Best Black Friday and Cyber Monday deals that should be of interest to many Linux users. The deals are on Linux gadgets, courses, books, magazines, merchandises, and servers.
Usually, when I get review hardware in, it's not a big deal. It's like working in a candy shop. At first, it seems great ("All the candy I can eat!"). Then, you quickly get sick of dealing with the extra equipment.
But, every now and again, I get a really fine machine, like Dell's latest XPS 13 Developer Edition laptop. And I get excited again.
The Pinebook is available in both 11.6" and 14" models for $99 (the 14" model has a lower resolution screen at time of publication, although mine had a "surprise" upgrade to 1080p before it was advertised on the site), and it's being offered in "Buy To Order" format. That basically means you buy it, they build them in small batches, then periodically ship them out from China.
Let's set expectations early. The Pinebook is built around a 64-Bit Quad-Core ARM Cortex A53 CPU clocked at 1.2GHz, with 2GB of LPDDR3 RAM. That's the same board Pine64 sells for $29.99. To arrive at $99 on my model, the Pinebook surrounds that board with a white clamshell-style enclosure, 16GB of eMMC flash storage, Wifi 802.11b/g/n, Bluetooth 4.0, a full-size keyboard, multi-touch touchpad, an SD webcam and a 1080p IPS display.
Chrome OS is rapidly becoming a serious player in the Linux field. Now, Google seems to be further integrating the Linux app support with the existing Android app support by allowing the Chrome OS Linux apps to access files from the separated ‘Play files’.
To keep things naturally secure, among other reasons, Chrome OS keeps its native files, the ‘Play files’ used by Android apps, and the ‘Linux files’ available to Linux apps neatly separated. If you wish to work on something with an Android app then switch to working on it from a Linux app, you currently need to copy the file from one container to the other.
Google’s Chromium team is working to allow users to break down that barrier, according to a work-in-progress commit posted last week to the Chromium Gerrit source code management. The goal of the work is to allow users to share contents of the ‘Play files’ folder with Linux apps, just as can currently be done with the Downloads folder.
The commit is under heavy discussion though, as the Chromium developers work on ensuring the safety and stability of such a change. For example, one factor considered is the possibility of a malicious file created from a Linux app potentially causing a more serious exploit via Android.
A report commissioned by the Dutch government has recommended disabling any settings in Microsoft Office 2016 that sends data to Microsoft servers.
Dutch government users have also been advised to consider alternatives to Microsoft Office.
A Data Protection Impact Assessment (DPIA) conducted by Privacy Company for the Dutch Ministry of Security and Justice has found that Microsoft has been collecting vast amounts of personal data.
“Microsoft systematically collects data on a large scale about the individual use of Word, Excel, PowerPoint and Outlook.
Inside the spacious warehouse where solar-energy equipment was once made, about two dozen employees are building the craziest thing to be built in Denver: computers.
Major PC makers moved manufacturing overseas long ago, but System76 isn’t known for following others. Its computers don’t have Microsoft Windows, but rather, the open source Linux operating system. The bootstrapped company never took a dime in venture capital and instead let sales beget growth. And CEO Carl Richell says the time was right to move manufacturing to Denver, a decision that had more to do with customization and speed than rising costs in China or the ongoing trade war.
“We think we can manufacture our own products, and we think we can do it at a volume and price that is competitive, and do it locally,” said Richell, who co-founded System76 in his basement 18 years ago.
As I've mentioned in previous articles, I recommend buying a cheap, used computer for travel. That way, if you lose it or it gets damaged, confiscated or stolen, you're not out much money. I personally bought a used Acer Parrot C710 for use as a travel computer, because it's small, cheap and runs QubesOS pretty well once you give it enough RAM.
Today’s topics include the beta release of Red Hat Enterprise Linux 8, and Oracle acquiring Talari Networks for entry into the SD-WAN space.
Three and a half years since the launch of Red Hat Enterprise Linux 7 in June 2014, Red Hat is finally issuing a major new version number of its flagship Linux platform—RHEL 8, which it is now previewing in beta.
In response to the emergence of containers and microservices as a primary paradigm for application deployment, Red Hat is including multiple container tools in RHEL 8 that it has been developing and proving out in the open-source community, including Buildah for container building, Podman for running containers, and Skopeo for sharing and finding containers.
Systems management is also getting a boost with the Composer features that enable organizations to build and deploy custom RHEL images.
"I have 13 years of Red Hat and unlike Max [McLaren, regional vice president and general manager of Australia and New Zealand], I don't have 13 years of IBM, but I do have 13 years of HP."
According to Bill-Peter, it isn't just what Red Hat offers that is different to IBM, rather the company has its own culture, one due completely to open source he said.
"For me it was like, this was really odd ... and I think a lot of us felt like that because we identify with the open source principles. It's not just open source, it's also our transparency about how we lead the organisation," he explained.
Red Hat will operate as a kind of “Switzerland” within IBM and maintain its commitment to open source at the conclusion of Big Blue’s takeover of the software company, according to Marco Bill-Peter, Red Hat senior vice president of customer experience and engagement.
Red Hat will function as an independent, distinct unit within IBM’s Hybrid Cloud team and maintain its commitment to open source principles, he told the Red Hat Forum in Sydney.
He described the US$34 billion as a “big elephant in the room” and admitted that he, along with a number of other Red Hat employees initially thought “this is really odd” when the mammoth deal was announced late last month.
