Linux has long-since established itself as a mainstream system for enterprises. If your company needs further convincing, here are five reasons for moving, according to SUSE’s Sabine Söllheim
Open source operating system, Linux, has positively impacted the world of technology since Linus Torvalds created it over 25 years ago. SAP is heralding it as the operating system of the future – a vote of confidence cemented by the fact the company has chosen to run its enterprise suite SAP HANA exclusively on Linux. It looks like 2018 is the year in which companies seriously start migrating to Linux.
Linux has long-since established itself as a mainstream system for enterprises, which in itself is enough to seriously consider the idea of switching. However, if your company needs further convincing, here are five reasons for moving.
It is hard to believe Kubernetes 1.0 was launched just over three years ago, while its rampant adoption will likely continue to run riot.
The Kubernetes ecosystem is indeed huge, and many organizations both large (think Bloomberg) and small continue to take advantage of what may become one of the most successful open source platforms in IT history.
The past year has been especially important for Kubernetes’ maturity as a platform and its wide-scale adoption. We highlight below the most stand-out developments.
In March 2018, Kubernetes became the first-ever CNCF project to receive the “Graduated” status. And, more recently, Kubernetes has earned the 2018 OSCON Most Impact Award.
Three years ago the community celebrated the first production-ready release of Kubernetes, what is now a de facto standard system for container orchestration, at the 1.0 launch day at OSCON. Today we celebrate Kubernetes to not only acknowledge it on the project’s birthday but to also thank the community for the extensive work and collaboration to drive the project forward.
With the cutoff of new feature material to DRM-Next ahead of the Linux 4.19 cycle coming to an end, here is an overview of the prominent Direct Rendering Manager (DRM) changes on the plate for this next kernel version.
Out today is a new release of the Intel IWD network stack, the wireless daemon hoping to eventually replace WPA Supplicant.
PECI is a new one-wire bus interface being developed at Intel for communication between Intel CPUs and chipset components to external monitoring/control devices. The Linux support for this Platform Environment Control Interface continues to be worked out by Intel's open-source Linux kernel developers.
EdgeX Foundry, the Linux Foundation’s open source industrial IoT group, released its second major update to its open source IoT software. Dubbed California, the release has a smaller footprint so it can run more effectively at the edge and also incorporates several new security features.
The California release follows EdgeX’s first software release, called Barcelona, which occurred last October. California was originally scheduled to be released in April but was delayed until July so that the EdgeX developer community could rebuild the EdgeX code in Go Lang and reduce the footprint of the platform. “We launched Barcelona last October and had tremendous momentum,” said Jason Shepherd, EdgeX Foundry member and chair of the group’s governing board. “Even our developer count has doubled. We have more than 50 unique authors contributing to the code.”
Less than one full week after their previous code drop, the AMD developers maintaining the AMDVLK Vulkan Linux driver today pushed out their freshest code.
Back during GDC 2018, Alen Ladavac serving as the CTO of Croteam presented on their research and testing into frame timing for helping uncover why some games are stuttering even when being rendered at high frame-rates. The short story is the issue can be addressed by just not measuring the time for rendering each frame in a game but to measure the time needed to actually present that frame on a display output. For that there is VK_GOOGLE_display_timing for Vulkan and other similar extensions.
Your pre-order has finally unlocked and has just finished installing. Nervously, you are starting it for the first time. So far, so goodââ¬Å —ââ¬Å the game is running at 60 frames per second. Or at least the frame counter from the latest GPU tuner overlay says so. But, something is not right. You flick your mouse around in sharp, deliberate movements. You side-strafe left and right quickly… and… It stutters! IT FRIGGIN’ STUTTERS! Argh, how can it be? How can it stutter at 60 frames-per-bloody-second?
Mesa 18.2 is going to be branched at the end of the month to mark the end of feature development for this quarterly Mesa feature release. This is a few weeks later than originally scheduled and has allowed for some extra features to land. Here is a look at some of the Mesa 18.2 changes on the way.
Recently I have been posting a number of Linux laptop battery benchmarks including how the power consumption compares to Windows 10. If you are curious how these numbers play out on the desktop side and when using AMD hardware, here are some results for your viewing pleasure with a Ryzen 7 2700X and Radeon RX Vega 64 desktop system.
While working on some recent Windows/Linux benchmarks from the AMD side given the number of recent Intel operating system benchmarks, I took the opportunity to also run some fresh power consumption tests. The system under test was an AMD Ryzen 7 2700X with an ASUS ROG CROSHAIR VII HERO motherboard, 2 x 8GB DDR4-3400 memory, 256GB Samsung 950 PRO 256GB NVMe SSD, and Radeon RX Vega 64 graphics.
No matter whether you want to practice Linux commands or just analyze/test your shell scripts online, there’s always a couple of online Linux terminals and online bash compilers available.
This is particularly helpful when you are using the Windows operating system. Though you can install Linux inside Windows using Windows Subsystem for Linux, using online Linux terminals are often more convenient for a quick test.
Most of us know that Linux is an open-source operating system. It differs from Microsoft windows in most of the features. It would not be wrong if we say, Windows is used more than Linux. But there is a misconception. Many people think Linux is only an operating system used by Professional Programmers, Ethical Hackers or Security Experts.
Whenever they think about Linux, the first thought is a black background terminal with green commands running on it. But Linux isn’t all about the terminal. It is now something that a common computer user can also use.
In this article, we will see how a normal user can use Linux to perform video editing using Linux. But none of this software will be paid. I am gonna add all free software regarding the category.
SoftMaker's FreeOffice 2018 is a high-end productivity suite that is worthy of consideration. The TextMaker word processor module is one of the closest products I have used in Linux to being capable of handling page design and publication functions.
I often use it for design pages instead of Scribus for desktop publishing tasks. The PlanMaker and Presentation modules are equally adept at rounding out office documents needs.
However, FreeOffice 2018 has a few quirks. One of them is the spelling feature. The English language version is supposed to be included by default. It is not in the installed package. As a workaround, I downloaded the Canada English Hunspell dictionary from the Softmaker website. No U.S. English dictionary was available for download.
Another oddity is the right panel that has a show/hide button. In each of the three modules, the right panel displays handy tips on using some of the core features.
Hello everyone, in this article I will outline the progress that the Kiwi TCMS team has made towards achieving the goals on our roadmap.
Cockpit is the modern Linux admin interface. We release regularly. Here are the release notes from version 173.
Unfortunately, Google’s view of their IDaaS platform doesn’t include systems operating outside of GCP. So, with respect to this blog post, the concept of connecting Google Cloud Identity with Linux machines hosted at AWS, Azure, on-prem, or anywhere else that is outside of Google’s ecosystem simply doesn’t work with Google Cloud Identity alone.
For those of you wanting to emulate some classic Dreamcast games on Linux, you're in luck as Redream [Official Site] is an actively developed emulator that works on Linux. The compatibility list for it is quite impressive, with over 500 titles being playable with only 97 listed as being broken currently.
GOG are continuing to boost their library of Visual Novels with today's release of A Kiss For The Petals - Remembering How We Met with Linux support.
If you're new to Linux and you're wondering what notable releases have made their way to Linux in 2018, here's a quick list of some good stuff on the table.
This is by no means an exhaustive list, we have to cut it down somewhere! Otherwise, it will go on forever as there's been rather a lot. We're a long way from Feb, 2013 when Steam was officially released on Linux that's for sure. I remember being able to keep track of releases every day, now it's practically impossible.
