Monthly Archives: May 2008

Lessig Blog: Closed until June


As tiny compensation for (almost) spending more time on the road than at home each year, when our first child was born, we started the best tradition I’ve ever known: 1 month, off the grid, somewhere amazing. That begins today. It is a real, and essential, luxury. My apologies if it is a burden. Continue reading

Posted in Uncategorized | 24 Comments

TotalRecut remix contest


TotalRecut has today launched a remix contest: “What is Remix Culture?” I’m a judge (as close as I’ll ever get to that title, but now twice — just finished judging the Obama in :30 contest). Cool prizes. Great question. Get busy. Continue reading

Posted in good code | Leave a comment

fantastically cool code to watch

This is something to watch, as its potential to enable real integration is amazing: Apture.

Apture Getting Started Tutorial from Tristan Harris on Vimeo
Continue reading

Posted in good code | 10 Comments

Z's book is out


JZ’s book is out. It is in the brilliant Yale Series of brilliant (and Creative Commons licensed) books (which includes Yochai‘s as well). But you can (and will want to) buy it the old fashioned way, too.
This book will redefine the field we call the law of cyberspace. That sounds like a hokey blurb no doubt. But hokeness does not mean it is not true. It is true. The field before this book was us cheerleaders trying to convince a skeptical (academic) world about the importance and value of certain central features of the network. Zittrain gives these features a name — generativity — and then shows us an aspect of this generative net that we cheerleaders would rather you not think much about: the extraordinary explosion of malware and the like that the generative net has also generated.
Why does that matter? Why should it change things? Well as Z nicely shows, we’re radically underestimating the inevitable damage this malware will produce. Whether a single event, or a coordinated event, whether intentional, or accidental, it is simply a matter of time before a catastrophic network event happens. And when it happens — think of it as a kind of i9/11 event, but the bad guys are not Al-Qaeda — will we be prepared for the inevitable iPatriot Act response? Are we better prepared than civil libertarians were when we were hit with the USA Patriot Act? Have we even framed the right debate?
Certainly, we cheerleaders haven’t. This book begins it, and will define it for a generation (in Internet time, at least). Continue reading

Posted in just plain brilliant | 6 Comments

37 helpful comments later

After thinking through the 37 helpful comments posted to my post about comment policy, I’ve decided to start slowly as proposed. That means:

I have adopted a policy of deleting personal attacks on others. That means any comment that is directed against someone other than me, which is uncivil and attacking something other than the substance of what that person has written as a comment on my blog will be removed if (1) a request is made by anyone to [email protected], and (2) the volunteer I’ve selected agrees the policy has been violated.

I like some of the other suggestions, including incorporating the slashdot system. As things develop, I may move to something more.
Thanks to all for the help. Continue reading

Posted in eye | 4 Comments