Mini-rant archive

From Pin Eight
Jump to: navigation, search

This is a collection of mini-rants that aren't yet big enough for their own page.

At least one of these is bound to be on-topic in a large percentage of discussions on a general geek interest web forum such as Slashdot. Feel free to copy-and-paste links to sections into comments on SoylentNews, Slashdot, or other forums. If you have any questions or comments, add them to the talk page.


Ad blocking

Myth: "The only alternative to web advertising platforms that leave visitors open to malware installation is subscriptions."

Fact: It's a lot more complicated than that. See Ad blocking.

Audio quality

Myth: "Vinyl is inherently superior to CD."

Fact: See CD quality.

Bargain bin gaming

The price of video gaming in current dollars has gone up: from $300 per PlayStation console, $20 per controller, and $50 per game in 1995 to $600 per PLAYSTATION 3 console, $50 per controller, and $60 per game. Video games are even more expensive in Europe due in part to content rating, localization, and tax differences. Some people like to cut costs by buying video games from the bargain bin or buying them used. But some games never hit the bargain bin, and their used prices stay high. For example, Harvest Moon was first published in 1995 at a price around 60 USD. In 2007, it's still 60 USD on So how can I tell whether a game will hit the bargain bin or become a collector's item?

The other problem is DNAS error -103. Sony has a habit of pulling the plug on the matchmaking servers needed by online multiplayer features of games for PlayStation family platforms after a couple years. So I buy a game, pull it out of the shrinkwrap, put it in my PS2, try to go online, and "This software title is not in service."

C++: The plus stands for bloat

Moved to C++ vs. C#iostream


Most major broadband providers officially do not allow servers to run on residential connections. They offer business-class service, but some offer this only in a commercially zoned area.[1] Even those that do offer business-class service to private homes have trouble setting up a residential account for home TV and a business account for business Internet at the same address.

In the United States, the providers (the telco for DSL and the cable company for cable modem service) generally have monopolies or duopolies on the last mile in the local market because wireless broadband (satellite or cellular) is cost prohibitive: $60 per month for about 5 GB of transfer per month. In October 2012, there were still plenty of rural in the United States that couldn't get wired broadband at all.[2] People in Great Britain as well are still relying on satellite[3] and cellular[4] for home Internet access despite the single digit GB per month transfer cap of a typical plan, or bringing desktop PCs into Starbucks and Panera to download service packs or large games.[5] Expect not to be able to watch more than one or two movies a month on Netflix or your country's counterpart, and if a quarter-gigabyte operating system service pack lands, don't expect even that. Some rural households in the United States still use dial-up because wireless broadband is so expensive.

By 2015, a multi-gigabyte Windows update has caused people to blow through caps, and though Windows 10's cap abuse has been reported to Microsoft, Microsoft hasn't officially done anything about it. Windows 8 and 10 offer a way to mark a particular WLAN SSID as metered, causing it to delay many background downloads. But there's no interface for doing this on Ethernet nor for interoperating with some ISPs' time-of-day-dependent metering policies, such as those of satellite Internet. One Slashdot user suggested writing a PowerShell script that checks the time of day against the ISP's metering policy and writes the appropriate state to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\DefaultMediaCost\Ethernet. For example, running the script between midnight and 5 AM might write unmetered, whereas running it at other times would write metered. Then schedule a task to run this script at each critical point in the policy, such as midnight and 5 AM local time, with "Run task as soon as possible after a scheduled start is missed" turned on in case the computer was off or asleep,[6] and "Run whether user is logged on or not" and "Run with highest privileges" so that it can write to HKLM.[7]

When the ISP quotes you an installation fee in excess of $40,000 to run high-speed Internet to your house,[8][9] would you rather spend tens of thousands of dollars to pack up your belongings, buy a new house, move your family to another location, and try to find a new job, just to get a better Internet connection? Some are willing to do so,[1][2][3][4] or at least to take Internet access into account if you're planning to move anyway.[5][6] But most think "only a raving lunatic" would "live like a nomad" and move just for a better Internet connection,[7][8][9] especially if not single,[10] and some just can't stand cities.[11] Moving often could cause your kids to have fewer quality relationships and die younger. Besides, even if you do find a good ISP, it'll probably end up bought anyway.[12]

