EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.09.13

Links 9/1/2013: Mageia Moves Ahead, Fedora 18 Beta for ARM

Posted in News Roundup at 9:10 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Want to understand open source? Live with its developers

    Let’s say you want to understand what makes free and open source software (FOSS) so vital today—and what makes those who write it so committed to their difficult work. How would you do this? You might crack a few books on the cultural history of coding, like Levy’s Hackers or Markoff’s What the Dormouse Said, both pivotal explorations of the values that seem to guide open source programming (what we might call “the hacker ethic”). You might pore over the seminal tracts that give voice to these values—Raymond’s The Cathedral and the Bazaar or Stallman’s GNU Manifesto, perhaps. You might even peruse key documents from the projects themselves—maybe the Debian Social Contract or the Fedora Licensing Guidelines.

  • Web Browsers

    • Mozilla

      • Firefox OS finds a new way to app
      • Find out what’s new in Firefox 18

        Mozilla is currently in the process of releasing new versions of the Firefox web browser. Stable channel users will be moved from Firefox 17.0.1 to Firefox 18 via automatic updated if the browser has not not been configured otherwise. The new release is already on Mozilla’s ftp server but not on the main site which means that there is still a slim chance that it will be replaced by another version. Most of the time though that is not happening and if you are experiencing issues with Firefox 17.0.1 you may want to upgrade right away. Download portals such as Softpedia already list the new version for download on their sites.

      • Mozilla Firefox 18 Boosts Performance with IonMonkey

        Mozilla is out with its first Firefox release of 2013 today, accelerating the open source web browser with a new engine.

        Firefox 18 includes the IonMonkey JavaScript engine that Mozilla first started testing in September of 2012. IonMonkey can improve performance by as much as 25 percent for JavaScript heavy pages, by introducing an extra layer of JavaScript optimization known as intermediate representation (IR).

      • Firefox 18 Launches With Faster IonMonkey-Enabled JavaScript, Built-In PDF Viewer
      • Firefox 18 Features Major Update to JavaScript Engine: Ion Monkey

        On Tuesday, Mozilla pushed out version 18 of the Firefox browser. Unlike your average browser update, this one includes an overhauled JavaScript engine, Ion Monkey, which you can find complete details on here. Ion Monkey speeds up JavaScript tasks by translating them to intermediate representations, optimizing them, and then translating them to machine code. It should have a big impact on web apps, and also on games.

      • Mozilla Firefox 18 Boosts Performance with IonMonkey
  • Public Services/Government

    • Greek government asked to adapt enquiry form to accommodate open source

      Eel/lak, a Greek open source advocacy group wants the Greek administration to change one its enquiry forms, to accommodate users of free and open source software solutions. The form is used by the Greek government’s Financial and Economic Crime Unit when requesting companies and organisations to provide an inventory of their software licences along with the corresponding invoices.

    • Study Finds Free Trade With China Lowered American Manufacturing By 29.6 Percent

      Around 2001, the raw number of manufacturing jobs in the United States plummeted from just over 17 million to just over 14 million. After leveling off for a few years, it collapsed to around 11.5 million due to the Great Recession. It’s since seen a small rebound under President Obama’s tenure, but the continuing depression has put the long-term fate of manufacturing back on the national radar.

  • Openness/Sharing

  • Programming

Leftovers

  • Full Show: Ending the Silence on Climate Change
  • 1998’s most intriguing OS, 15 years later: Hands-on with Haiku alpha 4
  • Security

  • Defence/Police/Secrecy/Aggression

    • Does It Matter if John Brennan Was Complicit in Illegal Torture?

      In nominating John Brennan to head the CIA, President Obama has made it more urgent that the report be declassified. It is one of several sources that could help us to answer an important question: Are the American people being asked to entrust our clandestine spy agency and its killing and interrogation apparatuses to a man who was complicit in illegal torture?

