With the Linux 4.19 kernel set to be released next weekend, here's a recap of the most prominent features to be found in this next kernel release.
Adding to the long list of new features for what will be Linux 4.20 or likely renamed to Linux 5.0 per Linus Torvalds' numbering preferences is a new wireless networking subsystem within the kernel's networking code... Meet LoRa.
LoRa is a long-range, low-power wireless standard with the bits planned for the mainline kernel been in the works for the past number of months. LoRa was developed for IoT use-cases and runs on sub-gigahertz radio frequency bands while aiming for transmissions that can span beyond 10 kilometers (6+ miles). LoRa is designed to be inexpensive and work out well for deployment in rural and remote environments. The frequencies that LoRa operates at also requires no licenses.
More Linux storage drivers have been converted to the "blk-mq" interfaces for the multi-queue block I/O queuing mechanism for the 4.20~5.0 kernel cycle.
Blk-mq is capable of delivering much better performance with modern storage devices -- namely NVMe PCI Express SSDs but also SCSI drives. This code that's been part of the Linux kernel the past few years allows mapping I/O to multiple queues and distributing the tasks across multiple CPU threads, thus scaling better with today's multi-core servers, while also supporting multiple hardware queues of capable devices.
Various efforts always are underway to implement Secure Boot and to add features that will allow vendors to lock users out of controlling their own systems. In that scenario, users would look helplessly on while their systems refused to boot any kernels but those controlled by the vendors.
The vendors' motivation is clear—if they control the kernel, they can then stream media on that computer without risking copyright infringement by the user. If the vendor doesn't control the system, the user might always have some secret piece of software ready to catch and store any streamed media that could then be shared with others who would not pay the media company for the privilege.
Recently, Chen Yu and other developers tried to submit patches to enhance Secure Boot so that when the user hibernated the system, the kernel itself would encrypt its running image. This would appear to be completely unnecessary, since as Pavel Machek pointed out, there is already uswsusp (userspace software suspend), which encrypts the running image before suspending the system. As Pavel said, the only difference was that uswusp ran in userspace and not kernel space.
Google engineer Brendan Higgins sent out an experimental set of 31 patches today introducing KUnit as a new Linux kernel unit testing framework to help preserve and improve the quality of the kernel's code.
KUnit is a unit testing framework designed for the Linux kernel and inspired by the well known JUnit as well as Googletest and other existing unit testing frameworks for designing unit tests and related functionality.
The Automotive Grade Linux project has released Unified Code Base 6.0 in-vehicle infotainment stack with new software profiles for telematics and instrument cluster.
The Linux Foundation’s Automotive Grade Linux project version 6.0 (“Funky Flounder”) of its Unified Code Base 6.0 distribution is now available for download. The new release for the first time expands the open source in-vehicle infotainment (IVI) stack to support telematics hooks and instrument cluster displays.
“The addition of the telematics and instrument cluster profiles opens up new deployment possibilities for AGL,” stated Dan Cauchy, Executive Director of Automotive Grade Linux at the Linux Foundation. “Motorcycles, fleet services, rental car tracking, basic economy cars with good old-fashioned radios, essentially any vehicle without a head unit or infotainment display can now leverage the AGL Unified Code Base as a starting point for their products.”
Comparing Spinnaker and Kubernetes in this way is somewhat unfair to both projects. The scale, scope, and magnitude of these technologies are different, but parallels can still be drawn.
Just like Kubernetes, Spinnaker is a technology that is battle tested, with Netflix using Spinnaker internally for continuous delivery. Like Kubernetes, Spinnaker is backed by some of the biggest names in the industry, which helps breed confidence among users. Most importantly, though, both projects are open source, designed to build a diverse and inclusive ecosystem around them.
With this weekend's release of Vulkan 1.1.88 stealing the show was the Vulkan transform feedback capability to allow projects like DXVK to support Direct3D's Stream Output functionality. But besides VK_EXT_transform_feedback, there are other extensions also being worked on for Mesa ANV / RADV Vulkan driver coverage.
DisplayPort's Forward Error Correction (FEC) is part of the specification since DP 1.4 and is for ensuring reliable, error-free video transport. Forward Error Correction allows for correcting link errors and a "glitch-free visual experience" by using a Reed-Solomon parity/correction check. The DisplayPort sink can detect and correct any small errors in the compressed video stream.
NVIDIA's embargo for reviews on the GeForce RTX 2070 graphics cards has now expired ahead of the expected retail availability on Wednesday.
NVIDIA has released the 410.66 Linux graphics driver today as their first stable release in the 410 series and comes with support for the new GeForce RTX 2070 graphics card.
The main addition to the NVIDIA 410 Linux driver series is the initial Turing GPU support with the GeForce RTX 2070/2080 graphics cards. Besides enabling Turing support, the NVIDIA 410 driver has initial RTX ray-tracing support with Vulkan. The NVIDIA driver ships new libnvidia-rtcore.so and libnvidia-cbl.so libraries for this ray-tracing functionality. The OptiX ray-tracing engine is also bundled as libnvoptix.so.
Arriving earlier this month was a Dell PowerEdge R7425 server at Phoronix that was equipped with two AMD EPYC 7601 processors, 512GB of RAM, and 20 Samsung 860 EVO SSDs to make for a very interesting test platform and our first that is based on a dual EPYC design with our many other EPYC Linux benchmarks to date being 1P. Here is a look at the full performance capabilities of this 64-core / 128-thread server compared to a variety of other AMD EPYC and Intel Xeon processors while also doubling as an initial look at the performance of these server CPUs on Ubuntu 18.10.
While CodeWeavers' developers have been busy with improvements to Wine and Valve's downstream "Proton" for allowing a great Windows-on-Linux gaming experience, they haven't parted ways with their core business and today they announced the availability of CrossOver 18.
FossMint has covered software for audio creation and manipulation in the past (e.g. Ardour and Audacity) and we even covered Operating Systems created with media creation in focus (e.g Ubuntu Studio and AV Linux).
Today, we bring you an amazing tool for professional use that anybody with an interest in music creation and time can easily make use of. It goes by the name of Tracktion 7.
Tracktion 7 is a free, cross-platform, DAW (Digital Audio Workstation) for music creators of all classes. It features an equalizer, input, waveform, level, pan, and plugins which are all displayed left-to-right in an intuitive single-screen interface.
Its users have access to an unlimited number of audio and MIDI tracks coupled with tools to facilitate easier music composing, recording, mixing, and sharing processes.
Linux systems maintain quite a collection of log files, many of which you are probably rarely tempted to view. Some of these log files are quite valuable, though, and options for exploring them might be more interesting and varied than you imagine. Let's look at some system logs and get a handle on some of the ways in which log data might be easier to probe.
Developed Weather Factory, some of the same people responsible for Fallen London and Sunless Sea, have pushed out a good free update for Cultist Simulator along with the first DLC.
For those not clued up, Planetary Annihilation: TITANS is now being run by a dedicated studio that are going to give it a new life with continued support and plenty of updates. The original Planetary Annihilation is no longer available to buy, with a permanent discount to upgrade to TITANS.
Valve are continuing to polish the next version of Steam Play's Proton with an update to the beta channel.
Valve in cooperation with CodeWeavers and other developers continues making rapid progress on Steam Play and their "Proton" downstream flavor of Wine.
After re-basing to Wine 3.16 upstream a few days ago rather than the quickly-dated Wine 3.7, the second Proton 3.16 Beta is out this evening. This updated beta has switched over to the new DXVK 0.90 release with Stream Output support but keep in mind that requires the Vulkan driver on your system to support Vulkan's new transform feedback capability -- it's easy if using the NVIDIA Vulkan beta driver but otherwise for Intel ANV or Radeon RADV requires building patched versions of Mesa. DXVK 0.90 also brings various game fixes in its own right.
Descenders, the rather good extreme downhill freeriding game from RageSquid looks to be getting some fun updates soon.
Bridge Constructor Portal, the rather amusing cross-over has been updated with a built-in level editor along with Steam Workshop support.
The rather good Early Access puzzle game Train Valley 2 has just expanded with a rather big update with lots of new content.
The developers said they weren't originally going to be adding in more official levels before the final release, however, given how active the community has been with creating their own content they decided to push this out early. This will also allow them to get more feedback on issues with it.
These new levels include the brand new electricity game mechanic and resource, which mixes up the gameplay a little as it works differently. To produce it, you will need to constantly feed power plants for other buildings connected and so it does add a little bit of extra depth to the gameplay as well as present some interesting challenges.
Developer All Parts Connected has now announced that their action-survival game Sipho is going to enter Early Access. on November 13th.
Today KDE releases a Bugfix update to KDE Plasma 5, versioned 5.14.1. Plasma 5.14 was released in October with many feature refinements and new modules to complete the desktop experience.
We will be holding a Bug Day on October 20th, 2018, focusing on Konsole. Join at any time, the event will be occurring all day long!
This is a great opportunity for anyone, especially non-developers to get involved!
The GNOME desktop has a problem, and we’re (partly) all to blame.