For those into your Visual Novels, you're in luck as Shining Song Starnova released today on GOG while the developer works on a release with Valve. This is in addition to A Kiss For The Petals - Remembering How We Met that was also put up on GOG today.
It seems it's currently stuck in review on Steam, likely while Valve figure out whatever they're doing with these types of games. I've not a clue what's going on any more since they started handing out removal notices to a few games, then saying they will relax their rules and now a few games, like this, are stuck in limbo.
Valve have now officially released their overhaul of the Steam Chat feature to everyone as of last night.
This means the Linux beta is now compatible with the Tanks DLC, as well as being compatible with Windows gamers again until they get the 1.84 and we have to wait again.
Currently, there's an issue in the Linux version where you can't see any servers in the server list. They're aware of the issue and suggest you view the server list in your browser and connect directly.
This Is the Police 2 arrives with Linux support on August 2nd. Ahead of the release they've put out a new trailer to welcome you to the town of Sharpwood.
Day of the Tentacle now has a fan-made sequel with Return of the Tentacle - Prologue and it has a Linux version.
Sadly we missed the actual release for the really sweet couch co-op adventure 39 Days to Mars, but we're making up for it by letting you know it has some additional free content!
The Additional Victorian Adventure released this week adding in plenty of new puzzles and disasters. The new content blends into the existing story, to compliment what's already there.
Plague Inc: Evolved is a game that has you trying to wipe out humanity with a global Plague while adapting to how the world reacts. It's actually been available on Linux for quite some time, although it's not a game we've given much light.
If you follow the Ubuntu development process closely, you must be knowing about the Ubuntu Communitheme that has been under development for some time. In case you are a person who doesn’t like this name, here’s a good news.
Canonical has announced details regarding the next default Ubuntu 18.10 Cosmic Cuttlefish theme, which is now called Yaru. This follows the Japanese influence on Ubuntu’s theme naming and it means “to do.” Ubuntu’s last icon theme’s name Suru also meant “to do,” but in a casual way.
I’d like to announce that I’m one of the newest members of the GNOME Foundation! So thanks to the foundation committee and to GNOME for having me!
I have installed openSUSE and it runs without any problems. I installed it without turning off secure boot. It automatically asked me to add the openSUSE key. WiFi worked out of the box. The touch-pad works without issue. However, that is not to say that there is nothing to improve. When trying out the gaming capabilities, I noticed very low frame-rates. When looking into the issue, it became clear that openSUSE Leap 15 doesn’t install the xf86-video-intel driver by default. This is easily remedied by searching and installing this driver via YaST and rebooting.
Red Hat has developed a free scanner for the infamous SPECTRE vulnerability. The toolkit was created for internal use but is being made available in source form, with the caveat that it is not a supported Red Hat product.
The tool was made public last week. It can scan Intel’s x86_64 and Arm’s AArch64 architectures, with the ability to scan more architectures planned.
Red Hat developers have made it available in source form as it would be “unwise to offer a security analysis tool as a pre-compiled binary.”
Red Hat Application Migration Toolkit (RHAMT) 4.1.0 has been released, and with it a new feature that I’d like to highlight in this article—Technology Reports.
If you’re not familiar with RHAMT, check out my previous article that introduces RHAMT and describes how you can use it to help with migration existing applications to a modern application platform by analyzing your code base.
Mike Dietrich, Big Red's master product manager for upgrades and migrations, said users can download 18.3 from the Oracle website as a handy 4.3GB .ZIP file.
In addition, database-loving folk can also get their hands on Windows client versions (both 32-bit and 64-bit) – provided, naturally, that you have an Oracle licence and are willing to log in and prove it.
"The download gets you the zip file but not the rpm. Those may take a couple of weeks for unknown reasons," wrote Dietrich.
As we reported last year, Oracle changed its release numbering from version number increments to year-based increments. Hence Oracle Database 18 was previously known as Oracle Database 12.2.0.2. The cash-printing company (which posted profits of $13.7bn on revenues of $39.8bn in fiscal year 2017) has now moved to a quarterly release cycle.
As part of its strategy to re-imagine the business of travel, Sabre Corporation today announced that it will leverage Red Hat OpenShift Container Platform as the foundation for its Next Generation Platform initiative. OpenShift will be the basis of a modern architecture that includes microservices, development and operations (DevOps), and a multi-faceted cloud strategy to lead an industry evolution in the future of retailing, distribution, and fulfillment through innovative technology. OpenShift, built on containers and Kubernetes, is the the industry’s leading enterprise Kubernetes platform for running existing and cloud-native applications in any cloud.
The Automation Broker is preparing for OpenShift Container Platform (OCP) 3.10. With several releases of the Broker (formerly Ansible Service Broker) we wanted to take a few moments to communicate our release strategy.
The world of computer security has changed dramatically in the last few years. Keeping your operating system updated with the latest security patches is no longer sufficient. Operating system providers need to be more proactive in combating security problems. A majority of exploitable security flaws are due to memory corruption. ExecShield, a Red Hat-developed technology, included since Red Hat Enterprise Linux 3, aims to help protect systems from this type of exploitable security flaws.
We’re excited to announce that for the eighth consecutive year, the Red Hat Customer Portal has been named one of the “Top Ten Support Websites” by the Association of Support Professionals (ASP).
The ASP is an international membership organization for customer support managers and professionals. Its prestigious "Ten Best Web Support Sites" competition, now celebrating its 20th year, showcases excellence in online service and support. Selected by a panel of judges with experience in web support design and implementation, winners are evaluated through a scoring system based on 25 separate performance criteria. Key criteria include overall usability, design and navigation; knowledgebase and search implementation; interactive features; community engagement; and site development strategy.
While Fedora 28 has been a fantastic release, Fedora 29 that is currently under development for releasing in October is going to be what feels like a massive amount of changes.
Fedora 29 remains under active development and below is a look at many of the changes expected for this next Red Hat sponsored Linux distribution release. Keep in mind though not all of the features are complete yet so some could still risk not making it into this next release but could be postponed to Fedora 30 or later.
Fast forward to the beginning of my time editing RPM spec files; first for myself, then for Fedora Extras, then for Fedora at large, EPEL, employers, etc. One of the most common errors I see are bogus dates in changelogs. That, and people who manage to misspell their own names and/or email addresses. I’ve done it. If you’ve made any reasonable number of spec edits, you’ve almost certainly done it. So we’re careful. We check the date, the day of the week, and do our best. We copy/paste/edit when we can.
These “auto connect” permissions typically cater to core functionality, such as being able to draw a window using the display server, or play sound through your speakers.
Other auto connect permissions tend to be helpful rather than functional, like allowing an app to open non-hidden files kept in your home directory.
Canonical encourages Snap app developers to make interfaces optional where possible, and suggests that devs instead ask users to enable a permission via an in-app dialog the first time they try to access a feature that has additional requirements.
The benefit with Snap versions of apps is that you’re (mostly) in control of these permissions, even after they’ve been granted or okayed.
You can enable/disable Snap app permissions at any time, just like on more recent versions Android.
Gumstix announced a version of its Aerocore 2 drone control board that runs Linux on Nvidia’s Jetson TX2. The Geppetto customizable board provides a Cortex-M4 running PX4, and offers USB 3.0, micro-HDMI, and support for LTE, GPS, and 4x HD cameras.
