PrintNumber | ErrorLocation | Error | Correction | DateAdded |
---|---|---|---|---|
2 | pv | print line needs updated | done | 7/31/2008 |
2 | pxvii | Hal Abelson is Class of 1922 Professor of Electrical Engineering and Computer Science at MIT, and an IEEE Fellow. | Hal Abelson is Class of 1922 Professor of Computer Science and Engineering at MIT, and an IEEE Fellow. | 7/31/2008 |
2 | pxvii | Harry Lewis, former Dean of Harvard College, is Gordon McKay Professor of Computer Science at Harvard. | Harry Lewis, former Dean of Harvard College, is Gordon McKay Professor of Computer Science at Harvard and Fellow of the Berkman Center for Internet and Society. | 7/31/2008 |
2 | p24 | Global Positioning Systems (GPSs) have improved the marital lives of countless males too stubborn to ask directions. Put a Garmin or a TomTom in a car, and the car will radio its location to satellites, which will in turn communicate with ground-based mapping databases, which will finally radio driving directions to the car. Its a marvel that the 24 satellites spinning 12,500 miles above the earth can pin down the location of your car within 25 feet, all at a price that makes these systems standard options for new cars and popular birthday presents as add-ons. People love these systems. But change the scenario just a bit and the same technology feels less wonderful. |
Global Position Systems (GPSs) have improved the marital lives of countless males too stubborn to ask directions. Put a Garmin or a Tom Tom in a car, and it will listen to precisely timed signals from satellites reporting their positions in space. The GPS calculates its own location from the satellites' locations and the times their signals are received. The 24 satellites spinning 12,500 miles above the earth enable your car to locate itself within 25 feet, at a price that makes these systems popular birthday presents. If you carry a GPS-enabled cell phone, your friends can find you, if that its what you want. If your GPS-enabled rental car has a radio transmitter, you can be found whether you want it or not. |
7/31/2008 |
2 | p43 | You can find out for yourself, at www.fec.gov. | You can find out for yourself, at www.fec.gov or fundrace.huffingtonpost.com. |
7/31/2008 |
2 | p64 | Fair Practices | Fair Information Practice Principles | 7/31/2008 |
2 | p65 | These principles were originally promulgated for U.S. medical data, but became a model for thinking about all kinds of personal data, especially in Europe. They have been the foundation for many corporate privacy policies. | These principles were proposed for U.S. medical data, but were never adopted. Nevertheless, they have been the foundation for many corporate privacy policies. | 7/31/2008 |
2 | p66 | All corporations doing business with the public have privacy notices, and virtually no one reads them. | Most large corporations doing business with the public have privacy notices, and virtually no one reads them. | 7/31/2008 |
2 | p67 | The European reliance on the Fair Information Privacy Practices is often no more useful, in practice, than the American approach. | The European reliance on the Fair Information Practice Principles is often no more useful, in practice, than the American approach. | 7/31/2008 |
2 | p69 | If Seligmann had gone to the extraordinary lengths necessary to avoid leaving digital fingerprintsnot using a modern camera, a cell phone, or a bank, and living off campus to avoid electronic lockshe might be in prison today. | If Seligmann had gone to the extraordinary lengths necessary to avoid leaving digital fingerprintsnot using a modern camera, a cell phone, or a bank, and living off campus to avoid electronic lockshis defense would have lacked important exculpatory evidence. | 7/31/2008 |
2 | p83 | attaches a message authentication code (MAC) to the image, and uploads the image and the MAC to the verification system. The system processes the received image with the same key and verifies that the same MAC results. The system is secure because it is impossible, with any reasonable amount of computation, to produce any other image that would yield the same MAC with this key. | attaches a digital signature (see Chapter 5) to the image and uploads the image and the signature to the verification system. The system processes the received image with the same key and verifies that the same signature results. The system is secure because it is impossible, with any reasonable amount of computation, to produce another image that would yield the same signature with this key. | 7/31/2008 |
