355 lines
24 KiB
Plaintext
355 lines
24 KiB
Plaintext
|
|
Episode: 1115
|
||
|
|
Title: HPR1115: TGTM Newscast for 11/07/2012
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1115/hpr1115.mp3
|
||
|
|
Transcribed: 2025-10-17 19:16:22
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
You're listening to Talk Geek To Me News, number 80, record for Wednesday, November
|
||
|
|
7, 2012.
|
||
|
|
You're listening to the Tech Only Hacker Public Radio Edition to get the full podcast,
|
||
|
|
including political, commentary, and other controversial topics.
|
||
|
|
Please visit www.talkgeektoMe.us.
|
||
|
|
Here are the vials statistics for this program.
|
||
|
|
Your feedback matters to me.
|
||
|
|
Please send your comments to dgatdeepgeek.us.
|
||
|
|
The webpage for this program is at www.talkgeektoMe.us.
|
||
|
|
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
|
||
|
|
My username there is dgtgtm as in DeepGeek Talk Geek To Me.
|
||
|
|
Before I start off the tech news, I want to announce that Talk Geek To Me News has
|
||
|
|
to be cut back.
|
||
|
|
It's just too time consuming and my personal life is increasing.
|
||
|
|
So as a temporary setback, we'll be producing two shows per month at this point.
|
||
|
|
The decision is not finalized.
|
||
|
|
I did set up a straw poll at http colon slash slash straw poll.me slash 4866 slash.
|
||
|
|
Did some choices as to what I can do with the project?
|
||
|
|
I hope you'll stop by even if it's just to abstain from voting, so I know you've been there.
|
||
|
|
However, I just have to produce less and I also want to do other things.
|
||
|
|
So we're having at least a reduction to shows a month instead of the normal three.
|
||
|
|
And possibly a different permanent situation will emerge, but we'll come as a last minute
|
||
|
|
reprise.
|
||
|
|
Also interested if somebody would like to do a newscast once or twice a month, I am
|
||
|
|
interested in hearing from you.
|
||
|
|
I would be certainly glad to publish.
|
||
|
|
And you might think if you know of the world news section of the show, you might think
|
||
|
|
that I might have a political requirement, but that's not the case.
|
||
|
|
The only requirement would have would be in regards to attribution and copyright rules.
|
||
|
|
So if you're interested in becoming an unwaged newscaster, please contact me and we can
|
||
|
|
go from there.
|
||
|
|
And now the tech roundup from democracynow.org, day 1025, 2012, WikiLeaks releases
|
||
|
|
trove of US files on jailing foreign prisoners.
|
||
|
|
Another WikiLeaks news, the whistleblown group, has just released a new case of files detailing
|
||
|
|
US guidelines for jailing foreign prisoners at military prisons from Iraq to Guantanamo
|
||
|
|
Bay.
|
||
|
|
According to WikiLeaks, the detainee policies includes one manual instructing how to disappear
|
||
|
|
prisoners into other government agencies while hiding their names from US military records.
|
||
|
|
From perspectives that MVDirona.com did Monday, October 29, 2012 by James Hamilton, AMD
|
||
|
|
announced a server targeted on-part.
|
||
|
|
I have been interested in and writing about microservice since 2007.
|
||
|
|
microservice can be built using any instruction set, architecture, but I'm particularly interested
|
||
|
|
in ARM processors and their application to server side workloads.
|
||
|
|
Today, advanced micro devices announced they are going to build an ARM CPU targeting
|
||
|
|
the server market.
|
||
|
|
This will be a 4 core 64 bit more than 2 gigahertz part that is expected to sample in 2013
|
||
|
|
and ship in volume in early 2014.
|
||
|
|
AMD is far from new to the microservice market.
|
||
|
|
In fact, much of my taskwork on microservice has been AMD powered.
|
||
|
|
What's different today is that AMD is applying their server processor skills while at the
|
||
|
|
same time leveraging the massive ARM processor ecosystem.
|
||
|
|
ARM processors power Apple iPhones, Samsung smartphones, tablets, disk drives, and applications
|
||
|
|
you didn't even know had computers in them.
|
||
|
|
The defining characteristic of server processor selection is to focus first and most on
|
||
|
|
raw CPU performance and accept the high cost and high power consumption that follows from
|
||
|
|
that goal.
|
||
|
|
The defining characteristics of microservice is we leverage the high-round client and
|
||
|
|
connect the device ecosystems and make a CPU selection on the basis of a price performance
|
||
|
|
and power performance with an emphasis on building balanced servers.
