Monday, January 5, 2009
Recipe#101
1 baked potato, peeled and cubed
1 unblemished serrano pepper, diced
3 sun-dried tomatoes, diced
4 garlic cloves, chopped
2 cups of rotini, boiled
4 tablespoons of oil
1 cup fettucine sauce
Lemon juice, to taste
Salt and peppe, to taste
Fry the garlic for a minute on medium heat and then throw in chopped tomatoes and potatoes. Fry for five minutes, stirring occasionally. Throw in the cabbage and fry till it becomes slightly soft. Pour in the sauce and chopped chilli. Cook for a couple of minutes before seasoning and spiking with lemon juice. Cook for another couple of minutes before serving.
Makes two servings.
Monday, January 28, 2008
Review - Lessig's Code v2 - Code is Law
- Vague/incorrect terms such as obscene, immoral, spamming, spoofing, malicious code, cyber terrorism (neologism: “terroristic”) .
- Unbridled agency powers: complete access to all information and info systems – obstructing investigators can be penalized! No safeguards against agency misdemeanor.
- Mandatory real-time data collection by ISPs – retain at least 90 days of data and the government may extend the period - no safeguards on traffic data usage.
Was the Internet always regulated? Lessig opens chapter 1 - entitled Code is Law - by comparing Internet's openness in the mid-1990's with the libertarian ideals of post-communist Central European societies in late 1980's. Arguably, professors of these ideals made the same mistake - that of believing that liberty is ensured by the absence of the State whether in cyberspace or real-life society. Lessig argues that instead a "constitution" - a way to structure and contain legal and social power - was, but all the more now, needed to guarantee certain fundamental values (e.g. freedom of expression and privacy) agreed upon by the society. Left to itself, cyberspace offers an open invitation to become a perfect tool of control for "invisible" hands. Yet, protecting fundamental values needs understanding how regulation works, particularly how "code" - the hardware and software that determines Internet users' choices - works and how it can be used to protect these values. As Lessig says:
"The first generation of these architectures was built by a noncommercial sector—researchers and hackers, focused upon building a network. The second generation has been built by commerce. And the third, not yet off the drawing board, could well be the product of government. Which regulator do we prefer? Which regulators should be controlled? How does society exercise that control over entities that aim to control it?"
Part I of the book describes the current evolution of the Internet toward greater regulation. Part II tries to reach a broad (legal, but especially technical) understanding of regulatory mechanisms. Part III focuses on three controversial issues in the Internet: Intellectual property, privacy and free speech. Part IV returns to the role of State regulation, internationally. Finally, Part V draws the most important lessons of the book and suggests the way forward.