What is JacketFlap

  • JacketFlap connects you to the work of more than 200,000 authors, illustrators, publishers and other creators of books for Children and Young Adults. The site is updated daily with information about every book, author, illustrator, and publisher in the children's / young adult book industry. Members include published authors and illustrators, librarians, agents, editors, publicists, booksellers, publishers and fans.
    Join now (it's free).

Sort Blog Posts

Sort Posts by:

  • in
    from   

Suggest a Blog

Enter a Blog's Feed URL below and click Submit:

Most Commented Posts

In the past 7 days

Recent Comments

Recently Viewed

JacketFlap Sponsors

Spread the word about books.
Put this Widget on your blog!
  • Powered by JacketFlap.com

Are you a book Publisher?
Learn about Widgets now!

Advertise on JacketFlap

MyJacketFlap Blogs

  • Login or Register for free to create your own customized page of blog posts from your favorite blogs. You can also add blogs by clicking the "Add to MyJacketFlap" links next to the blog name in each post.

Blog Posts by Tag

In the past 7 days

Blog Posts by Date

Click days in this calendar to see posts by day or month
new posts in all blogs
Viewing: Blog Posts Tagged with: isp, Most Recent at Top [Help]
Results 1 - 3 of 3
1. Israel and the offensive military use of cyber-space

When discussions arise about the utility of cyber-attacks in supporting conventional military operations, the conversation often moves quickly to the use of cyber-attacks during Russia’s invasion of Georgia in 2008, the US decision not to use cyber-attacks in the 2003 invasion of Iraq, or Russia’s behavior in cyber-space surrounding the conflict with Ukraine that began in 2014. These, however, may not really be the most useful cases to examine.

The post Israel and the offensive military use of cyber-space appeared first on OUPblog.

0 Comments on Israel and the offensive military use of cyber-space as of 9/5/2016 6:20:00 AM
Add a Comment
2. A Call to Tech Support

The wifi in my eldest daughter’s laptop died recently. Being the home’s Chief Technology Officer, I worked through the handy troubleshoot on the system which told me it was working perfectly. Of course, the inability to connect to the internet and the distraught look on my poor daughter’s face told me it wasn’t. No worries, I bought a USB dongle and she was up and running.

Little did I know that my trouble-shooting skills would soon be needed again. A week ago, she informed me that her dongle wasn’t working. Of course, at 11:15, my system was shut down, so I didn’t pay much attention and went to bed. When I awoke, I realized it wasn’t her computer – there was a wholesale internet outage in the house!

I think that is mentioned in Revelation, isn’t it? The Mark of the Beast and the inability to access High-Speed Wireless is in chapter 13, if I remember correctly. I looked outside and it didn’t appear the Battle of Armageddon had begun yet. A check of the beds told me the wife and kids were still here, so the rapture hadn’t left me behind (Whew!)

But I still had no internet.

This has happened before and I fixed it. What did I do? Oh yeah, I unplugged it and it rebooted itself. So I pulled the plug and let it regenerate. Unfortunately, the light blinking was still red long after power was restored. So I called my ever-helpful internet service provider and got stuck in the web of automated attendants who sound helpful, but are very patronizing. Don’t they know I am the CTO? That should give me some status, I would think.

My biggest problem wasn’t the self-righteous know-it-all computer voice on the other end of the phone, it was the fact that my cell phone service is spotty in the basement where the router resides. So I put the phone on speaker and listened as best I could. Like a rat pushing through a maze, I found the tech support cheese after seventeen minutes and the new, smarter sounding Tech Support Weenie voice tells me we are going to have to restart the system.

TSW: I will now tell you how to restart your system. This is a medium level procedure and will take approximately 3-5 minutes.

Okay

TSW: Can you see your internet router?

Yes

TSW: Please find the power cable on the back of the router and say yes when you’ve found it.

Got it

TSW: I didn’t understand you.

Er…  Yes

TSW: Trace the cable to the electric outlet. Unplug the cable and wait 10 seconds before plugging it back in.

Well, that’s what I did before, but okay

TSW: Did this solve your problem?

NO!

At that point, my spotty cell service affected my ability to clearly hear the next steps in the process. What I am pretty sure it said was for me to disconnect all cables, kick the box across the room, plug it back in and see if any lights were blinking. Repeat until no lights function.

Done!

After I hung up, I went to work early and left this note on the floor:

936051_10152553265964675_8432536674832206132_n

 

The good news, there is free wifi at the hotel, but I really wish they would call.


Filed under: It Made Me Laugh

6 Comments on A Call to Tech Support, last added: 8/5/2014
Display Comments Add a Comment
3. Avast, ye file sharers! Is Internet piracy dead?

By Darren Meale


The fact that the Internet is so hard to police — and that no single authority is in a position to dictate what it should and should not contain — should be cause for celebration for anyone with an interest in the freedom of speech, expression, and the sharing of ideas. But the Internet has two faces. For every positive exercise of those and other freedoms, there’s an act of fraud, counterfeiting, and copyright infringement. How is the law — in particular the English legal system — attempting to stem the tide of the last problem (online infringement) and take pirates down?