Copy-protected audio

Windows XP contains a Secure Audio Path, and Windows Vista and Windows 7 have Protected User Mode Audio. Applications send encrypted data to Windows Media APIs, and codecs that run in kernel space (SAP) or a process in the Protected Environment (PUMA) transform encrypted compressed audio into cleartext PCM and send it to the audio driver. Only drivers signed by Microsoft with copy protection permissions will receive copy-protected data; to be signed, a driver has to conform to Microsoft's DRM requirements, which include disabling all digital outputs within the machine (such as to files) and encrypting any digital outputs (such as adding HDCP to HDMI) while playing a copy-protected audio stream.

But is analog reconversion of audio really that bad? With a good DAC on one end and a good ADC on the other, both external from the electrically noisy PC case, the artifacts of Vorbis, WMA, or AAC perceptual modeling will outweigh the -90 dB noisefloor of 16-bit PCM.

High-definition video, on the other hand, isn't so easy to analog reconvert. But given that people are more than willing to watch low-definition (240p or 360p) video on YouTube and download overcompressed SDTV cams on pirate networks, pirate audiences may not care about pristine video.


are not necessarily a bad thing. Copyleft, which keeps free software free, is built on copyright.

The bad thing is the use of copyright to interfere with free speech, where publishers threaten to sue critics of their works for copyright infringement. (For examples, see Fanwork Ban on All The Tropes.) Sure, some jurisdictions provide a fair use defense, but making any sort of defense requires access to legal funds that the publishers know most individuals don't have.

The bad thing is also an alleged pattern of extension of the copyright term to create what critics of copyright maximalism have called "perpetual copyright on the installment plan". Though publishers might explain this away an unfortunate artifact of the timing of implementation of European-style three-generation copyright in the United States and other countries late to join the Berne Convention, they still haven't proven that a three-generation term maximizes the utility of copyright in the first place.

Digital Millennium Copyright Act

The wording of the DMCA's circumvention ban (17 USC 1201) is a bad thing.

Several companies produce add-on devices (called "mod chips") that deliver boot code to a PlayStation console. These are used in software development and can be used to run free software (or backups of lawfully acquired copies of software) on a PS1 or PS2. Sony has attacked those companies because the devices also allow pirated games to run.

Not to mention the DVD and eBook problems. See also DMCA in Plain English.


Is not illegal, no matter what Nintendo says. If you are running free software on your emulator, or you have burned free software to a CD or flash cartridge to play on your game console, whose copyright are you violating? Even if you use a cartridge copier to copy cartridges that you have purchased into your computer, you're probably covered under the format-shifting precedent in the RIAA v. Diamond Multimedia case (which grew out of the Betamax precedent set in Sony v. Universal case) as long as you don't redistribute the ROM dumps. Some people will complain about the ruling in Atari v. JS&A that backup copies under 17 USC 117(a)(2) are not needed and therefore not authorized, but ROM dumps used for emulation are not backups; they are an essential step in the use of a program under 17 USC 117(a)(1), and Vault v. Quaid appears more likely to apply.

Some game software companies try to thwart emulation and development of independent software by copyrighting a magic cookie used to authenticate products to other products. For instance, Game Boy and Game Boy Advance software needs to contain an exact copy of the Nintendo logo, or the system's BIOS will not start the program. Even worse, Sega Dreamcast games must have 14 kilobytes of copyrighted boot sector code that matches byte-for-byte a copy in ROM, or the system will not boot the game. It's a good thing the Sega v. Accolade decision has recognized copying such "magic cookies" as fair use. Chamberlain v. Skylink and Lexmark v. Static Control have upheld the principle even in the age of the DMCA. Heck, under the Magnuson-Moss Warranty Improvement Act of 1975, the console maker can't even void the warranty if you use independently produced hardware or software with your console.

But please don't use NESticle for NES software. Try Nestopia, FCE Ultra, or Nintendulator instead.