See, most of us enjoy customizing our Linux desktop to suit our preferred tastes. A dash of colour here, a splash of translucency there, and so on.
Malleableness is an assumption; distro users expect to be able to tweak, tune or toggle anything, they like, from integral kernel modules to superficial GTK3 themes.
Meet Lakka, a lightweight Linux distribution that will transform your old or low-end computer (like Raspberry Pi) into a complete retrogaming console,
When I say retrogaming console, I am serious about the console part. If you have ever used a PlayStation of Xbox, you know what a typical console interface looks like.
Lakka provides a similar interface and a similar experience. I’ll talk about the ‘experience’ later. Have a look at the interface first.
If you’re looking for a Windows alternative but have shied away from Linux, MX Linux may be the solution you’ve been waiting for.
Linux distributions have always held promise for Windows users to migrate away from an expensive OS. Even Windows 10 has enough quirks and issues that a truly robust and functional Linux alternative could easily entice longtime Windows users to switch.
Let’s take a closer look at MX Linux from the perspective of a longtime Windows user.
Just ahead of Ubuntu 18.10, Solus 4, and Fedora 29 among other forthcoming Linux distribution releases, Elementary OS 5 "Juno" has been released for a polished desktop experience that aims to compete with macOS and Windows for desktop usability.
Elementary OS 5.0 "Juno" continues to be based upon Ubuntu for its package set but continues with its own Pantheon desktop environment and remains quite focused on delivering a polished desktop experience. With the 5.0 Juno release they focused on refining the user experience, improving productivity, and taking their developer platform to the next level.
It's not exactly common practice to take an operating system -- or any piece of software -- from a point release like 0.4 to a major version release like 5.0. When elementary OS debuted, the developers said the 0.1 version number represented how they felt about it at the time. In their words, "a complete product but an incomplete vision." I have to assume, then, that bumping today's brand new version of elementary OS (code-named Juno) to 5.0 represents not only developer confidence, but satisfaction that they've achieved their vision.
Since the beginning of 2018, precisely after we had the sophisticated Loki since 2016, we have been waited for Juno, the 5.0 version of elementary OS. Today, Wednesday, 17 October 2018, it's finally released and you can download it. This article brings the download links, torrents, checksum, and announcement info. I include short instructions on how to download for both direct and torrent ways as some users wonder how. Also, for historical purpose, I note here a summary of some links from the first announcement of Juno development from January this year up to last notice of Beta 2 last month. Anyway, happy downloading, happy using Juno, and please help seeding the torrent!
elementary OS is the fast, open, and privacy-respecting alternative to Windows and macOS. Over the past year we’ve been hard at work putting together a new major version of elementary OS, codenamed Juno.
Today the Plasma developer team released Plasma 5.14.1 which was what I was waiting for. I was a bit hesitant to add a major new release (5.14.0) to my monthly refresh for Slackware and opted for this point release.
And now “KDE-5_18.10” has been uploaded to the ‘ktown‘ repository. Again I was able to offer a full set of updates.
What’s new
The October release of KDE Plasma5 for Slackware contains the KDE Frameworks 5.51.0, Plasma 5.14.1 and Applications 18.08.2. All this on top of Qt 5.11.2 which was updated inbetween the two monthly ‘ktown’ releases. There were two updates in the ‘extras’ section for Applications: new versions for ‘krita’ and ‘okteta”. The ‘deps’ section saw some changes as well: ‘PyQt5’ was updated to work properly with Qt 5.11.2, a newer version of ‘sip’ had to be added for that same reason – it replaces the somewhat older Slackware package. And a new package ‘python-enum34’ package had to be added, it is a dependency for the Python2 support in PyQt5.
Redis Labs, the home of Redis and provider of Redis Enterprise, is collaborating with Red Hat to make Redis Enterprise available as a hosted and fully-managed database service on Red Hat OpenShift Container Platform, with built-in support for Kubernetes Operators.
This collaboration enables joint customers to more quickly and easily deploy and manage the multi-model Redis Enterprise database as a stateful Kubernetes service, with a goal of enabling customers to automate database management, streamline operations, deliver cloud portability, and simplify application development.
During the summer, I worked on updating nrpe to a newer version and made changes to the systemd startup to match the provided one. Part of this was adding PIDfile so that systemd could send signals and monitor the correct nrpe daemon as there had been bugs where systemctl was unable to restart the daemon.
EclipseCon Europe is almost here, and many Red Hatters are working furiously to make the show as valuable as possible for attendees. (We’re partly doing it for ourselves as well, of course, because it’s a great opportunity to get the entire Che/Theia community together.) If you aren’t familiar with Eclipse Che, it’s is a next-generation cloud IDE and developer workspace server for teams and organizations. Theia is an extensible open-source framework to develop multi-language IDEs for the cloud and desktop using state-of-the-art web technologies.
Red Hat is pleased to announce the general availability of Red Hat Satellite 6.4. The latest release focuses on enhancements in the Satellite user interface and improved integrations with Ansible Automation.
Over the past three years, we’ve worked hard to help make containers and Kubernetes an enterprise-ready technology, one that’s not only flexible and scalable to support the growth of cloud-native workloads, but also stable enough for the demanding needs of modern enterprises. Red Hat OpenShift Container Platform is designed to be our answer to these IT needs, built on the backbone of the world’s leading enterprise Linux platform and providing the scale and additional components that Kubernetes needs to fuel enterprise digital transformation.
Businesses worldwide are on track to spend $1.1 Trillion on Digital Transformation in 2018 according to IDC. Executives tasked with driving transformation have to balance funding innovation initiatives with keeping the lights on. Maintaining existing infrastructure is necessary but when much of the budget is used to maintain the status quo, transformation efforts slow down to a crawl. New competitors disrupting established companies are not saddled with the burden of maintaining legacy infrastructure. They can innovate faster, using new business models and technologies like Cloud Computing, Artificial Intelligence, industrial IoT, and Real Time Analytics. What do all these technologies have in common? The foundation for these transformational technologies is open source software.
While Ubuntu 18.10 is set to roll out this week with its new theme and an assortment of package updates and other enhancements, there is one feature Canonical previously talked about for the Ubuntu 18.10 "Cosmic Cuttlefish" cycle that we have yet to see made public.
After Canonical added a software/hardware survey on new installs for the Ubuntu 18.04 cycle to collect statistics on its users, for the Ubuntu 18.10 cycle is when they were planning on making that mass amount of data public. But unfortunately the 18.10 release is nearing this week and we've heard nothing out of Canonical on making this data public.
The Ubuntu Server developers are looking to make it easier to deploy free SSL/TLS certificates from Let's Encrypt.
Robie Basak of Canonical has been working on a Snap package for Certbot, one of the command-line clients for automating the setup process of generating and deploying certificates from Let's Encrypt.
The purpose of this communication is to provide a status update and highlights for any interesting subjects from the Ubuntu Server Team. If you would like to reach the server team, you can find us at the #ubuntu-server channel on Freenode. Alternatively, you can sign up and use the Ubuntu Server Team mailing list.
The popular screenshot tool, which uses Gtk2 and Perl, was one of the very few packages that blocked Debian (and Ubuntu) from removing the obsolete libgnome2-perl and libgnome2-vfs-perl from the repository archive. Since Shutter doesn't work without these packages, it was removed from the Debian Unstable and Ubuntu 18.10 repositories.
On Kickstarter: SwitchDoc Labs’ “Smart Garden System” is a Raspberry Pi and Grove-based environmental monitoring and plant watering system with sensors for soil moisture, sunlight, air quality, temperature, and humidity.
Spokane Valley, Wash. based SwitchDoc Labs (SDL) has launched a more advanced, up to nine plant Smart Garden System (SGS) kit version of its earlier SmartPlantPi kit. The Raspberry Pi based kit, which requires no soldering, is promoted as being an educational system for learning about gardening as well as the Raspberry Pi and IoT technology.
Raspberry Pi has been able to inspire a wide range of open source Linux computer boards. Some of the notable names include Orange Pi, Asus Tinker Board, Banana Pi, etc. Also, from time-to-time, new and promising projects keep appearing on Kickstarter and Indiegogo that promise to provide a better value at lower cost.
Just recently, I came across a similar project that goes by the name La Frite. This open source mini computer is available for backing and it aims to ship in November. The project has already crossed its $10,000 aim.
The Voyage may be dead, but the Kindle line still has some life left in it. This time last year, Amazon upgraded the high-end Oasis model, and now the mid-range Paperwhite is getting a little love.The workhorse of the company’s devoted e-reader line just got a handful of upgrades that will give users a more premium experience, while keeping the device’s starting price at $130.
Hedera Hashgraph, one of the DApp facilitators within the blockchain industry recently announced that it has released its Software Development Kit (SDK) in Java.
Finding differing opinions on open source with the telecom industry isn't hard to do, especially where orchestration is concerned. That's why a panel discussion on open source and MANO at the Light Reading NFV-Carrier SDN event in Denver seemed an odd place to find such outspoken agreement on that topic, but there it was.
