Saturday, April 28, 2007
In other words, Microsoft seems to have made the decision that it's better to have insecure versions of its operating system floating around the Internet, acting as potential infection points for spam zombies, than to make the patches available. They also appear to have decided it's acceptable to risk crippling their customers' machines if Genuine Advantage screws up.
Normally, I favor OpenOffice. Version 2.2 is pretty good stuff. But sometimes you need to send a Word file to someone--PDF won't cut it--and you need to know exactly what it'll look like when that person opens it. So for this job I'm tied into Word. And there's certain Windows-only software I need to run, so I'm tied to Windows. So, unfortunately, I guess Microsoft's decided correctly.
At least for now.
 Word just crashed on me. Why should I have any confidence Genuine Advantage will be more reliable?
Wednesday, April 25, 2007
Thursday, April 19, 2007
Well, I want to rename “green.” I want to rename it geostrategic, geoeconomic, capitalistic and patriotic. I want to do that because I think that living, working, designing, manufacturing and projecting America in a green way can be the basis of a new unifying political movement for the 21st century. A redefined, broader and more muscular green ideology is not meant to trump the traditional Republican and Democratic agendas but rather to bridge them when it comes to addressing the three major issues facing every American today: jobs, temperature and terrorism.And so on. It's a long article but definitely worth a read.
. . .
The notion that conserving energy is a geostrategic imperative has also moved into the Pentagon, for slightly different reasons. Generals are realizing that the more energy they save in the heat of battle, the more power they can project. The Pentagon has been looking to improve its energy efficiency for several years now to save money. But the Iraq war has given birth to a new movement in the U.S. military: the “Green Hawks.”
. . .
The only way we are going to get innovations that drive energy costs down to the China price — innovations in energy-saving appliances, lights and building materials and in non-CO2-emitting power plants and fuels — is by mobilizing free-market capitalism. The only thing as powerful as Mother Nature is Father Greed.
Monday, April 16, 2007
I would like to propose a new addition to the Bluebook's list of citation signals. As you know, see is among the most popular support signals, indicating helpful cases, law review articles, and other sources of information which support the author's point with only a small logical step required. But see also plays an important role showing sources that disagree with the author's point and thereby promoting healthy and vigorous debate. In addition, these signals serve the valuable secondary role of allowing authors to demonstrate they are widely read and erudite, easily able to rattle off a string of supporting and disagreeing authority.
I propose the addition of a new signal: don't see. Don't see would introduce authority that disagrees with the author's contention, and that the author has read and considers so poorly reasoned that the author advises the reader to avoid it. Obviously, use of an explanatory parenthetical would be strongly recommended.
Consider the benefits of don't see. It serves the purpose of making authors appear erudite because it allows them to show they have read every source, even the junky ones. More importantly, what could foster the give-and-take of vigorous academic debate and a full airing of the issues better than citing an author's work with a don't see signal? In fact, don't see would promote a veritable democracy of ideas: currently, an author must discriminate against those sources the author considers poorly reasoned by omitting them because the required order of authorities leaves no room for the author to tell the reader which of the listed sources the author considers helpful. This new signal would allow the author to list sources the author regards as poorly reasoned or unhelpful, allowing the reader could make up her own mind about them.
I hope you will give serious consideration to including don't see in the next edition of the Bluebook.
I think we need a verb form of recondite. It comes from the Latin verb recondere, which suggests the English verb form "to recond," as in to make obscure except to the Mensa and academic audiences. It'd imply intent, so you could complain about someone who likes to recond his papers.
Sunday, April 15, 2007
I want to do it this weekend (no preposition before “this weekend”)
You have time for yourself over a weekend. (“over” before “a weekend”)
You work in the weekends of April. (“in” before “the weekends”)
How confusing …. Would anyone here be able to explain which prepositions -- no-preposition, over, or in -- that I need to use with what types of conditions associated with “weekend”?
I spent lots of time to do my SAS programming work in the weekends of March and April. The place that I work has a programmer-shortage, we have had so many tasks to complete, and I program SAS to some extent. Thus, I ended up taking a programming task though I have never been trained as a programmer. The task turned out to be more complicated and time-consuming than I thought. In addition, I had my own priority tasks to complete at the same time. Well, I ended up spending several weekends to do this programming work. An advantage to work on the programming task over the weekend is that I was able to pick the False Data’s brain. Thank you! You are a wonderful programmer and helper and soon-to-be a legal expert! The task was mostly done last night after the midnight.