|
||
|
|
The case for microservice is anchored upon these four observations.
|
||
|
|
Volume economics.
|
||
|
|
Rather than draw on the small volume economics of the server market with microservice we leverage
|
||
|
|
the massive volume economics of the smart device world driven by cell phones, tablets,
|
||
|
|
and clients to give some scale to this observation IDC reports that there were 7.6 million
|
||
|
|
server units sold in 2010.
|
||
|
|
ARM reports that there were 6.1 billion ARM processors shipped last year.
|
||
|
|
The connected and embedded device market volumes are 1000 times larger than that of the server
|
||
|
|
market and the performance gap is shrinking rapidly.
|
||
|
|
My conductor analysis semicast estimates that by 2015 there will be two ARM processors
|
||
|
|
for every person in the world.
|
||
|
|
In 2010 ARM reports that on average there were 2.5 ARM-based processors in each smartphone.
|
||
|
|
The connected and embedded device market is 1000 times that of the server world.
|
||
|
|
Having watched and participated in the industry for nearly three decades, one reality seems
|
||
|
|
to dominate all others, high-valon economics drives innovation and just about always wins.
|
||
|
|
As an example IBM mainframe ran just about every important server side workload in the
|
||
|
|
mid-80s, but they were largely swept aside by higher volume risk servers running unix.
|
||
|
|
At the time I loved risk systems, database systems would just scream on them and they offered
|
||
|
|
customers excellent press performance, but the same trend played out again.
|
||
|
|
The higher volume x86 processors from the client world swept the superior war performing
|
||
|
|
risk systems side, and verily what we see happening about once a decade is a high-valon
|
||
|
|
lower price technology takes over the low end of the market.
|
||
|
|
When this happens many engineers correctly point out that these systems can't hold a
|
||
|
|
candle to the previous generation server technology and then incorrectly believe they won't
|
||
|
|
get replaced.
|
||
|
|
The new generation is almost never better in absolute terms, but they all are better
|
||
|
|
price performers, so they first are adapted for the less performance critical applications.
|
||
|
|
Once this happens, the die is cast and the outcome is just about assured.
|
||
|
|
The high-valon plots move up the market and eventually take over even the most performance
|
||
|
|
critical workloads of the previous generation.
|
||
|
|
We see the same scenario played out roughly once a decade.
|
||
|
|
Not CPU bound, most discussion out industry centers on the more demanding server workloads
|
||
|
|
like databases, but in reality many workloads are not pushing CPU limits and are instead
|
||
|
|
storage, networking, and memory bound.
|
||
|
|
There are two major classes of workloads that don't need or can't fully utilize more
|
||
|
|
CPU.
|
||
|
|
Some workloads simply do not require the highest performing CPUs to achieve their SLAs.
|
||
|
|
You can pay more and buy a higher performing processor, but it will achieve little for
|
||
|
|
these applications.
|
||
|
|
Some workloads just don't require more CPU performance to meet their goals.
|
||
|
|
The second class of workloads is characterized by being blocked on networking, storage,
|
||
|
|
or memory, and the buy memory bound, I don't mean the memory is too small.
|
||
|
|
In this case, it isn't the size of the memory that is the problem, but the bandwidth.
|
||
|
|
The processor looks to be fully utilized from an operating system perspective, but the
|
||
|
|
bulk of its cycles are waiting for memory.
|
||
|
|
Disk and CPU bound systems are easier to detect by looking for which is running close to
|
||
|
|
100% utilization while the CPU load is rate lower.
|
||
|
|
Memory bound is more challenging to detect, but it's super common, so worth talking about.
|
||
|
|
Most server processors are super scalar, which is to say they can retire multiple instructions
|
||
|
|
each cycle.
|
||
|
|
On many workloads less than one instruction is retired each cycle.
|
||
|
|
You can see this by mining instructions per cycle, because the processor is waiting for
|
||
|
|
memory transfers.
|
||
|
|
If a workload is bound on network, storage, or memory, spending more on a faster CPU will
|
||
|
|
not deliver results.
|
||
|
|
The same is true for non-demanding workloads.
|
||
|
|
They too are not bound on CPU, so a fast apart won't help in this case either.
|
||
|
|
Price performance.