Heritage Bank welcomed a new CEO in November 2015, with Peter Lock moving in to change the way the member-owned bank thought about technology.
Speaking at Red Hat Forum in Sydney on Wednesday, Heritage Bank CIO Wayne Marchant said Lock started the organisation's transformation by bringing in a new management group, of which he is one.
"We took a view that if we were going to answer digital change that we knew was coming into banking, we had to take our bank, which is very much a physical bank with a bit of a digital presence, and change it to be a digital bank, but still with that physical presence because we think that branches are an important element," he explained.
Red Hat today announced the winners of the Red Hat Innovation Awards APAC 2018 for the Australia and New Zealand region.
Australia and New Zealand Banking Group Limited (ANZ Bank) and New Zealand Customs Service (NZ Customs) were recognised at the Red Hat Forum Sydney on 21st November, 2018, for their outstanding and innovative usage of Red Hat solutions.
Years ago there was much interest in the ability to build the mainline Linux kernel with the LLVM Clang compiler as an alternative to using the GCC compiler in order to ensure better code portability, shaking out GCC'isms, possible build speed improvements, and other benefits. But in recent years it seems to have waned in interest but now things are heating up again.
After the formal LLVMLinux project faded away for building the Linux kernel with the LLVM stack and what feels like years since the last presentation on the topic, at last week's Linux Plumbers Conference were three presentations on the topic.
At the start of 2018 there was early work on Cgroups support for DRM drivers. That early work was done by Intel developers on using cgroups to allow restricting the GPU priority. AMD is now looking to build a more extensive DRM cgroup controller support for monitoring and restricting GPU resources.
With this new AMD effort where they are seeking comments from upstream, they intend to use Control Groups "cgroups" for limiting GPU resources in the area of GPU compute/workstation needs.
After the AMD Zen tuning for RadeonSI was dropped earlier this month, a revised implementation has now landed in Mesa 19.0-devel.
The revised patch that was merged overnight pins driver threads to a fixed core complex (CCX) when glthread is enabled. Glthread is the tunable for enabling OpenGL threading and can be done on a per-game basis with whitelisting that is handled by the DRI configuration file. The current list of whitelisted games can be seen here for where this glthread behavior is enabled by default.
That patch explains that the RadeonSI Gallium3D driver's three threads -- glthread, Gallium, and Winsys -- will be pinned to a random CCX. The belief is this should be the optimal approach for getting the best gaming performance on AMD Ryzen processors.
Yesterday Feral Interactive released their much anticipated port of Total War: Warhammer II for Linux. This latest Linux game port is yet another Vulkan-powered game. Here are some initial benchmark results of Warhammer II running natively on Ubuntu Linux with a variety of AMD Radeon and NVIDIA GeForce graphics cards.
As a reminder, Feral lists the GeForce GTX 680 / Radeon R9 285 as the minimum requirements since this is a Vulkan-powered game. They recommend though at least a GeForce GTX 970 or Radeon RX 480 graphics card. The game needs at least Mesa 18.1.5 or NVIDIA 396.54, which isn't stiff driver requirements like some of their last ports that have required the bleeding-edge drivers.
Cryptocurrencies are any digital assets designed to be mediums of exchange implementing strong cryptographic practices.
Bitcoin is the most popular cryptocurrency and ever since its release in 2009, enthusiasts have created 4,000+ alternative variants of bitcoin and other cryptocurrencies.
Cryptomining involves verifying and adding crypto transactions to the blockchain digital ledger and we have compiled a list of the best 8 apps you can use for the task.
Linuxbrew is a clone of homebrew, the MacOS package manager, for Linux, which allows users to install software to their home directory.
These seven money manager applications for Linux offer a wide range of features and user interfaces. Some are good starting products for users with little or no experience with this category of software. Other titles give you all of the tools to manage your household and your small business.
I deliberately avoided ranking these Linux products. I also suspended the usual star rating for each one in this roundup. All of them share two things in common. They are all free open source applications. They are all stable and very workable, depending on your money-tracking and management needs.
Some of them are easy to set up and use. Others are more involved and can be frustrating if you are not familiar with accounting procedures.
Official Mac and Linux ports of Total War: Warhammer II are out now, and folks who already got it for Windows have those now for free too. As is the way with Total War, the ports are handled by long-running portpeeps Feral Interactive. While running Windows games on Macs and Linux b0x0rs is easier than it once was, especially with Valve working on Steam’s new built-in Linux trickery, it’s still nice to have formal support.
Feral used to sell such ports separately but nah, these days publishers have ’em thrown in as bonuses. Getting the game for any OS gets you it for all three.
Shadow of the Tomb Raider is the third game of the Tomb Raider Reboot series by Crystal Dynamics, the game came out back in September and was also recently cracked by scene groups. Now Shadow of the Tomb Raider for Linux and macOS has been announced.
[...]
Sadly Shadow of the Tomb Raider didn’t quite do too well in Sales, as it was already on Sale a month after it’s release on Steam and users were pissed off at having to buy deluxe editions only for the game’s price to come down a month later.
[...]
Shadow of the Tomb Raider was another game to fall victim to the scene groups a few days ago as it was cracked by famous scene group called CPY and became available for pirates to download from torrent sites.
Are you excited about Shadow of the Tomb Raider for Linux and macOS? Will you be getting it? Let us know in the comments below.
Have you always wanted to build your own powerful corporate empire? On December 6th you will get that chance.
Paradox have announced the rather large Stellaris: MegaCorp expansion is releasing then, as usual it should come with a hefty free content patch for all players too.
