/content/view/4585/125/">Canadian</a> copyright policy and makes better sense of <a href="http://thecommandline.net/2009/12/04/kei-director-tries-to-pin-ustr-on-acta/">KEI Director James Love's encounter with USTR chief Ron Kirk</a>, <a href="http://arstechnica.com/web/news/2009/12/commonjs-effort-sets-javascript-on-path-for-world-domination.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">standalone JavaScript</a>, <a href="http://arstechnica.com/tech-policy/news/2009/12/how-the-robber-barons-hijacked-the-victorian-internet.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">historical antecedents to the current broadband regulation debate</a>, and <a href="http://arstechnica.com/tech-policy/news/2009/12/website-invading-your-privacy-bookmark-it-and-alert-the-ftc.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">a new privacy reporting tool from the CDT</a> which is part of <a href="http://thecommandline.net/2009/12/04/badge-for-targeted-advertising/">a larger trend to try to improve awareness around online privacy</a>.</p>
<p>Following up this week <a href="http://techdirt.com/articles/20091203/0906507179.shtml">one British politician pushed back on the Digital Economy Bill</a> and <a href="http://www.eff.org/deeplinks/2009/11/google-books-settlement-2-0-evaluating-censorship">evaluating the censorship risk of the current version of the Google Books settlement</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 06 Dec 2009 19:05:27 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-12-06.m4a" length="24628182" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20091206-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 199, an episode of The Command Line Podcast.</itunes:subtitle>
<itunes:summary>This is news cast 199, an episode of The Command Line Podcast.
This week's security alerts are malware may start affecting non-jailbroken iPhones and testing whether Google's new DNS resolver is secure. I wrote about Google's new offering earlier in the week.
In this week's news latest ACTA leak seems to confirm the worst exceeding EU and Canadian copyright policy and makes better sense of KEI Director James Love's encounter with USTR chief Ron Kirk, standalone JavaScript, historical antecedents to the current broadband regulation debate, and a new privacy reporting tool from the CDT which is part of a larger trend to try to improve awareness around online privacy.
Following up this week one British politician pushed back on the Digital Economy Bill and evaluating the censorship risk of the current version of the Google Books settlement.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>33:22</itunes:duration>
</item>
<item>
<title>TCLP 2009-11-29 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/11/29/news_198/</link>
<description><![CDATA[<p>This is news cast 198.</p>
<p>In the intro, a quick Philcon recap. See my <a href="http://thecommandline.net/2009/11/22/philcon-2009/">earlier post</a> for more.</p>
<p>This week's security alerts are <a href="http://arstechnica.com/microsoft/news/2009/11/ie6-and-ie7-vulnerable-to-latest-flaw-ie8-immune.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">details on an exploitable flaw in older versions of MSIE</a> including <a href="http://blogs.zdnet.com/security/?p=4985">news of an actual exploit</a> and <a href="http://arstechnica.com/apple/news/2009/11/malicious-attacks-continue-against-jailbroken-iphone-users.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">the latest iPhone worm snags bank credentials</a>.</p>
<p>In this week's news <a href="http://www.technologyreview.com/blog/arxiv/24448/?a=f">research suggesting combining the promising techniques in quantum computing to produce a viable system sooner</a> (this builds on <a href="http://arstechnica.com/science/news/2009/11/scientists-create-the-first-programmable-quantum-computer.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">recent work by NIST</a> and <a href="http://hardware.slashdot.org/story/09/09/28/0151216/A-Photon-Machine-Gun-For-Quantum-Computers?from=rss">a design for a photon "machine gun" for producing larger registers of qubits</a>), <a href="http://it.slashdot.org/story/09/11/23/1837238/English-Shell-Code-Could-Make-Security-Harder?from=rss&amp;utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+slashdot%2FeqWf+%28Slashdot%3A+Slashdot%29&amp;utm_content=Google+Reader">encoding shell code as English text</a>, <a href="http://arstechnica.com/open-source/news/2009/11/w3c-publishes-draft-of-new-file-api-spec.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">a client side file handling API for JavaScript and HTML5</a> which is <a href="https://developer.mozilla.org/en/Using_files_from_web_applications">already implemented in Firefox's latest beta build</a>, and <a href="http://www.readwriteweb.com/archives/new_website_publicizes_iphone_app_rejections.php?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+readwriteweb+%28ReadWriteWeb%29&amp;utm_content=Google+Reader">a site for sharing information about rejections for Apple's app store</a>.</p>
<p>Following up this week <a href="http://www.eff.org/deeplinks/2009/11/google-books-settlement-2-0-evaluating-privacy">evaluating privacy in the revised Books settlement</a> and <a href="http://techdirt.com/articles/20091123/1541197061.shtml">two senators question ACTA secrecy</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 29 Nov 2009 17:46:29 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-11-29.m4a" length="25877889" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20091129-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 198.</itunes:subtitle>
<itunes:summary>This is news cast 198.
In the intro, a quick Philcon recap. See my earlier post for more.
This week's security alerts are details on an exploitable flaw in older versions of MSIE including news of an actual exploit and the latest iPhone worm snags bank credentials.
In this week's news research suggesting combining the promising techniques in quantum computing to produce a viable system sooner (this builds on recent work by NIST and a design for a photon "machine gun" for producing larger registers of qubits), encoding shell code as English text, a client side file handling API for JavaScript and HTML5 which is already implemented in Firefox's latest beta build, and a site for sharing information about rejections for Apple's app store.
Following up this week evaluating privacy in the revised Books settlement and two senators question ACTA secrecy.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>35:04</itunes:duration>
</item>
<item>
<title>TCLP 2009-11-25 Interview: Cory Doctorow (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/11/25/cory_doctorow_makers/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>I am delaying listener feedback until the next feature cast due to the holiday week and the length of the feature.</p>
<p>There is no new hacker word of the week this week.</p>
<p>The feature this week is my third interview with Cory Doctorow in as many years. This time, we speak mostly about his new novel, <a href="http://craphound.com/makers/">"MAKERS"</a>. My friend Dan, from <a href="http://geekadelphia.com">Geekadelphia</a>, took some great pictures while we were interviewing. You can see the best of those pictures <a href="http://www.flickr.com/photos/31219652@N07/sets/72157622727029469/">here</a> and all of my pictures from the entire convention, <a href="http://www.flickr.com/photos/cmdln/sets/72157622864575792/">here</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 25 Nov 2009 20:59:53 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-11-25.m4a" length="30535632" type="audio/x-m4a"/>
<guid isPermaLink="false">tclp-20091125-interview-cory-doctorow-comment</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
I am delaying listener feedback until the next feature cast due to the holiday week and the length of the feature.
There is no new hacker word of the week this week.
The feature this week is my third interview with Cory Doctorow in as many years. This time, we speak mostly about his new novel, "MAKERS". My friend Dan, from Geekadelphia, took some great pictures while we were interviewing. You can see the best of those pictures here and all of my pictures from the entire convention, here.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>41:25</itunes:duration>
</item>
<item>
<title>TCLP 2009-11-18 Rant: Nowhere to Go (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/11/18/nowhere_to_go/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, a final reminder I will be at <a href="http://philcon.org">Philcon</a> this weekend, so no news show on Sunday. There almost definitely will be a feature show next week since I should have my interview with Cory to release. Also a revelation, that <a href="http://www.imdb.com/title/tt1018887/">"Dreams with Sharp Teeth"</a> has convinced me I am not much of a curmudgeon.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/Evil-Empire.html">Evil Empire</a>.</p>
<p>The feature this week is a rant, though more of an emotional than a surly one, entitled nowhere to go.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 18 Nov 2009 20:41:49 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-11-18.m4a" length="17034692" type="audio/m4a"/>
<guid isPermaLink="false">tclp-20091118-rant-nowhere-to-go</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, a final reminder I will be at Philcon this weekend, so no news show on Sunday. There almost definitely will be a feature show next week since I should have my interview with Cory to release. Also a revelation, that "Dreams with Sharp Teeth" has convinced me I am not much of a curmudgeon.
There is no listener feedback this week.
The hacker word of the week this week is Evil Empire.