In June 2012, a successful lawsuit by a video game publisher helped me to realize why e-sports have less of a future than traditional sports. The core difference is that nobody owns tennis, but somebody owns Tetris.

Playing a video game in an organized tournament is a public performance, and the owner of copyright in a video game has the exclusive right to perform the game publicly. Nintendo, for instance, can shut down Super Smash Bros. tournaments, and Capcom routinely requires performance licenses for Street Fighter tournaments.[10] Activision Blizzard has had a TV rights spat with KeSPA. Sega once ordered all videos of its Shining RPGs removed from YouTube[11] and continued to issue copyright strikes for gameplay videos in 2013.[12] When YouTube Gaming debuted in 2015, users discovered they had little recourse against false positives from YouTube's automated Content ID system,[13] dubbed the "Copyrobeast" by some critics.

Traditional sports, on the other hand, are rarely if ever subject to exclusive rights. The National League of Professional Baseball Clubs, by contrast, had no legal power to prevent the American League, Federal League, or independent baseball leagues from operating. Nor could the NBA or NFL stop other leagues other than through competition or acquisition. And there's no Tennis Company to stop Larry Ellison from start his own tennis tour.[14] The only case I can think of is a 20-year patent on Arena Football's rebound nets, which other indoor football leagues just didn't use.

EULAs vs. statutory rights

Some compare buying a copy of a computer program to buying a piece of paper with a copyrighted work printed on it. Such a transaction does not give you a license to do whatever you want, but under United States law, it does grant you fair use rights and first sale rights in your copy of the work, and for computer software, such rights include the right to copy the software into RAM and to make backups. However, if a contract presented before the sale specifies that instead of buying a copy, you are perpetually renting one, then you are not "the owner of a copy," and none of this applies. But since 2008 or so, it became more common to deliver software over the Internet than in a box, and the vast majority of computer users are not "owners of a copy". By 2010, half of PC game sales were downloads, and by 2013, the figure reached 92 percent.[15]


I'm not on the Facebook. For one thing, I graduated from college in 2003 and thereby lost my e-mail account in the .edu top-level domain before Facebook launched in 2004. Even after Facebook opened to users in late 2006, Facebook has been known to require a cellular subscription with a globally unique SMS number and/or photographs of a user's state ID in order to reinstate privileges of a user whose account has been locked for suspicious automated behavior or a suspicious name. There are anecdotal reports that users who have never joined a university network by adding a .edu address are more likely to get hit. In addition, Facebook tracks users' behavior across the Internet, even on sites not owned by Facebook.[16]

But just as importantly, I lack the time to participate in Facebook. A study by the University of Pittsburgh Center for Research on Media, Technology and Health confirms that spreading oneself too thinly across social networks leads to depression.[17]

Garbage collection

Tracing garbage collection helps plug memory leaks. But it's no panacea for all resource management problems in computer programming because not all resources owned by a process are memory. Neither Java nor Python guarantees that an object's finalizer will ever be called, which causes the resource managed by the object to be leaked, though CPython's reference counting comes close so long as a reference cycle doesn't hold non-memory resources. One can avoid resourced leaks with the dispose pattern, but for resources whose lifetime exceeds that of the method that acquired the object, any object holding a reference to a resource that needs to be disposed will itself need to be disposed. The observer pattern, for example, can lead to a lapsed listener problem, where a notification source continues to hold references to observers that are no longer otherwise reachable. Avoiding this requires explicit disposal of observer registrations, which makes an object need to be disposed. This "viral" aspect of the dispose pattern brings in comparable conceptual overhead to C++-style deterministic memory management techniques such as Resource Acquisition Is Initialization (RAII). And once your garbage-collected application's heap exceeds one-fourth of the available space,[18] prepare for 200 ms pauses as the collector keeps sweeping the heap.[19]

GNU software on Microsoft operating systems

Yes, you can run GNU software and other software from the "Linux ecosystem" on Windows without needing even virtualization. The Cygwin and MinGW/MSYS environments provide a minimal GNU environment, including Bash and the GCC toolchain, though apps that depend on them might be hard for a first-timer to install. Even KDE applications are being ported.[20]

