Plenty of members in the blogger community are discussing this important topic. I am all for aggregating content to make people find information easier for how they use the web. The issue is that most of the blogger content is protected by copyright. That is sacred. Being a published author, this topic is sensitive for me. Very early in my consulting career, I was on a project where a consultant working for a competing firm and from a country that had few protections for the written word, borrowed the training material from a Lotus class paid for by the customer. He then went around to all of the other customers asking who wanted a copy. I declined. He then asked my trainer who was a CLI. She gave him an attitude adjustment and went to the client. Being a man of integrity, the client immediately saw the issue and fixed the problem. The point is that we take our protections of published work seriously here. For someone to disrespect the author's wishes for how their information is to be disseminated is shameful.
Another aspect is of the marketing on the site. Do the vendors know that the content on the site is being provided in a manner that is questionable in character? I would guess, and this is conjecture on my part, but most are probably sold on the concept sans seeing the site. If there were involved early on, then most definitely, in my opinion. Curious how the sponsors would respond if they knew there name was appearing adjacent to potentially illegally published content. If the business owner has integrity, I would think the advertising revenue stream would dry-up quickly. But that is a guess on my part, knowing nothing about LotusLearns particular arrangements therein.
If the CEO of LotusLearns chooses to publish the works from blog sites, then that is fine, so long as she provides attribution. If the author published the information as copyleft, then there is no issue. In grade school, most domestic children were taught that if you use another resource other than your own in your report, research, review, or other writing, you must provide a bibliography, reference page, or footnote section to properly cite your sources. It is sad to contemplate that school children have more sense of responsibility than some adults. To take --- without permission --- what is not one's and publish as one's own is dishonorable, illegal, and equates to cheating, in my opinion (I state this as such as I am not an attorney, nor do I disseminate legal opinions--just my perspective).
Would it really be that much harder for LotusLearns to append either as a prefix or suffix, a proper cite reference for her content? If you consider all of the community heat that site is going to take with its approach, plus all the time the LotusLearns CEO will spend defending its actions, it would be a better use of her and everyone else's time if she would just put the URL, source article name, and blog title for each post. That builds goodwill, earns respect and would make a potentially useful site an asset in our community.
IBM Mobile Connect POODLE Fix
Mon, Nov 3rd 2014 5:16a Bill Malchisky Jr. IBM just announced a couple of Technotes dealing with IBM Mobile Connect and POODLE. As this product is quite secure by design and a product that I enjoy as customers have a great track record with it in the field, the option to use TLS 1.0 - 1.2 is supported. The new SSL v3 security changes are implemented under APAR IV66131 -- available for IMC 6.1.5 and 18.104.22.168. Thus, if you have not upgraded IMC in the past ten days, then read below and plan your upgrade as appropriate. Here Are The Tec [read] Keywords: connections
IBM Protector for Mail Security POODLE Fix
Wed, Oct 22nd 2014 2:20p Bill Malchisky Jr. A day after providing two Technotes on SHA-2, TLS, and POODLE for Domino, IBM released two documents to cover their Protector product. The bulletin covers three vulnerabilities and provides details on each. For the workaround document, mind the side effect mentioned at the bottom, as with some sites, this may introduce a risk assessment against delivery versus the exploit's vulnerability. 1. Bulletin - Security Bulletin: Vulnerabilities in OpenSSL may cause weak cyphers to be used over SSLv [read] Keywords: domino
Ryder Cup Skype Chat Announced
Wed, Sep 24th 2014 9:12p Bill Malchisky Jr. It is that time again when the best pro golfers in The United States of America take on the best pro golfers in Europe for the coveted Ryder Cup. This year, it is played at the beautiful Gleneagles course in Scotland designed by pro golf legend Jack Nicklaus, who describes his course hole by hole. Play commences Friday, Saturday at 7:35am local time, or 2:35am EDT, with a more respectable Sunday start at 11:36a local time, or 6:36a EDT for singles play. I will open a Skype chat for the event. [read] Keywords: google
Big News for ICS Partners!
Wed, Sep 17th 2014 10:15p Bill Malchisky Jr. After three years of working with IBM, I am proud to make the first public announcement of the beta milestone of a new IBM community feedback continuity tool entitled, Voice of the Partner. ICS is behind this at the highest levels and there is a strong desire within IBM to make this a success. Imagine that as a partner you have a tool where you can input ideas and concerns to IBM and receive a response in a meaningful way, that also ensures continuity of feedback throughout the issue's life [read] Keywords: ibm
I AM Speaking at ICON UK
Thu, Sep 11th 2014 11:13a Bill Malchisky Jr. Long story short, I will be speaking this Friday, 12 September in London, for the ICON UK renaissance. You can find me acting as emcee for the Ask IBM session at 2:00pm (1400h) and then again at 3:45pm (1545h) presenting The Headless Collaborator: Sametime 9 Command Line Install. If you are in London for this wonderful event, please do say, "Hi," or better yet, attend one of my sessions. See you Friday! [read] Keywords: ibm