So, what am I doing on Sunday? I cannot come up anything that I feel like to do though I know there are many things that I have to do. Therefore, here I am, just blogging … how productive I am …
Saturday, April 14, 2007
Sources close to the students say the impromptu protest began the night before 1L Ames briefs were due. 1L Jim Johnson was attempting to figure out the proper citation in Massachusetts state court for a government report co-authored by three different agencies and posted on the Internet as an MS Word document.The Bluebook's citation system is irregular, occasionally contradictory, and a general mess. It should take no more than 15 pages to express a flexible, uniform citation system. Time for an overhaul, I say.
When not a single one of his Hastings floor mates proved able to assist him, Johnson walked the short distance to Gannett House where he began throwing stones at the windows and shouting "Come out, you [expletive], and Bluebook this [expletive] [expletive]."
Friday, April 13, 2007
Why's that interesting? Well, the CAN-SPAM act, which, unfortunately, seems to be about the best we've got to work with, normally limits enforcement to the FTC or the state attorneys general. However, § 7(g) lets an ISP sue a spammer in federal court:
- (1) ACTION AUTHORIZED- A provider of Internet access service adversely affected by a violation of section 5(a)(1), 5(b), or 5(d), or a pattern or practice that violates paragraph (2), (3), (4), or (5) of section 5(a), may bring a civil action in any district court of the United States with jurisdiction over the defendant--
- (A) to enjoin further violation by the defendant; or
- (B) to recover damages in an amount equal to the greater of--
- (i) actual monetary loss incurred by the provider of Internet access service as a result of such violation; or
- (ii) the amount determined under paragraph (3).
Now, the FTC and attorneys general have bigger fish to fry than going after spammers, but ISPs feel this pain every day. It might not be worth their while to stamp out a bunch of little individual spammers around the Internet, but if it's only four or five big operations, that prospect starts looking a lot more interesting.
- §§ 949a(1)(A) and 948d(c) of the act say one way to be an Unlawful Enemy Combatant is for a Combatant Status Review Tribunal or other competent tribunal under the President's authority to determine that you're one. The sections do not limit their scope to alien unlawful enemy combatants.
- §§ 948c and 948d(a) limit the jurisdiction of a military commission to alien unlawful enemy combatants.
- § 948a has separate definitions for "unlawful enemy combatant" and "alien," suggesting they're separable concepts.
- I could not find anything in the act that specifies whether or not the jurisdiction of a Combatant Status Review Tribunal, as opposed to a military commission, extends to non-aliens.
The act says they decide whether you're an "unlawful enemy combatant," not whether you're an "alien unlawful enemy combatant," but the military commissions only have jurisdiction over alien unlawful enemy combatants. So we have this odd situation where a Combatant Status Review Tribunal can find you're an unlawful enemy combatant, but if you're a citizen you're still outside the jurisdiction of the military commissions. Why?
Now the kicker. In Hamdi v. Rumsfeld, the Supreme Court's plurality said the executive branch can hold a citizen indefinitely only if the citizen has a chance to rebut the charge of being an "enemy combatant" before a neutral decisionmaker. So my question to the Representative is whether Congress, in the Military Commissions Act, handed the executive that neutral decisionmaker in the form of the Combatant Status Review Tribunal.
It'll be interesting to see how she responds.
Thursday, April 12, 2007
In the meantime, I came across a recipe to make your own pink and blue soap bubbles using pH indicators. You can also find bubbles that glow gold under black light. And a bubble machine to go with. There are even machines that'll blow smoke-filled bubbles.
But nothing yet that's brightly colored.
Follow-up: there's even a wind-powered bubble machine along with directions to make your own.
Tuesday, April 10, 2007
None of these papers gets into heavy economics. If you're seeking quantitative models, confidence intervals, and empirical data, you won't find it among these articles, though you might find it in their citations. The lack of empirical data sometimes causes problems for the articles, such as when the author tries to compare the magnitude of two separate effects.
- Tim Wu, The Broadband Debate, A User's Guide, 3 Journal on Telecommunications & High Technology Law 69 (2004), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=557330. This paper is a good starting point. It does a reasonable job of laying out the various positions and identifying the main points of contention.
- Christopher S. Yoo, Beyond Net Neutrality, 19 Harvard Journal of Law & Technology 1 (2005). A good second article. Lays out many of the economic objections to net neutrality.