Four smart guys, none shy with their opinions, all seemed to agree on key points around open source, the need for standards, the role of vendors and the lack of internal software skills. But they also agreed that telecom service providers are struggling a bit to understand how to proceed in an open source world and still need some fundamental internal changes.
More than 20 years ago I chose the name "Bro" as "an Orwellian reminder that monitoring comes hand in hand with the potential for privacy violations", as the original Bro paper put it. Today that warning is needed more than ever ... but it's clear that now the name "Bro" is alas much more of a distraction than a reminder.
On the Leadership Team of the Bro Project, we heard clear concerns from the Bro community that the name "Bro" has taken on strongly negative connotations, such as "Bro culture". These send a sharp, anti-inclusive - and wholly unintended and undesirable - message to those who might use Bro. The problems were significant enough that during BroCon community sessions, several people have mentioned substantial difficulties in getting their upper management to even consider using open-source software with such a seemingly ill-chosen, off-putting name.
When I was an ops consultant, I had the "great fortune" of seeing the dark underbelly of many companies in a relatively short period of time. Such fortune was exceptionally pronounced on one client engagement where I became the maintainer of an in-house deployment tool that had bloated to touch nearly every piece of infrastructure—despite lacking documentation and testing. Dismayed at the impossible task of maintaining this beast while tackling the real work of improving the product, I began reviewing my old client projects and probing my ops community for their strategies. What I found was an epidemic of "not invented here" (NIH) syndrome and a lack of collaboration with the broader community.
There are many organizations out there, from companies like Red Hat to internet scale giants like Google and Facebook that have established an open source programs office (OSPO). The TODO Group, a network of open source program managers, recently performed the first ever annual survey of corporate open source programs and revealed some interesting findings on the actual benefits of open source programs.
Does the world need another web browser? Even though the days of having a multiplicity of browsers to choose from are long gone, there still are folks out there developing new applications that help us use the web.
One of those new-fangled browsers is Min. As its name suggests (well, suggests to me, anyway), Min is a minimalist browser. That doesn't mean it's deficient in any significant way, and its open source, Apache 2.0 license piques my interest.
Chromeboxes are really great desktops for users who have moved their workflow into a web browser, especially at lower prices. You don’t need higher specs inside a Chromebox for it to work well, but it can help.
For those who want a supercharged Chromebox on the cheap, Oregon-based CTL has just the thing for you. Its new Chromebox—the CBX1—has all the high-end parts you could want, at a comparatively low price.
Chrome 70, available now, lets you install “Progressive Web Apps,” or PWAs, on Windows. When you visit a website with a PWA, like Twitter or Spotify, you can now “install” it to make it behave more like a normal desktop application.
With Chrome 69, Google began automatically signing you into the Chrome browser whenever you signed into a Google website like Gmail. Chrome 70, available now, has a hidden option to disable this feature.
We don’t think most Chrome users will care about this. But, if you do care, Google now gives you a choice. And that’s good news.
Chrome 70, the latest version of Google’s browser, is rolling out now on Windows, Mac, and Linux computers. The update sees Google reverse some of the controversial changes it made with the last version, by allowing users to stop the browser from automatically signing into their Google account after logging into one of the search giant’s apps. Chrome 70 also brings support for Progressive Web Apps, or PWAs, on Windows.
Chrome 70 is now available. This release removes the controversial change from the last version, and now allows users to stop the browser from automatically signing in to their Google accounts after logging in to one of its apps, The Verge reports. You still need to opt-out and specifically change this setting, however. Other changes include support for progressive web apps on Windows. See the "New in Chrome 70" post for more information on this release.
Google's Chrome/Chromium 70 web-browser made it out today for Linux users as well as all other key supported platforms.
Chrome 70 is notable for shipping with preliminary AV1 video decoding support granted rather limited and only CPU-based decoding at this stage after the AV1 video decode support was dropped from Chrome 69.
With Raptor Computing Systems' Talos II Lite and especially the forthcoming Blackbird positioning the POWER architecture in a prime spot for use by libre Linux users who want a system that's open-source down to the firmware, they've been trying to make sure the Linux desktop stack is in order. The latest area they've been working on is browser coverage.
At the moment for 64-bit POWER little-endian (PPC64LE), there isn't a modern browser with JavaScript JIT support available upstream... Obviously that is a problem for more Linux desktop users in 2018. But fortunately Raptor has been committing resources to changing that. They have gotten a patched version of Chrome working well on their POWER9 hardware complete with JIT support.
My old laptop had so many great stickers on it I didn’t want to say goodbye. So I put off my hardware refresh cycle from the recommended 2 years to almost 3.
To speak the truth it wasn’t only the stickers that made me wary of switching. I had a workflow that worked. The system wasn’t slow. It was only three years old.
But then Windows started crashing on me during video calls. And my Firefox build times became long enough that I ported changes to my Linux desktop before building them. It was time to move on.
Firefox is only as strong as its passionate users. Because we’re independent, people need to make a conscious choice to use a non-default browser on their system. We’re most successful when happy users tell others about an alternative worth trying.
Workshops that teach you how to detect misinformation and mobile trackers. A series of art installations that turn online data into artwork. A panel about the unintended consequences of AI, featuring a former YouTube engineer and a former FBI agent. And a conversation with the inventor of the web.
These are just a handful of the experiences at this year’s MozFest, Mozilla’s annual festival for, by, and about people who love the internet. From October 22-28 at the Royal Society of Arts (RSA) and Ravensbourne University in central London, more than 2,500 developers, designers, activists, and artists from dozens of countries will gather to explore privacy, security, openness, and inclusion online.
One of the ways developers have tipically tried to keep a smooth web application, without interfering with the browser’s animation and response to input, is to use a Web Worker for long running computations. For example, in the Prism.js (a library for syntax highlighting) API there’s an async parameter to choose “Whether to use Web Workers to improve performance and avoid blocking the UI when highlighting very large chunks of code”.
In the past three weeks, we merged 181 PRs in the Servo organization’s repositories.
Our Windows nightlies have been broken for several months for a number of reasons, and we have now fixed all of the known breakage. If you’re a Windows user, give our latest builds a try! You can visit arbitrary URLs by pressing Ctr+L.
The Android Components project added a component to use Servo in any Android app.
Kreps believes that this competition slowed down progress in core Hadoop, as the need for differentiation resulted in more attention towards edge features. Case in point, he noted, the fact that HDFS, Hadoop's file system, which historically has been a key component of its value proposition, is no longer the most economic way to store loads of data -- cloud storage is now.
This could also be interpreted as a sign of moving away from batch processing that Hadoop started from and more toward real-time processing. Although Hadoop has been gradually grown to a full ecosystem, including streaming engines, the majority of its use cases are still batch-oriented, believes Kreps. How this will evolve, time will tell.
DragonFlyBSD 5.4 should be a really great release if you are a BSD user and have an AMD Threadripper 2 box, particularly the flagship Threadripper 2990WX 32-core / 64-thread processor.
The project leader of this long ago fork from FreeBSD, Matthew Dillon, has been quite outspoken about the Threadripper 2990WX since he purchased one earlier this summer. This prolific BSD developer has been praising the performance out of the Threadripper 2990WX since he got the system working on the current DragonFlyBSD 5.3 development builds.
Since getting DragonFlyBSD running on the Threadripper 2 hardware in August, he's routinely been making performance tuning optimizations to DragonFly's kernel to benefit the 2990WX given its NUMA design.
Grab an ebook/print bundle direct from No Starch Press. NSP coupon code ILUVMICHAEL gives you 30% off any NSP purchase and puts a few extra bucks in my pocket, so that’s cool. And there’s Amazon. There’s always Amazon, the company we all love to loathe.
It's been three years since the original draft proposal for relicensing the LLVM compiler code was sent out and while there hasn't been a lot to report on recently about the effort, they are making progress and proceeding.
Since 2015 LLVM developers have been discussing relicensing to an Apache 2.0 license to help motivate new contributors, protect users of LLVM code, better protect existing contributors, ensure that LLVM run-time libraries can be used by both other open-source and proprietary compilers.
The Software Freedom Law Center is proud to make available a whitepaper by Mark Shuttleworth, CEO of Canonical, Ltd., and Eben Moglen, Founding Director of the Software Freedom Law Center and Professor of Law at Columbia Law School. The whitepaper shows how new capabilities in the free and open source software stack enable highly regulated and sensitive industrial concerns to take advantage of the full spectrum of modern copyleft software.
Software embedded in physical devices now determines how almost everything – from coffee pots and rice cookers to oil tankers and passenger airplanes – works. Safety and security, efficiency and repairability, fitness for purpose and adaptability to new conditions of all the physical products that we make and use now depend on our methods for developing, debugging, maintaining, securing and servicing the software embedded in them.
The Software Freedom Law Center has announced the availability of a whitepaper [PDF] about automotive software and copyleft, written by Mark Shuttleworth and Eben Moglen. At its core, it's an advertisement for Ubuntu and Snap, but it does look at some of the issues involved.