The Aerocore 2 drone control board arrived in 2014 and was followed in 2016 by a more advanced version that swapped out the original’s Gumstix Overo module for a DragonBoard 410C SBC. This DragonBoard version was updated earlier this year. In 2017, Gumstix announced a Intel Joule based version that fizzled when Intel discontinued the Joule. Now, Gumstix is back with a $275 “Aerocore 2 for Nvidia Jetson” board that works with Nvidia’s Jetson TX1 and Jetson TX2 modules and can be customized in Gumstix’s Geppetto online design service.
Google unveiled a stripped-down “Edge TPU” version of its Tensor Processing Unit AI chip plus a Cloud IoT Edge stack for Arm-based IoT gateways that run Linux or Android Things. An NXP-based dev kit is due in October.
Google announced a lightweight, embedded version of its enterprise focused Cloud Tensor Processing Unit (Cloud TPU) AI co-processor. The new Edge TPU ASIC is similarly optimized for Google’s TensorFlow machine learning (ML) framework. It’s designed to run TensorFlow Lite ML models on Arm Linux- or Android Things based IoT gateways connected to Google Cloud services that are optimized with Cloud TPU chips. A development kit due in October will use an NXP SoC.
Black Magic Probe – JTAG & SWD ARM debugger Black Magic Probe Mini V2.1 is a very small (33 x 15 mm) and lightweight board. For more efficient embedded programming, associate this Serial Wire Debug Adapter with the tiny & powerful 1Bitsy ARM computer. You'll do the right things right in no time! When you run into a problem with a program you are writing, the Black Magic Probe allows you to follow the execution step by step. Run your program in real time and interrupt it at any step to inspect and modify CPU registers or variables, or watch them as they change. You can also inspect the Function Call Stack and much more.
Earlier this month, we saw the release of Android DP4 which also fixed a few bugs and improved Gesture Navigation, apparently the most notable feature of Android P. We also have compiled a massive list of Android P top features.
Open source may be the future of IBM i. It certainly seems that way at the moment. But if open source is going to soar to new heights on the platform, it will need better integration with the existing processes in place to monitor and manage the platform.
That’s the opinion of JK Grafe, the CEO of Quad Nova Group, a Jacksonville, Florida-based IBM i consultancy that has offices up the Eastern Seaboard. By Grafe’s own admission, open source is a great thing for the platform. But the difficulty in seeing what’s actually going on with open source workloads is a problem.
“I can open up a PASE environment to a couple of Java programmers, and they become invisible,” Grafe tells IT Jungle. “If you have a system operator who does his WRKACTJOBs, he doesn’t see these people. He doesn’t know what they’re doing. They’re invisible to him.”
"Open-source," in the context of software development, is a specific approach to creating computer software. The idea is that making code openly available for developers will create better code, and making it freely available to end users will increase adoption, result in ongoing evaluation, more use cases and a continuous cycle of improvement, development and new releases.
Drupal is the open-source software I use for our web development. It has allowed me to build sites that I never could have built on my own — both because of my lack of coding skills and also our lack of funds to purchase expensive, proprietary software.
In 2011, I went to my first DrupalCon — Drupal Conference — and experienced firsthand this open-source community. There were 3,000 participants connected by computer code. I've now been to several — they are held around the world — and it's a near-religious experience.
Free and open source software (FOSS) was a recurring theme during many of the talks during the HOPE XII conference, which should probably come as no surprise. Hackers aren’t big fans of being monitored by faceless corporate overlords or being told what they can and cannot do on the hardware they purchased. Replacing proprietary software with FOSS alternatives is a way to put control back into the hands of the user, so naturally many of the talks pushed the idea.
In most cases that took the form of advising you to move your Windows or Mac OS computer over to a more open operating system such as GNU/Linux. Sound advice if you’re looking for software freedom, but it’s a bit quaint to limit such thinking to the desktop in 2018. We increasingly depend on mobile computing devices, and more often than not those are locked down hard with not only a closed proprietary operating system but also a “Walled Garden” style content delivery system. What’s the point of running all FOSS software at home on your desktop if you’re carrying a proprietary mobile device around?
Here’s a sneak peek at why you need to be at Open Source Summit in Vancouver next month! But hurry – spots are going quickly. Secure your space and register by August 4 to save $150.
You might know of Google Chrome 68 for labeling non-HTTPS websites as “not secure.” But there is a lot more than Google has shipped with the latest version of Google Chrome.
We all have come across obnoxious video or audio that starts auto-playing on full volume out of nowhere. No thanks to top web browsers, who were so late in launching a fix for the most annoying feature of using the Internet.
At the end of last year, I was invited to speak at the Immersive Technology Conference, which took place at the University Of Houston. It was a two-day event with my talk being the first one. That always is something I simultaneously hate and still crave for. Because even if it's stressful, that is the only timeslot which allows me to actually listen to and enjoy other talks after me. Otherwise, I keep fretting over my own and can't concentrate on anything else.
[...]
This also was the first conference as a Mozilla TechSpeaker where I started trying to show live demos of WebXR applications running from my mobile. As you will see the experience isn't really flawless and often crashes. But it worked, I am still working out to iron out the kinks. But now the process goes much smoother as I experienced at OSCON.
This Week in Rust is openly developed on GitHub. If you find any errors in this week's issue, please submit a PR.
DTrace offers easy-but-powerful dynamic tracing of system behavior, and it is so lightweight and safe that it can routinely be used on production systems. DTrace was originally developed for the Oracle Solaris operating system.
At the beginning of the year Oracle reaffirmed their commitment for DTrace on Linux. For those still interested in using this dynamic tracing framework on Linux, Oracle has been rolling out a number of feature updates.
Oracle has made a number of recent updates to the DTrace framework on Linux. Recent DTrace for Linux improvements include support for 64-bit ARM (ARM64 / AArch64), support for additional providers, bringing feature alignment with other DTrace implementations, compile-time array bounds checking, support for newer versions of the Linux kernel, PID provider support for user-space tracing, and various bug fixes.
LibreOffice 6.1 is planned for release by the middle of August but for that next version to happen without a hitch, the LibreOffice team could use a hand with the testing of their latest release candidates.
SiFive, the leading provider of commercial RISC-V processor IP, today announced Brad Holtzinger as Vice President of Worldwide Sales, where he will work with the existing global portfolio of SiFive customers and onboard new clients seeking to take advantage of the company's market-leading Core IP. Holtzinger brings more than 30 years of embedded industry experience in sales, marketing and engineering.
But the solution to these problems is not to throw out libraries completely and replace them with mediocre bookstores designed to sell more Kindles. It is to recognize the vital work that libraries do in a functioning democracy, and grant them the funds they need to do that work properly.
Mark Twain famously wrote that “there are three kinds of lies: lies, damned lies, and statistics.” This insight is relevant to examining the apologetics of modern-day academics in the rising neoliberal assault on the public. This subservience to power is evident in efforts to rationalize governmental attacks on the most basic of human needs: access to clean water. In seeking to numb the public to basic facts and reality, the New York Times has published an op-ed analysis piece by Hernán Gómez and Kim Dietrich: “The Children of Flint Were Not Poisoned” (7/22/2018).
The Initiative for Medicines, Access & Knowledge (I-MAK) and the Delhi Network of Positive People (DNP+) filed an opposition with the Indian Patent Office in New Delhi on 21 July to prevent the granting of a patent to AbbVie on pibrentasvir, which forms part of Mavyret, their drug used to treat hepatitis C, according to a press release.
