I think you assume lyrics have no artistic value to a song, and are meaningless. By completely flipping around how the lyrics play out, you completely change the meaning and intent of the song. The only lyric they took from beastie boys was Girls. Everything else is new. The lyrics are handled quite transformatively. Weird Al creates PARODY not by changing the instrumental line but by changing the lyrics. (look to RICKY or I LOST ON JEAPORDY for examples of music that only changes some of the lyrics) Their is no requirement that the instrumental line change for parody to occur. (and before you say it, Weird Al always has said that while asks as a courtesy, he isn't REQUIRED to under law)
Artistic definition of parody (which I think is a bad word here) is met by the Transformative changes to the intent and meaning of the song by the lyrical changes. No requirement for changes to the instrumental line comes up.
Because you mistake the visuals to the what the brain learns. The brain learns and trains pattern recognition, hand eye coordination, and desicion making skills, not how to shoot. not that violence is good. but more basic, more applicable skills.
DMCA likely wasn't mentioned because the cource doesn't specificly cite that is was a takedown. The source specifically cites they used Youtube's "Copyright Claims System", which has grown in response to repeated whining on the part of Rightsholders that youtube wasn't doing enough.
How is that misuse of trademark law? Its the American indian equivalent of Nigger. Its a clear example of why the law is written the way it is, to prevent the perpetuation of hurtful epithats being protected by law.
Re: Re: Not when you immerse them in violent video games, Timmy.
Now, there's kernel of truth in "video games are bad". It is generally accepted fact that children (age 5-10) should play video games little as possible. Not that it's some kind of "harmful influence", but it bring nothing for child development. And no, "educational games" are useless too: there's plenty of research about it.
Aside from the anecdotal evidence contrary to this (i.e. me), I can't find links to widely published research or any articles downplaying educational games in google under the educational games are useless moniker. Moreover, if you had solid research about that perhaps you could tell us WHY? I learned so much from early video games. I also demand a source for these claims.
Mass shootings are not one the rise. WHen you define mass shootings as being "12+ people killed" they are on the rise....with 6 of the 12 mass shootings happening since 1949 occuring in the last 6 years. But thats not a very statistically sound sample. If you define mass shooting the way the FBI does, "4+ people killed", the 600 incidents since 1949 are relatively evenly spaced.
There is plenty of evidence that zero tolerance doesn't work. Including the fact that mass shootings aren't falling, violence in schools isn't going down, ect. No need to use bunk statistics to make your point.
An affiliate is a website with a link to amazon. That link, when used by a customer who buys something on that visit, tells amazon to pay a small percentage of the sale to the affiliate. THe affiliate is selling nothing.
Amazon also has webstores, in which people buy wholesale or used and sell product on amazon. Thats what you are refering to, and they are not 'Affiliates". They are a different thing entirely.
Except none of the sales are driven by the actions of the affiliate aside from providing a link to amazon.com. A person in sales tries to sell product. I guarantee you if people could track what advertisement brought you in pre-internet then a "ill give you a cut of the sale of everyone who you send to my store" that would have been one of, if not the only, standard advertising contracts.
If the network uses industry best security practices, Open Source code is no more vulnerable then closed source. Researchers can find the same loopholes attackers find, and open source makes it easier for both sides.
Details the sectors the Federal Reserve invests in ARE public knowlege, you jest have to read the financial statements, the notes to which are more dry then the US Penal code.
General information on the types of spying we do is normally public knowlege. Everyone knew the CIA could wiretap email providers, everyone knows you can wiretap cell phones. We didn't know how easily they could do it (very) and who they were wiretapping (everyone). But we knew they could. So even amongst spy programs, transparancy can be better.
The source code for a website is not crititcal to the national infrastructure. And given the coleslaw that is that code, the only reason to hide it is to hide how much hack that code actually is.