More than 15 years ago, Free, Libre, and Open Source Software (FLOSS) community activists successfully argued that licensing proliferation was a serious threat to the viability of FLOSS. We convinced companies to end the era of “vanity” licenses. Different charities — from the Open Source Initiative (OSI) to the Free Software Foundation (FSF) to the Apache Software Foundation — all agreed we were better off with fewer FLOSS licenses. We de-facto instituted what my colleague Richard Fontana once called the “Rule of Three” — assuring that any potential FLOSS license should be met with suspicion unless (a) the OSI declares that it meets their Open Source Definition, (b) the FSF declares that it meets their Free Software Definition, and (c) the Debian Project declares that it meets their Debian Free Software Guidelines. The work for those organizations quelled license proliferation from radioactive threat to safe background noise. Everyone thought the problem was solved. Pointless license drafting had become a rare practice, and updated versions of established licenses were handled with public engagement and close discussion with the OSI and other license evaluation experts.
Sadly, the age of license proliferation has returned. It's harder to stop this time, because this isn't merely about corporate vanity licenses. Companies now have complex FLOSS policy agendas, and those agendas are not to guarantee software freedom for all. While it is annoying that our community must again confront an old threat, we are fortunate the problem is not hidden: companies proposing their own licenses are now straightforward about their new FLOSS licenses' purposes: to maximize profits.
Open-in-name-only licenses are now common, but seem like FLOSS licenses only to the most casual of readers. We've succeeded in convincing everyone to “check the OSI license list before you buy”. We can therefore easily dismiss licenses like Common Clause merely by stating they are non-free/non-open-source and urging the community to avoid them. But, the next stage of tactics have begun, and they are harder to combat. What happens when for-profit companies promulgate their own hyper-aggressive (quasi-)copyleft licenses that seek to pursue the key policy goal of “selling proprietary licenses” over “defending software freedom”? We're about to find out, because, yesterday, MongoDB declared themselves the arbiter of what “strong copyleft” means.
After Redis Labs relicensed the modules it developed to complement its open-source database, from AGPL to Apache v2.0 with a Commons Clause, the free-software community expressed dismay.
And, inevitably, some responded by forking the affected code.
Today, the maker of another open source database, MongoDB, plans to introduce a license of its own to deal with the issue cited by Redis: cloud service providers that sell hosted versions of open-source programs – such as Redis and MongoDB database servers – without offering anything in return.
"Once an open source project becomes interesting or popular, it becomes too easy for the cloud vendors to capture all the value and give nothing back to the community," said Dev Ittycheria, CEO of MongoDB, in a phone interview with The Register.
Ittycheria pointed to cloud service providers such as Alibaba, Tencent, and Yandex. Those companies, he claims, are testing the boundaries of the AGPL by benefiting from the work of others while failing to share their code.
MongoDB is a bit miffed that some cloud providers — especially in Asia — are taking its open-source code and offering a hosted commercial version of its database to their users without playing by the open-source rules. To combat this, MongoDB today announced it has issued a new software license, the Server Side Public License (SSPL), that will apply to all new releases of its MongoDB Community Server, as well as all patch fixes for prior versions.
Previously, MongoDB used the GNU AGPLv3 license, but it has now submitted the SSPL for approval from the Open Source Initiative.
Things just got serious in open source land. Despite the occasional Commons Clause or Fair Source licensing attempt to change the meaning of the words "open source" to include "the right for a private company to make money from its open source efforts," we've stuck to the Open Source Definition, and it has served us well. Open source communities have become the center of the innovation universe, giving us exceptional code like Linux, Kubernetes, Apache Kafka, and more.
The old maxim that the nice thing about standards is that there are so many to choose from could well apply to open source licensing. While now nearing a couple years old, the last WhiteSource Software survey of the top 10 open source licenses found close competition between the GPL, MIT, and Apache licenses. While the commercial-friendly Apache license has dominated the world of big data platforms and AI frameworks, MIT and GPL (which has "copyleft" provisions requiring developers to contribute back all modifications and enhancements) continues to be popular. GPL and variants such as the AGPL have been popular amongst vendors that seek to control their own open source projects, like MongoDB.
MongoDB just announced that they were relicensing under their new Server Side Public License. This is basically the Affero GPL except with section 13 largely replaced with new text, as follows:
"If you make the functionality of the Program or a modified version available to third parties as a service, you must make the Service Source Code available via network download to everyone at no charge, under the terms of this License. Making the functionality of the Program or modified version available to third parties as a service includes, without limitation, enabling third parties to interact with the functionality of the Program or modified version remotely through a computer network, offering a service the value of which entirely or primarily derives from the value of the Program or modified version, or offering a service that accomplishes for users the primary purpose of the Software or modified version.
“Service Source Code” means the Corresponding Source for the Program or the modified version, and the Corresponding Source for all programs that you use to make the Program or modified version available as a service, including, without limitation, management software, user interfaces, application program interfaces, automation software, monitoring software, backup software, storage software and hosting software, all such that a user could run an instance of the service using the Service Source Code you make available."
MongoDB admit that this license is not currently open source in the sense of being approved by the Open Source Initiative, but say:"We believe that the SSPL meets the standards for an open source license and are working to have it approved by the OSI."
At the broadest level, AGPL requires you to distribute the source code to the AGPLed work[1] while the SSPL requires you to distribute the source code to everything involved in providing the service. Having a license place requirements around things that aren't derived works of the covered code is unusual but not entirely unheard of - the GPL requires you to provide build scripts even if they're not strictly derived works, and you could probably make an argument that the anti-Tivoisation provisions of GPL3 fall into this category.
MongoDB has submitted the SSPL, which is replacing the previous GNU APGLv3 license, for approval from the Open Source Initiative.
Politics and international relations may be fraught with acrimony these days, but the tech world seems a bit friendlier of late. Last week Microsoft joined the Open Invention Network and agreed to grant a royalty-free, unrestricted license of its 60,000-patent portfolio to other OIN members, thereby enabling Android and Linux device manufacturers to avoid exorbitant patent payments. This week, Arm and Intel kept up the happy talk by agreeing to a partnership involving IoT device provisioning.
Arm’s recently announced Pelion IoT Platform will align with Intel’s Secure Device Onboard (SDO) provisioning technology to make it easier for IoT vendors and customers to onboard both x86 and Arm-based devices using a common Peleon platform. Arm also announced Pelion related partnerships with myDevices and Arduino (see farther below).
Japanese chip designer Arm has lightly sketched out in public its future processor designs that are aimed at powering internet servers and infrastructure.
Think CPU cores, chip interconnects, memory subsystems, and so on, for semiconductor manufacturers to use in silicon brains for data center systems, edge devices, and networking and telecommunications gear. Arm really wants to nuzzle its way into server and telecoms racks, tiptoeing past Intel Xeons and AMD Epycs, and so here's the intellectual property it hopes will do the trick.
And we're not joking when we're say lightly sketched: the biz has only shown off a roadmap of codenames and process nodes. Arm is going public with these plans partly because source code supporting these future chip designs will soon be trickling into the Linux kernel and other open-source projects referencing said codenames, so it may as well spill some beans now to head off speculation.
Version Control (revision control or source control) is a way of recording changes to a file or collection of files over time so that you can recall specific versions later. A version control system (or VCS in short) is a tool that records changes to files on a filesystem.
There are many version control systems out there, but Git is currently the most popular and frequently used, especially for source code management. Version control can actually be used for nearly any type of file on a computer, not only source code.
A user story is a short description of a unit of work that needs doing. It’s normally told from the perspective of the user, hence the name. The journey towards a good pull request starts with a well-written user story. It should be scoped to a single thing that a user can do in the system being built.
The more you use computers, the more you see the potentials for automating everything. Who doesn't love that? By building Mergify those last months, we've decided it was time bring more automation to the development workflow.
Good news: We have developed a tool called release-bot that automates the process. All you need to do is file an issue into your upstream repository and release-bot takes care of the rest. But let’s not get ahead of ourselves. First, let’s look at what needs to be set up for this automation to happen. I’ve chosen the meta-test-family upstream repository as an example.
Health officials in Michigan this week honored Dr. Eden Wells with the state’s top award for an eminent career in public health—despite that Wells is currently facing several charges in connection with the Flint water crisis, including involuntary manslaughter.
It was only last year that Finland’s National Institute for Health and Welfare (THL) began recording births by circumcised women in Finland, and other major hospitals have also failed to keep detailed records. [...]
The Johnson v Monsanto trial was groundbreaking before it even began, because a judge allowed the plaintiff’s attorneys to present research and expert testimony on glyphosate and health risks – scientific evidence that the jury ultimately found credible and compelling.
The third panel gathers governments and civil society, he said, and will look into the need for antibiotic stewardship. For example, he said, a representative of the Swedish Public Health Agency will talk about its strategy to incentivise companies to keep existing antibiotics on the market despite their low prices.
UNCTAD and WHO are expecting a good debate and some clarification of how stakeholders see the needs for the future, Spennemann said. The two UN organisations seek to informally bring together small companies, and potentially interested investors, and launch an informal debate.