The feature this week is a rant, though more of an emotional than a surly one, entitled nowhere to go.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>23:03</itunes:duration>
</item>
<item>
<title>TCLP 2009-11-15 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/11/15/news_197/</link>
<description><![CDATA[<p>This is news cast 197.</p>
<p>A reminder in the intro that I will be at <a href="http://philcon.org">Philcon</a> this coming weekend, the 20th. I am going expressly to interview Cory Doctorow about his new book, <a href="http://craphound.com/makers/">MAKERS</a>, as well as hopefully some of his <a href="http://www.publishersweekly.com/article/CA6702526.html">other projects</a>. If you have questions you'd like me to consider including in the interview, send them to me this week.</p>
<p>This week's security alerts are <a href="http://www.theregister.co.uk/2009/11/10/web_security_survey/">Firefox bugs account for 44% of all browser bugs</a> and <a href="http://www.schneier.com/blog/archives/2009/11/is_antivirus_de.html">considering whether antivirus is dead</a>.</p>
<p>In this week's news <a href="http://www.pranavmistry.com/projects/sixthsense/">truly innovative mobile interface</a> to be <a href="http://blogs.zdnet.com/open-source/?p=5224">open</a> <a href="http://business.rediff.com/slide-show/2009/nov/06/slide-show-1-tech-mit-grad-mistry-to-make-digital-sixthsense-open-source.htm">source</a>, <a href="http://dev.chromium.org/spdy/spdy-whitepaper">Google shares open protocol</a> for <a href="http://code.google.com/speed/">speeding up the web</a>, the search giant also <a href="http://google-opensource.blogspot.com/2009/11/hey-ho-lets-go.html">announces</a> its <a href="http://arstechnica.com/open-source/news/2009/11/go-new-open-source-programming-language-from-google.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">new programming language</a> developed by among others Rob Pike (who also co-authored on of <a href="http://en.wikipedia.org/wiki/The_Practice_of_Programming">my favorite technology books</a>) and Ken Thompson of Unix fame, and <a href="http://www.boingboing.net/2009/11/12/howto-kill-wiretaps.html">a DoS attack against digital wire taps</a>.</p>
<p>Following up this week <a href="http://voices.washingtonpost.com/posttech/2009/11/googles_curbed_its_ambitious_d.html?wprss=posttech">revisions to the Google Books settlement</a> which exclude <a href="http://www.eff.org/deeplinks/2009/11/google-book-search-settlement-revised-no-reader-pr">any privacy protections</a> and <a href="http://arstechnica.com/tech-policy/news/2009/11/supremes-wrestle-with-business-method-software-patents.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">oral arguments were heard by the Supreme Court in the Bilski case</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 15 Nov 2009 19:22:27 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-11-15.m4a" length="25494115" type="audio/m4a"/>
<guid isPermaLink="false">tclp-20091115-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 197.</itunes:subtitle>
<itunes:summary>This is news cast 197.
A reminder in the intro that I will be at Philcon this coming weekend, the 20th. I am going expressly to interview Cory Doctorow about his new book, MAKERS, as well as hopefully some of his other projects. If you have questions you'd like me to consider including in the interview, send them to me this week.
This week's security alerts are Firefox bugs account for 44% of all browser bugs and considering whether antivirus is dead.
In this week's news truly innovative mobile interface to be open source, Google shares open protocol for speeding up the web, the search giant also announces its new programming language developed by among others Rob Pike (who also co-authored on of my favorite technology books) and Ken Thompson of Unix fame, and a DoS attack against digital wire taps.
Following up this week revisions to the Google Books settlement which exclude any privacy protections and oral arguments were heard by the Supreme Court in the Bilski case.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:33</itunes:duration>
</item>
<item>
<title>TCLP 2009-11-11 Hacking 101: Front End, Back End (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/11/11/front_end_back_end/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, a quick review of the expansion, <a href="http://www.boardgamegeek.com/boardgame/40849">On the Brink</a>, to the game <a href="http://www.boardgamegeek.com/boardgame/30549">Pandemic</a>. I reviewed Pandemic on the <a href="http://thecommandline.net/2009/03/25/code_style/">March 25th podcast</a>.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is evil.</p>
<p>The feature this week is a Hacking 101 segment on the terms front end and back end development. I mention the <a href="http://en.wikipedia.org/wiki/Model%E2%80%93view%E2%80%93controller">model-viewer-controller design pattern</a> and refer to my interview with <a href="http://thecommandline.net/2009/01/28/celeste_lyn_paul/">Celeste Lyn Paul</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 11 Nov 2009 21:31:03 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-11-11.m4a" length="17013754" type="audio/m4a"/>
<guid isPermaLink="false">tclp-20091111-hacking-101-front-end-back-end-</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, a quick review of the expansion, On the Brink, to the game Pandemic. I reviewed Pandemic on the March 25th podcast.
There is no listener feedback this week.
The hacker word of the week this week is evil.
The feature this week is a Hacking 101 segment on the terms front end and back end development. I mention the model-viewer-controller design pattern and refer to my interview with Celeste Lyn Paul.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>23:01</itunes:duration>
</item>
<item>
<title>TCLP 2009-11-08 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/11/08/news_196/</link>
<description><![CDATA[<p>This is news cast 196.</p>
<p>This week's security alerts are <a href="http://voices.washingtonpost.com/securityfix/2009/11/what_windows_autorun_hath_wrou.html?wprss=securityfix">the latest issues arising from Windows autorun</a> and <a href="http://news.electricalchemy.net/2009/10/cracking-passwords-in-cloud.html">using cloud computing to brute force crypto</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/tech-policy/news/2009/11/does-the-fcc-have-authority-to-enforce-net-neutrality-rules.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">more on the FCC's power to regulate the internet</a>, <a href="http://www.technologyreview.com/web/23836/">first general election to test</a> <a href="http://thecommandline.net/2006/11/12/david-chaums-secure-voting-system-punchscan/">some novel election crypto</a>, <a href="http://www.theglobeandmail.com/news/opinions/smarter-sleuthing-can-save-our-online-privacy/article1348687/">using better investigative techniques to help preserve online privacy</a>, and <a href="http://www.readwriteweb.com/archives/google_mozilla_sunlight_announce_nationwide_govern.php">a weekend hackathon for open government</a>.</p>
<p>Following up this week <a href="http://www.michaelgeist.ca/content/view/4510/125/">the latest info and analysis on ACTA</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 08 Nov 2009 19:21:16 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-11-08.m4a" length="27563632" type="audio/m4a"/>
<guid isPermaLink="false">tclp-20091108-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 196.</itunes:subtitle>
<itunes:summary>This is news cast 196.
This week's security alerts are the latest issues arising from Windows autorun and using cloud computing to brute force crypto.
In this week's news more on the FCC's power to regulate the internet, first general election to test some novel election crypto, using better investigative techniques to help preserve online privacy, and a weekend hackathon for open government.
Following up this week the latest info and analysis on ACTA.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>37:22</itunes:duration>
</item>
<item>
<title>TCLP 2009-11-04 Monologue: Social Identity (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/11/04/social_identity/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, a reminder that if you want to win one of three signed copies of <a href="http://jchutchins.net/">J.C. Hutchins' "7th Son: Descent"</a> you need to get your email in to 7thSonNovel@gmail.com by this Friday. Use the subject line "cmdln sent me", and in the body include both the phrase, "Kilroy 2.0 is everywhere", and your mailing address.</p>
<p>Also, I will be at <a href="http://philcon.org">Philcon</a>, just for the day on Saturday the 21st of November. I will be heading up to meet up with some friends and to interview Cory Doctorow about his just released novel, <a href="http://craphound.com/makers">"MAKERS"</a>. If anyone is interested in a meet up while I am there, send me a note at feedback@thecommandline.net.</p>
<p>Lastly, the intro includes a brief clarification and comment about the experimental opening music from the last show.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/Eric-Conspiracy.html">Eric Conspiracy</a>.</p>
<p>The feature this week is a monologue on social identity.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 04 Nov 2009 20:35:42 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-11-04.m4a" length="21244057" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20091104-monologue-social-identity-commen</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, a reminder that if you want to win one of three signed copies of J.C. Hutchins' "7th Son: Descent" you need to get your email in to 7thSonNovel@gmail.com by this Friday. Use the subject line "cmdln sent me", and in the body include both the phrase, "Kilroy 2.0 is everywhere", and your mailing address.
Also, I will be at Philcon, just for the day on Saturday the 21st of November. I will be heading up to meet up with some friends and to interview Cory Doctorow about his just released novel, "MAKERS". If anyone is interested in a meet up while I am there, send me a note at feedback@thecommandline.net.
Lastly, the intro includes a brief clarification and comment about the experimental opening music from the last show.
There is no listener feedback this week.
The hacker word of the week this week is Eric Conspiracy.
The feature this week is a monologue on social identity.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>28:47</itunes:duration>
</item>
<item>
<title>TCLP 2009-11-01 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/11/01/news_195/</link>
<description><![CDATA[<p>This is news cast 195.</p>
<p>In the intro, an experiment, playing some CC-licensed and interesting music instead of the usual theme music.</p>
<p>This week's security alerts are <a href="http://tech.slashdot.org/story/09/10/26/1314209/Arbitrary-Code-Execution-With-ldd?from=rss">executing attack code via the ldd utility</a> and <a href="http://voices.washingtonpost.com/securityfix/2009/10/former_anti-virus_researcher_t.html?wprss=securityfix">a former anti-virus research seemingly turning against the industry</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/open-source/news/2009/10/the-quest-for-a-truly-open-smartphone-can-it-be-done.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">in search of a truly open smart phone</a>, <a href="http://www.readwriteweb.com/archives/salmon_protocol_for_distributed_aggregated_content.php">an open protocol for aggregating comments</a>, <a href="http://www.wired.com/threatlevel/2009/10/sequoia/">industry releases its first open source voting system</a> <a href="http://www.freedom-to-tinker.com/blog/felten/sequoia-announces-voting-system-published-code">which includes all of the sources for recording and management</a>, and <a href="http://www.wired.com/gadgetlab/2009/10/tilera-100-cores/">a startup produces the first 100-core processor</a>.</p>
<p>Following up this week <a href="http://www.theregister.co.uk/2009/10/28/mandelson_three_strikes_file_sharing_clamp_down/">Mandelson is still pushing for three strikes in the UK</a> and <a href="http://techdirt.com/articles/20091027/0254326689.shtml">unlikely opponents, law enforcers</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 01 Nov 2009 19:25:21 -0500</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-11-01.m4a" length="27700145" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20091101-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 195.</itunes:subtitle>
<itunes:summary>This is news cast 195.