|
||
|
|
Device price performance is far better than current generation service CPUs, because there
|
||
|
|
is less competition in the server processors, prices are far higher, and price performance
|
||
|
|
is relatively low compared to the device world, using server plots performance is excellent,
|
||
|
|
but price is not.
|
||
|
|
Let's use an example again.
|
||
|
|
A service CPU is hundreds of dollars, sometimes approaching $1,000, whereas the ARM processor
|
||
|
|
in an iPhone comes in at just under $15.
|
||
|
|
By general rule of thumb, in comparing ARM processors with service CPUs, is that they
|
||
|
|
are capable of one core of the processing rate, at roughly $1.10 the cost.
|
||
|
|
And super important, the massive shipping volume of the ARM ecosystem feeds the innovation
|
||
|
|
and completion, and this performance gap shrinks the performance gap with each processor generation.
|
||
|
|
Each generation improvement captures more possible server workloads, while further improving
|
||
|
|
price performance.
|
||
|
|
Most modern servers run over 200 watts and many are well over 500 watts, while microservice
|
||
|
|
can weigh in at 10 to 20 watts.
|
||
|
|
No where is power performance more important than employable devices, so the pace of power
|
||
|
|
performance innovation in the ARM world is incredibly strong, in fact I've long used
|
||
|
|
mobile devices as a window into future innovations coming to the server market.
|
||
|
|
The technologies you've seen in the current generation of cell phones has a very high probability
|
||
|
|
of being used in a future server CPU generation.
|
||
|
|
This is not the first ARM-based server processor that has been announced and even more announcements
|
||
|
|
are coming over the next year, in fact that is one of the strengths of the ARM ecosystem.
|
||
|
|
The R&D investments can be leveraged over huge shipping volume for many producers to bring
|
||
|
|
more competition, lower cost, more choice, and faster pace of innovation.
|
||
|
|
This is a good day for customers, a good day for the server ecosystem, and I'm excited
|
||
|
|
to see AMD help drive the next phase in the evolution of the ARM server market.
|
||
|
|
The pace of innovation continues to accelerate industry-wide and it's going to be an exciting
|
||
|
|
rest of the decade.
|
||
|
|
I'm torrentfreak.com.
|
||
|
|
By Ernesto Data October 31, 2012, six directs evidence re-reviewed to fix RIAA lobbying controversy.
|
||
|
|
Starting next month, the file sharing habits of millions of Victorant users in the United
|
||
|
|
States will be monitored as part of an agreement between the MPAA, RIAA, and five major ISPs.
|
||
|
|
The Pories launched the Center for Copyright Information last year, which will be responsible
|
||
|
|
for the implementation of the plan, to guarantee the accuracy of the evidence behind the copyright
|
||
|
|
infringement accusations.
|
||
|
|
The Pories agreed to hire an impartial and independent technology expert.
|
||
|
|
However, their commitment to this promise was questioned last week when the expert turned
|
||
|
|
out to be Strauss Friedberg, a former RIAA lobbying group.
|
||
|
|
The CCI is clearly well aware of the sensitivities generated by this particularly unfortunate
|
||
|
|
pick.
|
||
|
|
Quote recent reports that a former employee of Strauss Friedberg lobbied several years
|
||
|
|
ago on behalf of RIAA matters unrelated to CCI have raised questions about the impartiality
|
||
|
|
of Strauss Friedberg, unquote CCI's executive director Jill Lesser now states, the CCI
|
||
|
|
is convinced that despite this history, Strauss Friedberg is capable of delivering an independent
|
||
|
|
review.
|
||
|
|
However, to reassure the public that it was carried out properly, CCI will hire a new
|
||
|
|
expert to go over the evidence review.
|
||
|
|
To read the rest of the log, follow the links in the show notes from eff.org,
|
||
|
|
they had to remember the 2nd 2012 by Corrine McSherry and Masha Hoffman.
|
||
|
|
The 2012 DMCA rulemaking, what we got, what we didn't, and how to improve the process
|
||
|
|
next time.
|
||
|
|
Last week, the librarian of Congress issued his final decision, limiting copyright owner's
|
||
|
|
ability to sue you for making full use of the works you buy.
|
||
|
|
The short version, it's a mixed bag.
|
||
|
|
On one hand, the librarian looked to the future, bordering existing exemptions from
|
||
|
|
extracting clips from DVDs to include clips from movies distributed online as well.
|
||
|
|
At the same time, the librarian refused to expand an exemption for jail-breaking smartphones
|
||
|
|
to include the smartphone's cousin, the tablet, even though there is a little practical
|
||
|
|
difference between the two devices.