SuperTux, a name I've not heard in quite some time, a free and open source platformer inspired by Super Mario Bros is still chugging along and it's heading towards a new release.
The free FPS QuakeWorld Team Fortress emailed (previously Team Fortress, Quake Team Fortress) that later became the inspiration for Valve's own Team Fortress games has a new release out with a Linux installer. The lead developer emailed it in, so we could help spread the word.
After trying it out today, I was impressed to see a good number of servers online with one of them almost full of players. Quite a surprise, as these classic FPS games tend to get forgotten about in favour of modern experiences. The one active server today was modded, so it took quite a while to download all the extras (it was very slow).
As promised by 11 bit studios, the next episode-based DLC The Last Broadcast is now out for Linux players of This War of Mine: Stories.
There's quite a lot to it, with it including: 7 remastered locations, 4 new locations, a new shelter, new playable characters, new radio mechanics, new investigating and reporting mechanics, new dilemmas mechanics and a non-linear story with 6 different endings.
Obsidian Entertainment have announced the final DLC for the RPG Pillars of Eternity II: Deadfire named The Forgotten Sanctum is going to release on December 13th.
Can't get enough sims? Game Dev Studio from Roman Glebenkov officially supports Linux now with the 23rd update released yesterday.
Back in October, the developer added in preliminary support for Linux although it wasn't advertised while they finished it up. As promised, it's here and it does look pretty good. Players on Steam seem to like it too, it's rated "Very Positive" so it's a reasonable indicator of a good game.
As always, please raise a ticket if you found any issue with the build script or if you have any suggestion to improve the experience with Cinnamon Desktop.
We will be holding a Bug Day on November 27th, 2018, focusing on Okular. Join at any time, the event will be occurring all day long!
This is a great opportunity for anyone, especially non-developers to get involved!
So it’s finally here, desktop icons release candidate for 1.0 is available now!
This means that all the features we wanted for 1.0 are implemented and we freeze the implementation of new features. Now we will focus on polishing and removing noisy or unnecessary stuff in the UI, fix weird behaviours and UX, fix bugs, etc.
[...]
Nautilus desktop icons has never worked well in multimonitor setups. Files get stuck hidden in some not reachable places due to the nature of Nautilus that simply puts a big window as the desktop, instead of a window per monitor.
This extension finally implements a sane multimonitor handling, by having a flexible grid per monitor. No more lost data…
Also, as you might know, the Nautilus desktop icons was Xorg only. This extension is by nature Wayland ready.
Shuttleworth is probably playing a bit with smoke and mirrors here, however, and there's likely not as much "new" here as it might seem. According to Canonical's website, traditional support with free security and bug fixes for Ubuntu 18.04 still runs out in five years, or in April 2023. After that, you'll need to write a check to Canonical to keep your machines safe and secure.
Hardkernel launched its Odroid-H2 SBC starting at $111 without RAM or flash. The open spec SBC runs Ubuntu 18.10 on Intel Gemini Lake, and offers 2x SATA 3.0, 2x GbE, HDMI and DP, 4x USB, and an M.2 slot for NVMe.
Last month when Hardkernel announced its Intel Gemini Lake based Odroid-H2 SBC with an estimated price of “higher than $100,” we predicted it would be closer to a $150 price. The world’s first open-sepc Gemini Lake hacker board is now on sale for $111, but that’s without RAM (up to 32GB) or eMMC.
U.S. consumers are expected to drop a bundle this Black Friday on smart speakers and home hubs. A Nov. 15 Canalys report estimates that shipments of voice-assisted speakers grew 137 percent in Q3 2018 year-to-year and are on the way to 75 million-unit sales in 2018. At the recent Embedded Linux Conference and Open IoT Summit in Edinburgh, embedded Linux developer and Raspberry Pi HAT creator Leon Anavi of the Konsulko Group reported on the latest smart speaker trends.
As Anavi noted in his “Comparison of Voice Assistant SDKs for Embedded Linux Devices” talk, conversing with computers became a staple of science fiction over half a century ago. Voice technology is interesting “because it combines AI, big data, IoT, and application development,” said Anavi.
In Q3 2017, Amazon and Google owned the industry with 74.7 percent and 24.6 percent, respectively, said Canalys. A year later, the percentages were down to 31.9 and 29.8. China-based Alibaba and Xiaomi almost equally split another 21.8 percent share, followed by 17.4 percent for “others,” which mostly use Amazon Alexis, and increasingly, Google Assistant.
Despite the success of the mostly Linux-driven smart speaker market, Linux application developers have not jumped into voice app development in the numbers one might expect. In part, this is due to reservations about Google and Amazon privacy safeguards, as well as the proprietary nature of the hardware and cloud software.
Every day, I use high-quality software that is developed and maintained by people who do not ask for payment, who respect my freedoms, and who are generous with their time and energy.
In this season of giving thanks, I encourage those of you who also use and appreciate the work of open source and free software maintainers to express your gratitude. Here are ten ways to do that...
Even the most hard-core open source users must spend their hard-earned dukets on computers, internet connectivity, and (on the occasion) software. So you don't have to worry about being relegated to only giving them gifts released under the GPL (wrapping said gifts in pages torn from The Cathedral And The Bazaar).
But what gifts should you give? Here are a few ideas that cover a wide spectrum of taste and price range for open source enthusiasts.
