[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/words-to-avoid.es.html philosoph...
From: |
GNUN |
Subject: |
www philosophy/words-to-avoid.es.html philosoph... |
Date: |
Thu, 1 Sep 2016 08:58:26 +0000 (UTC) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/09/01 08:58:25
Modified files:
philosophy : words-to-avoid.es.html
philosophy/po : words-to-avoid.es-en.html
proprietary : malware-microsoft.es.html proprietary.es.html
proprietary/po : malware-microsoft.es-en.html
proprietary.es-en.html
server : body-include-2.es.html sitemap.es.html
server/po : body-include-2.es.po sitemap.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.es.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.es-en.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.es.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/server/body-include-2.es.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.es.html?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/body-include-2.es.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.es-en.html?cvsroot=www&r1=1.73&r2=1.74
Patches:
Index: philosophy/words-to-avoid.es.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.es.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- philosophy/words-to-avoid.es.html 20 Jul 2016 09:00:09 -0000 1.131
+++ philosophy/words-to-avoid.es.html 1 Sep 2016 08:58:24 -0000 1.132
@@ -503,11 +503,22 @@
Quienes utilizan el término «contenido» son generalmente los editores, que
buscan incrementar el poder del copyright en nombre de los autores
(«creadores», como ellos los llaman) de las obras. El término «contenido»
-revela su verdadera actitud hacia las obras y los autores (véase la <a
-href="http://www.salon.com/2000/06/14/love_7/">carta abierta de Courtney
-Love a Steve Case</a> y buscar por «<cite>content provider</cite>» en esa
-página. Lamentablemente, la señorita Love no se ha dado cuenta de que la
-expresión «propiedad intelectual» también es <a
+revela su verdadera actitud hacia las obras y los autores. Esto lo ha
+reconocido también Tom Chatfield <a
+href="https://www.theguardian.com/culture/2016/aug/02/how-to-deal-with-trump-trolls-online">en
+el Guardian</a>:</p>
+
+<blockquote><p>
+El contenido propiamente dicho es irrelevante, como se desprende del uso de
+palabras como «contenido». En el momento en que se empieza a etiquetar cada
+fragmento de texto existente como «contenido», estos se admiten como
+intercambiables: su principal propósito es abastecer la factorÃa métrica.
+</p></blockquote>
+
+<p>Véase también la <a href="http://www.salon.com/2000/06/14/love_7/">carta
+abierta de Courtney Love a Steve Case</a> y buscar por «<cite>content
+provider</cite>» en esa página. Lamentablemente, la señorita Love no se ha
+dado cuenta de que la expresión «propiedad intelectual» también es <a
href="#IntellectualProperty">sesgada y confusa</a>).</p>
<p>
Sin embargo, mientras otras personas usen el término «<cite>content
@@ -1268,7 +1279,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/07/20 09:00:09 $
+$Date: 2016/09/01 08:58:24 $
<!-- timestamp end -->
</p>
Index: philosophy/po/words-to-avoid.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.es-en.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- philosophy/po/words-to-avoid.es-en.html 20 Jul 2016 09:00:09 -0000
1.79
+++ philosophy/po/words-to-avoid.es-en.html 1 Sep 2016 08:58:25 -0000
1.80
@@ -449,12 +449,22 @@
that push for increased copyright power in the name of the authors
(“creators,” as they say) of the works. The term
“content” reveals their real attitude towards these works
-and their authors.
-(See <a href="http://www.salon.com/2000/06/14/love_7/">Courtney
+and their authors. This was also recognized by Tom Chatfield
+<a
href="https://www.theguardian.com/culture/2016/aug/02/how-to-deal-with-trump-trolls-online">in
the Guardian</a>:</p>
+
+<blockquote><p>
+Content itself is beside the point—as the very use of words like
+content suggests. The moment you start labelling every single piece of
+writing in the world “content,” you have conceded its
+interchangeability: its primary purpose as mere grist to the metrical
+mill.