I-MAK and DNP+ argue in the press release that pibrentasvir is based on obvious and existing science, and does not represent an innovation, but rather an attempt to establish a monopoly that will limit access to hepatitis C treatment.
“If unmerited patents make pibrentasvir unavailable and unaffordable, millions of people around the world will go without treatments they need against hepatitis C,” said Tahir Amin, co-founder and co-executive director at I-MAK, as quoted in the press release.
Those attacks can include trolling, threats and harassment, as well as persistent and innovative phishing emails that can look as if they come from other colleagues within the newsroom or even friends outside of work. And once a hacker [sic] gets a journalist’s user names and passwords, “there’s nothing that you can do to get that data back,” she said.
Google gave its employees Yubikeys and told them they'd have to use them to access their company accounts, so there.
They have, and did, and the results were amazing.
No one - yes - that's zero people, or nought per cent, succumbed to a phishing attack once the security key policy was introduced.
Philip Guenther (guenther@) and Bryan Steele (brynet@) have added more mitigations against speculative execution CPU vulnerabilities on the amd64 platform.
Since January there has been KPTI in the x86_64 Linux kernel as Kernel-based Page Table Isolation for mitigating the Meltdown CPU vulnerability. On the back-burner since then has been KPTI support for the Linux x86 32-bit kernel to protect those using older 32-bit-only processors. With the upcoming Linux 4.19 kernel, KPTI is landing for Linux x86 32-bit. Here are sone benchmarks showing the performance penalty when upgrading to this new kernel on an Ubuntu i686 laptop.
In a previous article, I gave an overview of cryptography and discussed the core concepts of confidentiality (keeping data secret), integrity (protecting data from tampering), and authentication (knowing the identity of the data's source). Since authentication relates so closely to all the messiness of identity in the real world, a complex technological ecosystem has evolved around establishing that someone is who they claim to be. In this article, I'll describe in broad strokes how these systems work.
We all are aware of the cyberhacking and phishing that takes place in the digital world. And safeguarding us from petty hacks is always a few clicks away. But what about real-world hacking like literally physically hacking into the hardware. Ever thought about that?
A security firm Eclypsium posted a video on Youtube shocking laptop users of the dangers of evil maid attacks.
As the principal inventor behind both the Security Key and U2F protocol, we are true supporters of open standards. To realize our mission of making secure login ubiquitous, we designed the original Security Key, and provided the majority of the open source code and test tools for FIDO U2F and the latest version of the standard, FIDO2, which offers a passwordless experience.
Google today announced it is launching its own hardware security keys for two-factor authentication. These so-called Titan Security Keys will go up against similar keys from companies like Yubico, which Google has long championed as the de facto standard for hardware-based two-factor authentication for Gmail and other services.
Google has launched the public version of the security key used to protect its 85,000 employees from phishing and other cyber attacks during internal testing. Named Titan, it falls under the category of physical security keys that are known to provide better protection than other forms of 2-step verification including OTPs.
Earlier this week SpectreRSB was revealed by University of California researchers as a new Spectre V2 like attack affecting modern processors. A Linux kernel patch is in the works for starting to mitigate SpectreRSB.
The RSB in this context is with regards to the Return Stack Buffer that is targeted in this latest speculative execution issue. The researchers found with this vulnerability they could exploit private data supposed to be protected by Intel's Software Guard Extensions (SGX) and that the return stack buffer attacks could be cross-process or inter-VM.
So how can this fit in to the official government account? Presumably the claim is that Russian agents secretly visited the Skripal house, sprayed novichok on the door handle from this perfume bottle, and then, at an unknown location, disassembled the nozzle from the bottle (Mr Rowley said he had to insert it), then repackaged and re-cellophaned the bottle prior to simply leaving it to be discovered somewhere – presumably somewhere indoors as it still looked new – by Mr Rowley four months later. However it had not been found by anyone else in the interim four months of police, military and security service search.
Frankly, the case for this being the bottle allegedly used to coat the Skripals’ door handle looks wildly improbable. But then the entire government story already looked wildly improbable anyway – to the extent that I literally do not know a single person, even among my more right wing family and friends, who believes it. The reaction of the media, who had shamelessly been promoting the entirely evidence free “the Russians did it” narrative, to Mr Rowley’s extremely awkward piece of news has been to shove it as far as possible down the news agenda and make no real effort to reconcile it.
However, the United States is also militarily active in Somalia, Pakistan, Syria, Libya and most notably, Yemen. Since 2015, it has been involved in a coalition led by Saudi Arabia that is fighting the Houthi rebels in Yemen.
The geopolitical circumstances of this war and the U.S. involvement are complicated and the Houthi rebels are guilty of many things, but the horrific crimes of our own coalition are clear:
According to the United Nations, roughly 10,000 civilians have been killed by the Saudi-led coalition since 2015. Additionally, the coalition has cut off Yemen’s food supply and stifled humanitarian aid. What the U.S. and Saudi Arabia have created in Yemen is a crisis of terrifyingly devastating proportions.
[...]
In a U.S.-backed strike in October of 2016, bombs fell on a funeral procession and killed 140 civilians. In an appalling display of indifference, the U.S. did not change anything about its participation in the coalition. Then in President Trump’s first counter-terrorism operation as president in January of 2017, 10 children under the age of 13 were killed by U.S. forces.
Israeli anti-air defenses have shot down a Syrian warplane that allegedly flew over the Israeli-occupied Golan Heights Tuesday, making it only the latest instance in which international opponents of Syrian President Bashar al-Assad have downed manned aircraft fighting on his behalf.
Amid reports of sirens going off across the Golan Heights—which Israel seized from Syria in 1967 without international recognition—the Israeli Defense Forces (IDF) announced they had launched MIM-104 Patriot surface-to-air missiles at a Syrian Sukhoi fighter jet that flew about a mile into the occupied region. The Syrian warplane appeared to be serving a government campaign to defeat an Islamic State militant group (ISIS) affiliate operating near the Israel-administered demilitarized zone that has separated the two countries since a 1974 truce.
On July 12, Army Ranger Sgt. 1st Class Christopher Celiz died of wounds sustained in small arms fire during a military operation in Afghanistan’s Paktiya Province. Former soldiers familiar with the situation say this operation was actually part of a secret CIA program.
As Ecuador's president Lenín Moreno visits the UK, there is growing speculation about a possible deal between the two countries to end years of a diplomatic saga after Julian Assange obtained asylum inside the Ecuadorean embassy in London.
In a series of letters and memos from late 1983 unearthed in the Central Intelligence Agency’s archives by Emma Best, CIA Director William J. Casey expressed dismay over the Peace Corps’ lifetime ban on former Agency employees, claiming that it could set a precedent that would lead to the unfair stigmatization of those “tainted” by the CIA’s activities.
The Natural Resources Institute Finland (Luke) on Friday said it expects the rye yield to decrease by a half and wheat yield by a third from the previous year.
Panasonic, the exclusive supplier of batteries to Tesla, has concerns that cobalt delivered to the company was mined in Cuba. As a result, the electronics manufacturer has suspended business with Canadian energy producer Sherritt International Corp., according to sources close to Reuters.