Wendys.com sells 1.5 million burgers a day via its website and app. At that scale, when it came time to update the back-end software supporting it, choosing a WCMS wasn't as simple as running the Frosty machine.
Earlier this year, the fast-food giant sought a simpler design but far more complex data tracking for personalization, said Michael Mancuso, the company's head of digital analytics who also heads up Wendys.com. In this Pipeline podcast episode, he discusses the process for choosing a WCMS.
Spoiler alert: Wendy's didn't weigh technology analyst reports that rank the market leaders. Acquia, the open source WCMS platform vendor, eventually beat out 24 other prospective vendors. (The vendor actually ranks well in such industry reports.)
In a recent blog post, Google announced they have open-sourced BERT, their state-of-the-art training technique for natural language processing (NLP) applications. Google has decided to do this, in part, due to a lack of public data sets that are available to developers. BERT also includes a new bidirectional technique which improves its effectiveness in NLP. To reduce the amount of time required for developers and researchers to train their NLP models, Google has made optimizations in Cloud Tensor Processing Units (TPUs) which reduces the amount of time it takes to train a model to 30 minutes vs a few hours using a single GPU.
[...]
In addition to new techniques included in BERT, Google has made enhancements to Cloud TPUs which allow developers and researchers to quickly experiment, debug and tweak models. These investments allowed Google to exceed the capabilities of existing pre-training models.
In today’s increasingly digital world, learning to code has become an integral part of STEM curriculums. Schools are using Raspberry Pi and other ARM-based hardware as a low-cost means of introducing students to coding.
Following the recent news that RISC OS, the original ARM operating system, is going open source, TechRadar Pro sat down with the Director of RISC OS Developments, Richard Brown to learn more about how the operating system is being used in schools and other hardware projects.
Redis changed the licensing of some of their enterprise modules to be licensed under the Apache 2.0+ Common Clause. These modules cannot be used as stand-alone commercial SAAS. This was specifically aimed at cloud providers.
The surrounding controversy has raised an issue that has been lurking in the open source community for a while. The best case for open source has been with software infrastructure, rather than software application projects. If cloud computing companies become the infrastructure providers for software, their market control might allow them to take over open-source projects, and sell those software services at a lower price point than companies who market open source services.
If this scenario comes to pass, is there any future for open source companies?
As the open source movement reaches the two-decade milestone, thoughts turn to the movement's achievements and future goals.
The Open Source Initiative (OSI) is celebrating its 20th Anniversary in 2018. To mark the occasion, cloud infrastructure provider DigitalOcean surveyed over 4,300 developers on the movement's health, as well as on how enterprises and employees are approaching and using open source technologies.
[...]
Open source is continuing to move toward increased corporate stewardship, advised Chris Kelly, director of engineering marketing and engagement at Salesforce. "We’ll continue to see more production-critical projects from companies being released as open source as a way to build industry consensus, accelerate hiring and [create] a gateway to their products," he predicted.
Drone.io, makers of the open-source Drone continuous integration/continuous delivery tool (CI/CD), announced Drone Cloud today, a new CI/CD cloud service that it’s making available for free to open-source projects. The company is teaming with Packet, which is offering to run the service for free on its servers.
Drone.io co-founder Brad Rydzewski says his company is “a container-native continuous delivery platform, and its goal is to help automate the developer workflow from testing to release.” Continuous delivery is an approach built on cloud-native, the idea that you can manage cloud and on prem with single set of management tools. From a developer standpoint, it relies on containers as a way to continuously deliver application updates as changes happen.
As part of that approach, the newly announced Drone Cloud provides a publicly hosted CI/CD cloud offering. “It’s free for the open-source community. So it’s an open source only offering. There’s no paid plan, and it’s only available to public GitHub repositories,” Rydzewski explained.
RED HAT, INC. has partnered with the Department of Information and Communications Technology (DICT) on the creation of applications for the government using open source technology.
“The collaboration with DICT is something with regards to developing a community of ISVs (independent software vendors) and developers within the Philippines that can leverage on open source innovations and the way that we have discussed, moving forward, with DICT is to provide DICT with a platform, a sandbox platform comprising Red Hat technologies,” Damien Wong, vice president and general manager of Asian Growth and Emerging Markets (GEM) at Red Hat, said during the launch of the company’s Philippine office.
No browser is 100 percent confidential. However, the best of the privacy-minded browsers promise to block ads and cookies and allow for extensions to disrupt trackers even further.
With a number of options out there for private browsing, we take a look at the best browsers on the market for privacy.
This week's crate is cargo-sweep, a cargo subcommand to clean cargo's various temporaries. Thanks to Viktor Holmgren for the suggestion!
With 100+ languages at the ready, Google Translate is the go-to translation tool for millions of people around the world. But for folks who need to make frequent translations on the web, it?s a hassle to copy text from a web page, navigate over to translate.google.com, paste it in, return to your page, etc. Fortunately there are a number of Firefox browser extensions that streamline the translation process, and in some cases even add new features. Here are two exceptional examples:
Greetings! I’ll introduce WebRender’s 31st newsletter with a few words about batching.
Efficiently submitting work to GPUs isn’t as straightforward as one might think. It is not unusual for a CPU renderer to go through each graphic primitive (a blue filled circle, a purple stroked path, and image, etc.) in z-order to produce the final rendered image. While this isn’t the most efficient way, greater care needs to be taken in optimizing the inner loop of the algorithm that renders each individual object than in optimizing the overhead of alternating between various types of primitives. GPUs however, work quite differently, and the cost of submitting small workloads is often higher than the time spent executing them.