+</p></blockquote>
+
+<p>See also <a href="http://www.salon.com/2000/06/14/love_7/">Courtney
Love's open letter to Steve Case</a> and search for “content
provider” in that page. Alas, Ms. Love is unaware that the term
“intellectual property” is
-also <a href="#IntellectualProperty"> biased and confusing</a>.)</p>
+also <a href="#IntellectualProperty"> biased and confusing</a>.</p>
<p>
However, as long as other people use the term “content
provider,” political dissidents can well call themselves
@@ -1237,7 +1247,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/20 09:00:09 $
+$Date: 2016/09/01 08:58:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-microsoft.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.es.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/malware-microsoft.es.html 24 Aug 2016 12:28:04 -0000
1.25
+++ proprietary/malware-microsoft.es.html 1 Sep 2016 08:58:25 -0000
1.26
@@ -225,6 +225,7 @@
</ul>
<h3 id="surveillance">Vigilancia de Microsoft</h3>
+
<ul>
<li><p>
<a
@@ -241,7 +242,12 @@
los archivos del usuario, lo que escribe, lo que dice, su ubicación, sus
contactos, los registros en el calendario y el historial de navegación, asÃ
como a conectar automáticamente el equipo a redes públicas inalámbricas y
-mostrarle al usuario anuncios personalizados.</p></li>
+mostrarle al usuario anuncios personalizados.</p>
+
+ <p>Podemos suponer que Microsoft mira los archivos de los usuarios a pedido
del
+gobierno de los Estados Unidos, aunque su «polÃtica de privacidad» no lo
+diga explÃcitamente. ¿Mirará también los archivos de los usuarios a pedido
+del gobierno chino?</p></li>
<li><p>
<a
@@ -250,35 +256,10 @@
el usuario desactiva la función de búsqueda Bing y Cortana y activa los
parámetros de protección de la privacidad. </p></li>
- <li><p>
- Microsoft utiliza la «polÃtica de privacidad» de Windows 10 para imponer
-abiertamente el «derecho» de mirar los archivos de los usuarios en cualquier
-momento. El cifrado de disco completo en Windows 10 <a
-href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">proporciona
-una llave a Microsoft</a>.</p>
-
- <p>AsÃ, Windows es un <cite>malware</cite> al descubierto con respecto a la
-vigilancia, como también en otros aspectos.</p>
-
- <p>Podemos suponer que Microsoft mira los archivos de los usuarios a pedido
del
-gobierno de los Estados Unidos, aunque su «polÃtica de privacidad» no lo
-diga explÃcitamente. ¿Mirará también los archivos de los usuarios a pedido
-del gobierno chino?</p>
-
- <p>La «identificación publicitaria», única para cada usuario, permite a
otras
-compañÃas rastrear los sitios que visita cada usuario en particular.</p>
-
- <p>Pareciera que Microsoft ha optado deliberadamente por convertir a Windows
10
-en la máxima malignidad en toda dimensión, adueñarse de un poder total sobre
-todo aquel que no abandone Windows ahora mismo.</p></li>
-
- <li><p><a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">Windows
-10 exige a los usuarios que otorguen un permiso para husmear en todas
-partes</a>, incluso en sus archivos, ingresos de órdenes, ingresos de texto
-e ingresos vocales.</p></li>
+ <li><p>La «identificación publicitaria», única para cada usuario,
permite a otras
+compañÃas rastrear los sitios que visita cada usuario en particular.</p></li>
- <li>Código espÃÂa en Windows: <a
+ <li>Código espÃÂa en Windows 8: <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"><i>Windows
Update</i> husmea en las actividades del usuario</a>. <a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">Windows
@@ -410,7 +391,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/08/24 12:28:04 $
+$Date: 2016/09/01 08:58:25 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/proprietary.es.html 25 Jul 2016 10:58:46 -0000 1.10
+++ proprietary/proprietary.es.html 1 Sep 2016 08:58:25 -0000 1.11
@@ -51,6 +51,8 @@
Apple</a></li>
<li><a href="/proprietary/malware-microsoft.html">El <cite>malware</cite> de
Microsoft</a></li>
+ <li><a href="/proprietary/malware-adobe.html">El <cite>malware</cite> de
+Adobe</a></li>
<li><a href="/proprietary/malware-mobiles.html"><cite>Malware</cite> en los
dispositivos móviles</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html"><cite>Malware</cite>
en
@@ -167,7 +169,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/07/25 10:58:46 $
+$Date: 2016/09/01 08:58:25 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-microsoft.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/malware-microsoft.es-en.html 24 Aug 2016 12:28:04 -0000
1.24
+++ proprietary/po/malware-microsoft.es-en.html 1 Sep 2016 08:58:25 -0000
1.25
@@ -192,6 +192,7 @@
</ul>
<h3 id="surveillance">Microsoft Surveillance</h3>
+
<ul>
<li><p>
<a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
@@ -205,7 +206,11 @@
to snoop on the users' files, text input, voice input,
location info, contacts, calendar records and web browsing
history, as well as automatically connecting the machines to open
- hotspots and showing targeted ads.</p></li>
+ hotspots and showing targeted ads.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on demand?</p></li>
<li><p>
<a
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
@@ -213,33 +218,10 @@
turns off its Bing search and Cortana features, and activates the
privacy-protection settings.</p></li>
- <li><p>
- Microsoft uses Windows 10's “privacy policy” to overtly impose a
- “right” to look at users' files at any time. Windows 10 full disk
- encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
- gives Microsoft a key</a>.</p>
-
- <p>Thus, Windows is overt malware in regard to surveillance,
- as in other issues.</p>
-
- <p>We can suppose Microsoft look at users' files for the US government on
- demand, though the “privacy policy” does not explicit say so.
