CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Brian McWilliams, who perpetrated the terrorist website hoax I wrote about yesterday, has now posted his response, including a quasi-apology. [Link credit: Politech]
-
Static Control Files for DMCA Exemption
I wrote previously about the lawsuit filed by printer maker Lexmark against Static Control, a maker of toner cartridge remanufacturing parts. Lexmark claims that Static Control is violating the DMCA…
-
Terrorist Website Hoax
This one leaves me speechless. According to a fascinating story over at ComputerWorld, tech journalist Brian McWilliams has admitted to running a hoax website that claimed to be the site…
-
Valenti Interview
If you’re interested in technology regulation, don’t miss Derek Slater’s interview with MPAA chief Jack Valenti, in Harvard Political Review. Slater asks only four questions about copyright and technology, but…
-
Still More on Programs vs. Data
My previous postings on the program vs. data distinction have drawn quite a few comments. (To see them, click the “followups” links on my previous postings.) I’m going to let…
-
Spread of the Slammer/Sapphire Worm
A new paper by well-regarded networking researchers analyzes the spread of the recent Slammer/Sapphire worm. The worm spread at astonishing speed, doubling the number of infected hosts every 8.5 seconds,…
-
More on Programs vs. Data
Karl-Friedrich Lenz reacts to my previous posting on how to distinguish programs from data, by insisting on the importance of having a simple definition of “program.” He is right about…
-
Standards, or Collusion?
John T. Mitchell at InteractionLaw writes about the potential antitrust implications of backroom deals between copyright owners and technology makers. If a copyright holder were to agree with the manufacturers…
-
Programs vs. Data
Maximillian Dornseif asks how one can draw the line between programs and data. This is important because the law often treats the two differently. He concludes that no clear line…
-
Wacky Biometrics
I heard a presentation today by an expert on biometric security devices. He mentioned two new biometric devices under development. The first one uses body odor, detecting the unique combination…