|
||
|
|
Equally illogically, the librarian refused to grant an exemption for jail-breaking video
|
||
|
|
game consoles.
|
||
|
|
Now the long version.
|
||
|
|
In case you haven't been following the trivial process, here's some background.
|
||
|
|
The Digital Millennium Copyright Act prohibits circumventing digital rights management, and
|
||
|
|
other technological measures used to protect copyright works, while this ban was meant
|
||
|
|
to deter copyright infringement the law is misused to chill innovation, free speech, and
|
||
|
|
fair use.
|
||
|
|
The one ray of light, every three years the US copyright office convenes a rulemaking to
|
||
|
|
consider granting exemptions to the DMCA's ban on second wrenching to mitigate the
|
||
|
|
harms the law has caused to legitimate non-infringing uses of copyright materials.
|
||
|
|
The copyright office pours over-exemption proposals submitted by the public with the
|
||
|
|
pros and cons and then offers recommendations to the librarian of congress who ultimately
|
||
|
|
grants or denies the exemptions.
|
||
|
|
In the 2012 rulemaking EFF asked the librarian to protect the jail-breaking of smartphones,
|
||
|
|
electronic tablets, and video game consoles, libering them to run operating systems and
|
||
|
|
applications from any source, not just those approved by the manufacturer.
|
||
|
|
EFF also asked for legal protections for artists and critics who use excerpts from DVDs or
|
||
|
|
downloading services to create new remixed works.
|
||
|
|
Our goal was to build on and expand exemptions that EFF won in the 2009 rulemaking proceeding
|
||
|
|
for jailbreakers and remixed artists.
|
||
|
|
The group simply sought to build on exemptions for educational uses, filmmaking, and multimedia
|
||
|
|
e-books.
|
||
|
|
Hundreds of pages of materials for and against these exemptions were submitted to the copyright
|
||
|
|
office, including a petition with more than 27,000 signatures and support the proposed
|
||
|
|
jail-breaking exemptions.
|
||
|
|
Then this past summer witnesses gathered on several days of hearings on both coasts.
|
||
|
|
The office heard from industry representatives and proponents, of course, but equally,
|
||
|
|
if not more important, was the testimony from users who would be directly affected, such
|
||
|
|
as Vittor's Jonathan McIntosh, Antisha Turk, and software developer Brad Lassie from
|
||
|
|
Mozilla.
|
||
|
|
Until 2009, the only people out to circumvent DVD encryption for fair use purposes were
|
||
|
|
film and media studies professors.
|
||
|
|
In 2009, that category was expanded to include all college and university professors, film and
|
||
|
|
media studies students, documentary filmmakers, and non-commercial Vittor's.
|
||
|
|
Now the librarian has expanded further covering K-12 educators, all college students, multimedia
|
||
|
|
e-book authors, and professionals who have been commissioned to make videos for non-profit
|
||
|
|
purposes.
|
||
|
|
The new exemption also permits breaking encryption on online content, not just DVDs.
|
||
|
|
That's a big one for fair use creativity, and we are proud to have helped make it happen
|
||
|
|
to read the rest of the section on video exemptions, follow links in the show notes.
|
||
|
|
On the article, on the jail-breaking exemptions.
|
||
|
|
In 2009, EFF won an exemption allowing users to modify smartphones, so that they could
|
||
|
|
install independent software not necessarily authorized by the phones manufacturer, carrier
|
||
|
|
or platform provider, a process known as jail-breaking, for iPhones, and rooting for Android
|
||
|
|
phones.
|
||
|
|
This time, we asked the librarian not only to review this exemption, but expand it to cover
|
||
|
|
tablets.
|
||
|
|
This shouldn't have been a hard sell.
|
||
|
|
In all important respects, tablets are simply larger mobile devices, right down to using
|
||
|
|
the same access controls to restrict the program's users can install.
|
||
|
|
They just aren't marketed as phones, even though they can also be used to make calls.
|
||
|
|
The good news is that the librarian renewed EFF's exemption request for smartphones, relying
|
||
|
|
on the copyright offices finding that jail-breaking is fair use.
|
||
|
|
The copyright office note in particular that the 2009 exemption hasn't harmed the market
|
||
|
|
for smartphones, and the renewal may even make smartphones more attractive to consumers.
|
||
|
|
Score one for the jailbreakers.