    • New CIA boss plans to retire in Ireland once his term ends

      The new head of the Central Intelligence Agency (CIA) hopes to retire to Ireland when his term is completed, his family have revealed.

      John Brennan, whose family come from Co Roscommon, was this week nominated by US President Barack Obama to lead the CIA. The former counter-terrorism adviser paid an unplanned visit to these shores last November when he visited his Irish relations.

    • ‘CIA turns into military force, targets countries it’s not at war with’
    • Was a Reporter’s Role in a Government Prosecution a Reason to Recuse Him?

      Some readers found fault with Mr. Shane’s writing of the story, given his involvement. One was James Savage, a former longtime investigations editor with The Miami Herald.

      [...]

      I’ve been writing recently about the debate over reportorial impartiality and its role in the truth-telling that makes journalism worthwhile. One crucial element when impartiality comes into question is transparency.

    • U.S. Spy Law Authorizes Mass Surveillance of European Citizens: Report

      Europeans, take note: The U.S. government has granted itself authority to secretly snoop on you.

      That’s according to a new report produced for the European Parliament, which has warned that a U.S. spy law renewed late last year authorizes “purely political surveillance on foreigners’ data” if it is stored using U.S. cloud services like those provided by Google, Microsoft and Facebook.

    • Excusing Torture, Again

      The neocon Washington Post let ex-CIA official Jose Rodriguez, who oversaw waterboarding and other torture and then destroyed the videotaped evidence, make his case that there was no torture, just effective interrogation that helped get Osama bin Laden. But ex-CIA analyst Ray McGovern disagrees.

      [...]

      Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. He was an Army Infantry/Intelligence officer in the early 60s and then served in CIA’s analysis division for 27 years.

    • Two Former US Officials Criticize Obama’s Counter-Productive Drone War

      The study concludes that the Obama administration has been “successful in spinning the number of civilian casualties” downward by counting all military-age males they kill as combatants. Civilian casualties are likely to be far higher than so far acknowledged, Boyle said, and government claims to the contrary are ”based on a highly selective and partial reading of the evidence.”

    • NSA Whistleblower Compares Case to CIA Officer Convicted of First Classified Leak

      On Sunday, New York Times journalist Scott Shane published a feature story on the Justice Department’s prosecution of John Kiriakou, a former CIA officer convicted of violating the Intelligence Identities Protection Act (IIPA) by revealing the name of an undercover officer. It was the first successful conviction of someone for a disclosure since President Barack Obama was elected president.

      Thomas Drake, a National Security Agency (NSA) whistleblower who the Obama administration tried to prosecute for a “leak” until the case collapsed, joined me for a conversation about the parallels between his prosecution and Kiriakou’s prosecution.

    • Terror Tuesday: Impunity surges in New Year
    • The FBI’s Manufactured War on Terrorism

      Under J. Edgar Hoover, the FBI became a self-perpetuating myth-making machine carved out of Hoover’s battle against communism, organized crime, and his war on civil rights and anti-war activists (Cointelpro). Now, in the post-Hoover, post-9/11 period, the war on terrorism allows the myth making to continue.

    • War Profiteers Still Finishing First

      So who’s the fool? The outfit that turned its business of peddling useless propaganda to U.S. occupied countries onto America itself – by smearing journalists that dared criticize it – or the government that hired them for hundreds of millions in the first place?

    • Obama Administration Interrogating Terror Suspects Locked Up Abroad (Again)

      Remember rendition? Many people believe the practice of having terrorism suspects interrogated overseas was supposed to end when George W. Bush left office. But President Barack Obama said he’d end torture, not renditions—and last week, the Washington Post reported that they’re still happening. That’s true in some sense, but as Mother Jones and others have reported, the Obama administration’s use of foreign regimes to detain and interrogate terrorism suspects has avoided Bush-style renditions in favor of a different practice known as proxy detention.