Panasonic Corp (6752.T) said it was unable to determine how much of the cobalt used in batteries it makes for Tesla cars comes from Cuba, a country subject to U.S. sanctions, and that it had suspended relations with a Canadian supplier as a result of its concerns.
For some time, one common contention of those supporting Brexit is that the UK should prepare for a “no deal” Brexit.
This preparation would, it is asserted, put pressure on the EU in the exit negotiations because the UK could then threaten to walk away rather than accept a bad deal.
These contentions are all very well while they are glib, pat phrases.
But problems arise when such sound-bites need to be translated into substance.
And it now appears that those problems are arising.
In particular, pro-Brexit government ministers are now – seriously – setting out how food and medicines need to be stockpiled in case the UK leaves the EU without a deal next March.
So, after two years of negotiation with the EU, and after two years of withdrawal legislation clogging up parliament, the most tangible effects of Brexit which pro-Brexit politicians can offer are…
Wow, what a novel idea, as though right-wingers have not been pushing this line since the dawn of time: “Don’t worry that your standard of living is awful, the important thing is that your kids will be able to get rich.” (It doesn’t help his story that his poster child for the rich being good is Lloyd Blankfein, who made his fortune shuffling financial assets at Goldman Sachs, and benefited from a massive government bailout.)
But let’s be generous, and try to take Lowenstein’s story seriously. He goes on: “Rising inequality, although a fact, is also very hard to find a culprit for. Not that economists haven’t tried.”
Really? There are plenty of really good explanations for rising inequality, many of which are in my (free) book Rigged. I suppose in the Age of Trump, it is appropriate that the Post has a business columnist determined to flaunt his ignorance.
Starting next year, the Internal Revenue Service will no longer collect the names of major donors to thousands of nonprofit organizations, from the National Rifle Association to the American Civil Liberties Union to the AARP. Democratic members of Congress and critics of money in politics blasted the move, announced last week by the Treasury Department, the IRS’ parent agency. The Democrats claim the new policy will expand the flow of so-called dark money — contributions from undisclosed donors used to fund election activities — in American politics. For their part, Republicans and conservative groups praised the decision as a much-needed step to avoid chilling the First Amendment rights of private citizens.
The Supreme Court’s decision in Citizens United unleashed these groups, typically organized as 501(c)(4) nonprofits, to spend unlimited amounts of money on campaign ads. Their role in American politics has grown increasingly central. In theory, the new IRS policy could have a significant impact on the tax agency’s ability to detect improper contributions — and thereby curb illegal campaign spending.
The mainstream media is concerned with the politics, policies, and propaganda of President Donald Trump, but underplays the central question of his presidency: Is Donald Trump psychologically fit to be president of the United States and commander-in-chief? Over the past twelve months, psychiatrists and clinical psychologists have produced two books (“The Dangerous Case of Donald Trump” and “Rocket Man: Nuclear Madness and the Mind of Donald Trump”) to warn that our dangerously disordered president is a threat to domestic and international security. According to an article in Newsweek in March 2018, most Americans agree that Donald Trump is unfit to be president.
The mental health experts who have produced these books have had to ignore the ethical principle of the American Psychiatric Association known as the “Goldwater Rule,” which prohibited psychiatrists from diagnosing a public figure they had not personally interviewed. The erratic behavior of Donald Trump as a candidate in 2015-2016 and as president in 2017-2018 has led to a challenging ethical principle known as the “duty to warn” because of the danger he has created. In every area of American policy, Trump’s actions and statements have created the highest level of domestic and international anxiety since the end of World War II.
Pro-Trump supporter Jim MacDonald holds a sign that says "Thank God for Trump" at a protest. Image: Julius Motal/SIPA USA/PA ImagesOne of the remarkable things about Donald Trump is the extent to which he has attracted comparisons with the past. This is despite the general feeling that his political career, its embrace of brashness and almost obsessive use of social media, has something distinctly modern, if not unprecedented, about it. Now a year and a half into his first term, the POTUS has invited analogies with Athenian demagoguery, Roman despotism, and Germany in the 1930s. But in drawing such simplistic historical parallels, the liberal commentariat are underestimating the president’s Christian electoral base as a relic rather than a resurgent force that must be reckoned with.
Trump’s 2016 electoral victory benefited in large part from the enormously high support of white evangelicals — a fact that is all the more astonishing given Trump’s seemingly unreligious persona. Yet the ongoing influence of a Republican-leaning “religious Right” is also often treated as if it properly belonged to a premodern, bygone political era. This may be a natural response for liberals who, in the style of Rawls, have come to equate American democratic modernity with the separation of politics and religious doctrine. And, of course, we should be appalled by the resurgence of an exclusionary discourse that among other things is deeply hostile to LGBTQ+ and women’s rights. However, it is at best facile to relegate the influence of the religious right to the status of an oddity in a political modernity now built on the division of church and state. Significantly, it underplays the novelty — that is to say, the modernity — of that same religious right.
What the arguments of the book in fact proclaim are two counter-intuitive realities: first, the promise of a Republican future, in particular a Religious Right future. Haidt paints Republicans as what could also be termed Honor-based. I wrote in a recent book that the Dignity-based competitor would ultimately win. The present book gives the argument that the Honor-based faction will actually win. Dignity-based folks must now rephrase core values (human justice, governmental accountability, the normative influence of money, and a moderate Supreme Court) and in addition adopt some Honor-based criteria (disproportionately low taxation of the wealthy). Ultimately, it all devolves either to social justice or to whatever titillates the Republican palate. This to me is the 30,000 foot view.
Second, the bulk of the first two-thirds of the book is an argument that our judgements are engendered and recalled intuitively; reason has far less to do with the assessing of judgements than we might ordinarily suppose. So to approach the conservatives one must go for the intuitionist approach which focuses on presenting yourself as a friendly inquirer. Make friends, (then apologize for past liberal intransigence?). “If you want to change people’s minds, you’ve got to talk to their elephants.” Do not suppose that reasoning with them will work (Haidt maintains a knee-jerk reaction against rationalists), and certainly not argumentation. I am sure Haidt didn’t mean it this way, but one could be forgiven for wondering if liberals shouldn’t just apologize for being liberals. I am sure Haidt didn’t mean it this way, but one could be forgiven for wondering if liberals shouldn’t just apologize for being liberals.
His chief evidence that the Republicans have a built-in advantage comes from a six-tiered accounting of “foundational” ideas: “Until Democrats understand…the difference between a six-foundation morality and a three-foundation morality, they will not understand what makes people vote Republican.” Here are the six: Care/Harm; Fairness/Cheating; Loyalty/Betrayal; Authority/Subversion; Sanctity/Degradation, and Liberty/Oppression. Haidt has evaluated conservative and liberal trends and maintains that liberals pay attention to but three of these foundational categories, whereas the conservatives encompass the whole range.
It’s much easier to let judges and appointees do the unpopular work of stripping workers of their rights, outlawing abortion, and running the administrative state into the ground.
Democratic Party elites are increasingly concerned the midterm elections will be a “base election” and make their centrist politics even more irrelevant, as insurgent candidates like Alexandria Ocasio-Cortez garner widespread support.
Earlier this year we wrote about the bad decisions by both Google and Amazon to end domain fronting. Domain fronting was a (somewhat accidental) way in which services could effectively hide certain traffic to make it quite difficult for, say, authoritarian regimes in Iran or China to block the traffic. For that reason, domain fronting was an important tool in keeping services like Signal's encrypted communications platform working for activists and dissidents in such places.