In the intro, an experiment, playing some CC-licensed and interesting music instead of the usual theme music.
This week's security alerts are executing attack code via the ldd utility and a former anti-virus research seemingly turning against the industry.
In this week's news in search of a truly open smart phone, an open protocol for aggregating comments, industry releases its first open source voting system which includes all of the sources for recording and management, and a startup produces the first 100-core processor.
Following up this week Mandelson is still pushing for three strikes in the UK and unlikely opponents, law enforcers.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>37:33</itunes:duration>
</item>
<item>
<title>TCLP 2009-10-28 Inner Chapter: Perfection and Compromise (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/10/28/perfection_compromise/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, two books that just launched that I want to recommend to you, <a href="http://jchutchins.net/">J.C. Hutchins' "7th Son: Descent"</a> is now in print and <a href="http://craphound.com/?p=2369">Cory Doctorow's "MAKERS"</a> was released today. Additionally, J.C. has offered to give away three signed copies of his book to listeners. Send a note to 7thSonNovel at gmail dot com with the subject line, "cmdln sent me", and the phrase, "Kilroy 2.0 is everywhere", and your mailing address in the body. J.C. will draw three lucky winners on November 6th so get your emails in now.</p>
<p>There is no listener feedback this week.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/epsilon-squared.html">epsilon squared</a>.</p>
<p>The feature this week is an Inner Chapter on the subject of perfection and compromise.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 28 Oct 2009 20:56:05 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-10-28.m4a" length="24114395" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20091028-inner-chapter-perfection-and-comp</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, two books that just launched that I want to recommend to you, J.C. Hutchins' "7th Son: Descent" is now in print and Cory Doctorow's "MAKERS" was released today. Additionally, J.C. has offered to give away three signed copies of his book to listeners. Send a note to 7thSonNovel at gmail dot com with the subject line, "cmdln sent me", and the phrase, "Kilroy 2.0 is everywhere", and your mailing address in the body. J.C. will draw three lucky winners on November 6th so get your emails in now.
There is no listener feedback this week.
The hacker word of the week this week is epsilon squared.
The feature this week is an Inner Chapter on the subject of perfection and compromise.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>32:41</itunes:duration>
</item>
<item>
<title>TCLP 2009-10-25 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/10/25/news_194/</link>
<description><![CDATA[<p>This is news cast 194.</p>
<p>In the intro, a quick reminder about tomorrow night's CopyNight here in DC.</p>
<p>This week's security alerts are <a href="http://www.schneier.com/blog/archives/2009/10/evil_maid_attac.html">the "evil maid" attack on encrypted disks</a> and <a href="http://theharmonyguy.com/2009/10/19/first-impressions-on-security-in-google-wave/">first impressions of security in Google Wave</a>.</p>
<p>In this week's news <a href="http://www.tor.com/index.php?option=com_content&amp;view=blog&amp;id=58083">considering the punk in steampunk</a> which echoes a <a href="http://thecommandline.net/2008/08/06/steam_punk/">rant of mine</a>, <a href="http://www.readwriteweb.com/archives/bookserver_a_plan_to_build_an_open_web_of_books.php">a plan for an open web of books</a>, <a href="http://arstechnica.com/tech-policy/news/2009/10/sequoia-evoting-code-reveals-possible-fec-rule-violations.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">leaked voting machine code reveals a vendor's blunders</a>, and <a href="http://www.wired.com/gadgetlab/2009/10/super-sized-memory-storage/">new research into massively dense info storage</a>.</p>
<p>Following up this week <a href="http://www.eff.org/deeplinks/2009/09/net-neutrality-fcc-perils-and-promise">raising concerns over jurisdiction and enforcement in the FCC's net neutrality plan</a> and <a href="http://www.wired.com/threatlevel/2009/10/conyers_bill/">a House bill was introduced to curtail the PATRIOT Act during its consideration for renewal</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 25 Oct 2009 19:21:52 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-10-25.m4a" length="27452839" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20091025-news</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 194.</itunes:subtitle>
<itunes:summary>This is news cast 194.
In the intro, a quick reminder about tomorrow night's CopyNight here in DC.
This week's security alerts are the "evil maid" attack on encrypted disks and first impressions of security in Google Wave.
In this week's news considering the punk in steampunk which echoes a rant of mine, a plan for an open web of books, leaked voting machine code reveals a vendor's blunders, and new research into massively dense info storage.
Following up this week raising concerns over jurisdiction and enforcement in the FCC's net neutrality plan and a House bill was introduced to curtail the PATRIOT Act during its consideration for renewal.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>37:13</itunes:duration>
</item>
<item>
<title>TCLP 2009-10-21 Interview: Randal Schwartz (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/10/21/randal_schwartz/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, letting you know that <a href="http://lifeafterlawschool.libsyn.com/index.php?post_id=540095">part one</a> of a two part interview with me is up at the <a href="http://lifeafterlawschool.libsyn.com/">Life after Law School</a> podcast.</p>
<p>There is no listener feedback this week.</p>
<p>Due to the length of the feature, there is no hacker word of the week this week.</p>
<p>The feature this week is an interview with <a href="http://www.stonehenge.com/merlyn/">Randal Schwartz</a>. I first met Randal through his talk on his experience being snared under one of the problematic computer fraud and abuse laws. We don't discuss that topic in the interview but if you are curious, he recommends <a href="http://www.securitycatalyst.com/security-catalyst-26-insider-interviews-randal-schwartz/">his appearance on the Security Catalyst podcast</a> and <a href="http://www.thefutureandyou.libsyn.com/index.php?post_id=329133">his interview with Stephen Euin Cobb on the Future and You</a>. Randal also mentions the <a href="http://squeakbyexample.org/">Squeak by Example</a> book in the interview which is available as a free electronic edition and a print-on-demand edition. You can also hear Randal on the excellent <a href="http://twit.tv/FLOSS">FLOSS Weekly</a> podcast which I also recommend for its consistently superb coverage of free software and open source projects of all varieties.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 21 Oct 2009 21:05:37 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-10-21.m4a" length="44904790" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20091021-interview-randal-schwartz-commen</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, letting you know that part one of a two part interview with me is up at the Life after Law School podcast.
There is no listener feedback this week.
Due to the length of the feature, there is no hacker word of the week this week.
The feature this week is an interview with Randal Schwartz. I first met Randal through his talk on his experience being snared under one of the problematic computer fraud and abuse laws. We don't discuss that topic in the interview but if you are curious, he recommends his appearance on the Security Catalyst podcast and his interview with Stephen Euin Cobb on the Future and You. Randal also mentions the Squeak by Example book in the interview which is available as a free electronic edition and a print-on-demand edition. You can also hear Randal on the excellent FLOSS Weekly podcast which I also recommend for its consistently superb coverage of free software and open source projects of all varieties.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>1:00:58</itunes:duration>
</item>
<item>
<title>TCLP 2009-10-18 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/10/18/news_193/</link>
<description><![CDATA[<p>This is news cast 193.</p>
<p>In the intro, my initial impressions of Google's Wave. You can find me there as cmdln dot net at googlewave dot com. I have also stared public Waves which you are welcome to join for the DC area CopyNight and for this podcast.</p>
<p>This week's security alerts are <a href="http://www.readwriteweb.com/archives/how_safe_are_facebook_applications.php">figuring out whether Facebook apps are safe</a> and <a href="http://blogs.zdnet.com/security/?p=4614">Microsoft's un-invited Firefox add-on has a vulnerability</a> though <a href="http://blog.mozilla.com/security/2009/10/16/net-framework-assistant-blocked-to-disarm-security-vulnerability/">Mozilla has acted to disable it for everyone</a>.</p>
<p>In this week's news <a href="http://www.tnr.com/article/books-and-arts/against-transparency?page=0,0">Professor Lessig's provocative piece on naked transparency</a> as inspired by <a href="http://en.wikipedia.org/wiki/Louis_Brandeis">Brandeis</a> and <a href="http://radar.oreilly.com/2009/10/larry-lessig-and-naked-transpa.html">some thoughtful</a> <a href="http://www.tnr.com/article/tnr-debate-too-much-transparency-part-i">responses</a>, <a href="http://www.antipope.org/charlie/blog-static/2009/10/why_i_hate_star_trek.html">why Charlies Stross doesn't like Star Trek</a>, <a href="http://science.slashdot.org/story/09/10/13/2022244/The-Ultimate-Limit-of-Moores-Law?from=rss">a fundamental limit on the speed of computation</a>, and <a href="http://radar.oreilly.com/2009/10/lawgov-americas-operating-syst.html">working on a recommendation and plan for an open repository of the text of US law</a>.</p>
<p>Following up this week <a href="http://arstechnica.com/tech-policy/news/2009/10/these-42-people-are-shaping-us-internet-enforcement-policy.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">42 people gain access under NDA to the ACTA drafts</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 18 Oct 2009 18:58:03 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-10-18.m4a" length="26787118" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20091018-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 193.</itunes:subtitle>
<itunes:summary>This is news cast 193.