But even on systems without GNU software, both the classic command prompt (cmd.exe) and the newer, .NET-powered Windows PowerShell have tab completion. Open up a command prompt, type cd , and start hitting the tab key. (If it doesn't work: Open regedit, search for "CompletionChar", and change its value from "0" to "9".) Its behavior when there are multiple completion choices differs somewhat[21]

The Free Software Foundation has called using free software on Windows "the first step towards freedom."[13] The second is switching to a free operating system such as GNU/Linux once you've found free applications for your whole work flow. This becomes especially important as of Windows 10, which offers a subset of GNU but requires all device drivers to have been signed with an EV code signing certificate,[22] which is cost prohibitive for individual hardware hackers.

HTTP cookies

A lot of web applications require isolating each user's sessions from other users. HTTP provides several ways to distinguish among different users' sessions: session token in the cookie, session token in JavaScript local storage, session token in the URL, and Basic authentication. Some people disable HTTP cookies and JavaScript local storage out of privacy paranoia. But the others have their own drawbacks, which I'll explain in the context of distinguishing the carts of different shoppers at an online store:

  • A session token in the URL allows others to hijack a user's session if the user shares a URL, such as a product description page.
  • Basic authentication requires previous agreement on a username and password. This means each user must create an account before adding anything to the cart. Users confronted with this while buying physical goods tend to bounce and shop elsewhere.


The trend of migrating all web functionality to HTTPS accelerated in the 2010s, following revelations of nation-state surveillance programs as well as technical trends that made use of HTTPS easier. In the middle of the decade, the end of Windows XP support removed the requirement for a dedicated IP address, and the rise of low-cost certificates from domain-validated CAs such as and Let's Encrypt offering certificates for public sites at low or no cost. This made it practical to host a web development portfolio on HTTPS.

But isn't completely without drawbacks in edge cases. One is that the deprecation of cleartext HTTP resulted in restriction of JavaScript functionality to secure contexts, which makes it harder for the operator of a server on a private home LAN to offer those features to visitors to the LAN because such servers rarely have a stable FQDN.

The other is that public resources delivered through HTTPS cannot be cached by an intermediate proxy. Sometimes a last-mile ISP, especially one serving a remote or less-developed area, puts HTTP clients behind a caching proxy to make the most efficient use of a slow upstream connection. For HTTPS, the ISP would need to act as a man in the middle (MITM) for all outgoing HTTPS connections and in turn require subscribers to install the MITM's certificate as a trusted root. Enterprise firewalls at sufficiently large businesses tend to do this.[23] This reduces the number of entities that can view the communication from everyone on the path to three: the client, the server, and a single proxy cluster at the ISP. But traditionally, subscribers to a home ISP have desired to keep certain things private even from the ISP, such as financial transactions, making three entities one too many. Previously, a site could offer resources that are not specific to a user session through cleartext HTTP with Cache-Control: public, and switch to HTTPS only once a user session is established. But with the "encrypt all the things" mentality that took hold in the early to mid 2010s, the proxy has no way to know in advance which connections contain information acceptable for the ISP's other subscribers to see, as the Cache-Control: public header isn't set until after the connection is already established. Furthermore, as arth1 and later US-CERT pointed out, this technique hides details about the site's certificate from the subscriber, as the browser instead sees the certificate generated by the proxy. This includes the certificate's assurance level, particularly whether it uses Extended Validation.

What's worse: someone seeing what Wikipedia articles you're reading, or not being able to read them at all because your ISP hit its daily cap downloading separate copies of the article for other users?

Mobile phones

The problem with making applications for mobile phones and then distributing them to the public used to involve BREW's larger entry barriers,[24] which were even more closed than Apple's iOS developer program, and the difficulty of buying a device without a 24-month cellular voice and data service commitment. But starting in the fourth quarter of 2011, it had become easier because of the U.S. cellular industry's shift toward buying smartphones up front, led by T-Mobile and the prepaid MVNOs.

As of 2014, the big problems are CPU and GPU differences among Android devices and input deficiencies of touch-screen devices in general.