Another brief reminder that another Reproducible Builds summit will be taking place between 11th—13th December 2018 in Mozilla’s offices in Paris. If you are interested in attending please send an email to holger@layer-acht.org. More details can also be found on the corresponding event page of our website.
A Russian-speaking grey-hat hacker is breaking into people's MikroTik routers and patching devices so they can't be abused by cryptojackers, botnet herders, or other cyber-criminals, ZDNet has learned.
The hacker, who goes by the name of Alexey and says he works as a server administrator, claims to have disinfected over 100,000 MikroTik routers already.
Apple, Google, Microsoft, and Mozilla announced plans today to disable Transport Layer Security (TLS) 1.0 and 1.1 support in their respective browsers in the first half of 2020.
Apple, Google, Microsoft and Mozilla all announce the end of support for TLS 1.0 and 1.1 standards starting in 2020, ZDNet reports. Chrome and Firefox already support TLS 1.3, and Microsoft and Apple will soon follow suit.
libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authentciate without any credentials.
There’s a four-year-old bug in the Secure Shell implementation known as libssh that makes it trivial for just about anyone to gain unfettered administrative control of a vulnerable server. While the authentication-bypass flaw represents a major security hole that should be patched immediately, it wasn’t immediately clear what sites or devices were vulnerable since neither the widely used OpenSSH nor Github’s implementation of libssh was affected.
But University of Michigan grad student Matt Bernhard has demonstrated that he can bypass the tamper-evident seals in seconds, using a shim made from a slice of a soda can. The bypass is undetectable and doesn't damage the seal, which can be resecured after an attacker gains access to the system.
Bernhard, who is an expert witness for election integrity activists in a lawsuit filed in Georgia to force officials to get rid of paperless voting machines used in that state, said the issue of security ties and seals came up in the lawsuit earlier this year when Fulton County Elections Director Richard Barron told the court that his Georgia county relies on tamper-evident metal and plastic ties to seal voting machines and prevent anyone with physical access to the machines from subverting them while they sit in polling places days before an election.
[...]
He noted that defeating ties and seals in non-tamper-evident ways isn’t the only method to wreak havoc on an election in Michigan. The state has a unique law that prohibits ballots from being used in a recount if the number of voters doesn't match the number of ballots cast at a precinct or if the seal on a ballot box is broken or has a different serial number than what it should have. Someone who wanted to wreak havoc on an election or alter an election outcome in Michigan could purposely tamper with ballot box seals in a way that is evident or simply replace them with a seal bearing a different serial number in order to get ballots excluded from a recount. The law came into sharp relief after the 2016 presidential election when Green Party candidate Jill Stein sought to get a statewide recount in Michigan and two other critical swing states and found that some precincts in Wayne County couldn't be recounted because the number of voters who signed the poll books—which get certified with a seal signed by officials—didn't match the number of ballots scanned on the voting machines.
The Department of Homeland Security announced last October that all federal agencies had until Oct. 16, 2018, to adopt the email authentication process, known as domain-based message authentication, reporting and conformance (DMARC), which blocks fake or spoofed emails being sent from a government domain.
When Grubbs was first charged, he claimed LuminosityLink was a legitimate tool for system administrators, and he never intended for it to be used maliciously. He reversed course in a plea agreement he signed in July 2017. In that document, he admitted for the first time that he knew some customers were using the software to control computers without owners' knowledge or permission. Grubbs also admitted emphasizing a wealth of malicious features in marketing materials that promoted the software.
Keeping up with Facebook privacy scandals is basically a full-time job these days. Two weeks ago, it announced a massive breach with scant details. Then, this past Friday, Facebook released more information, revising earlier estimates about the number of affected users and outlining exactly what types of user data were accessed. Here are the key details you need to know, as well as recommendations about what to do if your account was affected.
30 Million Accounts Affected
The number of users whose access tokens were stolen is lower than Facebook originally estimated. When Facebook first announced this incident, it stated that attackers may have been able to steal access tokens—digital “keys” that control your login information and keep you logged in—from 50 to 90 million accounts. Since then, further investigation has revised that number down to 30 million accounts.
The attackers were able to access an incredibly broad array of information from those accounts. The 30 million compromised accounts fall into three main categories. For 15 million users, attackers access names and phone numbers, emails, or both (depending on what people had listed).
An 18-year-old Muslim girl in Nawada district, Bihar was tied to a tree and caned by her family members for loving a Hindu boy. Her punishment was allegedly a result of the village panchayat's diktat.
The incident happened on Wednesday (October 3) in Jogiya Maran village falling under Rajauli police station in Nawada. She remained tied to the tree for around five hours.
ACLJ said Bibi was “convicted in 2010 under Pakistan’s medieval blasphemy laws and sentenced to death for blasphemy against the prophet Muhammad after she offered water to a Muslim co-worker who believed Asia had made the water ceremonially unclean by drinking from the same cup.”
DURING his decade-long legal battle with the Swiss authorities, Rudolf Elmer, a bank whistleblower, endured 48 prosecutorial interrogations, spent six months in solitary confinement and faced 70 court rulings. None, though, was more important than the decision by Switzerland’s supreme court on October 10th, which set strict limits on the country’s famous bank-secrecy laws.
Mr Elmer had leaked data from Julius Bär after being sacked by the Cayman Islands affiliate of the Zurich-based bank. The court, dismissing an appeal by prosecutors, ruled that because he was employed by the Cayman outfit, not its parent, he was not bound by Swiss secrecy law when he handed data to WikiLeaks in 2008. The 3-2 ruling followed a rare public debate among the judges, held in only 0.3% of supreme-court cases, underlining the national importance of the issue.
If you’re opposed to war, how can you not love Julian Assange? Peace has been his overarching goal ever since he hacked into Pentagon computers at age 17, and he still has hope. In 2011, he told RT:
“Nearly every war that has started in the past 50 years has been the result of media lies. The media could have stopped it. If they hadn’t reprinted government propaganda, they could’ve stopped it. But what does that mean?
“That means basically that populations don’t like wars. And populations have to be fooled into war. Populations don’t willingly and with open eyes go into war. So if we have a good media environment, then we’ll also have a peaceful environment.”
Carbon dioxide emissions must reach net zero by 2050 in order to keep global warming below 1.5 degrees Celsius according to the “1.5 Degree Report,” compiled by the Intergovernmental Panel on Climate Change (IPCC), a coalition of climate scientists working for the United Nations. For perspective, we emitted over 32 gigatonnes of carbon dioxide last year (a gigatonne is one billion metric tonnes.) The report also claims that national pledges from the 2015 Paris Climate Accord are not enough to meet these targets.
Scientists issued a new alarm on the devastating impacts of continued burning of fossil fuels. But the Trump E.P.A. keeps propping up coal.
So now let’s connect all the dots. Capitalism didn’t just rape the planet laughing, and cause climate change that way. It did something which history will think of as even more astonishing. By quite predictably imploding into fascism at precisely the moment when the world needed cooperation, it made it impossible, more or less, for the fight against climate change to gather strength, pace, and force. It wasn’t just the environmental costs of capitalism which melted down the planetââ¬Å —ââ¬Å it was the social costs, too, which, by wrecking global democracy, international law, cooperation, the idea that nations should work together, made a fractured, broken world which no longer had the capability to act jointly to prevent the rising floodwaters and the burning summers.
Food products will be marked with stickers showing their environmental impact, according to a proposal expected to be included in a new climate package to be presented by the government this week.
Even 1.5C of warming would have brutal consequences, according to the report. Poor people, in particular, would suffer as the threat of food and water shortages increase in some parts of the world.
But the report makes clear that allowing warming to reach 2C would create risks that any reasonable person would regard as deeply dangerous.
According to the drafts, the report finds that it would take a massive global effort, far more aggressive than any we’ve seen to date, to keep warming in line with 1.5€°C — in part because we are already en route to 3€°C of warming. And even if we hit the 1.5€°C goal, the planet will still face massive, devastating changes. So it’s pretty grim.
As a UN panel prepares a report on 1.5C global warming, researchers warn of the risks of ignoring ‘feedback’ effects
The federal budget deficit swelled to $779 billion in fiscal year 2018, the Treasury Department said on Monday, driven in large part by a sharp decline in corporate tax revenues after the Trump tax cuts took effect.
The deficit rose nearly 17 percent year over year, from $666 billion in 2017. It is now on pace to top $1 trillion a year before the next presidential election, according to forecasts from the Trump administration and outside analysts. The deficit for the 2018 fiscal year, which ended Sept. 30, was the largest since 2012, when the economy and federal revenues were still recovering from the depths of the recession.
Administration officials attributed the deficit’s rise to greater federal spending, including the military and domestic budget increases that President Trump approved this year, not the $1.5 trillion tax cut.
Now comes this Linda Blair-style head turn. The NHTSA report deftly leaps past standard wing-nut climate denial and lands on a new nihilistic construct, in which action is useless precisely because climate change exists and is caused by fossil fuels.