2 | p90 | Depending on the use for which the image was being put, a lossy compression method might be acceptable. | Depending on how an image will be used, a lossy compression method might be acceptable. | 7/31/2008 |
2 | p93 | Indeed, it does so regularly, in order to enhance the capabilities of its softwareand new releases create incompatibilities with legacy documents. A document created with Word 2007 cant be opened with Word 2003, and early adopters of the new, extended .docx format discovered similar problems with previous versions of the software. | Indeed, it does so regularly, in order to enhance the capabilities of its softwareand new releases create incompatibilities with legacy documents. Some documents created with Word 2007 can't be opened in Word 2003 without a software add-on, so even all-Microsoft offices risk document incompatibilities if they don't adjust to Microsoft's format changes. | 7/31/2008 |
2 | p102 | Filling blocks with zeroes takes timeif the file is huge, a lot of timeso much time that users would complain about how slowly their computers were running if every abandoned block were immediately zeroed. | Filling blocks with zeroes might take so much time that the users would complain about how slowly their machines were running if every block were zeroed immediately. With some clever programming the process could be made unnoticeable, but so far neither Microsoft nor Apple has made the necessary software investment. | 7/31/2008 |
2 | p117 | In February 2008, a San Francisco Judge tried to shut down the Wikileaks web site, which posts leaked confidential documents anonymously as an aid to whistleblowers. | In February 2008, a San Francisco judge tried to shut down the Wikileaks web site, which posts leaked confidential documents anonymously as an aid to whistleblowers. | 7/31/2008 |
2 | p153 | (This is apparently an allusion to another Google maxim, Do no evilnow revised to read, You can make money without doing evil.) | (This is apparently an allusion to another Google maxim, Dont be evilnow revised to read, You can make money without doing evil.) | 7/31/2008 |
2 | p189 | From Clipper Wars, the furious industry reaction against the Clinton Administrations Clipper Chip proposal. Reprinted with permission. | Reprint with permission of RSA Security, Inc. | 8/12/2008 |
2 | p227 | That might have seemed reasonable at a time when planes flew at only 1,000 feet. | That might have seemed reasonable at a time when planes flew at only a few thousand feet. | 8/12/2008 |
2 | p317 | Endnote #6, extra space | fixed | 8/12/2008 |
2 | p320 | Endnote #30, Because his ticket did not... should be in italic. | fixed | 8/12/2008 |
2 | p320 | Endnote #49: OnStar warns, OnStar will cooperate
OnStar Helpful Info web page. www.onstar.com/us_english/jsp/explore/onstar_basics/helpful_info. jsp?info-view=serv_plan. missing end quote |
fixed | 8/12/2008 |
2 | p324 | Endnote #77: bad spacing Endnote #93: A document created with Word 2007 See, for example, Shan Wang, New Word frustrates users, Harvard Crimson, November 26, 2007. |
fixed Some documents created with Word 2007 See, for example, Shan Wang, New Word frustrates users, Harvard Crimson, November 26, 2007. |
8/12/2008 |
2 | p327 | Endnote #139(2nd one): bad spacing | fixed | 8/12/2008 |
2 | p341 | Endnote #255: Is it possible that a rogue Warren Richey, Once its on the Web, whose law applies?, Christian Science Monitor, December 19, 2002. | by imposing death sentences Warren Richey, Once its on the Web, whose law applies?, Christian Science Monitor, December 19, 2002. | 8/12/2008 |
2 | p358 | Index entry: MAC (message authentication code), 83 | removed | 8/12/2008 |
3 | p93 | Public documents were public property; access should never require the cooperation of a single private corporation. |
Public documents were public property; access should never require the cooperation of a single private corporation. Peter Quinn, the states Chief Information Officer, added, The world is about open standards...I cant understand why anybody would want to continue making closed-format documents anymore. |
6/10/2009 |
3 | p94 | Kriss returned to private industry as he had planned to do before joining the state government. |
Delete sentence. | 6/10/2009 |
3 | p324 | Add endnote: 93 The world is about open standards... Massachusetts Verdict: MS Office Formats Out, eWeek.com, www.eweek.com/article2/0,1895,1863060,00.asp. |
fixed | 6/10/2009 |