My podcast is a regular feed in which I read from one of my stories for a few minutes at least once a week, from whatever friend's house, airport, hotel, conference, treaty negotiation or what-have-you that I'm currently at. You can get the Podcast through iTunes. Alternatively:
Subscribe to the Podcast
Podcast files an Oggs, streams, and different bitrate MP3s
I just appeared on the Command Line podcast (MP3) to talk about Information Doesn't Want to Be Free -- Thomas and I really had a wide-ranging and excellent conversation:
In this episode, I interview Cory Doctorow about his latest book, “Information Doesn’t Want to be Free: Laws for the Internet Age.” If you are interested in learning more about the topics we discuss and that that book covers, you can also check out books by the scholars we mention: Lawrence Lessig, James Boyle and William Patry. I compared Cory’s book to “The Indie Band Survival Guide” the authors of which are friends of the show whom I have also interviewed.
The audiobook version of the book is already available. Check Cory’s site, the free download and electronic editions should be available soon.
I appear in the latest edition of the Writing Excuses podcast (MP3), recorded live at Westercon in Salt Lake City last summer, with Mary Robinette Kowal, Brandon Sanderson, Dan Wells and Howard Tayler, talking about why we care about characters.
Last month, I sat down for a long conversation (MP3) with Ken Jones for the Between the Covers at Portland, Oregon's KBOO community radio station, talking about my book Information Doesn't Want to be Free. They've posted the audio so people from outside of Portland can hear it too!
I'm heading to Ann Arbor, DC and Baltimore this week for a series of talks -- I did a a quick interview with Baltimore's WYPR (MP3) that came out very well!
Here's an MP3 of the audio from the Reigniting Society’s Ambition with Science Fiction event that I did with Neal Stephenson and Ed Finn at Seattle Town Hall on Oct 26, to promote the Hieroglyph anthology, designed to inspire optimistic technologies to solve the Earth's most urgent problems. I had a story in it called The Man Who Sold the Moon.
I sat down at New York Comic-Con with Aaron from The Geekcast podcast for a long, interesting interview (MP3) on a wide variety of subjects about art, computers, games and justice!
Here's the audio of my closing keynote speech at last Friday's Dconstruct (this was the tenth Dconstruct; I'm pleased to say that I also gave the closing speech at the very first one!).
You can hear audio from the rest of the speakers too.
Here's a reading (MP3) of the first part of my story "Petard: A Tale of Just Desserts" from the new MIT Tech Review anthology Twelve Tomorrows, edited by Bruce Sterling. The anthology also features fiction by William Gibson, Lauren Beukes, Chris Brown, Pat Cadigan, Warren Ellis, Joel Garreau, and Paul Graham Raven. The 2013 summer anthology was a huge hit -- Gardner Dozois called it "one of the year’s best SF anthologies to date, perhaps the best."
Here's a reading (MP3) of my latest Guardian column, How Amazon is holding Hachette hostage, which examines how Hachette's insistence on DRM for their ebooks has taken away all their negotiating leverage with Amazon, resulting in Amazon pulling Hachette's books from its catalog in the course of a dispute over discounting:
Under US law (the 1998 Digital Millennium Copyright Act) and its global counterparts (such as the EUCD), only the company that put the DRM on a copyrighted work can remove it. Although you can learn how to remove Amazon's DRM with literally a single, three-word search, it is nevertheless illegal to do so, unless you're Amazon. So while it's technical child's play to release a Hachette app that converts your Kindle library to work with Apple's Ibooks or Google's Play Store, such a move is illegal.
It is an own-goal masterstroke. It is precisely because Hachette has been so successful in selling its ebooks through Amazon that it can't afford to walk away from the retailer. By allowing Amazon to put a lock on its products whose key only Amazon possessed, Hachette has allowed Amazon to utterly usurp its relationship with its customers. The law of DRM means that neither the writer who created a book, nor the publisher who invested in it, gets to control its digital destiny: the lion's share of copyright control goes to the ebook retailer whose sole contribution to the book was running it through a formatting script that locked it up with Amazon's DRM.
The more books Hachette sold with Amazon DRM, the more its customers would have to give up to follow it to a competing store.
Here's a reading (MP3) of a short story I wrote for the July, 2014 issue of Wired UK in the form of a news dispatch from the year 2024 -- specifically, a parliamentary sketch from a raucous Prime Minister's Question Time where a desperate issue of computer security rears its head:
Quick: what do all of these have in common: your gran's cochlear implant, the Whatsapp stack, the Zipcar by your flat, the Co-Op's 3D printing kiosk, a Boots dispensary, your Virgin thermostat, a set of Tata artificial legs, and cheap heads-up goggles that come free with a Mister Men game?
If you're stumped, you're not alone. But Prime Minister Lane Fox had no trouble drawing a line around them today during PMQs in a moment that blindsided the Lab-Con coalition leader Jon Cruddas, who'd asked about the Princess Sophia hacking affair. Seasoned Whitehall watchers might reasonably have expected the PM to be defensive, after a group of still-anonymous hackers captured video, audio and sensitive personal communications by hijacking the Princess's home network. The fingerpointing from GCHQ and MI6 has been good for headlines, and no one would have been surprised to hear the PM give the security services a bollocking, in Westminster's age-old tradition of blame-passing.
Nothing of the sort. Though the PM leaned heavily on her cane as she rose, she seemed to double in stature as she spoke, eyes glinting and her free hand thumping the Dispatch Box: "The Princess Sophia affair is the latest installment in a decades-old policy failure that weakened the security of computer users to the benefit of powerful corporations and our security services. This policy, the so-called 'anti-circumvention' rules, have no place in an information society.