I won’t go into the details of why GPUs work this way here, but the big takeaway is that it is best to not think of a GPU API draw call as a way to draw one thing, but rather as a way to submit as many items of the same type as possible. If we implement a shader to draw images, we get much better performance out of drawing many images in a single draw call than submitting a draw call for each image. I’ll call a “batch” any group of items that is rendered with a single drawing command.
In September the European Commission proposed a new regulation that seeks to tackle the spread of ‘terrorist’ content on the internet. As we’ve noted already, the Commission’s proposal would seriously undermine internet health in Europe, by forcing companies to aggressively suppress user speech with limited due process and user rights safeguards. Here we unpack the proposal’s shortfalls, and explain how we’ll be engaging on it to protect our users and the internet ecosystem.
As we’ve highlighted before, illegal content is symptomatic of an unhealthy internet ecosystem, and addressing it is something that we care deeply about. To that end, we recently adopted an addendum to our Manifesto, in which we affirmed our commitment to an internet that promotes civil discourse, human dignity, and individual expression. The issue is also at the heart of our recently published Internet Health Report, through its dedicated section on digital inclusion.
At the same time lawmakers in Europe have made online safety a major political priority, and the Terrorist Content regulation is the latest legislative initiative designed to tackle illegal and harmful content on the internet. Yet, while terrorist acts and terrorist content are serious issues, the response that the European Commission is putting forward with this legislative proposal is unfortunately ill-conceived, and will have many unintended consequences. Rather than creating a safer internet for European citizens and combating the serious threat of terrorism in all its guises, this proposal would undermine due process online; compel the use of ineffective content filters; strengthen the position of a few dominant platforms while hampering European competitors; and, ultimately, violate the EU’s commitment to protecting fundamental rights.
In a video interview with ServerWatch, Jonathan Bryce, Executive Director of the OpenStack Foundation outlines some of the new an enhanced capabilities that will be coming in the OpenStack Stein release.
"There is a focus on operations, there is a focus on security and there are updates to the upgrade process and continuing to improve that," Bryce said.
In the Queens release cycle, OpenStack starting talking about the notion of "fast forward" upgrades, whereby OpenStack operators could skip a release, instead of needing to upgrade to each consecutive release, in order to stay current.
In terms of new things coming in OpenStack Stein, Bryce said that he expects to see a lot of accelerator work. The accelerator work is being done in the core OpenStack Nova compute project as well as the OpenStack Cyborg project, which provides a framework for managing hardware and software acceleration resources. Acceleration resources include multiple hardware components including GPUs, FPGAs, ASICS and other different processor types.
At the core of every technology on GitHub is a programming language. In this year’s Octoverse report, we published a brief analysis of which ones were best represented or trending on GitHub. In this post, we’ll take a deeper dive into why—and where—top programming languages are popular.
There are dozens of ways to measure the popularity of a programming language. In our report, we used the number of unique contributors to public and private repositories tagged with the appropriate primary language. We also used the number of repositories created and tagged with the appropriate primary language.
Most of the OpenBSD systems I am in charge of are deployed in data centres, powered by UPSs which provide them with electrical power during periods of public grid power outages. But there is also a number of OpenBSD systems I administer, which are deployed in much less favourable conditions; where frequent power outages last longer than UPS batteries do, or where there are no UPSs at all (such as branch office routers in godforsaken places where having electricity and Internet access at all is considered a lucky circumstance). These latter systems are likely to have high rate of unclean shutdowns caused by prolonged or unexpected power outages, which in turn increase the probability of their inability to boot without human intervention. This article describes steps to make OpenBSD system more resilient to unexpected power outages by minimising the possibility of inconsistent file systems after unclean shutdowns, which is achieved by mounting all disk partitions in read-only mode. Filesystems which have to be writable - /var, dev and /tmp - are mounted as writable memory file systems.
What do all programmers like to do after work? Ok, what do most programers like to do after work? The answer is simple: play a good game! Recently at the Polish BSD User Group meetup mulander was telling us how you can play games on OpenBSD. Today let’s discuss how this looks in the FreeBSD world using the “server only” operating system.
GIMP (GNU Image Manipulation Program) is undoubtedly the most popular free image editing software, and some even call it as the free Photoshop Alternative. If you are looking for a free tool that can let you edit your Photoshop files and offers a rich experience, GIMP is the right choice. This raster graphics editor comes with a lot of powerful features and enjoys support from an ever-growing open source community. Learning it, however, will take some time.
GIMP was originally designed for Linux systems, but that does not mean Windows support is loose. It has been beautifully ported to Windows and runs as smooth as it does on Linux. I have very less experience in image editing, but I have seen this tool being used by a number of Photographers, Graphic Designers and people in the imaging industry. It is good to go for free alternatives to expensive tools like Photoshop.
A revised patch was posted on Tuesday for adding ARMv8 tuning support for Ampere Computing's eMAG platform.
Ampere eMAG is the very compelling ARM 64-bit server platform we began benchmarking last month. With up to 3A revised patch was posted on Tuesday for adding ARMv8 tuning support for Ampere Computing's eMAG platform.
Ampere eMAG is the very compelling ARM 64-bit server platform we began benchmarking last month. With up to 32 cores and up to 3.3GHz turbo clock frequencies, it's quite a speedy ARM server platform. But with some GCC tuning can perhaps be even more competitive.