In the intro, my initial impressions of Google's Wave. You can find me there as cmdln dot net at googlewave dot com. I have also stared public Waves which you are welcome to join for the DC area CopyNight and for this podcast.
This week's security alerts are figuring out whether Facebook apps are safe and Microsoft's un-invited Firefox add-on has a vulnerability though Mozilla has acted to disable it for everyone.
In this week's news Professor Lessig's provocative piece on naked transparency as inspired by Brandeis and some thoughtful responses, why Charlies Stross doesn't like Star Trek, a fundamental limit on the speed of computation, and working on a recommendation and plan for an open repository of the text of US law.
Following up this week 42 people gain access under NDA to the ACTA drafts.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>36:19</itunes:duration>
</item>
<item>
<title>TCLP 2009-10-14 Rant: My Love-Hate Relationship with CS (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/10/14/love_hate_cs/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, I mention two upcoming events you might like to check out. The first is <a href="http://oggcamp.org/">OggCamp</a> and the second is the <a href="http://www.cposc.org/">Central Pennsylvania Open Source Conference</a>.</p>
<p><a href="http://oggcamp.org/"><img class="alignnone" title="OggCamp" src="http://www.oggcamp.org/_media/oggcamp-badge-wide.png" alt="" width="275" height="60" /></a></p>
<p>Listener feedback this week is from <a href="http://identi.ca/notice/11842519">Kaity</a> and from Erwin.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/epsilon.html">epsilon</a> .</p>
<p>The feature this week is a rant trying to explain my odd, love-hate relationship with computer science.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 14 Oct 2009 20:19:30 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-10-14.m4a" length="23479271" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20091014-rant-my-lovehate-relationship-wi</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, I mention two upcoming events you might like to check out. The first is OggCamp and the second is the Central Pennsylvania Open Source Conference.
Listener feedback this week is from Kaity and from Erwin.
The hacker word of the week this week is epsilon .
The feature this week is a rant trying to explain my odd, love-hate relationship with computer science.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>31:49</itunes:duration>
</item>
<item>
<title>TCLP 2009-10-11 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/10/11/news_192/</link>
<description><![CDATA[<p>This is news cast 192.</p>
<p>In the intro, some information on a new conference, <a href="http://confoo.ca/en">ConFoo.ca</a>, being held in Montreal in March of next year. I will be adding this to my list for consideration as well as submitting for the CFP if I decide to go.</p>
<p>This week's security alerts are <a href="http://it.slashdot.org/story/09/10/05/1651209/Researchers-Hijack-Mebroot-Botnet-Study-Drive-By-Downloads?from=rss">researchers hijack a botnet to study drive-by attacks</a> and <a href="http://arstechnica.com/security/news/2009/10/botnet-hosting-subscribers-soon-to-get-warnings-from-comcast.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">Comcast to start sending warnings to customers whose PCs are snared in botnets</a>.</p>
<p>In this week's news <a href="http://www.freedom-to-tinker.com/blog/felten/introducing-fedthread-opening-federal-register">the first application to make use of the Federal Register's open data</a>, <a href="http://www.eff.org/press/archives/2009/10/05">EFF's 2009 Pioneer Award winners</a>, <a href="http://arstechnica.com/tech-policy/news/2009/10/autocad-resale-ruling-a-messy-win-for-first-sale-doctrine.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">key ruling on the first sale doctrine may be more messy than we'd like</a>, and <a href="http://www.eff.org/deeplinks/2009/10/obama-sides-republicans-patriot-act-renewal-bill-p">Patriot Act renewal passes committee</a> <a href="http://www.wired.com/threatlevel/2009/10/pariot-act-renewal/">almost entirely without reforms</a>.</p>
<p>Following up this week <a href="http://yro.slashdot.org/story/09/10/07/1221207/CBS-Interactive-Sued-For-Distributing-Green-Dam?from=rss">copyright suit over distributing Green Dam</a> and <a href="http://www.wired.com/threatlevel/2009/10/diebold-antitrust-2/">Senate panel to examine sale of Diebold's voting machine division</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 11 Oct 2009 19:07:00 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-10-11.m4a" length="25426651" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20091011-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 192.</itunes:subtitle>
<itunes:summary>This is news cast 192.
In the intro, some information on a new conference, ConFoo.ca, being held in Montreal in March of next year. I will be adding this to my list for consideration as well as submitting for the CFP if I decide to go.
This week's security alerts are researchers hijack a botnet to study drive-by attacks and Comcast to start sending warnings to customers whose PCs are snared in botnets.
In this week's news the first application to make use of the Federal Register's open data, EFF's 2009 Pioneer Award winners, key ruling on the first sale doctrine may be more messy than we'd like, and Patriot Act renewal passes committee almost entirely without reforms.
Following up this week copyright suit over distributing Green Dam and Senate panel to examine sale of Diebold's voting machine division.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:28</itunes:duration>
</item>
<item>
<title>TCLP 2009-10-07 Inner Chapter: Personal Advocacy (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/10/07/personal_advocacy/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, a request that you consider contributing to <a href="http://creativecommons.org/weblog/entry/18166">the Creative Commons 5th annual fundraising campaign</a>.</p>
<p>Listener feedback this week is from Eric who writes with <a href="http://server.ericsbinaryworld.com/blog/2009/07/19/missing-the-point-of-public-domain/">a question about a disclaimer on public domain photos</a>.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/epoch.html">epoch</a>.</p>
<p>The feature this week is an Inner Chapter on personal advocacy. This was inspired partly by <a href="http://thecommandline.net/2009/04/16/in-a-job-search-nothing-trumps-personal-advocacy/">a Coding Horror post and my reaction to it</a>. I relate it to both <a href="http://thecommandline.net/2009/01/14/effecting_change/">effecting change</a> and <a href="http://thecommandline.net/2009/08/12/thought_leadership/">thought leadership</a> which I've discussed previously.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 07 Oct 2009 20:18:07 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-10-07.m4a" length="19964485" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20091007-inner-chapter-personal-advocacy-</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, a request that you consider contributing to the Creative Commons 5th annual fundraising campaign.
Listener feedback this week is from Eric who writes with a question about a disclaimer on public domain photos.
The hacker word of the week this week is epoch.
The feature this week is an Inner Chapter on personal advocacy. This was inspired partly by a Coding Horror post and my reaction to it. I relate it to both effecting change and thought leadership which I've discussed previously.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>27:02</itunes:duration>
</item>
<item>
<title>TCLP 2009-09-30 Copyright Panel at D*C 2009 (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/09/30/dc_copyright_09/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, a correction from Randal on the correct pronunciation of "Kernighan". Also, Gail Martin interviewed me for her podcast, <a href="http://www.ghostinthemachinepodcast.com/">Ghost in the Machine</a>. We chatted about peer media, open content and media advocacy. You can <a href="http://ghostinthemachinepodcast.com/?p=98">download the interview</a> or <a href="http://gzmartin.audioacrobat.com/rss/gailzmartinpodcast.xml">subscribe to her feed</a>, she interviews many other fascinating, aspiring authors on her show.</p>
<p>I'm going to push off on listener feedback until next week. Also, no hacker word of the week for the same reason, the length of the feature.</p>
<p>The feature this week is the recording of the "Creative Commons and Legal Issues" panel from the podcasting track at <a href="http://dragoncon.org/">Dragon*Con 2009</a>, otherwise known simply as the copyright panel. I was joined by Thomas Vincent, Randy Chertkow of <a href="http://beatnikturtle.com/">Beatnik Turtle</a>, and Courtney Lytle Perry. This is the third time Randy and Courtney have joined me for this panel and it was a sheer pleasure. The audio is a little over driven, we were having speaker issues this year, but I think I managed to get things a bit under control.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 30 Sep 2009 19:14:52 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-09-30.m4a" length="47770329" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090930-copyright-panel-at-dc-2009-comme</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, a correction from Randal on the correct pronunciation of "Kernighan". Also, Gail Martin interviewed me for her podcast, Ghost in the Machine. We chatted about peer media, open content and media advocacy. You can download the interview or subscribe to her feed, she interviews many other fascinating, aspiring authors on her show.
I'm going to push off on listener feedback until next week. Also, no hacker word of the week for the same reason, the length of the feature.
