Feeds

Cries for help go out as open source mogul's radar breaks

A man in crisis

Top three mobile application threats

OSCON How appropriate that we caught Chairman Tim O'Reilly ogling Portland's tram schedule just a few minutes before the Pirate Party's founder Rickard Falkvinge took the stage at O'Reilly's own conference. Chairman Tim plotted his escape from OSCON, as Falkvinge prepared to talk to the people about things that matter.

O'Reilly seemed to miss the crucial issues of the day at every turn, during OSCON.

He peppered attendees with relentless Web 2.0 talk, thrusting Facebook, Flickr and Wikipedia at them. The OSCON crowd applauded every time someone ridiculed the Web 2.0 moniker. That didn't stop Chairman Tim.

"I know people complain about the name, but it's a good handle for a set of phenonomen," O'Reilly said, during one OSCON speech.

That very speech served as O'Reilly's attempt to make up for his evisceration as the hands of Free Software Foundation attorney Eben Moglen. One day earlier, Moglen charged O'Reilly with wasting too much time on hem lines, haircuts and the latest fluffy Web 2.0 start-up that looks like it might be acquired for a ridiculous amount of cash. O'Reilly had no counter on the actual day of Moglen's attack, but thought about the issues overnight.

Refreshed, O'Reilly called Moglen's demand that we pay more attention to freedom and not just the success of business "an important message." A moment later he added that "it's important to recognize that businesses matters" too. Businesses shape our culture. Businesses are a big part of successful activism. Tim's been "noodling" and "brain dumping" too. "People should be paying a lot of attention to Wikipedia." The freedom to take your data away rather than controlling the rights to your source code might dominate the Web 3.0 meme. Hadoop! "I got a call from David Filo (co-founder of Yahoo!) last night saying Yahoo! is really behind this."

Back on this planet, Falkvinge talked to the OSCON crowd about why copyright holders such as movie studios or record labels should not be able to pass laws that let them sort through our electronic communications, hunting for a dreaded MP3 making its way from one friend to another. Shall we let law enforcement or media moguls examine our e-mails sent to doctors, lawyers or employers?

"On the one end of the scale is one income source for one industry," Falkvinge said. "On the other end of the scale are the basic foundations of our democracy."

The Pirate Party has enjoyed modest but rising political success in Sweden, urging that copyrights should have nothing to do with private communications, DRM is evil, patents are even more evil, privacy is good, due process is good and transparent government is even better, Falkvinge said, before adding that the party supports shortening copyright lifespans as well.

The OSCON members greeted Falkvinge with repeated "Arghs!," and the party will need this support as it seeks to impact EU elections in 2009 and national elections in 2010. You can make party donations here. Sweden does not regulate the contributions.

Hadoop!

Seven Steps to Software Security

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.