    • Former Guantanamo Prosecutor to Speak about Torture and Intelligence

      Colonel Morris Davis, anti-torture and humanitarian law advocate, will speak about “Confronting Torture: How it Makes America Less Safe” on Thursday, Jan. 31, at 12 p.m. in Rm. 5042 at the UNC School of Law. The lecture — free and open to the public — is sponsored by The Immigration & Human Rights Policy Clinic at UNC School of Law.

    • 5 terrifying facts about John Brennan
    • The CIA’s Hypocrisy on Secrets

      On Thursday, ex-CIA deputy director Jose Rodriguez publicly protested that agents had only used water bottles when waterboarding detainees, not the buckets shown in Zero Dark Thirty. Disclosures like that must chafe John Kiriakou, the ex-agent facing 30 months in prison for passing info to a reporter. “The contrast points to the real threat to secrecy,” namely, the agency itself, author Ted Gup writes in the New York Times. “The CIA invokes secrecy to serve its interests, but abandons it to burnish its image and discredit critics.”

    • As Brennan Tapped for CIA, Case of Somali Detainees Highlights Obama’s Embrace of Secret Renditions
    • Obama names head of drone assassination program to lead CIA
    • Republican senator threatens to block Obama’s CIA nominee
    • Senator threatens to block CIA nominee
    • John Brennan Wrong for CIA, CODEPINK Says

      Once CODEPINK heard about the coming nomination, we decided to protest in front of the white house. Within just a couple of hours banners were made, the press was called, and other CODEPINKers were alerted.

    • Secret Double Standard

      The contrast points to the real threat to secrecy, which comes not from the likes of Mr. Kiriakou but from the agency itself. The C.I.A. invokes secrecy to serve its interests but abandons it to burnish its image and discredit critics.

      Over the years, I have interviewed many active and retired C.I.A. personnel who were not authorized to speak with me; they included heads of the agency’s clandestine service, analysts and well over 100 case officers, including station chiefs. Five former directors of central intelligence have spoken to me, mostly “on background.” Not one of these interviewees, to my knowledge, was taken to the woodshed, though our discussions invariably touched on classified territory.

    • Kuwaiti police tear-gas opposition protesters

      Kuwaiti riot police on Sunday fired tear gas and stun grenades at hundreds of opposition protesters who demanded that the new parliament be dissolved and controversial electoral legislation be scrapped.

      Police arrested several protesters including Osama al-Shaheen, a member of the previous opposition-dominated parliament, as they chased demonstrators through a residential area south of the capital, Kuwait City.

    • US drones killed 25 in a single day

      As usual, all of the casualties were claimed to be militants. But a recent study by one of President Obama’s former counter-terrorism advisors concludes the administration has been “successful in spinning the number of civilian casualties” downward by counting all military-age males they kill as combatants.

    • DRONES DRAW MORE CONTROVERSY AS BERKELEY TRIES TO KEEP THEM OUT OF THEIR SKIES
    • Why You Won’t Hear About Drones at John Brennan’s Confirmation Hearing

      Alas, don’t hold your breath. The hearings will be run by Senator Dianne Feinstein, who is slated to remain chair of the Senate Select Committee on Intelligence. Despite leaking information regarding covert drone strikes in Pakistan, the senator strongly endorses targeted killings — and, more generally, executive branch secrecy– and will assuredly place strict limits on the discussion of drones in open session. Although drones and targeted killings were never raised in the confirmation hearings for previous CIA directors Michael Hayden or Leon Panetta, they were during successor David Petraeus’ testimony in June 2011. See below for the brief exchange between Senator Roy Blunt and Petraeus (where you read “(CROSSTALK)” that is Feinstein trying to interrupt the discussion.) Do not expect much more from John Brennan’s confirmation hearing.

    • nnan Needs to Correct the Record on Dro
    • Czar of the Drones

      …both boys were instantly vaporized—only a few chunks of flesh remained.