The feature this week is the recording of the "Creative Commons and Legal Issues" panel from the podcasting track at Dragon*Con 2009, otherwise known simply as the copyright panel. I was joined by Thomas Vincent, Randy Chertkow of Beatnik Turtle, and Courtney Lytle Perry. This is the third time Randy and Courtney have joined me for this panel and it was a sheer pleasure. The audio is a little over driven, we were having speaker issues this year, but I think I managed to get things a bit under control.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>1:04:52</itunes:duration>
</item>
<item>
<title>TCLP 2009-09-27 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/09/27/news_191/</link>
<description><![CDATA[<p>This is news cast 191.</p>
<p>In the intro, a reminder that this month's <a href="http://copynight.org/">CopyNight</a> here in DC is tomorrow night, at 6:30PM at the Teaism in Penn Quarter. The discussion will at least include the Google Books settlement and the FCC rules on network neutrality and more besides no doubt.</p>
<p>This week's security alerts are <a href="http://www.boingboing.net/2009/09/23/aes-explained-by-sti.html">AES explained by stick figures</a> and <a href="http://blogs.zdnet.com/security/?p=4451">bounties on infected Macs</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/tech-policy/news/2009/09/fcc-chairman-wants-network-neutrality-wired-and-wireless.ars?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=rss">FCC chair calls for rules on network neutrality</a> including <a href="http://www.wired.com/epicenter/2009/09/net-neutrality-announcement/">early challenges and resistance</a> and <a href="http://lauren.vortex.com/archive/000614.html">a web site detailing the details as the rules will be implemented</a>, <a href="http://www.freedom-to-tinker.com/blog/paul/netflixs-impending-still-avoidable-multi-million-dollar-privacy-blunder">Netflix second release of anonymized data could be a privacy disaster</a>, <a href="http://radar.oreilly.com/2009/09/rebooting-the-book-one-apple-i.html">re-booting the book</a> which at least partly continues Clive Thomson's consideration of <a href="http://www.wired.com/techbiz/people/magazine/17-06/st_thompson">the future of reading</a>, and <a href="http://developers.slashdot.org/story/09/09/25/1257226/The-Duct-Tape-Programmer?from=rss">duct tape programmers</a>.</p>
<p>Following up this week <a href="http://bits.blogs.nytimes.com/2009/09/22/more-time-requested-in-google-book-scanning-case/">authors and other plaintiffs ask for a delay in the Google Books settlement</a> which <a href="http://www.wired.com/epicenter/2009/09/judge-nixes-google-book-hearings-as-copyright-negotiations-continue/">is granted</a> and <a href="http://www.theregister.co.uk/2009/09/23/senate_passes_hadopi2/">the French Senate passes an amended three strikes law</a> though <a href="http://www.edri.org/edri-gram/number7.14/3-strikes-second-senate">it still requires debate and passage by the National Assembly</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 27 Sep 2009 19:17:06 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-09-27.m4a" length="23847792" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090927-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 191.</itunes:subtitle>
<itunes:summary>This is news cast 191.
In the intro, a reminder that this month's CopyNight here in DC is tomorrow night, at 6:30PM at the Teaism in Penn Quarter. The discussion will at least include the Google Books settlement and the FCC rules on network neutrality and more besides no doubt.
This week's security alerts are AES explained by stick figures and bounties on infected Macs.
In this week's news FCC chair calls for rules on network neutrality including early challenges and resistance and a web site detailing the details as the rules will be implemented, Netflix second release of anonymized data could be a privacy disaster, re-booting the book which at least partly continues Clive Thomson's consideration of the future of reading, and duct tape programmers.
Following up this week authors and other plaintiffs ask for a delay in the Google Books settlement which is granted and the French Senate passes an amended three strikes law though it still requires debate and passage by the National Assembly.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>32:19</itunes:duration>
</item>
<item>
<title>TCLP 2009-09-23 Importance of Open Formats (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/09/23/open_formats/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, letting you know my <a href="http://www.podioracket.com/main/2009/09/22/episode-18-thomas-gideon-and-and-tim-dodge/">interview with the ladies of Podioracket</a> is now available. We discuss my recently released <a href="http://thecommandline.net/innerchapters/">podiobook</a>, a collection of the first set of Inner Chapters essays I produced for this very podcast. I also wanted to mention my last guest appearance before this one, in <a href="http://www.thesecretlair.com/main/2009/06/25/episode-0024-hard-sci-fi/">episode 24 of The Secret Lair</a> podcast (because I am embarrassed to admit I think I forgot to mention it at that time).</p>
<p>Listener feedback this week is a voice mail from Jed in response to my discussion of the Vanish project discussed in the <a href="http://thecommandline.net/2009/09/13/news_190/">September 13th news cast</a>.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/EOU.html">EOU</a>.</p>
<p>The feature this week is the recording I took of my talk on the importance of open formats at the local Software Freedom Day celebration.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a></p>
<p>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 23 Sep 2009 20:56:17 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-09-23.m4a" length="28621292" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090923-important-of-open-formats-comment</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, letting you know my interview with the ladies of Podioracket is now available. We discuss my recently released podiobook, a collection of the first set of Inner Chapters essays I produced for this very podcast. I also wanted to mention my last guest appearance before this one, in episode 24 of The Secret Lair podcast (because I am embarrassed to admit I think I forgot to mention it at that time).
Listener feedback this week is a voice mail from Jed in response to my discussion of the Vanish project discussed in the September 13th news cast.
The hacker word of the week this week is EOU.
The feature this week is the recording I took of my talk on the important of open formats at the local Software Freedom Day celebration.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>38:49</itunes:duration>
</item>
<item>
<title>TCLP 2009-09-16 Hacking 101: Golden Hammer Syndrome (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/09/16/golden_hammer/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro, a request that you consider making a sustaining donation to your favorite free software project or open content producer, whether or not that happens to be me. The thought was inspired by my finally adding a recurring donation button to my web site.</p>
<p>Also, a clarification in case there was any confusion. My talk for the local <a href="http://www.softwarefreedomday.org/">Software Freedom Day</a> is at 11:30, the event starts at 10:30 in the computer lab at the Miller Branch of the Howard County Library. The schedule of talks is now <a href="http://sfd.ubuntu-maryland.org/">available online</a>.</p>
<p>Listener feedback this week (catching up) comes from <a href="http://balticonpodcast.org/wordpress/">Paul Fischer</a> who writes in response to the August 23rd show, specifically to the stories about Menuet and cracking the SecurID token.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/ENQ.html">ENQ</a>.</p>
<p>The feature this week is a Hacking 101 on the subject of <a href="http://en.wikipedia.org/wiki/Golden_hammer">Golden Hammer Syndrome</a>, something all beginning hackers need to beware of.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 16 Sep 2009 20:51:10 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-09-16.m4a" length="22682721" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090916-hacking-101-golden-hammer-syndrom</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro, a request that you consider making a sustaining donation to your favorite free software project or open content producer, whether or not that happens to be me. The thought was inspired by my finally adding a recurring donation button to my web site.
Also, a clarification in case there was any confusion. My talk for the local Software Freedom Day is at 11:30, the event starts at 10:30 in the computer lab at the Miller Branch of the Howard County Library. The schedule of talks is now available online.
Listener feedback this week (catching up) comes from Paul Fischer who writes in response to the August 23rd show, specifically to the stories about Menuet and cracking the SecurID token.
The hacker word of the week this week is ENQ.
The feature this week is a Hacking 101 on the subject of Golden Hammer Syndrome, something all beginning hackers need to beware of.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>30:44</itunes:duration>
</item>
<item>
<title>TCLP 2009-09-13 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/09/13/news_190/</link>
<description><![CDATA[<p>This is news cast 190.</p>
<p>In the intro, a reminder I will be speaking at <a href="http://softwarefreedomday.org/teams/Ubuntumaryland">the Maryland Ubuntu Loco</a> for <a href="http://softwarefreedomday.org/">Software Freedom Day</a> on the 19th. That will be at the Miller Branch of the Howard County Library. You can visit that second link to find an event in your area or to register to host your own.</p>
<p>I also share a few thoughts on my experiences at this year's Dragon*Con including a round of thanks. First, thanks to my follow volunteers: <a href="http://skepticality.com/">Swoopy</a>, <a href="http://www.samchupp.com/">Sam Chupp</a>, <a href="http://coffeeandteashow.libsyn.com/">Laura Ross</a>, Andrew Wilson, Kreg Steppe and <a href="http://electronics.howstuffworks.com/techstuff-podcast.htm">Jonathan Strickland</a>. A special thanks to my room mates for the weekend, the hosts of <a href="http://chuckchat.com/technorama/">Technorama</a>, Chuck Tomasi and Kreg Steppe. There wasn't time to thank them in the intro but I also wanted to thank my friends Chooch and Viv (of the <a href="http://cohpodcast.com/">COH Podcast</a> and <a href="http://intotheblender.com/">Into the Blender</a>) who dragged me away from the podcast track to make sure I ate, saw the rest of the con and socialized (mostly with them and their own room mates, <a href="http://www.pgholyfield.com/">P.G. Holyfield</a> and <a href="http://www.theseanachai.com/">Patrick McLean</a>.)</p>
<p>I documented my experiences at the con extensively on the blog and may still try to sum up my experiences for this year, beyond just that journal of events.</p>
<p>This week's security alerts are <a href="http://it.slashdot.org/story/09/09/08/1345247/Windows-7-Reintroduces-Remote-BSoD?from=rss">Windows 7 restores a vintage remote BSoD</a> and <a href="http://www.theregister.co.uk/2009/09/12/linux_zombies_push_malware/">researchers discover the first Linux web server based botnet</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/tech-policy/news/2009/09/goodbye-drm-hello-stealable-digital-personal-property.ars">emulating scarce property in an attempt to improve on DRM</a>, <a href="http://www.thepublicdomain.org/2009/09/06/google-books-and-the-escape-from-the-black-hole/">Boyle's thoughts on the copyright black hole and the Google Books settlement</a>, <a href="http://www.technologyreview.com/biomedicine/23354/page1/">why motivation may matter to artificial intelligence</a> which reminds me of <a href="http://thecommandline.net/2009/04/25/love_sex_ai/">my own ruminations on love, sex and artificial intelligence</a>, and <a href="http://www.schneier.com/blog/archives/2009/09/file_deletion.html">reliable remote file deletion in the cloud</a>.</p>
<p>Following up this week just <a href="http://www.groklaw.net/article.php?story=20090909235419648">i4i's side of the story about its patent claims against Microsoft</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 13 Sep 2009 18:52:41 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-09-13.m4a" length="25036789" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090913-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 190.</itunes:subtitle>
<itunes:summary>This is news cast 190.