The more you read of this impact statement, the weirder it seems. After the document lays out its argument for doing nothing, it runs a series of bar graphs comparing the impact of various action plans with scenarios in which the entire world did nothing (labeled the “no action” alternative).
The news in that statement is that administration officials serenely contemplate that 4C rise (twice the last-ditch target set at the Paris climate talks). Were the world to actually warm that much, it would be a literal hell, unable to maintain civilizations as we have known them. But that’s now our policy, and it apparently rules out any of the actions that might, in fact, limit that warming. You might as well argue that because you’re going to die eventually, there’s no reason not to smoke a carton of cigarettes a day.
Meanwhile, reporters also discovered that the administration has set up what can only be described as a concentration camp near the Mexican border for detained migrant children, spiriting them under cover of darkness from the foster homes and small shelters across the nation where they had been staying.
Charges of voter suppression have been levied in the governor’s race in Georgia in recent weeks, pitting the secretary of state and GOP candidate Brian Kemp against critics, including his Democratic opponent Stacey Abrams, who say that he’s using his perch as the chief election official to benefit his own candidacy.
The race, which the Cook Political Report currently lists as a toss-up, has received national attention. The controversy has raised questions about whether some Georgians will be turned away at the polls.
Here’s what’s happened so far, and what voters need to know.
In 2017, Georgia passed a new “exact match” law, supported by Kemp, which requires that voter registration applications precisely match information on file with the Georgia Department of Driver Services or the Social Security Administration.
Travis County, Texas — the home of Austin — has experienced a massive spike in voter registrations this cycle, which officials there attribute to the heightened interest in the state’s competitive Senate race. The county received around 35,000 registrations on the final day to submit them — that’s 10,000 more than on the same day in 2016.
While the increase in voter participation is good news, the recent surge is complicated by the fact that the registrations were submitted on paper. Texas is one of only 13 states not to have online voter registration. About a dozen county employees are now sifting through thousands of applications, verifying them and entering them into the state’s voter rolls by hand.
Of the 35,000 registrations received on Oct. 9, 25,000 have yet to be processed. Early voting starts Monday. County officials recognize that the haste required to process that many applications is likely to lead at least some voters to experience problems at the polls.
Lazare joins us to discuss a recent Intercept article, "The Washington Post, as it Shames Others, Continues to Pay and Publish Undisclosed Saudi Lobbyists and Other Regime Propagandists," by Glenn Greenwald. It questions the Washington Post grieving one of its journalists while at the same time continuing ties with the Saudi regime: "In the wake of the disappearance and likely murder of Washington Post columnist Jamal Khashoggi, some of the most fervent and righteous voices demanding that others sever their ties with the Saudi regime have, understandably, come from his colleagues at that paper… addressing unnamed hypothetical Washington luminaries who continue to take money to do work for the despots in Riyadh, particularly Saudi Crown Prince Mohammed bin Salman bin Abdulaziz Al Saud, or 'MbS' as he has been affectionately known in the Western press." But Greenwald says Post writers should ask those question of themselves, given the paper's history of favorable reporting on Saudi Arabia's government. What do we make of these headlines?
Donald Trump claims he only licensed his name for real estate projects developed by others. But an investigation of a dozen Trump deals shows deep family involvement in projects that often involved deceptive practices.
I feel that as a woman, people will give you hell just because they can. If it is very nasty, I tend to ignore it. Somedays, when I am in a really bad mood, I may give it back to them in the same vein though. When asked which video of hers received a lot of flak, Saadiya recounts, “There was a video of mine on Muslims; nothing derogatory, I was just making fun of my own people. That ticked off a lot of Muslims. I also speak of topics that are hardcore feministic and this doesn’t go down well with a lot of people.
“The threats range from I should get raped or killed to asking me to put out my address if I was that brave because they wanted to teach me a lesson. A lot of these people don’t even understand jokes, sarcasm or satire. They pick some words, form their own ideas and get offended. Now how is this my fault?”
So if it is not ethnic minorities clamouring for PC censorship, who is? The Hidden Tribes researchers identified a section of society which it labelled ‘progressive activists’. This group includes those most wedded to political correctness: only 30 per cent see it as a problem. It is characterised as being young, cosmopolitan and liberal. But it makes up just eight per cent of the US population. They are also disproportionately white: 80 per cent of the ‘progressive activists’ surveyed were white compared with 69 per cent of those surveyed overall. They are also overwhelmingly better-off: so-called progressive activists are three times as likely to have a postgraduate education and twice as likely to be earning over $100,000 a year.
He was also quick to defend the project, which human rights groups have suggested will likely to be complicit in human rights violations and would allow for far more detailed tracking and profiling of people's behaviour.
A lawsuit filed in New York federal court last week against the creator of the “Shitty Media Men” list and its anonymous contributors exemplifies how individuals often misuse the court system to unmask anonymous speakers and chill their speech. That’s why we’re watching this case closely, and we’re prepared to advocate for the First Amendment rights of the list’s anonymous contributors.
On paper, the lawsuit is a defamation case brought by the writer Stephen Elliott, who was named on the list. The Shitty Media Men list was a Google spreadsheet shared via link and made editable by anyone, making it particularly easy for anonymous speakers to share their experiences with men identified on the list. But a review of the complaint suggests that the lawsuit is focused more broadly on retaliating against the list’s creator, Moira Donegan, and publicly identifying those who contributed to it.
For example, after naming several anonymous defendants as Jane Does, the complaint stresses that “Plaintiff will know, through initial discovery, the names, email addresses, pseudonyms and/or ‘Internet handles’ used by Jane Doe Defendants to create the List, enter information into the List, circulate the List, and otherwise publish information in the List or publicize the List.”
In other words, Elliott wants to obtain identifying information about anyone and everyone who contributed to, distributed, or called attention to the list, not just those who provided information about Elliot specifically.
The First Amendment, however, protects anonymous speakers like the contributors to the Shitty Media Men list, who were trying to raise awareness about what they see as a pervasive problem: predatory men in media. As the Supreme Court has ruled, anonymity is a historic and essential way of speaking on matters of public concern—it is a “shield against the tyranny of the majority.”
And it's that tweet that Daniels/Avenatti sued over. Again, this was clearly going nowhere. That tweet is not at all defamatory under the 1st Amendment. In his defense, Trump, who was represented by Charles Harder*, filed an anti-SLAPP motion, arguing that Trump was protected under Texas' anti-SLAPP law, that the case should be dismissed, and that Trump should be awarded attorneys' fees. And the court easily agreed.
[...]
He and Daniels will almost certainly lose this appeal and Trump will almost certainly win. But the real question is whether or not this helps Trump recognize the value of strong anti-SLAPP laws. It seems like now would be a good time for Congress to finally move on the federal anti-SLAPP law, while reminding Trump that it may have just saved him a bunch of money...
Another case attempting to define the contours of the Fifth Amendment as it pertains to cellphones and passwords has arrived in the Massachusetts Supreme Judicial Court. The case involves sex trafficking allegations and a phone seized from the defendant at the time of his arrest. Testimony from a person who said she was trafficked suggested the phone seized belonged to the defendant Dennis Lee Jones. The state sought to compel Jones to unlock the seized phone, but this motion was denied by the trial court, resulting in the state's appeal.
While the lower court did express some concern that unlocking devices can result in the production of evidence to be used against the person unlocking it, the standard for compelled password production has nothing to do with the eventual recovery of evidence. All the state* needs to reach is a reasonable certainty the defendant knows the password to the seized device. This is called a "foregone conclusion" -- the defendant "telling" the state what it already "knows:" that the phone belongs to him and he can unlock it. The potential evidence held inside the phone may eventually be used against the defendant, but the Fifth Amendment question isn't about this evidence, but rather the simple act of producing a password, which isn't considered testimonial if the government can tie the phone to the accused.
Right now, if you head to the privacy settings of your browser, there is a feature called “Do Not Track.” If you don’t know what that is, it’s basically a feature that sends a message to every website you visit asking them to not track your digital footprint.
Websites use tracking to study your behavior and serve you ads accordingly to boost online sales revenue. We often fall for it, one minute you are looking at an expensive Jacket you want but you can’t afford it, the next minute you visit Facebook and there it is again, 20% off. And more often than not we end up buying the products.
Canada has been stumbling towards an EU-style "right to be forgotten" (RTBF) for quite some time now. There was a big case last year that not only said Google can be forced to remove links to certain information, but that it could be forced to do so globally (i.e., outside of just Canada). That was as a result of a specific lawsuit about specific information, but this year, a bigger exploration of the RTBF concept has been underway, as some have argued that Canada's PIPEDA (Personal Information Protection and Electronic Documents Act) meant that Google should be forced to "de-link" articles on certain people's name searches upon request (just like the EU's RTBF).
A report from the Canadian Privacy Commissioner earlier this year argued that PIPEDA already provided such a right and the Privacy Commissioner Daniel Therrien has been stumping for this ever since. Google has -- for obvious reasons -- been expressing its position that this is ridiculous, saying that PIPEDA does not apply to de-linking individuals' names from news articles, and further argued that requiring such a result would be unconstitutional.