The patch adds the "emag" target for tuning and adds its tuning values to the table. 2 cores and up to 3.3GHz turbo clock frequencies, it's quite a speedy ARM server platform. But with some GCC tuning can perhaps be even more competitive.
The patch adds the "emag" target for tuning and adds its tuning values to the table.
While this year Oracle was successful in getting DTrace working well on Linux assuming you apply their patches or (more easily) using their Unbreakable Enterprise Kernel on Oracle Linux, they are looking at enhancing DTrace with the increasingly-used eBPF framework / in-kernel JIT.
IBM buying Red Hat for $34 billion took many by surprise, including none other than the company’s senior vice president of Customer Experience and Engagement, Marco Bill-Peter.
Speaking at the Red Hat Forum 2018 in Sydney, Bill-Peter explained that the acquisition “shocked” the company’s employees, suggesting that this takeover should take place smoothly in order to leave the open-source culture untouched.
Otherwise, Red Hat’s mission would be altered and this could eventually lead to en-masse departures from the company.
“At Red Hat we have like 13,000 people. If the open source culture gets impacted, trust me, many of those 13,000 people will leave,” he was quoted as saying.
[...]
Red Hat has long been a target for tech giants, and while the IBM takeover took many by surprise, people familiar with the matter revealed many years ago that talks over a potential acquisition involved several other companies, including software firm Microsoft and Google.
I've very happy to have had the opportunity to attend and speak at PyCon Canada here in Toronto last week.
PyCon has always been a very well organized conference. There are a wide range of talks available, even on topics not directly related to Python. I've attended previous PyCon events in the past, but never the Canadian one!
My talk was titled How Mozilla uses Python to Build and Ship Firefox. The slides are available here if you're interested. I believe the sessions were recorded, but they're not yet available online. I was happy with the attendance at the session, and the questions during and after the talk.
The Federal Government has said it would make all services with which citizens have to interact accessible online by 2025, according to a Digital Transformation Strategy released by Human Services and Digital Transformation Minister Michael Keenan on Wednesday.
So the age of homebrew AI may not be all sweetness and light. Nor will it be all darkness and porn. Mostly, its expressions will be marvelous in their specificity. Meet some of the pioneers showing what happens when the masses can teach computers new tricks.
The Trump administration is defending the legality of having three Trump associates help steer the Department of Veterans Affairs from the president’s Mar-a-Lago resort, asserting that a Watergate-era sunshine law on advisory committees shouldn’t apply.
In a court filing last week, the government lawyers argued in part that the trio didn’t fit the law’s definition of an advisory committee because rather than being under the agency’s control, the three men reportedly wielded influence over the agency.
“Far from alleging that the department managed or controlled the three individuals, the complaint asserts quite the opposite: that the three individuals asserted influence over the department,” Justice Department lawyers said in the filing, which was submitted on Friday.
Medicare for All is rapidly surging in popularity among the American public and gaining momentum in Congress, but private insurance interests and Big Pharma have no intention of giving up their immensely profitable stranglehold on the U.S. healthcare system without a fight.
According to strategy documents obtained by The Intercept and the watchdog group Documented, the private healthcare industry is working aggressively alongside corporate Democrats to spread anti-single payer propaganda and "minimize the potential" for Medicare for All as an alternative to the current for-profit status quo.
The air quality of the San Francisco Bay Area is the worst in the world right now. We all have air quality apps on our phones now to keep up and as I type the air particles pollution index just went up to 217, as a comparison Beijing, for years vilified as the city with the worst air quality in the world, today is 75. It is really dangerous for anyone to be out in it even with a N95. That is the best over the counter face mask that is now common and known just by its number. As we go into the second week of this, more and more people are inside and those few outside are wearing N95’s, and for the thousands of homeless, well they, as usual, are on their own.
What is sinking into the consciousness of all is that the destination State; the so called Golden State is seriously tarnished. The streets seem abandoned as schools, businesses – and even San Francisco’s famed cable cars are closed. The common view of seeing the iconic Golden Gate Bridge across the bay is becoming a thing of the past and part of the wardrobe of our grand children will most likely require face masks.
There are 3 major fires still not under control in California, 2 in the South and one in Butte County, 165 miles up wind from where we live in Oakland and that fire is the source of the worst air quality here ever. The Butte wildfire is now on record as the worst fire in California history and the worst in the U.S. in over a century. Over 140,000 acres have burned and over 13,000 structures have been turned to ash; 9,800 of them homes.
As Americans prepare to cook and consume nearly 50 million turkeys on Thanksgiving Day, an ongoing outbreak of salmonella poisoning linked to the poultry means food safety at home is more critical than ever.
Federal health officials have identified no single source of the outbreak of Salmonella Reading, which has sickened at least 164 people in 35 states during the past year.
As of Nov. 5, the bacterial strain has led to 63 hospitalizations and, in California, one death.
Many who fell ill reported preparing or eating such products as ground turkey, turkey parts and whole birds. Some had pets who ate raw turkey pet food; others worked at turkey processing plants or lived with someone who did.
Late Thursday, Jennie-O Turkey Store Sales LLC of Barron, Wis., recalled more than 91,000 pounds of raw ground turkey products that may be connected to the illnesses.
There is no U.S. requirement that turkeys or other poultry be free of salmonella — including antibiotic-resistant strains like the one tied to the outbreak — so prevention falls largely to consumers.
The effort to reframe the debate has two prongs: a set of messages crafted for elite DC policymakers and another set aimed at heading off the mounting public approval for Medicare for All, now supported by 70% of Americans including a majority of registered Republicans.