Amazon and Google claimed that they never intended to allow domain fronting, and that while it helped those services work in such places it might also lead to much broader blocks by those countries trying to get at the fronted communications. Now, in an interesting move, Senators Ron Wyden and Marco Rubio have sent both companies a letter asking them to reconsider.
China has a serious and worsening Islamophobia problem. While relations between China’s Muslim minorities and its Han majority have been fraught since 2009’s deadly inter-ethnic riots in the far western city of Urumqi, recent years have seen the normalization of online hate speech directed at Muslims. The rise of Islamophobia inside China is a product both of government action, and of the government’s failure to act. Commentary on the recent death of a prominent Muslim leader in the western province of Qinghai highlights the extent to which the situation has deteriorated, and suggests the ways in which China’s warped online discourse could blunt its efforts to build influence and win friends in countries across the Muslim world.
The latest novel from Haruki Murakami, Japan’s most celebrated literary export, has fallen foul of censors in Hong Kong, where it was ruled to be indecent by a tribunal and removed from display at a book fair.
Hong Kong’s Obscene Articles Tribunal announced last week that the Chinese-language edition of Murakami’s Kishidancho Goroshi, or Killing Commendatore, had been temporarily classified as “Class II – indecent materials”, according to the South China Morning Post. This means that it can only be sold in bookshops with its cover wrapped with a notice warning about its contents, with access restricted to those over the age of 18. The ruling has also seen the novel pulled from booths at the Hong Kong book fair, where a spokesperson said the novel had been removed proactively after last week’s ruling.
Due to be published in the UK this autumn, Killing Commendatore is “an epic tour de force of love and loneliness, war and art – as well as a loving homage to The Great Gatsby – and a stunning work of imagination from one of our greatest writers”, according to its British publisher Harvill Secker. It went on sale in Japan last year with midnight openings and queues of eager fans.
A pro-life charity [anti-abortionists group] is has condemned a London council over their “authoritarian and discriminatory” decision to remove their stall from a country show at the weekend.
Life says it has documentary evidence that Lambeth Borough Council had granted it permission to attend the Lambeth Country Show in Brockwell Park, and accepted payment for their stall.
When it comes to identifying fake news, it is less science than alchemy; a task residing somewhere between asking “What is art?” and “What is beauty?” In other words, fake news is largely, as the aphorism goes, in the eye of the beholder.
Though used excessively by Democrats and Republicans alike, the term itself is nothing more than a worthless catchall for content we might find objectionable for any number of reasons. Does the content seem biased and unfair against “our guy?” Fake news. Is the content from a news source we don’t like? Fake news. Did Jim Acosta file the story? Oh, definitely fake news.
The Chinese government is turning to censorship and appeals for calm, amid mounting public anger following revelations earlier this week that one of the country's largest vaccine makers had violated safety standards. Furor about the faulty vaccines, an estimated 250,000 of which may have been administrated to children, has continued to dominate Chinese social media, further eroding public trust in essential services.
Nowadays, it has hard for companies to hide from the privacy protection radar, at least, in theory. Surely, Microsoft is one of them. Criticism in the past has forced Redmond to open up on the tracking and data collection it performs through Windows and other products.
In 2017, Microsoft disclosed what data it collects from Windows 10 PCs. And with the release of the April 2018 Update, it introduced the Diagnostic Data Viewer app in Windows 10. Still, there are is a lot of stuff to be known.
A federal judge in San Francisco recently excoriated the government over its improper methods in searching one suspect's cell phone and in the use of a stingray to find an alleged co-conspirator.
Prosecutors say the two men, Donnell Artis and Chanta Hopkins, were engaged in credit card fraud and also illegally possessed firearms, among other pending charges that also involve four other people.
While it's good the FBI is seeking warrants for Stingray deployments, there's some bad news. This story from Cyrus Farviar from Ars Technica shows FBI warrant procedures are incredibly flawed -- so severely flawed they break state law when they're put to use.
[...]
As was noted earlier, state/county judges can issue certain warrants to federal and local law enforcement. But only local law enforcement is allowed to execute search warrants issued by local judges. If a federal agent wants to engage in a search or an arrest, they need to get their warrants approved by federal judges. The DEA's inability to follow California law has cost it a few cases over the years. The FBI is going to have the same problem if it doesn't train its agents correctly.
Even if it was a lapse in training, Judge Chhabria isn't interested in forgiving Agent Carlson for his agency's failings. This results in one of the harsher bench-slaps handed out to a federal agent.
Despite the FBI finally admitting it had greatly exaggerated the number of encrypted devices it can't get into, FBI Director Chris Wray keeps pushing the "going dark" theory to whoever will listen. This time it was NBC's Lester Holt. In an interview during the Aspen Security Forum, Wray again hinted he was moving towards an anti-encryption legislative mandate if some sort of (impossible) "compromise" couldn't be reached with tech companies.
[...]
First off, bringing the space program into this is ridiculous. All it does is demonstrate the government has access to some of the best minds, but Wray expects the private sector to provide, maintain, and bear the expense of a law enforcement-friendly encryption "solution." (And if it fails to deliver, Wray's more than willing to ask the government to force the private sector to play ball.)
Second, putting a man on the moon was the side effect of a Cold War cock-measuring contest with the USSR. While the nation has derived many benefits over the years from the space program, the "man on the moon" mission was a way of expressing superiority and implying that our weaponry was similarly advanced. The US government showed the world how powerful it was. I don't think that's the analogy you want to make when discussing personal device encryption.
And third, the whole "putting a man on the moon" analogy was solidly mocked on John Oliver's program two years ago when he quoted cryptography expert Matt Blaze accurately saying, "When I hear 'if we can put a man on the moon, we can do this' I'm hearing an analogy almost saying "if we can put a man on the moon, surely we can put a man on the sun.'" Not every issue is the equivalent of putting a man on the moon.
While the others listed are private sector achievements, they're simply not good comparisons. Encryption methods continue to advance in complexity and ease-of-use. This is innovation, even if it's innovation Chris Wray doesn't like. Each of the innovations listed solved problems and created markets. In this case the problem is device security. Encryption solves it. Who wants secure devices? Everyone who buys one.
If electronic tolling is eventually introduced, the state must protect drivers’ privacy rights.
Last week, Connecticut Gov. Dannel Malloy issued an executive order requiring the state Department of Transportation to conduct a $10 million study of introducing electronic tolling to Connecticut roads. Today, the state bond commission voted to approve spending that $10 million.
Missing from that executive order? Any mention of people’s privacy rights.
Imagine making your daily commute with the government tracking where and how fast you are going every time you drive through a toll. In this world, the state, federal government, and for-profit corporations can see that information and use it to pinpoint your location and travel habits. Thousands of detailed scans about your travel habits are kept in a state database, without rules for how the government secures or shares them.
If this toll study ignores privacy rights, this could be the reality in Connecticut.
Connecticut tolls would likely rely on electronic gantries, not the tollbooths of yesteryear. To collect fees, these gantries scan a transponder attached to someone’s windshield and automatically deduct money from a prepaid account tied to the vehicle’s license plate. If someone doesn’t have a transponder or prepaid account, a camera captures an image of their license plate, and the state mails the vehicle’s owner a bill.