P2P music sharing

Pointless in most cases. Virtually all music controlled by the major record labels is all-rights-reserved, and sharing it with the world is copyright infringement. Sharing cover versions is copyright infringement, as the songwriter and music publisher aren't getting the royalties that they are due. Even sharing recordings of independent artists' own compositions is also likely to be copyright infringement as well: see Songwriting.


are not always a bad thing. The Lempel-Ziv-Welch patent (U.S. Patent 4,558,302 and foreign counterparts) used in GIF did not cover lossless image compression; it covered a specific bytestream compression method. Other non-patented bytestream compression schemes exist; the Deflate algorithm (used in such apps as gzip and zip) was selected for PNG, and 7-Zip uses the LZMA algorithm.

The bad thing is overly broad patents. U.S. Patents #5,715,314 (electronic shopping carts) and #5,960,411 (single-action purchasing over WWW) cover both known ways to handle online shopping. Other patents such as #5,253,341 (compressed images) and #4,873,662 (hyperlinks; read more) seem to cover the basic concept of a World Wide Web.

The bad thing is patent examiners not doing their job. Patent #6,061,680 on using a hash of a compact disc's table of contents as a database key (i.e. how CDDB works) had prior art; CDDB existed two years before the patent was filed. (In the United States, an inventor who does not file a patent application within twelve months of publicly disclosing an invention loses eligibility for a patent.) All Amazon's patent #5,960,411 added to prior art was "using HTTP"; is that really such a non-obvious invention?

The bad thing is patents on something that any undergraduate could have come up with, such as requiring one second of inactivity before and after an escape sequence to distinguish it from data (look up Hayes Smartmodem). The worse thing is a Congress that siphons needed funding from the Patent Office. Left to its own devices, the U.S. Patent and Trademark Office is fully self-sufficient from trademark and patent filing fees, but Congress uses the USPTO as a revenue source, making the USPTO unable to pay patent examiners to do their job.

The bad thing is companies such as Rambus, TechSearch, and PEARL Ltd. that make extortion via the court system their primary business model.

The only thing in a patent that has legal force is the claims. You have to make, use, or sell a device that uses all elements of a given claim to infringe it, but infringing even one claim is patent infringement. To view claims, enter the patent serial number (e.g. LZW patent is 4558302) at the US Patent Office Full Text Database.

PC vs. console gaming: Multiplayer

So you've got a home theater PC or a MAME cabinet. Now what are you supposed to play?

Or you've developed a multiplayer video game for one PC. Now who's supposed to play it?

See Single-screen multiplayer#Why?

RIAA monopoly

When was the last time you heard Creative Commons music on the radio?

In the United States, the FCC's monopoly on broadcasting prevents independent music from getting played on the radio. For a long time, Clear Channel (now iHeart) owned a large stake in XM satellite radio (now Sirius XM); it and a few other big players own most of the FM radio stations in most markets. It's hard for a new independent radio station to get a broadcasting license in the FM band (88.1 to 107.9 MHz), and without a sizable number of independent stations, radio listeners hear what iHeart wants them to hear, and the RIAA member labels pay a puppet promoter to pay iHeart to play RIAA music and only RIAA music. These bribes often come not in the form of cold hard cash but in free promotional copies of music and free tickets to live performances. True, Internet radio that plays only freely licensed music isn't subject to the broadcast cartel, but playing this in the car requires cellular data service that still costs hundreds of dollars per year as of 2016.

So recording artists unaffiliated with a major label have to find other ways to market indie music. And no, touring isn't always it, as not all genres are concert-friendly. There are so many popular albums whose songs cannot be recreated live that one comedy writer claims they need a warning label.[25]

Region coding

Using the region coding features of game consoles and DVD players to keep Japanese films and games out of American hands, especially when not a lot of text is involved and the community accepts bad translations as humorous, is a result of outright greed.

