Andy Baio has continued his excellent annual series, "Pirating the Oscars," which tracks
each year's Oscar nominee's appearance on file-sharing networks, and keeps statistics
on the method by which each nominee is captured and uploaded (camcordered, ripped from
screener/pre-release cut, ripped from commercial DVD, etc). Because Andy does these stats
on an annual basis, we get a longitudinal view into the way that file-sharing is changing in response to the studios' countermeasures, and in response to new technologies in general.
Pirating the 2011 Oscars
* This year, three films were leaked online within a day of their theatrical release -- Iron Man 2, Alice in Wonderland, and Harry Potter.
* The Rabbit Hole screener was leaked online eight days before its theatrical release, while Winter's Bone [ed: excellent film, but don't make the mistake I made -- it's not a date-night kind of movie!] was the slowest to leak online (so far) at 125 days after its theatrical release.
* Oscar-nominated films tend to get released late in the year, but how late? More nominated films have been released on December 25 than any other day, but the median date is October 20.
* For the first year, the first high-quality leak of a film -- Harry Potter and the Deathly Hallows -- was a PPV rip, most likely from a hotel's new movie releases on pay-per-view.
* Retail Blu-Ray rips are now frequently being leaked online now before retail DVDs, so I've modified the "Retail DVD" column to include them.
In the age of Internet, discussions about the federal government and its functions are informed by and rely on our unprecedented access to federal documents. Anyone can freely view public records online, such as proposed Congressional legislation and presidential executive orders. Accessing public court documents, however, is a bit trickier. As Katherine Mangu-Ward wrote for the Wall Street Journal in 2011, “no aspect of government remains more locked down than the secretive, hierarchical judicial branch.”
It’s not just that smart cars’ Android apps are sloppily designed and thus horribly insecure; they are also deliberately designed with extremely poor security choices: even if you factory-reset a car after it is sold as used, the original owner can still locate it, honk its horn, and unlock its doors.
Josh Jacobson is a Nintendo cartridge hacker who makes homebrew cartridges for games that were never released for NES/SNES, complete with label art and colored plastic cases that makes them look like they came from an alternate universe where (for example), there was a Nintendo version of Sonic the Hedgehog.
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]
Learning new skills is a great way to improve your resume and stand out from other candidates. Especially in a workforce in which many job-seekers have a wide variety of qualifications. With lifetime access to Virtual Training Company, you won’t have to choose a specific focus. You can pick up new expertise whenever you deem it […]