On the other side of the fence, the Investigatory Powers Tribunal (IPT) ruled that the system that gave GCHQ access to personal data from telecoms companies had been illegal between 2001 and 2012. The rules, which were introduced in the wake of the 11 September 2001 attacks, gave the UK’s foreign secretary the power to direct GCHQ to obtain data from telecoms companies with barely any oversight. In this case, the IPT said it has found no evidence that the system was ever misused by GCHQ.
Australia's Digital Health Agency, the body that manages the My Health Record system, is making a bid to change the licensing of data to mobile phone apps, with an option to cancel any agreement if the app firms damage the reputation of the system.
There are also much tighter clauses on how the companies report data breaches and collect information and consent from app users.
"Especially in the case of our sensitive health information, the Government must ensure that health apps use the highest standards of consent," Dr Kemp said.
"This agreement does not do that."
For the past two years, researchers at Northwestern University have been analyzing the habits of tens of thousands of scientists—using Dropbox. Looking at data about academics' folder-sharing habits, they found the most successful scientists share some collaboration behaviors in common. And on Friday, they published their results in an article for the Harvard Business Review.
The study quickly attracted the notice of academics—but not for the reason Dropbox and the researchers had hoped. One sentence in particular caught readers' attention: “Dropbox gave us access to project-folder-related data, which we aggregated and anonymized, for all the scientists using its platform over the period from May 2015 to May 2017—a group that represented 1,000 universities." Written by Northwestern University Institute on Complex Systems professors Adam Pah and Brian Uzzi and Dropbox Manager of Enterprise Insights Rebecca Hinds, that wording suggested Dropbox had handed over personally identifiable information on hundreds of thousands of customers.
In “Documenting Hate: Charlottesville,” Frontline and ProPublica investigate the white supremacists and neo-Nazis involved in the 2017 Charlottesville Unite the Right rally. Our joint reporting has already shed new and troubling light on the events of Aug. 11 and 12, 2017 — revealing that one participant in the violence, Vasillios Pistolis, was an active-duty Marine, and that another, Michael Miselis, worked for a major defense contractor and held a U.S. government security clearance. Now, correspondent A.C. Thompson goes even deeper, showing how some of those behind the racist violence nearly one year ago went unpunished and continued to operate around the country. This is the first in a series of two “Documenting Hate” films from Frontline and ProPublica, with the second coming later this fall.
The Transportation Security Administration (TSA) is starting to use CT scanners to look for explosives and other banned objects in carry-on bags. The advance in technology might—eventually—let travelers go through airport security without removing electronics, liquids, or anything else from their bags.
China has expressed a readiness to increase its investments in Nigeria’s oil industry... designed to strengthen the future prospects for the so-called “petroyuan” by tying Africa’s largest oil producer to the petrodollar’s worst enemy.
The Trump administration sinks to new low and tries to rob the families it traumatized of time to make life-altering choices.
The family separation crisis took a turn yesterday, when the Trump administration revealed in a federal court filing its intention to deport families immediately upon reunifying them. The ACLU had sought a court order blocking the deportation of any parent with a final order of removal until one week after notification that they have been reunited with their children.
This waiting period is crucial to ensure that parents have an opportunity to make an informed decision about whether to fight their own removal case, leave their child, who may have their own asylum claim, behind in the United States, or to make some other decision. In short, families will be making life-altering decisions after months of traumatic separation — and the fact that the government is trying to shortchange them a matter of days to do so is galling.
Yesterday in court, we argued that given reports of a chaotic reunification process, not to mention the trauma caused by prolonged involuntary separation, families absolutely require a waiting period of seven days after notification of reunion, so that they can meet with attorneys and be fully apprised of their rights before any deportations occur. A Justice Department attorney pushed back, saying “The government takes issue with the assertion that there is a mess on the ground. We have many reasons to be proud of this effort."
Libertarian senator Rand Paul, a Kentucky Republican, said on Monday that in a personal meeting with President Donald Trump, he urged the president to revoke the security clearances of a half dozen former Obama-era intelligence officials, including former CIA director John Brennan, former Director of National Intelligence James Clapper, and former National Security Advisor Susan Rice. I couldn’t agree more with Paul’s position, not specifically regarding these three people, but for any former intelligence official. No former intelligence official should keep a security clearance, especially if he or she transitions to the media or to a corporate board.
The controversy specifically over Brennan’s clearance has been bubbling along for more than a year. He has been one of Trump’s most vocal and harshest critics. Last week he went so far as to accuse Trump of having committed “treason” during his meeting in Helsinki, Finland with Russian president Vladimir Putin. Brennan said in a tweet, “Donald Trump’s press conference performance in Helsinki rises to & exceeds the threshold of ‘high crimes and misdemeanors.’ It was nothing short of treasonous. Not only were Trump’s comments imbecilic, he is wholly in the pocket of Putin. Republican patriots: Where are you???” The outburst was in response to Trump’s unwillingness to accept the Intelligence Community position that Putin and the Russians interfered in the 2016 presidential election.
Other intelligence professionals weighed in negatively on Trump’s Helsinki performance, including Republicans like former Defense Secretary Chuck Hagel and former CIA director Mike Hayden.
“Mt. Juliet Mission Group Stalled in Haiti.” “Missionary From Hubbardston Weathers Protests in Haiti.” “Riots Delay Lowell Missionaries’ Return From Haiti.” “Raleigh Church Group Returning From Haiti After Civil Unrest.”
Judging by headlines, one might assess that the significant thing about public protests in Haiti is that they have interrupted the travel of US missionary groups. Reading further, you may learn that the immediate spark for the unrest was a proposed hike in fuel prices, a 38 percent increase in the price of gas, 47 percent for diesel and 51 percent for the kerosene many people use to heat and cook.
But in general (the Miami Herald‘s Jacqueline Charles was a notable exception), big US media outlets just don’t seem all that interested in what’s happening in Haiti. And so stories focused on Americans who “tried to help, but got caught up in violence,” take center stage, reinforcing a media storyline that has tended to present Haiti as a place of almost inherent chaos and a bottomless pit for international aid.
It’s a sad, static vision that doesn’t encourage much thinking about positive ways forward for Haiti and Haitians. Joining us now to help shed a different light on things is Jocelyn McCalla, the longtime director of the National Coalition for Haitian Rights; he’s now advocacy coordinator for the group Haitian-Americans United for Progress. He joins us now by phone from Brooklyn. Welcome to CounterSpin, Jocelyn McCalla.
Facebook announced Tuesday that it would make “legally binding” changes to its advertising platform, removing some features that allowed discrimination in housing, employment, insurance and credit ads.
The social networking company’s pledges came in response to an investigation by the state of Washington prompted by a November 2016 ProPublica article. The article disclosed that the company’s software made it possible for marketers to tailor who saw Facebook ads by race, gender, nationality and other characteristics protected by the Fair Housing Act of 1968.
The housing act bars publication of any advertisement “with respect to the sale or rental of a dwelling that indicates any preference, limitation, or discrimination based on race, color, religion, sex, handicap, familial status, or national origin.”
Three young black men who died during or after police restraint are not included in the latest official count of “deaths in or following police custody”, Shine A Light has learned.
The three are Rashan Charles, Shane Bryant and Edson Da Costa.
A report published today by the Independent Office for Police Conduct (formerly known as the Independent Police Complaints Commission) records 23 police custody deaths in England and Wales in the year to 31 March 2018. That’s a 14-year high.
But at least three young black men who are known to have died during or after police restraint are not listed by the IOPC among the headline 23 “deaths in or following police custody”.
