US Senators Urge Attorney General to Prosecute Pirate Streaming Services
Mar18

US Senators Urge Attorney General to Prosecute Pirate Streaming Services

At the end of 2020, U.S. Congress passed the spending bill. The legislation package includes various copyright-related changes, including a new plan to criminalize streaming piracy services. The Protecting Lawful Streaming Act (PLSA), as it’s called, was only introduced a few days prior and was approved without any notable debate. This stands in sharp contrast with earlier ‘felony streaming’ plans, which in part triggered the SOPA and...

Read More
Practice using the Linux grep command
Mar18

Practice using the Linux grep command

One of the classic Unix commands, developed way back in 1974 by Ken Thompson, is the Global Regular Expression Print (grep) command. It’s so ubiquitous in computing that it’s frequently used as a verb (“grepping through a file”) and, depending on how geeky your audience, it fits nicely into real-world scenarios, too. (For example, “I’ll have to grep my memory banks to recall that...

Read More
Get started with an open source customer data platform
Mar18

Get started with an open source customer data platform

RudderStack is an open source, warehouse-first customer data pipeline. It collects and routes event stream (or clickstream) data and automatically builds your customer data lake on your data warehouse. read more Powered by...

Read More
“Going out of your way to be open”: An important practice for executive leaders
Mar18

“Going out of your way to be open”: An important practice for executive leaders

Throughout our “Managing with Open Values” series, we’ve interviewed a number of managers and leaders who shared with us their experiences and practices. In this installment, I interviewed fellow Open Organization Ambassador Sam Knuth to discuss how he lets open values guide his approach to leading large teams. read more Powered by...

Read More

Foreign Meddling Flooded the 2020 Election—but Not Hackers

A new ODNI report shows how extensive Russian and Iranian influence operations were, but it doesn’t mention a single hack-and-leak incident. Powered by WPeMatico

Read More