In the intro, a reminder I will be speaking at the Maryland Ubuntu Loco for Software Freedom Day on the 19th. That will be at the Miller Branch of the Howard County Library. You can visit that second link to find an event in your area or to register to host your own.
I also share a few thoughts on my experiences at this year's Dragon*Con including a round of thanks. First, thanks to my follow volunteers: Swoopy, Sam Chupp, Laura Ross, Andrew Wilson, Kreg Steppe and Jonathan Strickland. A special thanks to my room mates for the weekend, the hosts of Technorama, Chuck Tomasi and Kreg Steppe. There wasn't time to thank them in the intro but I also wanted to thank my friends Chooch and Viv (of the COH Podcast and Into the Blender) who dragged me away from the podcast track to make sure I ate, saw the rest of the con and socialized (mostly with them and their own room mates, P.G. Holyfield and Patrick McLean.)
I documented my experiences at the con extensively on the blog and may still try to sum up my experiences for this year, beyond just that journal of events.
This week's security alerts are Windows 7 restores a vintage remote BSoD and researchers discover the first Linux web server based botnet.
In this week's news emulating scarce property in an attempt to improve on DRM, Boyle's thoughts on the copyright black hole and the Google Books settlement, why motivation may matter to artificial intelligence which reminds me of my own ruminations on love, sex and artificial intelligence, and reliable remote file deletion in the cloud.
Following up this week just i4i's side of the story about its patent claims against Microsoft.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>33:56</itunes:duration>
</item>
<item>
<title>TCLP 2009-09-09 Interview: Beatnik Turtle (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/09/09/beatnik_turtle3/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>No hacker word of the week because of the length of the feature. Also, though I have some listener feedback, I am saving it until next Wednesday for the same reason.</p>
<p>The feature this week is an interview with <a href="http://beatnikturtle.com/">Beatnik Turtle</a>, actually just Randy Chertkow, one of the band's members. Although there is no just about Randy if you've listened to the past two (Two! It's a tradition now!) interviews with members of the band.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 09 Sep 2009 21:15:16 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-09-09.m4a" length="48118648" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090909-interview-beatnik-turtle-comment</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
No hacker word of the week because of the length of the feature. Also, though I have some listener feedback, I am saving it until next Wednesday for the same reason.
The feature this week is an interview with Beatnik Turtle, actually just Randy Chertkow, one of the band's members. Although there is no just about Randy if you've listened to the past two (Two! It's a tradition now!) interviews with members of the band.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>1:05:21</itunes:duration>
</item>
<item>
<title>TCLP 2009-08-30 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/08/30/news_189/</link>
<description><![CDATA[<p>This is news cast 189.</p>
<p>In the intro, the final reminder I will be at Dragon*Con over Labor Day weekend. No show on the 2nd or the 6th.</p>
<p>This week's security alerts are <a href="http://tech.slashdot.org/story/09/08/23/1458246/Facebook-App-Exposes-Abject-Insecurity?from=rss">an application the exposes how insecure the Facebook apps are</a> building on <a href="http://blog.aclu.org/2009/06/11/quiz-what-do-facebook-quizzes-know-about-you/">prio warnings from the ACLU</a> though <a href="http://bits.blogs.nytimes.com/2009/08/27/facebook-moves-to-improve-privacy-and-transparency/">Facebook has already promised to change its policies to address the issue</a> and <a href="http://arstechnica.com/tech-policy/news/2009/08/one-minute-wifi-crack-puts-further-pressure-on-wpa.ars">a so-called 60 second crack of WPA</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/open-source/news/2009/08/quickly-new-rails-like-rapid-development-tools-for-ubuntu.ars">a new rapid application development tool for Linux</a> building on <a href="http://arstechnica.com/open-source/news/2007/09/vala-high-level-programming-with-less-fat.ars">past</a> <a href="http://tech.slashdot.org/article.pl?sid=09%2F01%2F19%2F2350235&amp;from=rss">efforts</a> to make development more accessible, <a href="http://www.thepublicdomain.org/2009/08/26/what-intellectual-property-law-should-learn-from-software/">James Boyle considers what IP law should learn from software</a>, after <a href="http://tech.slashdot.org/article.pl?sid=08/11/19/1934231&amp;from=rss">last year's FCC ruling allowing them</a> <a href="http://arstechnica.com/tech-policy/news/2009/08/wifi-on-steroids-first-whitefi-devices-hit-testing-stage.ars">new technical specs for white space devices start to emerge</a>, and <a href="http://arstechnica.com/science/news/2009/08/maybe-antiferromagnetism-can-speed-up-your-hard-drive.ars">using anti-ferromagnetism to potentially speed disk writes</a>.</p>
<p>Following up this week <a href="http://techdirt.com/articles/20090824/1723375986.shtml">Nina Paley shares some positive economic data on sharing her work openl</a>y and <a href="http://www.readwriteweb.com/archives/mozilla_labs_launches_testswarm_crowdsourced_javascript_testing.php">Mozilla launches Test Swarm</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 30 Aug 2009 18:48:08 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-08-30.m4a" length="25812222" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090830-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 189.</itunes:subtitle>
<itunes:summary>This is news cast 189.
In the intro, the final reminder I will be at Dragon*Con over Labor Day weekend. No show on the 2nd or the 6th.
This week's security alerts are an application the exposes how insecure the Facebook apps are building on prio warnings from the ACLU though Facebook has already promised to change its policies to address the issue and a so-called 60 second crack of WPA.
In this week's news a new rapid application development tool for Linux building on past efforts to make development more accessible, James Boyle considers what IP law should learn from software, after last year's FCC ruling allowing them new technical specs for white space devices start to emerge, and using anti-ferromagnetism to potentially speed disk writes.
Following up this week Nina Paley shares some positive economic data on sharing her work openly and Mozilla launches Test Swarm.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>34:59</itunes:duration>
</item>
<item>
<title>TCLP 2009-08-26 Embracing Fair Use (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/08/26/embracing_fair_use/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro a quick review of the file, "<a href="http://sitasingstheblues.com/">Sita Sings the Blues</a>", by Nina Paley.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/enhancement.html">enhancement</a>.</p>
<p>The feature this week is a monologue on embracing fair use. Here's the promised links <a href="http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/chapter9/9-a.html">defining fair use</a> and <a href="http://www.publaw.com/fairusetrade.html">fair use for trademarks</a>. I mention <a href="http://openmediareview.com">Open Media Review</a> and <a href="http://www.prometheusradiotheatre.com/">The Arbiter Chronicles</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width:0;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Tue, 25 Aug 2009 20:31:02 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-08-26.m4a" length="19913764" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090826-embracing-fair-use</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro a quick review of the file, "Sita Sings the Blues", by Nina Paley.
The hacker word of the week this week is enhancement.
The feature this week is a monologue on embracing fair use. Here's the promised links defining fair use and fair use for trademarks. I mention Open Media Review and The Arbiter Chronicles.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>28:17</itunes:duration>
</item>
<item>
<title>TCLP 2009-08-23 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/08/23/news_188/</link>
<description><![CDATA[<p>This is news cast 188.</p>
<p>In the intro, I will be speaking at the <a href="http://softwarefreedomday.org/teams/Ubuntumaryland">Maryland gathering</a> for <a href="http://softwarefreedomday.org/">Software Freedom Day</a> on September 19th. More details after Dragon*Con.</p>
<p>This week's security alerts are <a href="http://www.technologyreview.com/blog/arxiv/23998/?a=f">new research to predict online attacks</a> and <a href="http://bits.blogs.nytimes.com/2009/08/20/how-hackers-snatch-real-time-security-id-numbers/">cracking real time ID generators</a>.</p>
<p>In this week's news <a href="http://www.eetimes.com/rss/showArticle.jhtml?articleID=219400197&amp;cid=RSSfeed_eetimes_newsRSS">new research into nanoscale lasers</a> using surface <a href="http://en.wikipedia.org/wiki/Plasmon">plasmons</a> to break the previous scale limits with <a href="http://arstechnica.com/science/news/2009/08/itty-bitty-lasers-hold-hope-for-scalable-optical-processing.ars">some more good technical detail in Ars' coverage</a>, <a href="http://www.nytimes.com/2009/08/16/weekinreview/16mcgrath.html?_r=1&amp;partner=rss&amp;emc=rss&amp;pagewanted=all">an excellent discussion of transformative works</a>, <a href="http://www.readwriteweb.com/archives/trim_to_go_open_source_community_owned.php">URL shortening service Tr.im cheats death by opening its source and its data</a>, and <a href="http://rss.slashdot.org/~r/slashdot/eqWf/~3/71xgJYKRCNE/Behind-Menuet-an-OS-Written-Entirely-In-Assembly">an operating system programmed in assembly</a>.</p>
<p>Following up this week <a href="http://rss.slashdot.org/~r/slashdot/eqWf/~3/4lJOR2TxiJU/i4i-Says-OpenOffice-Does-Not-Infringe-Like-MS-Word">i4i confirms OpenOffice doesn't violate its patent</a> and <a href="http://www.boingboing.net/2009/08/20/sita-sings-the-blues-3.html">Nina Paley shares the source files to her wonderful open content work</a> "<a href="http://www.sitasingstheblues.com/">Sita Sings the Blues</a>".</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 23 Aug 2009 18:22:54 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-08-23.m4a" length="21213216" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090823-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 188.</itunes:subtitle>
<itunes:summary>This is news cast 188.