Alderson pointed Motherboard to the apparently misconfigured database which contains the Donald Daters user information. To verify the data did come from Donald Daters, Motherboard created an account on the app, searched for users mentioned in the exposed data, found these through the app itself, and confirmed the profile photos and names matched up.
Increasingly, Padilla’s description applies to CBP as well. It turns out that the legal definition of “the border” is troublingly broad. Some 200 million people — nearly two-thirds of all Americans — live within the “border zone,” which is defined by the Justice Department as the area up to 100 air miles from any U.S. land or coastal boundary. Nine of the country’s 10 largest cities lie within the zone. It touches 38 states and encompasses all of Connecticut, Delaware, Florida, Hawaii, Maine, Massachusetts, Michigan, New Hampshire, New Jersey and Rhode Island.
The force confirmed it had settled the case without liability, meaning it made no formal admission of wrong-doing, although the settlement including a letter of apology.
The recent disappearances of two high-profile Chinese citizens have once again focused international attention on China's legal system and its use of secret detentions.
Tommie Smith and John Carlos staged a stunning protest at the ’68 Summer Olympics. Fifty years later, rampant racial discrimination remains.
In 1968, rage over the United States’ treatment of Black America was boiling over. It culminated that year in a protest at the Summer Olympics in Mexico City that shocked the world. But perhaps the lid blowing off the kettle shouldn’t have been so surprising.
In May of 1967, Martin Luther King Jr. admitted that his “dream” of 1963 had “turned into a nightmare.” The uprisings later that summer reflected long-festering racial inequality. And as 1968 dawned, poverty was rampant in Black America.
In Memphis, striking sanitation workers made about a dollar an hour. The Kerner Report, which was released in March of 1968, sounded ominous:
“What white Americans have never fully understood — but what the Negro can never forget — is that white society is deeply implicated in the ghetto. White institutions created it, white institutions maintain it, and white society condones it.”
Less than one month later, King was shot down in Memphis supporting those very sanitation workers.
1968 also saw continued protests over the Vietnam War, the assassination of Robert Kennedy, and the live broadcast across the nation of the Chicago Police beating demonstrators at the Democratic National Convention. As the 1968 Olympics Games began, track athletes John Carlos and Tommie Smith made a decision. Something had to be said to the world about the promise of America going up in smoke.
Police reform legislation will go into effect this week in New York City, but the law depends on the NYPD acting in good faith.
In December 2017, the New York City Council passed two police reform measures, collectively known as the Right to Know Act, which aimed to improve communication and transparency during police stops and searches. On Friday, both bills will take full effect, and the New York Police Department will be tasked with implementing the council’s mandate to become more transparent and accountable. But there are good reasons to be skeptical that the NYPD will implement the law faithfully.
The first measure requires the NYPD to develop a policy that instructs officers to let people know when they have the right to refuse to be searched. Under the consent-to-search law, if an officer wants to search someone, her home, her vehicle, or her property without a warrant or a legally recognized exception under the Fourth Amendment’s warrant requirement, the officer must ask if the person voluntarily agrees to be searched.
The law also requires the officer to explain that no search will happen if the individual stopped says no, and it requires the officer to double check that the person stopped understands that explanation. If the person has limited English proficiency, the officer must use interpretation services so that the person understands what’s being asked of her.
If the officer has a body-worn camera, the encounter will be recorded, and the officer will be required to let the person know how to request a copy of that footage. The NYPD will also have to start keeping track of these encounters and publicly report how many searches are happening and, perhaps most importantly, the demographics of the people being asked to let an officer search them.
Moderating at scale is a nightmare. Anything you do will be wrong. This doesn't mean you shouldn't try. This doesn't mean you shouldn't listen to criticism. Just be aware every move you make will cause unintended collateral damage. Making everyone happy is impossible. Making everyone angry is inevitable.
[...]
Maybe so, but the vanishing of a handful of cop accountability-focused pages isn't exactly what comes to mind when someone's talking about Russian interference. Encouraging platforms to engage in further moderation may seem innocuous, but the reality of the situation is there is constant pressure -- applied by people like Senator Warner -- for platforms to do more, more, more because some speech they don't care for can still be found on the internet.
The more politicians push for action, the more collateral damage they will cause. They may feel there's no Constitutional problem since they're not directly mandating moderation efforts. But they are harming free speech, if only indirectly at this point.
#MeToo exposed the widespread silencing and dismissal of survivors and the need for our institutions to do better.
Before there was Christine Blasey Ford, there was Recy Taylor, an African-American woman who was raped by six white men in 1944 and fought for justice with the help of Rosa Parks. And in between the two of them, there was Anita Hill, Tarana Burke, Alyssa Milano, Lupita Nyong’o, Tanya Selveratnam, Aly Raisman, and many, many more.
For centuries, women have experienced violence and harassment, and many have spoken out. #MeToo brought us to a new phase in building the movement to end gender-based violence, magnifying and connecting thousands of voices as they shared their stories. Despite women’s achievement of formal equality, #MeToo exposed how common such violence is, the widespread silencing and dismissal of survivors, and the myriad ways violence undermines survivors’ security, dignity, and opportunities.
The President and Senate Judiciary Committee are far from the only powerful people and institutions that limit investigations, disbelieve survivors, and fault people for coming forward. Discrimination against survivors infiltrates all aspects of life, including the responses of law enforcement, employers, housing providers, and schools, to name a few. Speaking out about violence is a crucial step. But law enforcement, employers, housing providers, and schools must also step up and acknowledge how their policies and practices contribute to violence.
“Why didn’t you report?” is the refrain so many survivors face when they disclose violence for the first time. But too often, police dismiss survivors who go to law enforcement. This attitude results in governments’ decisions not to test thousands of rape kits in cities like Detroit, Albuquerque, and Washington DC, based on officers’ assumptions that there was no sexual assault. It also explains why one in three survivors feel less safe after contacting police.
EFF is introducing a new Coders' Rights project to connect the work of security research with the fundamental rights of its practitioners throughout the Americas. The project seeks to support the right of free expression that lies at the heart of researchers' creations and use of computer code to examine computer systems, and relay their discoveries among their peers and to the wider public.
To kick off the project, EFF published a whitepaper today, “Protecting Security Researchers' Rights in the Americas” (PDF), to provide the legal and policy basis for our work, outlining human rights standards that lawmakers, judges, and most particularly the Inter-American Commission on Human Rights, should use to protect the fundamental rights of security researchers.
We started this project because hackers and security researchers have never been more important to the security of the Internet. By identifying and disclosing vulnerabilities, hackers are able to improve security for every user who depends on information systems for their daily life and work.
A Virginia woman says state prison officials terminated a visit with her husband and accused her of attempting to smuggle drugs with a tampon days after the state suspended a policy that would have banned women from wearing the feminine hygiene product to visits.
Weeks later, according to the woman, her visits were unofficially suspended indefinitely as officials continue to investigate the package.
The woman, who asked not to be named out of fear of retaliation from prison officials, said a Virginia Department of Corrections (DOC) administrator told her she was one of several women who had their visits terminated that day (although a friend who was in the visitation room with her said she did not see anyone else dismissed). She told Shadowproof she felt like she was targeted because she was on her period.
The Virginia DOC did not return requests for comment on the alleged incident and visitation privileges. It posted a vague tweet on October 3 about drugs being found in the bathroom of one of its facilities but a spokeswoman did not disclose further details on the statement.
The confrontation marked the latest incident in which officials used contraband to exert their power over incarcerated women and visitors’ periods.
The FBI's impersonation of journalists raised questions about its investigative activities, none of which the FBI felt like addressing. An Inspector General's investigation of FBI investigations using this tactic found that it was generally a bad idea, but not an illegal or unconstitutional one. Prior to the investigation, the FBI apparently had no clear policies governing this form of impersonation, which it used to snare a school-bombing suspect.
Following the report, a policy was put in place that added some additional layers of oversight but didn't indicate the obvious downside of impersonating journalists: that the people the FBI wants to investigate are going to do a lot less talking to anyone they don't know, which includes journalists attempting to document newsworthy events that might contain criminal activity.
The FBI blew it with one of its other impersonation efforts. As Camille Fassett reports for the Freedom of the Press Foundation, a more recent effort may have put a serious damper on its fake news(person) efforts.
The case concerns the 16-year-old A.K. and 13-year-old S.Ãâ. who have hugged and kissed each other on the school premises of the latter. The incident however was taken to the judiciary when a schoolmate of the 13-year old S.Ãâ. (known with initials A.à ž) took the video of the two kissing and shared it with friends. Once the relevant video was seen by the school management, a lawsuit was opened at the Antalya 6th Heavy Penalty Court against the middle schooler A.à ž. for “using children in the production of inappropriate images” and the high schooler A.K. for “sexual assault.”
He was questioned about his support for Islamic State, the caliphate and Sharia Law, which he believed should be implemented in Australia for all Muslims and non-Muslims.
