Court Orders Pirate IPTV Linker to Shut Down or Face Penalties Up to €1.25m
There are few things guaranteed in life. Death, taxes, and lawsuits filed regularly by Dutch anti-piracy outfit BREIN. One of its most recent targets was Netherlands-based company Leaper Beheer BV, which also traded under the names Flickstore, Dump Die Deal and Live TV Store. BREIN filed a complaint at the Limburg District Court in Maastricht, claiming that Leaper provides access to unlicensed live TV streams and on-demand movies. The...
ABS-CBN Targets ‘Pirate’ Streaming Box Vendor in Canada
ABS-CBN, the largest media and entertainment company in the Philippines, is continuing its legal campaign against piracy. Over the past several years, the company has singled out dozens of streaming sites that offer access to ‘Pinoy’ content without permission, both in the US and abroad. This week it filed a new case in Canada, that’s different from the ones we’ve seen before. Instead of going after site...
3 useful things you can do with the IP tool in Linux
It has been more than a decade since the ifconfig command has been deprecated on Linux in favor of the iproute2 project, which contains the magical tool ip. Many online tutorial resources still refer to old command-line tools like ifconfig, route, and netstat. The goal of this tutorial is to share some of the simple networking-related things you can do easily using the ip tool instead. read...
Why it's important to get kids into public speaking
Although she’s only 16 years old, Keila Banks is already a veteran presenter at technology conferences. Her courage to get on stage in front of adults, beginning at the very young age of 11, to talk about open source technology has opened a world of opportunities for her. read...
Looking at the Lispy side of Perl
Some programming languages (e.g., C) have named functions only, whereas others (e.g., Lisp, Java, and Perl) have both named and unnamed functions. A lambda is an unnamed function, with Lisp as the language that popularized the term. Lambdas have various uses, but they are particularly well-suited for data-rich applications. Consider this depiction of a data pipeline, with two processing stages shown: read...