  • Cablegate

  • Environment/Energy/Wildlife

  • Finance

  • PR/AstroTurf/Lobbying

    • What Will Scott Walker Lift from the ALEC Agenda in 2013?

      Wisconsin’s 2011-2012 legislative session saw the introduction of 32 bills or budget provisions reflecting American Legislative Exchange Council (ALEC) model legislation — including Governor Scott Walker’s contentious attack on public sector collective bargaining, voter ID legislation, and bills that make it harder for Americans to hold corporations accountable when their products injure or kill — and 19 of those proposals became law.

  • Censorship

  • Privacy

  • Civil Rights

    • Secrecy and National Security Whistleblowing

      In the “national security” area of the government–the White House, the departments of state and defense, the armed services and the “intelligence community,” along with their contractors–there is less whistleblowing than in other departments of the executive branch or in private corporations. This despite the frequency of misguided practices and policies within these particular agencies that are both more well-concealed and more catastrophic than elsewhere, and thus even more needful of unauthorized exposure.

      The mystique of secrecy in the universe of national security, even beyond the formal apparatus of classification and clearances, is a compelling deterrent to whistleblowing and thus to effective resistance to gravely wrongful or dangerous policies. In this realm, telling secrets appears unpatriotic, even traitorous. That reflects the general presumption–even though it is very commonly false–that the secrecy is aimed not at domestic, bureaucratic or political rivals or the American public but at foreign, powerful enemies, and that breaching it exposes the country, its people and its troops to danger.

    • Student Loses Lawsuit Challenging Texas School’s RFID Tracking Program

      A Texas public school district’s controversial pilot program to keep track of its students on campus with Radio Frequency Identification (RFID) chips has survived a legal challenge in federal court. On Tuesday, U.S. District Judge Orlando Garcia dismissed a request for a preliminary injunction from Andrea Hernandez, a sophomore at John Jay High School in San Antonio who refused to wear the school’s ID cards on religious grounds.

    • Student Suspended for Refusing to Wear RFID Tracker Loses Lawsuit
    • As Criminal Laws Proliferate, More Are Ensnared

      Eddie Leroy Anderson of Craigmont, Idaho, is a retired logger, a former science teacher and now a federal criminal thanks to his arrowhead-collecting hobby.

    • Minn. driver’s license data snoopers are difficult to track

      Driver’s license info is readily accessible, but finding out who’s checking it out is not easy. Hennepin County Sheriff Rich Stanek challenges state to justify its secrecy.

    • John Brennan pick revives leaks dispute
    • On Civil Liberties, John Brennan Is No Worse Than Barack Obama

      Four years ago, White House counterterrorism adviser John Brennan withdrew his name from consideration to run the Central Intelligence Agency. On Monday, President Barack Obama announced Brennan was his pick for the job, following the resignation of David Petraeus over an extramarital affair.

    • War Powers Reversal

      Perhaps the greatest irony of the Obama Presidency is how much it has vindicated the antiterror strategy of its predecessor. The latest example is President Obama’s vexed statement in signing the National Defense Authorization Act of 2013.

    • China: Fully Abolish Re-Education Through Labor

      The Chinese government’s announcement today that it will sometime this year “stop using” the notorious Re-Education Through Labor (RTL) system is a rare positive response to the system’s growing unpopularity, Human Rights Watch said today. While suspending use of RTL would be an important step, the government should aspire to fully abolish the RTL system.

    • Paying a high price for cheap fashion

      Young women are mistreated in some Indian textile factories in the Tamil Nadu state. German companies are among those who work with factories in that region. But there is no obligation to disclose the commodity chain.

  • Internet/Net Neutrality

    • Response to Nominet direct.uk consultation

      Our response offers general comments on the proposals set out in the consultation document, rather than addressing the consultation questions specifically.

      We understand the interest in improving security online, and the consequent benefits for the confidence people have in online encounters.