Region coded video game consoles: Famicom/NES, Mega Drive/Genesis, PlayStation, PS2, GameCube, Xbox, Xbox 360, Wii, Nintendo DSi, Nintendo 3DS

Region coded video game consoles known not to distinguish Japan from America after you pry off the tabs in the cartridge slot: Super Famicom/Super NES and Nintendo 64

Video game consoles known to be free of region lockout for games: Game Boy Color, Game Boy Advance, Nintendo DS, PSP, PlayStation 3 and later

Reverse engineering entertainment

Here's how to get around perpetual copyrights and trademarks: Abstract the copyrighted expression away from the uncopyrightable idea by finding antecedents from before 1923 (or which are otherwise Free). For example, derive Precious Moments from the Eloi people in chapter 4 of H. G. Wells's The Time Machine, and derive Enid Blyton's Noddy from Pinocchio renditions.

Another way to avoid copyright and trademark infringement is by taking a stereotype (uncopyrightable under Capcom v. Data East[14][15]) and "making it yours" by changing all the names and appearances so that any copied expression disappears into scènes à faire, or elements common in prior works. For example, the setting of Nintendo's Animal Crossing video games involves a lone human living in a forest populated by furries. These elements have appeared in works dating back to A.A. Milne's Winnie-the-Pooh (copyright expires 2 years left in USA, 11 years left in EU), and to Lego's Fabuland sets from the 1980s.


Video calling can replace a corded phone, not a cordless one. One has to sit in front of a computer instead of hanging a phone off a belt, donning a headset, and continuing to do chores around the house. Another problem is that a lot of people don't want to be seen without their makeup and presentable clothes on. And that's why my grandmother doesn't Skype.


Write a song. Put a recording on the Internet. Get sued.

The Handel v. Silver precedent[citation needed] recognizes a four-note match between two musical works as "substantial similarity" that constitutes prima facie evidence of copying. By that measure, in the Western musical scale, there exist only 50,000 melodies four notes in length.

There are several guides on the Internet to avoiding plagiarism, but most of them are directed at avoiding plagiarism in prose. Music differs from prose in that while "most people are unable to remember enough consecutive words from another source to make unintentional quotation a real problem," as one such guide puts it,[26] unintentional quotation of musical phrases has posed a problem in cases such as Bright Tunes Music v. Harrisongs Music.

The fear of accidentally copying an existing melody and facing a lawsuit from a major music publisher seems to put a chilling effect on creation of original works, as illustrated in the short story "Melancholy Elephants".[27] So sharing recordings of independent artists' own compositions may infringe copyright, as those songs that aren't direct covers may be inadvertent, subconscious, yet still infringing copies of all-rights-reserved major label musical works.[28][29]

It gets to the point where people are recommending against attempting to compose new music in favor of building movie and video game soundtracks out of arrangements of public-domain classical music. Rich Stim of Nolo calls this "Consider Cowriting With a Dead Songwriter."[30] The effect of this is the exact opposite of what copyright was intended for, namely "to promote the progress of science and useful arts" (U.S. Constitution, article I, section 8).


In the place where you live, unsolicited commercial e-mail ("spam") may or may not be legal. In the United States, the CAN-SPAM act set guidelines for legitimate direct marketing, but it failed to have much of an impact as spammers moved their operations offshore to botnets of compromised home computers in such countries as Brazil and the Republic of Korea.


There's more than one way to make a free GUI app that runs on more than one major desktop computer operating system. Cross-platform toolkits for GUI applications include GTK+, Qt, wxWidgets, and GNUstep. Cross-platform toolkits for games include SDL and Allegro, both of which can interface with OpenGL graphics.


Occasionally, trademarks have been used to authenticate products to other products. For example, Mattel Intellivision, Nintendo Game Boy, and Sega Genesis and Dreamcast consoles have a "Trademark Security System" (TMSS). The BIOS either won't start the program or will lock the video chip unless the program includes an instruction string that produces "PRODUCED BY OR UNDER LICENSE FROM" the console manufacturer, with copyright and trademark signs all over the screen. However, circumventing this is not an infringement of trademark. Use of a trademark as an ersatz patent is barred in the United States by the functionality doctrine, as interpreted by the Second Circuit in Sega v. Accolade (1992).