Edson Da Costa, 25, died in Newham, East London, on 21 June 2017, following restraint by police six days earlier.
New York State and the nation's second biggest cable provider (Charter Spectrum) aren't getting along particularly well. Early last year, Charter Spectrum was sued by New York State for selling broadband speeds the company knew it couldn't deliver. According to the original complaint (pdf), Charter routinely misled consumers, refused to seriously upgrade its networks, and manipulated a system the FCC used to determine whether the company was delivering advertised broadband speeds to the company's subscribers (it wasn't).
Charter has tried to use the FCC's net neutrality repeal to claim that states can't hold it accountable for terrible service, but that hasn't been going particularly well.
Meanwhile, Charter is also facing heat from the state after the State Public Service Commission found that Charter routinely mislead regulators about its efforts to meet conditions affixed to its $89 billion acquisition of Time Warner Cable and Bright House Networks. As part of that deal, Charter was supposed to expand service to "145,000 unserved and underserved residential housing units and/or businesses within four years." But the company was fined $2 million after regulators found it repeatedly tried to pretend it had expanded services to areas that weren't actually upgraded.
Cg42, a boutique consulting firm, has published its latest “2018 Cord Cutter & Cord Never Study,” which builds on several reports by providing an in-depth analysis of both US consumers who opted out of subscription-based Paid-TV service in the last several years (i.e., Cord Cutters) as well as US consumers who have never subscribed to paid-TV service (i.e., Cord Nevers).
On July 18th, The Verge sat down with Wyden on Capitol Hill to discuss the tech industry’s troubled state. For a technophile, his office is notably analog: a mountain of paper on his desk obscures an Economist and a copy of James Comey’s A Higher Loyalty, and on display are books by his father, the journalist Peter H. Wyden. Recent news made our conversation topical: just hours before, the European Union had levied a massive, $5.1 billion fine against Google for alleged anti-competitive practices. During our meeting, Wyden suggested that it was time for Congress to take a harder look at Big Tech and even hinted that legislation on the data privacy front was forthcoming.
Pai heard from his hometown ISP again yesterday when Wave and 181 other fixed wireless broadband providers wrote a letter opposing an FCC plan that could limit the small ISPs' access to wireless spectrum.
In the wake of the FCC's historically unpopular decision to gut net neutrality, more than half of the states in the nation are now exploring their own, state-level net neutrality rules. In some instances (Montana) states are signing executive orders that ban state agencies from doing business with ISPs that behave anti-competitively. Elsewhere (Oregon and Washington) states are passing new laws that largely mirror the FCC's discarded 2015 rules, and in some instances (California) are a bit tougher than the FCC on things like usage caps or "zero rating."
This week, Massachusetts began finalizing approval of S2610, which initially proposed doing many of the things other such bills do (banning ISP blocking, throttling, or crippling of competitor services and websites).
More clarity in calculating damages in standard essential patent disputes could have made judgment a more powerful precedent, according to India practitioners
The meaning of “protected by a basic patent” has been clarified in Teva v Gilead, in a return to familiar ground
Nestlé did not produce sufficient evidence to show that Kit Kat’s three-dimensional shape had acquired distinctive character, the CJEU rules, in a case that makes it clear the test for acquired distinctiveness is different from the test for non-use
Last week I was a discussant at the Innovation section of the 2018 NBER Summer Institute (full schedule here), which I highly recommend to scholars interested in the economics of innovation. The quality of the papers and the discussion was pretty uniformly high. There were a few examples of the insularity of economics, such as remarks about topics that "no one has studied" that have been studied by legal scholars, but I think this just illustrates the benefits of having scholars familiar with different literatures at disciplinary conferences.
Here are links and brief summaries of the innovation-related papers. (There was also a great panel discussion on gender and academic credit, which I might post about separately at some point.)
A top EU court adviser has recommended that the taste of cheese not be protected by copyright and that protection should only be applied to work that is seen or heard
According to the AG, there are two additional considerations that rule out copyright protection in a taste.
The first is the idea/expression dichotomy, which excludes protection for a recipe as such, this being an idea that has not yet been expressed in some form, eg in writing.
The second consideration is that original expressions should be identifiable with sufficient precision and objectivity. And here the AG brought trade mark law into the picture. By relying on the decision in Sieckmann concerning the (now seemingly defunct) graphic representation requirement and which - as a matter of fact - has made it virtually impossible to register less conventional signs like smells and, indeed, taste, he concluded that the same requirements envisaged for graphic representation of a sign in trade mark law - ie the representation be clear, precise, self-contained, easily accessible, intelligible, durable and objective - apply in copyright. Hence, if a certain subject-matter cannot be identified with sufficient precision and objectivity, it is not protectable.
The taste of a food product is a qualitative element and, as things currently stand, there are no techniques to identify it precisely and objectively. It follows that it is not possible to identify precisely and objectively the scope of the protection (if any) afforded to it.
Over the past decade, we've talked about music industry lawyer Chris Castle and his bizarre interpretation of reality a few times. He insists that anyone supporting the legal sharing of content via Creative Commons is "self-serving shilling for the self-absorbed on the short con," which I'm sure must have sounded clever in his mind. A key target for Castle and his friends is that Google is the representation of all that is evil in the music industry. It's a convenient foil. Castle and his friends see Google lurking behind anything that's not like the old days, similar to the way that adults freaked out that pinball machines were destroying the minds of the youths in earlier generations.
Castle's latest claim, however, is positively crazy. Not only is he upset about the EU Parliament has agreed to reopen Article 13 of the EU Copyright Directive for discussion, he's decided that the only reason they did so must be due to a criminal conspiracy by Google, for which he is demanding an investigation.
Finally: the time has (almost) come to know the answer to one of the most pressing IP questions: is there, or not, copyright in the taste of a spreadable Dutch cheese known as Heks'nkaas?
This morning Advocate General (AG) Wathelet issued his Opinion [not yet available on the Curia website], in which he advised the Court of Justice of the European Union (CJEU) to rule that no copyright protection could vest in the taste of a cheese.
Despite its seemingly cheesy subject-matter, this case is potentially a very important one, as I discussed more at length here and here.
What do the fans do when The Pirate Bay is down, maybe, due to some error or federal actions? They have to accept the hard truth and look for some alternatives of The Pirate Bay or ripoffs like thepiratebay3.org.
Commonly known as TPB, the popular torrent site has been around for almost 15 years currently running on thepiratebay.org domain. Over the period of this time, it went away and came back multiple times and changed domains as well. Its operators even thought about setting up TPB servers on a satellite where law enforcement can’t reach.
Too often Techdirt writes about changes in copyright law that are only for the benefit of the big publishing and recording companies, and offer little to individual creators or the public. So it makes a pleasant change to be able to report that South Africa's efforts to update its creaking copyright laws seem, for the moment, to be bucking that trend. Specifically, those drafting the text seem to have listened to the calls for intelligent fair use rights fit for the digital world. As a post on infojustice.org explains, a key aspect of copyright reform is enshrining exceptions that give permission to Internet users to do all the usual online stuff -- things like sharing photos on social media, or making and distributing memes.
Doing nothing about online lawlessness chills free speech, the MPAA has told the NTIB. To improve the situation, online platforms should take more responsibility for illegal content and domain names should be off limits to pirate sites. On top, some Kodi addon makers and repositories should be targeted by criminal enforcement action.