Will it
- look at users' files for the Chinese government on demand?</p>
-
- <p>The unique “advertising ID” for each user enables other
companies to
- track the browsing of each specific user.</p>
-
- <p>It's as if Microsoft has deliberately chosen to make Windows 10
- maximally evil on every dimension; to make a grab for total power
- over anyone that doesn't drop Windows now.</p></li>
-
- <li><p><a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
- Windows 10 requires users to give permission for total snooping</a>,
- including their files, their commands, their text input, and their
- voice input.</p></li>
+ <li><p>The unique “advertising ID” for each user enables other
companies to
+ track the browsing of each specific user.</p></li>
- <li>Spyware in Windows: <a
-href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ <li>Spyware in Windows 8: <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user.</a>
<a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
Windows 8.1 snoops on local searches.</a> And there's a
@@ -347,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/08/24 12:28:04 $
+$Date: 2016/09/01 08:58:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary.es-en.html 24 Jul 2016 14:28:52 -0000
1.6
+++ proprietary/po/proprietary.es-en.html 1 Sep 2016 08:58:25 -0000
1.7
@@ -43,6 +43,7 @@
<li><strong>Company or type of product</strong></li>
<li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
<li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
+ <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
<li><a href="/proprietary/malware-mobiles.html">Malware in mobile
devices</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html">Malware in the Amazon
Swindle</a></li>
@@ -137,7 +138,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/24 14:28:52 $
+$Date: 2016/09/01 08:58:25 $
<!-- timestamp end -->
</p>
</div>
Index: server/body-include-2.es.html
===================================================================
RCS file: /web/www/www/server/body-include-2.es.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- server/body-include-2.es.html 30 Aug 2016 12:28:21 -0000 1.101
+++ server/body-include-2.es.html 1 Sep 2016 08:58:25 -0000 1.102
@@ -4,8 +4,8 @@
style="text-align: center; font-size: 1.2em; line-height: 1.4em;
padding: .2em; margin: 0; background: #ddeced;
border-top: .2em solid #0088a0; border-bottom: .2em solid #0088a0;">
-<strong><a href="http://www.gnuhealthcon.org/2016-las_palmas/">GNU Health
-Conference</a></strong> Nov 18-20, Las Palmas, Spain
+<strong><a href="http://www.gnuhealthcon.org/2016-las_palmas/">Conferencia
+GNU Health</a></strong> 18-20 de noviembre, Las Palmas, España
#GNUHealthCon2016
</p>
<div id="header">
Index: server/sitemap.es.html
===================================================================
RCS file: /web/www/www/server/sitemap.es.html,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- server/sitemap.es.html 29 Aug 2016 17:30:06 -0000 1.140
+++ server/sitemap.es.html 1 Sep 2016 08:58:25 -0000 1.141
@@ -1706,7 +1706,7 @@
</span>
<dl>
<dt><a href="/proprietary/malware-adobe.html">malware-adobe.html</a></dt>
- <dd>Adobe's Software is Malware</dd>
+ <dd>El software de Adobe es <cite>malware</cite></dd>
<dt><a href="/proprietary/malware-apple.html">malware-apple.html</a></dt>
<dd>Los sistemas operativos de Apple son <cite>malware</cite></dd>
<dt><a
href="/proprietary/malware-appliances.html">malware-appliances.html</a></dt>
@@ -2056,7 +2056,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/08/29 17:30:06 $
+$Date: 2016/09/01 08:58:25 $
<!-- timestamp end -->
</p>
Index: server/po/body-include-2.es.po
===================================================================
RCS file: /web/www/www/server/po/body-include-2.es.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- server/po/body-include-2.es.po 1 Sep 2016 08:54:51 -0000 1.102
+++ server/po/body-include-2.es.po 1 Sep 2016 08:58:25 -0000 1.103
@@ -39,8 +39,8 @@
"<a href=\"https://www.fsf.org/associate/support_freedom?"
"referrer=4052\">JOIN THE FSF</a>"
msgstr ""
-"<a href=\"https://www.fsf.org/associate/support_freedom?"
-"referrer=4052\">¡Ãnase a la FSF!</a>"
+"<a href=\"https://www.fsf.org/associate/support_freedom?referrer=4052\">"
+"¡Ãnase a la FSF!</a>"
#. type: Content of: <div><div><div><p>
msgid "<a href=\"http://www.fsf.org/fss\">Free Software Supporter</a>"
Index: server/po/sitemap.es-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.es-en.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/po/sitemap.es-en.html 26 Aug 2016 07:58:07 -0000 1.73
+++ server/po/sitemap.es-en.html 1 Sep 2016 08:58:25 -0000 1.74
@@ -1603,6 +1603,8 @@
Proprietary Software Is Often Malware<span class="gnun-split"></span>
</span>
<dl>
+ <dt><a href="/proprietary/malware-adobe.html">malware-adobe.html</a></dt>
+ <dd>Adobe's Software is Malware</dd>
<dt><a href="/proprietary/malware-apple.html">malware-apple.html</a></dt>
<dd>Apple's Operating Systems Are Malware</dd>
<dt><a
href="/proprietary/malware-appliances.html">malware-appliances.html</a></dt>
@@ -1926,7 +1928,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/08/26 07:58:07 $
+$Date: 2016/09/01 08:58:25 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www philosophy/words-to-avoid.es.html philosoph...,
GNUN <=