|
||
|
|
Unfortunately, as with the video exemptions, this call-out applies only to tool users,
|
||
|
|
not tool makers, that means you can rely on this exemption to jail-breaking your phone,
|
||
|
|
but not to distribute jail-breaking code to others.
|
||
|
|
The bad news is that the librarian refused to extend the exemption to tablets, claiming
|
||
|
|
it was too hard to know which devices fall in this category.
|
||
|
|
This is disappointing because the access controls on tablets and smartphones raise identical
|
||
|
|
problems for consumers, and there is no reason why users should face the MCA liability
|
||
|
|
for jail-breaking one, but not the other, especially as the functionality's devices continues
|
||
|
|
to blur.
|
||
|
|
EFF separately asks that an exemption be granted for users to jailbreak video game consoles,
|
||
|
|
so that academic researchers and independent homebrew developers can take full advantage
|
||
|
|
of their console's potential without risk of DMCA liability.
|
||
|
|
The librarian denied this exemption after the copyright office expressed concern that
|
||
|
|
jail-breaking even full-adjimate uses would lead to more infringing activity.
|
||
|
|
The office was wrong, both on reasoning and policy.
|
||
|
|
People who want to play in infringing games aren't going to be intimidated by the little
|
||
|
|
additional DMCA liability.
|
||
|
|
Despite an exemption, the only people hindered by the DMCA threat all legitimate users,
|
||
|
|
like researchers and independent software developers.
|
||
|
|
More generally, if you buy a device, whether it's a phone, a video game console, a tablet,
|
||
|
|
or an ebook reader, it's yours, and you should barely run any software you like on it.
|
||
|
|
There's no principled reason to allow users this freedom on some devices, but not others.
|
||
|
|
We hope that in the future rule-making, the librarian will recognize this fact, to read
|
||
|
|
the rest of this article, follow links in the show notes.
|
||
|
|
From EFF.org updated October 31, 2012 by Cindy Cohen and Julie Samuels, make a upload
|
||
|
|
and the government's attack on cloud computing.
|
||
|
|
Yesterday, EFF on behalf of its client, Kyle Goodwin, filed a brief proposing, a process
|
||
|
|
for the court in the make-up upload case to hold the government accountable for the actions
|
||
|
|
it took and failed to take when it shut down make-up upload service and denied third
|
||
|
|
parties, like Mr. Goodwin, access to their property.
|
||
|
|
The government also filed a brief of its own, calling for a long, drone-out process that
|
||
|
|
would require third parties, often individuals, or small companies, to travel to courts
|
||
|
|
far away and engage in multiple hearings just to get their own property back.
|
||
|
|
Even worse, the government admitted that his access Mr. Goodwin's make-up upload account
|
||
|
|
and reviewed the content of his files, by doing so the government has taken a significant
|
||
|
|
and frightening step.
|
||
|
|
It apparently searched through the data it seized for one purpose when its target was
|
||
|
|
make-up upload in order to use it against Mr. Goodwin, someone who was hurt by its actions,
|
||
|
|
but who was plainly not the target of any criminal investigation, much less one against
|
||
|
|
make-up upload.
|
||
|
|
This is, of course, a bold attempt to shift the focus to Mr. Goodwin, trying to distract
|
||
|
|
both the press and the court from the government's failure to take any steps, much less the
|
||
|
|
reasonable steps required by law, to protect property rights of third parties, either before
|
||
|
|
a warrant was executed or afterward.
|
||
|
|
And of course, if the government is so well-positioned that it can search through Mr. Goodwin's
|
||
|
|
files and opine on their content, and it is not at all clear that this second search
|
||
|
|
was authorized, presumably it can also find a way to return them.
|
||
|
|
But in addition, the government's approach should terrify any user of cloud computer
|
||
|
|
services, not to mention the providers.
|
||
|
|
The government maintains that Mr. Goodwin lost his property rights in his data by storing
|
||
|
|
it on a cloud computing service, specifically the government argues that both the contract
|
||
|
|
between make-up upload and Mr. Goodwin, a standard cloud computing contract, and the contract
|
||
|
|
between make-up upload and the server host Copatia, also a standard agreement, likely limit
|
||
|
|
any property interest he may have in his data.
|
||
|
|
If the government is right, no provider can both protect itself against sudden losses,
|
||
|
|
like those due to a hurricane, and also promise its customers that their property rights will
|
||
|
|
be maintained when they use the service.