      However, we do not believe that the proposed solution fits the problem. It is unclear that a .uk domain is the answer to the problems identified in the consultation document. We believe there are better ways to address a need to improve security and consequently help boost the confidence people have in online transactions.

  • Intellectual Monopolies

    • Trademarks

      • The Google Shortcut to Trademark Law

        The strength of a trademark — the extent to which consumers view the mark as identifying a particular source — is difficult to evaluate in practice. Assessments of “inherent distinctiveness” are highly subjective, survey evidence is expensive and unreliable, and other “commercial strength” factors such as advertising spending are poor proxies for consumer perceptions. Courts often fall back on heuristics and intuition rather than precise logical analysis.

    • Copyrights

      • RapidShare: Traffic and Piracy Dipped After New Business Model Kicked In

        Under continued pressure to take additional anti-piracy measures, file-hosting site RapidShare introduced a new business strategy last year. The model restricted the ability of all users to engage in third party public distribution, the most popular way of sharing copyrighted material. As a result the company experienced a significant drop in traffic and, according to a spokesman, a significant drop in copyright infringement too.

      • The Problem of “International Orphan Works” (Guest Blog Post)

        The U.S. Copyright Office recently extended the deadline by which the public may submit comments on issues related to orphan works until February 4, 2013. The Office is gathering suggestions for shaping future U.S. legislation and taking other actions to address the issues of works whose copyright has not expired, yet the owner of the copyright cannot be identified or located. However, legislating on orphan works at the national level cannot solve an important problem: the problem of establishing the status of an orphan work internationally. The solution to this problem is crucially important for anyone hoping to use orphan works on the internet – particularly entities that are among the most active lobbyists for orphan works legislation.

      • Anti-Piracy Company Seeks Patent On Automated Copyright Trolling
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Microsoft Windows Unsafe at Any Speed, by Design

    More timely reminders that Windows is simply not designed to be secure, irrespective of version, status of patching, etc.



  2. After Moonlight Dies and Even Microsoft Abandons Silverlight, the Abusive Monopolist Keeps Pushing for Other Microsoft Lock-in, Injecting OOXML Traps Into Free Software (Moodle)

    Despite a long history of Microsoft formats being proven guarantee of digital obsolescence, Moodle allows itself to become Microsoft prey and a Trojan horse for OOXML in classrooms (for children)



  3. Links 4/7/2015: Mostly (Geo)Political Catchup

    Links for the day



  4. Links 3/7/2015: KDE Applications 15.04.3, Ubuntu-Flavored Compute Stick

    Links for the day



  5. Patent Lawyers and Their Firms, Still Desperate to Protect the Status Quo, Manipulate the Media

    Patent lawyers are besieged by gradual tightening of patent scope and recklessly fight back (e.g. by saturating the media) to secure their revenue sources, derived from (and at the expense of) actual scientists and true market producers



  6. Amid Controversy, Political Scrutiny and Increased Media Pressure Željko Topić and Benoît Battistelli Allegedly Cancel Today's Trip to Zagreb (Croatia) Where Topić Faces Many Criminal Charges

    The Croatian press comments on the recent declaration from the Council of Europe and Topić's not-so-sterling status in his home country, where he is wanted for alleged crimes



  7. Microsoft Gradually Embraces, Extends, Extinguishes Linux Foundation as a Foundation of GNU/Linux

    By liaising with (or hijacking) existing members of the Linux Foundation, as well as by paying the Linux Foundation, Microsoft turns the Linux Foundation into somewhat of a Windows advocacy group



  8. Microsoft India Still Lobbies and Lies About Free Software in Order to Knock Down Policy That Favours Free Software

    Microsoft continues to bully Indian politicians who merely 'dare' to prefer software that India can modify, maintain, extend, audit, etc.