The biggest problem isn't in knowing the sales tax rate, I, an ametuer programmer, could probably build the module for a small database query. no, the problem is in the number of different tax jurisdictions and tax rates which legally need to be collected properly and mailed to each of the individual authorities. You know someone is going to decide that the online retailer with 1.001 million is sales (the guy who didn't even think he would need to collect sales tax, because his Gross sales never exceed 975K), should have remanded 102 dollars to region x and 104 dollars to region y rather then vice versa, which is what he did. Then he is getting audited by 50 different state tax agencies, putting the financial burden on a widget retailer with low profit margins (because what state agency is going to come to you for the audit? No they are going to make you come to them....)
All in All, I can see a huge bureaucratic nightmare coming from this.
Let me set this straight AC, Lying to Congress =/= lying to the SCOTUS. FISA Judges are in bed with the Intelligence community because all they hear is the smoke getting blown up their ass by Intelligence community Lawyers. Same way with patent Judges. But the Supreme Court is not inside that bubble. Its why the Intelligence community (INTCOM) made sure the merits of the law were never debated in the Supreme Court, only "standing".
Why do you think the Lawyer is screaming about how he was lied to when he went before the SCOTUS? Because Verrilli is in deep shit the next time this gets in front of the SCOTUS. He's tossing the INTCOM under the bus to save his own ass. Lying to congress has been shown to only be dangerous if the the popular narrative wants it to be dangerous (i.e. Bill Clinton). Lying directly to the courts? Far more often dangerous on its own merits.
If I remember correctly, back when the SCOTUS denied the ACLU's last lawsuit against phone call collections, the SCOTUS was very sceptical that the government was arguing that no one would ever have standing to challenge this collection, and the government argued that they would reveal if and when the data was used and then you could have standing.
Now they are arguing that no one has standing (except for a company with no reason to challenge the collection). The government has a big reason to not want this case to touch the SCOTUS, as lying to the SCOTUS should be far worse then what prenda is facing for only lying to a district judge....
If they were using PGP or any other third-party end to end encryption, Getting the SSL certificate wouldn't matter, because the content would still be encrypted.
what they wanted initially was known as a 'pen register', and amounted to giving the NSA access to monitor who a person was contacting/possible content monitoring. However, because that data stream being monitored is encrypted, the pen register told them nothing.
What they then attempted was to get the SSL certificate, which we have been told would have erased the security of the system and given the NSA full access to everyone's data. Given that a Proper PGP system wouldn't be affected by the compromise of the SSL certificate, given that the PGP public private key system is independent of SSL, It seems likely that the data was encrypted using SSL.
This has the advantage, as I pointed out elsewhere, that the user gets protection against man in the middle intercepts of his data but can still email non PGP users or PGP users with whom they had not yet shared public keys. You still want to be careful emailing said unprotected users, but the security of the communications 'in-transit' is significantly improved.
And it is clear from what we have been told that there was only one SSL certificate.
What you describe already exists. But it requires both sides to know each other and share public keys and have the software to work with it and because these keys are large data strings, you would have to store the key with the software, or likely in this case the lavabit servers, which likely undoes the security you are going for. Lavabit, by using SSL, encrypts all email sent out no matter the recipient and his setup or privacy concern, and only can be intercepted at the end point, but is still readable by the recipient. Secure communications without the enduser's normal problems setting up secure communications.
I think both the judge and the Techdirt authors are missing a key point to the whole process.
Mass data collection (which a subpeona for the SSL Certificate is) is justified by the Third Party Doctorine, namely that no data you give to a 'third party' has an expectation of privacy. However how can you have no expectation of privacy when the product that Lavabit sells is...privacy? Lavabit has a black box email, so it can't look at your communications data. That sounds like a situation where my communications are designed to remain private, because Lavabit can't even do any spam scanning or other 'intercept' of the communications data. If I used an encryption email, I would have an expectation of privacy with the encrypted data. So in what way can you justify a wiretap on every customer of Lavabit when privacy remains expected?