What people communicate is a matter of choice. But what can be more revealing are the issues they choose to avoid. There are certain prominent pro-GMO activists who describe themselves as ‘science communicators’. They hit out at those who question their views or who have valid criticisms of GM technology and then play the role of persecuted victim, believing that, as the self-appointed arbiters of righteousness, they are beyond reproach, although given their duplicity nothing could be further from the truth.
Instead of being open to questioning, they attempt to close down debate to push a flawed technology they have a vested (financial-career) interest in, while all the time appealing to their self-perceived authority, usually based on holding a PhD in molecular biology or a related discipline.
They relentlessly promote GM and industrial agriculture and unjustifiably cast critics as zealots who are in cahoots with Greenpeace or some other group they have a built-in dislike of. And they cynically raise or lower the bar of ‘credibility’ by ad hominem and misrepresentation so that studies, writers and scientists who agree with them are commended while those who don’t become subjected to smear campaigns.
Millions of sleep apnea patients rely on CPAP breathing machines to get a good night’s rest. Health insurers use a variety of tactics, including surveillance, to make patients bear the costs. Experts say it’s part of the insurance industry playbook.
[...]
Schmidt, 59, has sleep apnea, a disorder that causes worrisome breaks in his breathing at night. Like millions of people, he relies on a continuous positive airway pressure, or CPAP, machine that streams warm air into his nose while he sleeps, keeping his airway open. Without it, Schmidt would wake up hundreds of times a night; then, during the day, he’d nod off at work, sometimes while driving and even as he sat on the toilet.
“I couldn’t keep a job,” he said. “I couldn’t stay awake.” The CPAP, he said, saved his career, maybe even his life.
As many CPAP users discover, the life-altering device comes with caveats: Health insurance companies are often tracking whether patients use them. If they aren’t, the insurers might not cover the machines or the supplies that go with them.
In fact, faced with the popularity of CPAPs, which can cost $400 to $800, and their need for replacement filters, face masks and hoses, health insurers have deployed a host of tactics that can make the therapy more expensive or even price it out of reach.
Patients have been required to rent CPAPs at rates that total much more than the retail price of the devices, or they’ve discovered that the supplies would be substantially cheaper if they didn’t have insurance at all.
Medical devices are gathering more and more data from their users, whether it’s their heart rates, sleep patterns or the number of steps taken in a day. Insurers and medical device makers say such data can be used to vastly improve health care.
But the data that’s generated can also be used in ways that patients don’t necessarily expect. It can be packaged and sold for advertising. It can anonymized and used by customer support and information technology companies. Or it can be shared with health insurers, who may use it to deny reimbursement. Privacy experts warn that data gathered by insurers could also be used to rate individuals’ health care costs and potentially raise their premiums.
Patients typically have to give consent for their data to be used — so-called “donated data.” But some patients said they weren’t aware that their information was being gathered and shared. And once the data is shared, it can be used in a number of ways.
The U.S. Department of Health and Human Services (HHS) is continuing its audit into its fetal tissue research policies by consulting with scientists and anti-choice groups.
HHS officials scheduled a “listening session” for Friday with several scientist groups including the American Society for Cell Biology, the Federation of American Societies for Experimental Biology, the International Society for Stem Cell Research, and the Society for Neuroscience to discuss the agency’s policies and funding for research using fetal tissue. Agencies officials have already met with anti-choice groups on the issue according to a report by Politico. An HHS spokesperson confirmed to Rewire.News that the agency would be holding multiple listening sessions “with various stakeholders e.g. scientists, pro-life groups, ethicists” on this issue.
It’s unclear exactly which anti-choice groups have consulted with HHS regarding fetal tissue policies, but the Susan B. Anthony List has been named in multiple reports as having met with agency officials. The president of the group, Marjorie Dannenfelser, signed a September letter from several anti-choice groups to HHS Secretary Alex Azar calling for a ban on federal fetal tissue research grants.
“HHS has initiated a comprehensive review of all research involving fetal tissue to ensure consistency with statutes and regulations governing such research, and to ensure the adequacy of procedures and oversight of this research in light of the serious regulatory, moral, and ethical considerations involved,” said the spokesperson in an email. “Finally, HHS is continuing to review whether adequate alternatives exist to the use of human fetal tissue in HHS-funded research and will ensure that efforts to develop such alternatives are funded and accelerated.”
Azure AD is the de facto gatekeeper of Microsoft cloud solutions such as Azure, Office 365, Enterprise Mobility. As an integral component of their cloud ecosystem, it is serving roughly 12.8 million organizations, 950+ million users worldwide, and 90% of Fortune 500 companies on a growing annual basis. Given such a resume, one might presume that Azure Active Directory is secure, but is it?
Despite Microsoft itself proclaiming “Assume Breach” as the guiding principle of their security strategy, if you were to tell me a week ago that Azure or Office 365 was vulnerable to rudimentary attacks and that it could not be considered secure, then I probably would have even laughed you out of the room. But when a client of ours recently had several of their Office 365 mailboxes compromised by a simple brute-force attack, I was given no alternative but to question the integrity of Azure AD as a whole instead of attributing the breach to the services merely leveraging it and what I found wasn’t reassuring.