- Christopher S. Yoo, Would Mandating Broadband Network Neutrality Help or Hurt Competition, 3 Journal on Telecommunications & High Technology Law 23 (2004), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=495502. Yoo's later Beyond Net Neutrality restates and expands most of the arguments in this paper--including paraphrasing the opening sentences--so I would suggest reading it, instead. But I couldn't find a copy of Beyond Net Neutrality on the Internet. So if you can't get to a law library to pick up an actual, paper copy of a journal, you can get many of the arguments here.
- Rob Frieden, Network Neutrality or Bias?--Handicapping the Odds for a Tiered and Branded Internet, 29 Hastings Communications and Entertainment Law Journal 171 (2007), draft available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=893649. Does a good job of discussing peering and transit agreements and the billing concerns behind them.
- Barbara van Schewick, Torwards and Economic Framework for Network Neutrality Regulation, 5 Journal on Telecommunications & High Technonology Law 329 (2007), available at http://ssrn.com/abstract=812991. Contains an interesting discussion of effects a network provider with market power can have on complimentary markets and the associated incentives.
- Christopher S. Yoo, Network Neutrality and the Economics of Congestion, 94 Georgetown Law Journal 1847 (2006). I would have liked deeper analysis. The article's thesis relies heavily on the economic effects of congestion, but it provides very little evidence that congestion in the network (as opposed to throttling at the endpoints) occurs often enough to be significant. I lost patience about the time the author began claiming that content delivery systems (i.e. akamizing) constitute putting functionality into the core of the network. I think you can safely skip this one unless you're seriously into congestive effects and economics.
- Adam Thierer, Are "Dumb Pipe" Mandates Smart Public Policy? Vertical Integration, Net Neutrality, and the Network Layers Model, 3 Journal on Telecommunications & High Technology Law 275 (2005). Strong on advocacy, short on economic analysis. The author is both Senior Fellow and Director of the Center for Media Freedom at the Progress & Freedom Foundation, which bills itself as a think tank. If it's economics you seek, this is probably not the article for you.
Monday, April 09, 2007
Saturday, April 07, 2007
sshd:I couldn't find a host name for either address, so I'm guessing they're probably some infected Windows machines hanging out on a DSL or cable modem connection.
unknown (188.8.131.52): 1522 Time(s)
root (184.108.40.206): 426 Time(s)
unknown (220.127.116.11): 32 Time(s)
root (18.104.22.168): 8 Time(s)
lp (22.214.171.124): 2 Time(s)
cyrus (126.96.36.199): 1 Time(s)
postfix (188.8.131.52): 1 Time(s)
smmsp (184.108.40.206): 1 Time(s)
uucp (220.127.116.11): 1 Time(s)
Unknown Account: 1554 Time(s)
I just checked our server's logs and, lo and behold, we have another contestant trying to break in right now. 18.104.22.168. The Real-Time IP Locator puts them somewhere in China. Out of mild curiosity, I ran a quick scan. It's a Linux machine. They have open ports 22 (ssh), 80 (web), and 3306 (MySQL). Since they were kind enough to put up a web server, you can see our attacker's web page by clicking here. (English semi-translation, courtesy of Google, here.)
I've been calling them our attacker, but in fairness it's not the people who own the machine--they were just clueless enough to put the machine on the Internet without properly securing it. Someone else scanned it, found it vulnerable, took it over, and turned it around to start scanning and attacking other machines. Anyone who speaks some variant of Chinese and has an international calling plan is more than welcome to phone them up--their number's on their web page--and tell them their machine's been cracked and is creating a nuisance.
Friday, April 06, 2007
- A paramedic and fire truck pull up in front of the neighbors late at night. No evidence of smoke. After a while, they leave.
- There's a high-speed chase down the street, complete with squealing tires as the pursue-ee makes a hard right turn three houses down, closely followed by at least one pursuing cop car and a helicopter.
- Three cops show up at the neighbor's place (same neighboring apartment complex as for the paramedics, not sure if it's the same apartment). One knocks on the door, two others stand low on the stairs to be out of view from the peephole. They go inside and, after a while, come back out and leave.
Monday, April 02, 2007
(Yeah, that's about as insightful as it's gonna get right now. I'm just not up to tackling Massachusetts v. EPA till the head and stomach settle down. Lujan and Chevron and statutes, oh my!)