In the intro, I will be speaking at the Maryland gathering for Software Freedom Day on September 19th. More details after Dragon*Con.
This week's security alerts are new research to predict online attacks and cracking real time ID generators.
In this week's news new research into nanoscale lasers using surface plasmons to break the previous scale limits with some more good technical detail in Ars' coverage, an excellent discussion of transformative works, URL shortening service Tr.im cheats death by opening its source and its data, and an operating system programmed in assembly.
Following up this week i4i confirms OpenOffice doesn't violate its patent and Nina Paley shares the source files to her wonderful open content work "Sita Sings the Blues".
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>29:59</itunes:duration>
</item>
<item>
<title>TCLP 2009-08-19 Rant: Owning Innovation (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/08/19/owning_innovation/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro a quick review of the movie, <a href="http://www.imdb.com/title/tt1136608/">District 9</a>.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/engine.html">engine</a>.</p>
<p>The feature this week is a rant on owning innovation. In it I mention <a href="http://arstechnica.com/tech-policy/news/2009/07/podcasting-patented-after-2003-application-approved-by-uspto.ars">VoloMedia claiming to have the patent on podcasting</a> including <a href="http://www.downloadablemedia.org/index.php/volomedia-elaborates-its-position-after-recent-podcast-patent-announcement">their own words on the matter</a>, <a href="http://www.thebookseller.com/news/92389-page.html">Iain Bank's publisher claiming first podcast novel</a>, <a href="http://twitter.com/christianaellis/status/3071538464">Christiana Ellis wins the preposterous claims contest that followed on Twitter</a>, the <a href="http://creativecommons.org">Creative Commons</a> and the <a href="http://fixideas.org">Free Idea eXchange</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width:0;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 19 Aug 2009 20:23:45 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-08-19.m4a" length="16669763" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090819-rant-owning-innovation-comment-l</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro a quick review of the movie, District 9.
The hacker word of the week this week is engine.
The feature this week is a rant on owning innovation. In it I mention VoloMedia claiming to have the patent on podcasting including their own words on the matter, Iain Bank's publisher claiming first podcast novel, Christiana Ellis wins the preposterous claims contest that followed on Twitter, the Creative Commons and the Free Idea eXchange.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>23:40</itunes:duration>
</item>
<item>
<title>TCLP 2009-08-16 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/08/16/news_187/</link>
<description><![CDATA[<p>This is news cast 187.</p>
<p>In the intro, a quick reminder I will be at <a href="http://dragoncon.org/">Dragon*Con</a> September 4 through 7. My schedule is already on my Google calendar and will be updated as I learn more.</p>
<p>This week's security alerts are <a href="http://www.schneier.com/blog/archives/2009/08/self-enforcing.html">self enforcing protocols</a> and <a href="http://feeds.wired.com/~r/wired27b/~3/Tcl0hDqevvA/">RSA threatens trademark infringment over a security disclosure</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/science/news/2009/08/researches-create-3-nm-wiring-with-supercritical-fluids.ars">super critical fluids may fuel future chip miniaturization</a>, <a href="http://www.wired.com/epicenter/2009/08/open-source-twitter-network-could-fend-off-the-next-twitpocalypse/">Twitter outages have folks considering the future of micro blogging</a>, <a href="http://www.eff.org/deeplinks/2009/08/judge-rules-against-realdvd">judge rules against Real in its DMCA suit</a> though <a href="http://www.wired.com/threatlevel/2009/08/judge-copying-dvds-is-illegal/">confusion remains on her remarks about fair use</a>, and <a href="http://news.cnet.com/8301-13505_3-10308909-16.html?part=rss&amp;tag=feed&amp;subj=TheOpenRoad">an XML patent ruling could have implications for open file formats</a>.</p>
<p>Following up this week <a href="http://rss.slashdot.org/~r/slashdot/eqWf/~3/9SCgV4_nifA/Voting-Machine-Attacks-Proven-To-Be-Practical">researchers demonstrate that attacks on voting systems are practical without any special knowledge</a> and <a href="http://www.patentlyo.com/patent/2009/08/briefs-in-bilski.html">the latest on the Supreme Court appeal of Bilski</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 16 Aug 2009 18:46:44 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-08-16.m4a" length="23280438" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090816-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 187.</itunes:subtitle>
<itunes:summary>This is news cast 187.
In the intro, a quick reminder I will be at Dragon*Con September 4 through 7. My schedule is already on my Google calendar and will be updated as I learn more.
This week's security alerts are self enforcing protocols and RSA threatens trademark infringment over a security disclosure.
In this week's news super critical fluids may fuel future chip miniaturization, Twitter outages have folks considering the future of micro blogging, judge rules against Real in its DMCA suit though confusion remains on her remarks about fair use, and an XML patent ruling could have implications for open file formats.
Following up this week researchers demonstrate that attacks on voting systems are practical without any special knowledge and the latest on the Supreme Court appeal of Bilski.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>32:54</itunes:duration>
</item>
<item>
<title>TCLP 2009-08-12 Inner Chapter: Thought Leadership (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/08/12/thought_leadership/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro a mention that I will be at <a href="http://dragoncon.org/">Dragon*Con</a> September 4-7. My speaking commitments are on my Google calendar, otherwise I will be volunteering. If anyone else is attending or in the area and wants to have a meet up, let me know.</p>
<p>Lots of listener feedback this week, so no hacker word of the week. Nido Media writes with a question about the phrase "reader's note" which I use occasionally in the hacker words of the week segments. Jed Reynolds and Jonas write in about my rant on software frameworks. Jonas recommends the <a href="http://herdingcode.com/">Herding Code</a> <a href="http://herdingcode.com/?p=206">Podcast #56</a>. Nah tass</p>
<p>The feature this week is an Inner Chapter on thought leadership.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width:0;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 12 Aug 2009 21:18:42 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-08-12.m4a" length="28975452" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090812-inner-chapter-thought-leadership</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro a mention that I will be at Dragon*Con September 4-7. My speaking commitments are on my Google calendar, otherwise I will be volunteering. If anyone else is attending or in the area and wants to have a meet up, let me know.
Lots of listener feedback this week, so no hacker word of the week. Nido Media writes with a question about the phrase "reader's note" which I use occasionally in the hacker words of the week segments. Jed Reynolds and Jonas write in about my rant on software frameworks. Jonas recommends the Herding Code Podcast #56. Nah tass
The feature this week is an Inner Chapter on thought leadership.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>41:19</itunes:duration>
</item>
<item>
<title>TCLP 2009-08-09 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/08/09/news_186/</link>
<description><![CDATA[<p>This is news cast 186.</p>
<p>In the intro, an update on the state of the podiobook project.</p>
<p>This week's security alerts are <a href="http://blogs.zdnet.com/security/?p=3851">a persistent attack through the firmware in new Mac keyboards</a> and <a href="http://voices.washingtonpost.com/securityfix/2009/08/researchers_xml_security_flaw.html?wprss=securityfix">many XML libraries share common critical flaws</a>.</p>
<p>In this week's news <a href="http://arstechnica.com/tech-policy/news/2009/08/how-paul-bunyan-brought-fiber-to-bemidji-mn.ars">small telcos and ISPs are making up the gap in fiber rollouts to rural areas</a>, <a href="http://techdirt.com/articles/20090731/0311565725.shtml">consumer friendly music services drop features to maintain uneasy alliance with big content</a>, <a href="http://news.cnet.com/8301-13505_3-10304724-16.html?part=rss&amp;tag=feed&amp;subj=TheOpenRoad">considering with Google's support of open source has patent defense implications</a> a theory that builds on <a href="http://books.google.com/books?id=nKUJKu6MtRQC&amp;dq=martin+fink+commoditize+business&amp;source=gbs_navlinks_s">previous suggestions along these lines</a>, and <a href="http://tech.slashdot.org/story/09/08/08/1231231/Microsoft-Finally-Joins-HTML-5-Standard-Efforts?from=rss">Microsoft finally joins the discussion of the HMTL5 standard</a> with some <a href="http://news.cnet.com/8301-1001_3-10305822-92.html?part=rss&amp;subj=news&amp;tag=2547-1_3-0-5">further details of what that means</a>.</p>
<p>Following up this week <a href="http://arstechnica.com/tech-policy/news/2009/08/the-war-over-network-neutrality.ars">a new network neutrality bill has been introduced</a> and <a href="http://www.eff.org/deeplinks/2009/08/kindle-lawsuit-protecting-readers-future-abuses">the EFF's analysis of potential outcomes for the Kindle class action suit</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 09 Aug 2009 19:21:25 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-08-09.m4a" length="22286613" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090809-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 186.</itunes:subtitle>
<itunes:summary>This is news cast 186.