"They would have to sign a contract to live with, amongst Muslims in peace," he said.
"Whoever does not sign the contract either leaves the country or is executed."
Comcast submitted its filing on October 3 as part of the broadband industry lawsuit that seeks to overturn California's net neutrality law (SB 822), which is slated to take effect on January 1, 2019 unless the court grants a stay halting implementation. Comcast's filing is meant to support the industry's request for an injunction that would halt enforcement of the law while litigation is pending.
A new study has once again confirmed that the vast, vast majority of the public opposed the FCC's ham-fisted repeal of net neutrality.
Like most government proceedings, the FCC's net neutrality killing order's public comment period was filled will all manner of comments (both in favor and against) generated by automatic letter-writing campaigns. Like most government proceedings in the post-truth era, the net neutrality repeal was also plagued by a lot of shady gamesmanship by companies trying to disguise the fact that the government was simply kissing the ass of giant, unpopular telecom monopolies. But what happens if you eliminated all of the letter-writing campaign and bogus bot-comments?
A new report from Stanford University (pdf) did just that. It eliminated all automated or form-generated comments and found just 800,000 Americans willing to take the time to put their own, original thoughts on the net neutrality repeal into words.
After removing all duplicate and fake comments filed with the Federal Communications Commission last year, a Stanford researcher has found that 99.7 percent of public comments—about 800,000 in all—were pro-net neutrality.
AT&T recently defeated the DOJ's challenge to their $86 billion merger with Time Warner thanks to a comically narrow reading of the markets by U.S. District Court Judge Richard Leon. At no point in his 172-page ruling (which approved the deal without a single condition) did Leon show the faintest understanding that AT&T intends to use vertical integration synergistically with the death of net neutrality to dominate smaller competitors.
In fact, net neutrality was never even mentioned by the DOJ at the multi-week trial. Likely in part because the DOJ didn't want to highlight how the Trump FCC was screwing everybody over with one hand, while the Trump DOJ was allegedly suing AT&T to "protect consumers" with the other (some argue that Trump's disdain for CNN and adoration of Rupert Murdoch were the more likely motivators). But if you ignore the fact that AT&T plans to use its monopoly over many broadband markets (from residential to cellular tower backhaul) combined with the death of net neutrality to make life difficult for consumers and competitors alike, you're not paying any attention to history or to AT&T's repeated nods in that general direction.
Printer manufacturers hate third-party ink cartridges. They want you buying the expensive, official ones. Epson and HP have issued sneaky “updates” that break these cheaper cartridges, forcing you to buy the expensive ones.
HP pioneered this technique back in 2016, rolling out a “security update” to its OfficeJet and OfficeJet Pro printers that activated a helpful new feature—helpful for HP’s bottom line, at least. Now, before printing, the printer would verify you’re using new HP ink cartridges. If you’re using a competitor’s ink cartridge or a refilled HP ink cartridge, printing would stop. After some flaming in the press, HP sort-of apologized, but not really.
"The only reason you don't sign the OIN license is because you want to reserve the right to sue on core Linux," he said.
Taking Microsoft on as a member creates something of a public relations problem for OIN, which is not without detractors in the open source community. The opposition primarily centers on the widespread belief in open source circles that software shouldn't be patentable, mostly because software is already covered under copyright law. In a recent article on Microsoft's joining OIN, Roy Schestowitz, publisher of the software patent-focused Techrights website, called OIN "an IBM-centric group that favors software patents" and has said the organization's model works against patent reform because it supports the legitimacy of patents.
"We don't feel that we're legitimizing them," Bergelt said. "We're recognizing that they exist. It's a matter of pragmatism to say that whether we believe they should exist or shouldn't exist doesn't matter -- they do exist. My view is we're recognizing reality and dealing with it in a determined way, and I disagree with those who believe it's a validation."
The Federal Court of Justice held that the purpose of determining the technical problem (objective) in invalidity proceedings is to locate the starting point of skilled efforts to enrich the state of the art without knowledge of the invention, in order to assess, in the subsequent and separate examination of patentability, whether or not the solution proposed for this purpose was rendered obvious by the state of the art. Accordingly, it does not have the function to make a preliminary decision on the question of patentability. Therefore, it is neither permissible to take into account elements belonging to the solution according to the patent in the formulation of the problem nor may it be assumed without further ado that it was appropriate for the person skilled in the art to deal with a particular problem.
This is a follow-up to yesterday's post on Judge Lucy H. Koh's decision to deny a joint administrative motion by the Federal Trade Commission and Qualcomm asking her not to rule on a motion for partial summary judgment on the obligation to extend standard-essential patent (SEP) licenses on FRAND terms to rival chipset makers (such as Intel).
I didn't want to jump to conclusions from a case management decision, but in purely probabilistic terms it's a fact that Judge Koh's order increases the likelihood of summary judgment being granted. There's no harder-working judge than her, and she wouldn't have decided to cancel the hearing and take this motion (as well as several other, less important motions) under submission if there had been any questions left to ask. However, if she had been inclined to deny the actual motion, she might just have given the parties four weeks to work out a settlement--the sole remaining plausible explanation would be that she wanted to make it clear her court is nobody's tool, much less a restaurant that serves litigation à la carte where you can put one motion on hold while letting the process continue on the same schedule in all other respects.
This antitrust litigation has been going very, very well for the FTC for a long time. It wouldn't make sense to let Qualcomm off the hook now that there is a near-term opportunity (with respect to the summary judgment motion, "near-term" is actually a gross understatement) to restore fair competition in the market for baseband chipsets and with respect to cellular SEP licensing.
There's probably a lot of fighting going on in DC behind the scenes, inside and outside the FTC. Prior to the latest twist I had already tried to find out about where the current five commissioners stand on FRAND, but haven't found any information that would enable me to predict the outcome of a vote on a hypothetical settlement proposal tantamount to the agency's surrender. In the past, the positions of Commissioners Maureen Ohlhausen and Joshua D. Wright were well-known (I mentioned Mrs. Ohlhausen on several occasions, and in 2013 I dedicated a blog post to Mr. Wright's stance), but they aren't in office anymore. So I extended my search for clues to high-ranking FTC officials. It turns out that two of them--Alden Abbott (the FTC's General Counsel) and Bruce H. Kobayashi--have a certain proximity to Qualcomm and are sympathetic to Qualcomm's unFRANDly positions to a degree that is clearly a minority opinion in the legal community. While I don't have the slightest indication of any impropriety, there is a conspicuous lack of impartiality.
The Ninth Circuit’s Stairway to Heaven decision on September 28 offers a better application of the inverse ratio rule, according to one observer
The Ninth Circuit recently vacated in part the district court’s judgement that Led Zeppelin’s Stairway to Heaven did not infringe Spirit’s 1960s instrumental track Taurus.
The trademark claim rests solely on the name of the file including Chamandy's full name. It's a silly argument for trademark infringement as the whole point of including the name is to weigh the new art piece against her specific work, which necessarily involves anyone viewing these pieces being informed that they are not the work of the original author. The whole purpose of the validation process is to show what differentiation remains between the new piece and the human-made example. That's not trademark infringement. It's not really even close.
As for the copyright portion of this, it's important that you not be fooled by the percentage the machine setup notes in the validation process. You might think that an 85% match would mean the two images are very similar and would share a ton of features that would link the two in the viewer's mind. That's not even close to being the case, as you can see just how different the two images are below.
Last time, I explained why I thought the Ninth Circuit's recent vacating and remanding of the jury verdict in Led Zeppelin's favor was, long-term, a good thing for copyright law (even if I kind of liked the verdict and am genuinely sorry for Led Zeppelin). The reason is that the reversal gave one panel of the Ninth Circuit an opportunity to try to fix the Ninth Circuit's unhelpful legal framework for determining copyright infringement.
But that isn't why the panel reversed. While the panel did make some suggestions about how to present the "inverse-ratio" rule to the jury, the way it was presented to the original jury isn't what merited reversal. What merited reversal was the lack of another jury instruction about a basic and uncontroversial principle of copyright law that the parties agreed should have been there in some form. In short, the case is being reversed — and the Ninth Circuit is getting a chance to fix its own weird copyright law — because of what appears to have been a brain fart.
Vodlocker.to offers a handy video embed tool which several smaller pirate streaming sites have grown to rely on. Starting recently, however, the site also appears to have become the source of a rather nasty JavaScript-based DDoS campaign, which uses the unwitting viewers of these embedded videos to take out several pirate streaming sites.
Sweden's Patent and Market Court has ordered a local ISP to block access to several large torrent and streaming platforms. The interim ruling, which comes into force at the end of October, requires Telia to block The Pirate Bay, Dreamfilm, FMovies, and NyaFilmer following a complaint from Hollywood and local studios.
At the four-day appeal hearing last month, the lawyer for the Attorney-General, Victoria Casey told the High Court at Wellington the transfer of the requests was "orthodox and sensible", and that the Tribunal had taken the wrong approach to deciding whether the requests were vexatious.