|
||
|
|
Nor can they promise that their property might not suddenly disappear, with no reasonable
|
||
|
|
way to get it back if the government comes in with a warrant.
|
||
|
|
Apparently, your property rights become severely limited if you allow someone else to host
|
||
|
|
your data on the standard cloud computing arrangements.
|
||
|
|
This argument isn't limited in any way to make a upload, and would apply if the third
|
||
|
|
party host was Amazon's S3, or Google Apps, or Apple iCloud.
|
||
|
|
The government's tactics here demonstrate another chilling thing.
|
||
|
|
If users do try to get the property back, the government won't hesitate to comb through
|
||
|
|
their property to try to find an argument to use against them.
|
||
|
|
The government also seeks to place a virtually insurmountable practical burden on users by
|
||
|
|
asking the court to do a slow-walking, multi-step process that takes place in a far-away court.
|
||
|
|
Most third parties who use cloud computing services to store their business records, or
|
||
|
|
personal information, are not in a position to attend even one court appearance in Virginia.
|
||
|
|
Much less, the multiple ones, the government envisions its submission to the court.
|
||
|
|
Ultimately, if the government doesn't feel any obligation to respect the rights of
|
||
|
|
make-up upload customers, and it clearly doesn't, it's not going to suddenly feel differently
|
||
|
|
if the target of its next investigation is a more mainstream service.
|
||
|
|
The scope of its seizure here was breathtaking, and they took no steps to engage in what
|
||
|
|
the law calls minimization, either before it searches and seizures or afterwards, by taking
|
||
|
|
steps to return property to cloud computing users, who it knew would be hurt.
|
||
|
|
And now the government is trying to use standard contractual language to argue that any user
|
||
|
|
of a cloud computing service has, at best, severely limited ownership rights in their property.
|
||
|
|
Those who have been watching on the sidelines thinking that the issue, in this case, are
|
||
|
|
just about make-up upload, should take heed.
|
||
|
|
Other headlines in the news to read these stories, follow links in the show notes.
|
||
|
|
S3 hacked again, LV-0 keys leaked, CFW released, security whole, reportedly unpatchable.
|
||
|
|
The Internet Radio Fairness Act, what it is, why it's needed.
|
||
|
|
News from thestand.org, perspectives.nvderona.com, and allgov.com, used under a range permission,
|
||
|
|
news from tortfreak.com and eff.org, used under permission of the Creative Commons by Attribution
|
||
|
|
License.
|
||
|
|
News from Venezuelaanalysis.com, and democracynow.org, used under permission of the Creative Commons
|
||
|
|
by Attribution, non-commercial, no-dervous license.
|
||
|
|
News sources retain their respective copyrights.
|
||
|
|
Thank you for listening to this episode of Talk Geek To Me.
|
||
|
|
Here are the vials statistics for this program.
|
||
|
|
Your feedback matters to me, please send your comments to dgatdeepgeek.us.
|
||
|
|
The webpage for this program is at www.talkgeektome.us.
|
||
|
|
You can subscribe to me on Identica, as the username DeepGeek, or you could follow me
|
||
|
|
on Twitter.
|
||
|
|
My username there is dgtgtm, as in DeepGeek Talk Geek To Me.
|
||
|
|
This episode of Talk Geek To Me is licensed under the Creative Commons Attribution, share
|
||
|
|
like 3.0 on-port license.
|
||
|
|
This license allows commercial reuse of the work, as well as allowing you to modify the
|
||
|
|
work, as you share like the same rights you have received under this license.
|
||
|
|
Thank you for listening to this episode of Talk Geek To Me.
|
||
|
|
You have been listening to Hacker Public Radio, or Hacker Public Radio does not.
|
||
|
|
We are a community podcast network that releases shows every weekday Monday through Friday.
|
||
|
|
Today's show, like all our shows, was contributed by a HBR listener by yourself.
|
||
|
|
Have you ever considered recording a podcast, then visit our website to find out how easy
|
||
|
|
it really is.
|
||
|
|
Hacker Public Radio was founded by the Digital.Pound and the Infonomicom Computer Club.
|
||
|
|
HBR is funded by the binary revolution at binref.com, or binref projects are crowd-responsive
|
||
|
|
by linear pages.
|
||
|
|
From shared hosting to custom private clouds, go to lunarpages.com for all your hosting
|
||
|
|
needs.
|
||
|
|
On list otherwise stasis, today's show is released under a creative comments, attribution,
|
||
|
|
share alike, free those own license.
|