Attacks are being made on two main fronts in the UK. The first is via section 97A of the Copyright, Designs and Patents Act 1988. This permits a court to order a service provider — which could be an ISP, a search engine, or a social networking website — to block its users from accessing infringing material. To take ISPs as an example: when there are perhaps millions of infringing users in the UK using the internet access services of only six major ISPs, it’s going to be much easier to pursue those intermediaries than it is the individuals.

Although section 97A has been around since 2003, the first real attempt to use it wasn’t until 2011. The film industry brought a test case against the UK’s largest ISP, BT, seeking a court-ordered block of an infringing service called NewzBin2. BT heavily resisted the attempt, but every ground it raised was dismissed by the High Court and a block was ordered. This year it was the turn of the music industry, which sought blocks from BT and the remaining five major UK ISPs against the celebrity poster-boy of internet piracy: The Pirate Bay (TPB). With none of the ISPs willing to defend such an obviously dubious service, the High Court easily found TPB to be infringing copyright in February of this year. With little to distinguish TPB from NewzBin2, the ISPs then largely gave up the fight and dropped any opposition to a block. This was then ordered in May.

While section 97A has been making waves since its first appearance last year, the second front has been bobbing along in calm waters. Key provisions of the Digital Economy Act 2010 impose obligations upon ISPs to notify their subscribers, once those ISPs have been informed by copyright owners that those subscribers are suspected of infringing copyright, mostly likely via peer-to-peer file sharing (via sites such as TPB). Repeat offenders are put on what is effectively a “naughty list” and copyright owners can use those lists to pick juicy targets for taking further action. Two major ISPs tried to knock the Act out by launching judicial review proceedings, complaining that it offended European and human rights laws. They failed overall, but their actions have delayed the introduction of the Act’s notification regime. A final draft of the Initial Obligations Code (the Code), which sets out the details of the regime’s operation, has now been prepared by Ofcom (the UK’s communications regulator) and was put out for a consultation which ended in July. But there is a lot of work to be done before the regime begins. For example, an independent appeals body is to be created to deal with subscribers who wish to appeal an allegation of infringement. Accordingly, the Government does not expect the first notification letter to be sent until 2014. In the immediate term the Code will not provide for any real sanctions against subscribers beyond receipt of the letter, and accordingly can be criticised as lacking teeth.

While introducing the Digital Economy Act is probably better than doing nothing, the Newzbin2 and TPB cases suggest that section 97A is the far more effective weapon against piracy. Service providers may now be more motivated to assist copyright owners to police their services, if the alternative is to face the cost and bother of a section 97A application that the odds are they’ll lose. There is no direct connection, but in response to industry pressure Google (which may be the next target for a section 97A application) has recently agreed to demote websites from its search results where it has repeatedly received reports of those sites hosting infringing material. It’s a start, but it won’t remove them from its listings altogether.

The UK can’t, of course, solve this problem alone. A number of jurisdictions now have bespoke anti-file-sharing laws in place. These include France (HADOPI); Spain (Ley Sinde); South Korea and New Zealand. Others are in development. As well as being legally challenging, these sorts of measures are also proving politically controversial. Proposed legislation in the USA — SOPA (Stop Online Piracy Act) and PIPA (PROTECT IP Act) — met with huge public opposition earlier this year and are being reconsidered, but may still come to pass in some form. Before leaving power, President Sarkozy of France hailed HADOPI as hugely successful. The new government in France is reported to be less enthusiastic about the law and its multi-million Euro yearly cost.

It’s worth finishing with a note on circumvention. Very few, if any, of the measures discussed above are foolproof. Many (website blocks for example) are fairly straightforward to get around. Although a large proportion of casually infringing Internet users may not know how, a Google search for “How do I get around The Pirate Bay block?” reveals plenty of results, including several videos on Google’s own YouTube. Ironically, when I clicked on the first video in the list, I was presented with an advert for one of 20th Century Fox’s soon to be released (and no doubt, pirated) movies. Evidently, there’s still a lot of work to be done.

Darren Meale is a Senior Associate and Solicitor-Advocate at SNR Denton, specialising in intellectual property litigation and advice. He has particular expertise and interest in digital rights issues, including the way in which the Internet and new digital technologies interact with and potentially infringe intellectual property rights. His recent paper, ‘Avast, ye file sharers! The Pirate Bay is sunk’, has been made freely available for a limited time by the Journal of Intellectual Property Law and Practice.

JIPLP is a peer-reviewed monthly journal. It is specifically designed for IP lawyers, patent attorneys and trade mark attorneys both in private practice and working in industry. It is also an essential source of reference for academics specialising in IP, members of the judiciary, officials in IP registries and regulatory bodies, and institutional libraries. Subject-matter covered is of global interest, with a particular focus upon IP law and practice in Europe and the US.

Subscribe to the OUPblog via email or RSS.
Subscribe to only law and politics articles on the OUPblog via email or RSS.

Image credit: Pirate button on computer keyboard. Photo by Sitade, iStockphoto.

0 Comments on Avast, ye file sharers! Is Internet piracy dead? as of 9/5/2012 4:17:00 AM
Add a Comment