In the intro, an update on the state of the podiobook project.
This week's security alerts are a persistent attack through the firmware in new Mac keyboards and many XML libraries share common critical flaws.
In this week's news small telcos and ISPs are making up the gap in fiber rollouts to rural areas, consumer friendly music services drop features to maintain uneasy alliance with big content, considering with Google's support of open source has patent defense implications a theory that builds on previous suggestions along these lines, and Microsoft finally joins the discussion of the HMTL5 standard with some further details of what that means.
Following up this week a new network neutrality bill has been introduced and the EFF's analysis of potential outcomes for the Kindle class action suit.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>31:24</itunes:duration>
</item>
<item>
<title>TCLP 2009-08-05 Rant: Software Frameworks (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/08/05/frameworks/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro just sharing the news that <a href="http://www.podiobooks.com/title/the-inner-chapters-volume-1/">my podiobook</a> has been released. You can visit <a href="http://thecommandline.net/innerchapters/">the new page for The Inner Chapters</a> for details on how you can help promote it.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/email.html">email</a>.</p>
<p>The feature this week is a rant on software frameworks.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width:0;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 05 Aug 2009 20:08:26 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-08-05.m4a" length="17786514" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090805-rant-software-frameworks-comment</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro just sharing the news that my podiobook has been released. You can visit the new page for The Inner Chapters for details on how you can help promote it.
The hacker word of the week this week is email.
The feature this week is a rant on software frameworks.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>25:19</itunes:duration>
</item>
<item>
<title>TCLP 2009-07-29 Inner Chapter: Tradition (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/07/29/tradition/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro a heads up that there will be no news cast this weekend. And a bit of a mini rant and news discussion of the announcement of the awarding of a patent for podcasting. Dave Winer's blog, not surprisingly, has <a href="http://scripting.com/stories/2009/07/29/didVolomediaInventPodcasti.html">the details</a> as well as a pretty strong claim that he has prior art.</p>
<p>Listener Feedback this week comes from Randal Schwartz who adds some good explanation to my coverage of the OSFA announcement for the last news cast. Randal also points out an organization with which he works, <a href="http://linuxfund.org/">LinuxFund</a>, is a member of OSFA and worth your consideration for causes to help.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/EMACS.html">EMACS</a>.</p>
<p>The feature this week is an Inner Chapter on tradition.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width:0;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 29 Jul 2009 21:19:04 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-07-29.m4a" length="21898283" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090729-inner-chapter-tradition</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro a heads up that there will be no news cast this weekend. And a bit of a mini rant and news discussion of the announcement of the awarding of a patent for podcasting. Dave Winer's blog, not surprisingly, has the details as well as a pretty strong claim that he has prior art.
Listener Feedback this week comes from Randal Schwartz who adds some good explanation to my coverage of the OSFA announcement for the last news cast. Randal also points out an organization with which he works, LinuxFund, is a member of OSFA and worth your consideration for causes to help.
The hacker word of the week this week is EMACS.
The feature this week is an Inner Chapter on tradition.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>30:58</itunes:duration>
</item>
<item>
<title>TCLP 2009-07-26 News (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/07/26/news_185/</link>
<description><![CDATA[<p>This is news cast 185.</p>
<p>In the intro, an update on the state of the podiobook project.</p>
<p>This week's security alerts are <a href="http://blog.mozilla.com/security/2009/07/19/milw0rm-9158-stack-overflow-crash-not-exploitable-cve-2009-2479/">Mozilla claims a new Firefox 3.5 flaw is not exploitable</a> and <a href="http://blogs.zdnet.com/security/?p=3773">a zero day PDF, Flash flaw is being exploited</a>.</p>
<p>In this week's news <a href="http://www.codinghorror.com/blog/archives/001288.html">commentin</a>g on <a href="http://www2.computer.org/cms/Computer.org/ComputingNow/homepage/2009/0709/rW_SO_Viewpoints.pdf">an article on the death of software engineering as a discipline</a> by one of its <a href="http://www.amazon.com/Peopleware-Productive-Projects-Teams-Second/dp/0932633439">earliest and staunchest advocates</a>, <a href="http://linux.com/news/enterprise/biz-enterprise/29699-open-source-for-america-promotes-foss-for-government">a new coalition to advocate for open source in the federal government</a>, <a href="http://news.cnet.com/8301-13505_3-10290686-16.html">Microsoft releases a driver under the GPL</a> <a href="http://www.theregister.co.uk/2009/07/23/microsoft_hyperv_gpl_violation/">possibly because they were already in violation of that license</a> though <a href="http://go.theregister.com/feed/www.theregister.co.uk/2009/07/24/ramji_defends_gpl_drop/">they claim otherwise</a>, and <a href="http://rss.slashdot.org/~r/slashdot/eqWf/~3/llD62fNzXoQ/The-Battle-Between-Purists-and-Pragmatists">Glyn Moody contemplates the productive tension between pragmatist and purists in open source</a>.</p>
<p>Following up this week <a href="http://feedproxy.google.com/~r/boingboing/iBag/~3/T3vTK3DNFZQ/jeff-bezoss-kindle-a.html">Bezos personally apologizes for the remote Kindle deletions</a> and <a href="http://www.theglobeandmail.com/news/technology/pirate-bay-suitor-backpedals-in-court/article1225945/">GGF is back pedalling on its acquisition of The Pirate Bay</a>.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Sun, 26 Jul 2009 20:22:07 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-07-26.m4a" length="21651033" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090726-news-comment-line-2409492638</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is news cast 185.</itunes:subtitle>
<itunes:summary>This is news cast 185.
In the intro, an update on the state of the podiobook project.
This week's security alerts are Mozilla claims a new Firefox 3.5 flaw is not exploitable and a zero day PDF, Flash flaw is being exploited.
In this week's news commenting on an article on the death of software engineering as a discipline by one of its earliest and staunchest advocates, a new coalition to advocate for open source in the federal government, Microsoft releases a driver under the GPL possibly because they were already in violation of that license though they claim otherwise, and Glyn Moody contemplates the productive tension between pragmatist and purists in open source.
Following up this week Bezos personally apologizes for the remote Kindle deletions and GGF is back pedalling on its acquisition of The Pirate Bay.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>30:35</itunes:duration>
</item>
<item>
<title>TCLP 2009-07-22 Hacking 101: How to Contribute to Open Source (Comment Line 240-949-2638)</title>
<link>http://thecommandline.net/2009/07/22/contribute_to_open_source/</link>
<description><![CDATA[<p>This is a feature cast.</p>
<p>In the intro a heads up that I will be at <a href="http://copynight.org/">CopyNight</a> here in DC on Monday the 27th. We're being hosted by the ALA this time, please <a href="http://www.eventbrite.com/event/391015538">RSVP</a> as they will be providing refreshments and will need a head count.</p>
<p>The hacker word of the week this week is <a href="http://catb.org/jargon/html/E/ELIZA-effect.html">ELIZA effect</a></p>
<p>The feature this week is a Hacking 101 providing some advice and ideas for how to contribute to your first open source project.</p>
<p>More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.</p>
<p><a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/"><img style="border-width:0;" src="http://thecommandline.net/wp-content/uploads/2008/06/cc-by-nc-sa.png" alt="Creative Commons License" /></a>
<br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc-sa/3.0/us/">Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License</a>.</p>]]></description>
<pubDate>Wed, 22 Jul 2009 20:06:09 -0400</pubDate>
<enclosure url="http://media.libsyn.com/media/cmdln/cmdln.net_2009-07-22.m4a" length="14181940" type="audio/mp4"/>
<guid isPermaLink="false">tclp-20090715-hacking-101-how-to-contribute-to</guid>
<itunes:author>cmdln@thecommandline.net</itunes:author>
<itunes:subtitle>This is a feature cast.</itunes:subtitle>
<itunes:summary>This is a feature cast.
In the intro a heads up that I will be at CopyNight here in DC on Monday the 27th. We're being hosted by the ALA this time, please RSVP as they will be providing refreshments and will need a head count.
The hacker word of the week this week is ELIZA effect
The feature this week is a Hacking 101 providing some advice and ideas for how to contribute to your first open source project.
More news and commentary, the alternate feed, and downloadable show notes available at http://thecommandline.net/.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.</itunes:summary>
<itunes:explicit>no</itunes:explicit>
<itunes:duration>20:03</itunes:duration>
</item>
</channel>
</rss>