  1. Slashdot comment by sandytaru from May 2014
  2. Rob Pegoraro. "Rural options for speedy Internet still tough". USA Today, 2012-10-07. Accessed 2013-06-10.
  3. Stewart Mitchell. "Report: more users turn to satellite for broadband". Alphr, 2012-06-21. Accessed 2012-06-23, 2015-12-16.
  4. Paul Ockenden. "Why 3G broadband can be better and cheaper than ADSL". Alphr, 2012-05-11. Accessed 2012-06-23, 2015-12-16.
  5. Meanwhile, At Starbucks; WoW on an iMac in Panera; iMac in a coffee shop; Slashdot comment from July 2011; Slashdot comment from June 2012
  6. KingMotley's comments
  7. Fazer87. "Answer to Schedule a task with admin privileges without a user prompt in windows 7". Super User, 2014-06-18. Acessed 2017-06-08.
  8. Jon Brodkin. "Want fiber Internet? That’ll be $383,500, ISP tells farm owner". Ars Technica, 2015-08-11. Accessed 2015-10-13.
  9. Jon Brodkin. "Man builds house, then finds out cable Internet will cost $117,000". Ars Technica, 2015-09-30. Accessed 2015-10-13.
  10. Kyle Orland. "Why Nintendo can legally shut down any Smash Bros. tournament it wants". Ars Technica, 2013-07-11. Accessed 2015-05-18.
  11. Tony Ponce. "Sega forcing removal of Shining Force videos on YouTube". Destructoid, 2012-11-30. Accessed 2015-08-27.
  12. ReviewTechUSA. "Dear SEGA, SUE DSPGaming!" 2013-12-18. Accessed 2017-01-15.
  13. Jasmine Henry. "YouTube Gaming’s Copyright Rules Need Work". Game Rant, 2015-08-27. Accessed 2015-09-02.
  14. Ashlee Vance. "Larry Ellison Is Spending a Fortune to Save American Tennis". Bloomberg Business, 2015-06-04. Accessed 2015-06-04.
  15. Kyle Orland. "Analyst: Downloadable titles make up 92% of PC games market". Ars Technica, 2014-08-18. Accessed 2014-08-18.
  16. Matt Lee and John Sullivan. "Mark Zuckerberg is TIME Magazine's Person of the Year? Where's the "dislike" button?". Free Software Foundation, 2010-02-20. Accessed 2016-12-21.
  17. Mehak Anwar. "Millennials on multiple social networks more likely to be depressed". The Daily Dot, 2016-12-20. Accessed 2016-12-21.
  18. Drew Crawford. "Why mobile web apps are slow". Sealed Abstract, 2013-07-09. Accessed 2014-08-13.
  19. How can I avoid garbage collection delays in Java games? (Best Practices) Accessed 2014-08-13.
  20. KDE Windows Initiative
  21. RobSiklos et al. "How to make powershell tab completion work like bash". Stack Overflow, 2011-11-25. Accessed 2015-06-05.
  22. "Driver Signing changes in Windows 10". Windows Hardware Certification blog, 2015-04-01. Accessed 2015-06-05.
  23. Steffen Ullrich and Shadur. "Answer to Why is Cert Issuer different at my workplace?". Information Security Stack Exchange, 2017-02-21. Accessed 2017-02-21.
  24. Authentic Document IDs for BREW
  25. Adam Tod Brown. "7 Warning Labels Modern Music Desperately Needs". Cracked, 2014-03-27. Accessed 2014-03-27.
  26. Office of the Provost et al. "Nine Things You Should Already Know About Plagiarism". University of Oklahoma, 2014-08-21. Accessed 2014-09-25.
  27. Spider Robinson. "Melancholy Elephants". Baen. Accessed 2015-05-06.
  28. Damian Yerrick. "A Chilling Effect on Music. Slashdot, 2003-06-12. Accessed 2015-05-06.
  29. Peter C. Lemire. "Three Chords and the Truth Part II". Control Protect & Leverage, 2006-01-11. Accessed 2015-05-06.
  30. Rich Stim. "Ten Tips for Songwriters: Credits, Copyrights, and Coauthors". Nolo. Accessed 2015-05-06.

Articles by Damian Yerrick, published here

Pseudonymous articles, published here

Articles by Damian Yerrick, published elsewhere