  9. Patent Lawyers and Corporate Media Nervous About New Patents Barrier/Reality (Less Patents on Software and Business Methods)

    The rich and the powerful, as well as their lawyers (whose job is to protect their money and power by means of government-enforced monopoly), carry on whining after the Alice case, in which many abstract patents were essentially ruled -- by extension -- invalid



  10. Translation of Pierre-Yves Le Borgn' Speech Against EPO Management and New Parliamentarian Interventions

    More political fire targeting the EPO's management, adding up to over 100 parliamentarians by now



  11. Links 2/7/2015: KDE Plasma 5.3.2, antiX 15

    Links for the day



  12. Links 1/7/2015: OpenDaylight Lithium, OpenMandriva Lx 2014.2

    Links for the day



  13. Munich Press, Münchner Merkur, Slams the Munich-based EPO

    Pressure on Benoît Battistelli to leave (or be fired) grows as the cronies whom he filled his office with have become a huge public embarrassment to the decades-old European Patent Office



  14. The Shameless Campaign to Paint/Portray Free Software as Inherently Insecure, Using Brands, Logos, and Excessive, Selective Press Coverage

    Some more FUD from firms such as Sonatype, which hope to make money by making people scared of Free/libre software



  15. National Insecurity and Blackmail, Courtesy of Microsoft

    British members of parliament (MPs) outsourced their communication to the number one PRISM company and they are paying the price for it; The US Navy's systems continue to be unbelievably insecure (Windows XP), despite access to the world's biggest nuclear arsenal



  16. Microsoft Keeps Shrinking

    As the era of shrink-wrapped software comes to an end so does Microsoft, whose effort to become a 'cloud' company with online operations has been miserable at best



  17. They 'R' Coming: More Microsoft Money for the Linux Foundation

    The problem with having Microsoft in a Linux Foundation initiative, the R Consortium



  18. Speculations About the EPO's Possible Role in DDOS Attacks

    Readers' views on who might be behind the attacks on this site amid confirmation that it's on the 'targets' list of the EPO



  19. Links 30/6/2015: Linux Mint 17.2, OpenMandriva

    Links for the day



  20. Techrights Confirmed as a Target of EPO Surveillance, With Help From Control Risks Group (CRG)

    Unveiling the cloak of secrecy from long-term surveillance by the European Patent Office (EPO) and a London-based mercenary it hired, bypassing the law



  21. Google's Fight to Keep APIs Free is Lost, Let's Hope Google Continues Fighting

    SCOTUS refuses to rule that APIs cannot be considered copyright-'protected', despite common sense and despite Java (which the case is about) being Free/libre software



  22. Patent Trolls in the Post-Alice World

    A round-up of news about patent trolls in the United States, some of whom are are doing well and some of them not as well



  23. DDOS Attacks Against Techrights

    Information about some of the most recent DDOS attacks against this Web site and the steps to be taken next



  24. The Patent System Not What it Used to be, Large Corporations and Patent Lawyers the Principal Beneficiaries

    A look at some recent patent stories and what can be deduced from them, based on statistics and trends



  25. After Intervention by the Council of Europe Comes a Detailed Summary of the Situation in the European Patent Office (EPO)





  26. IRC Proceedings: May 31st - June 27th, 2015

    Many IRC logs



  27. Links 28/6/2015: Manjaro Linux Cinnamon 0.8.13, VectorLinux 7.1

    Links for the day



  28. Williamson v. Citrix Online (at CAFC) Reinforces Alice v. CLS Bank (at SCOTUS) in Crushing Software Patents

    More patent news from the United States, again serving to indicate that software patents over there are getting weak (harder to defend in court or acquire from the patent office)



  29. Proskauer Rose LLP is Cherry-Picking Cases to Make Software Patents Seem Eligible Despite Alice v. CLS Bank

    Naming and shaming those who are trying to reshape the consensus despite a rather consistent pattern of software patents being rejected



  30. IAM Biased: How IAM 'Magazine' Glorifies Patent Stockpiling

    A look at the bias of one of the most overzealous sites for and by patent lawyers


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts