Interactive Week: Fueling Bandwidth Trading. But the energy giant and a few of its neighbors in downtown Houston believe that – regardless of the current wreckage – they are going to transform the telecommunications business and the way bandwidth is bought, sold and traded. 6:28:47 PM

NY Times: Software Double Bind. A question, of course, is how anyone would ever be able to obtain and use the tools that would legally allow them to circumvent copy-protection technology if the people that make and distribute them are thrown in jail or prosecuted in civil trials. [Tomalak’s Realm] 6:23:41 PM

Industry Standard: Visible Hand. Lawrence Lessig. The harder issue – so far forgotten in this debate – is privacy. In real space, stores collect sales tax without necessarily collecting personal information. That’s because there’s “cash” in real space, and cash is a privacy-enhancing technology. [Tomalak’s Realm] 6:20:55 PM

Renato Iannella: Digital Rights Management Architectures. [Scripting News] 2:11:59 PM

XSLT (eXtensible Stylesheet Language Transformation) Basics: Push and Pull Models. Much more detailed, and therefore more interesting. I don’t really see the point of the push/pull definition, but the examples are excellent. 2:02:16 PM

Intro to XSLT, Part II. Short and sweet. 2:00:36 PM

The full text of the Cluetrain Manifesto is available on the Web. 1:51:09 PM

Steven Levy: “When it comes to protecting the business plans of those who publish books and music, academic freedom and free speech are apparently expendable.” 1:50:24 PM

A Warhol Worm: An Internet plague in 15 minutes!. A Warhol Worm: An Internet plague in 15 minutes. A more co-ordinated scanning strategy could infect a million machines in 15 minutes. Too fast for humans to track / deal with. 1:37:53 PM