After a simple “Office 365 brute force” search on google and without even having to write a line of code, I found that I was late to the party and that Office 365 is indeed susceptible to brute force and password spray attacks via remote Powershell (RPS). It was further discovered that these vulnerabilities are actively being exploited on a broad scale while remaining incredibly difficult to detect during or after the fact. Skyhigh Networks named this sort of attack “Knock Knock” and went so far as estimating that as many as 50% of all tenants are actively being attacked at any given time. Even worse, it seems as if there is no way to correct this within Azure AD without consequently rendering yourself open to denial of service (DOS) attacks.
Everyone needs a password manager to surf the web safely -- they enable you to set virtually crack-proof passwords for all your online accounts, plus store a range of other sensitive data too, all locked behind a single master password.
If you’re unsatisfied with your current offering, or looking to support an open source alternative, then look at 8bit Solutions LLC’s Bitwarden 1.10.0 and Bitwarden for mobile 1.19.4.
Cybersecurity agencies generally focus on preventing hackers from getting inside systems instead of stopping them from leaking information out. Now a new cybersecurity company called Darktrace is acting on this idea.
They have developed a tool, in collaboration with mathematicians from the University of Cambridge, that uses machine learning to catch internal breaches.
A new cybersecurity company called Darktrace has developed a tool in collaboration with the University of Cambridge that uses machine learning to detect internal security breaches. According to FossBytes, Darktrace created an algorithm that "recognizes new instances of unusual behavior". This technique is "based on unsupervised learning, which doesn't require humans to specify what to look for. The system works like the human body's immune system."
Both Turkey and Saudi Arabia are nominally U.S. allies. We need the former for its strategic military bases and the latter for both its oil and its vast investment capital. Despite being a NATO member and ostensibly a democracy, Turkey jails more journalists than almost any other country in the world. Saudi Arabia, meanwhile, is a full-blown dictatorship, and despite a valiant attempt to portray MbS as a Western-style reformer, the crown prince has tightened, not loosened, his grip on absolute power in Saudi Arabia.
Trump refused to blame Saudi Crown Prince Mohammed bin Salman for Khashoggi's killing even though the CIA has reportedly concluded that the crown prince ordered his assassination. The CIA on Tuesday was expected to share its full report on the killing with Trump.
"[Trump] is placing personal relationships and commercial interests above American interests in his desire to continue to do business as usual with the Crown Prince of Saudi Arabia," Ryan said in a statement.
"The CIA has thoroughly investigated the murder of this innocent journalist and concluded with high confidence that it was directed by the crown prince. If there is reason to doubt the findings of the CIA, President Trump should immediately make that evidence public."
“I never thought I’d see the day a White House would moonlight as a public relations firm for the Crown Prince of Saudi Arabia,” Corker wrote in a retweet of Trump’s statement questioning whether the crown prince was responsible for the death of U.S.-based dissident Saudi journalist Jamal Khashoggi.
"Statement from President Donald J Trump on Standing with Saudi Arabia" - the title of the White House release leaves little doubt about where he comes down on the murder of Saudi journalist Jamal Khashoggi.
Lockheed Martin is being contracted to mitigate the upcoming obsolescence of F-35 JSF essential semiconductors. Awarded by the Naval Air Systems Command, the $41.5 million firm-fixed-price delivery order provides for procurement of new Xilinx and Intel-Altera field programmable gate arrays (FPGAs). [...]
We may never know whether Cuba attacked American diplomats with microwave weapons—but we do know similar devices exist. The US Department of Defense’s Joint Non-Lethal Weapons Directorate, along with a host of private arms companies, has spent decades testing everything from long-range wireless Taser bullets to sonic guns that can disable a car engine from 150 feet away. The one requirement: These weapons must emit less than 10,000 joules, the amount of energy it takes to kill a person. Bombs incite wars, the thinking goes—but North Korea miiight forgive the “accidental discharge” of a directed-energy laser pulser (also, as it happens, in the works).
On the afternoon of 11 November 1918, my father Claud Cockburn, then aged 14, covertly threw the keys of the main gate of his school out of an upstairs window to a soldier waiting below. His purpose was to allow the soldiers being trained locally to break into Berkhamsted School in Hertfordshire and thrash it in retaliation for the refusal of the headmaster, Charles Greene, to call a school holiday to celebrate the armistice, which had just been declared. Many pupils, including Claud, objected to this decision, as did the soldiers, angry at what they saw as an unpatriotic failure to celebrate victory adequately after four years of war.
But the soldiers and schoolboys were both mistaken about the headmaster’s motives: Charles Greene, whose third son was the novelist Graham Greene, supported the war, but he was acutely aware of its terrible cost, not least to former Berkhamsted pupils, of whom no less than 230 had been killed, their names commemorated by plaques outside the school chapel, while a further 1,145 were still in the armed forces as the war ended. “Most of the sixth form were wiped out year after year,” Claud recalled 60 years later. “I know when I was in the sixth form, I think that only 10 per cent of the previous year were still alive.” Greene, a liberally minded man with great force of character, had had the grim experience of seeing those whom he had just been teaching called up when they reached the age of 18 and, all too often, they were reported killed or wounded a few months later.
The end of the slaughter might have led Greene to declare a holiday, but he reached a radically different conclusion about how the peace should best be celebrated. He had time to think about this because the news that the German kaiser and crown prince had abdicated reached Berkhamsted on Sunday 10 November and the announcement of the end of the war would clearly follow shortly. When the armistice was signed at 11am the following day, Greene announced the fact to staff and pupils who sang “God Save the King” before dispersing. He did not make the expected announcement about the holiday but instructed everyone to go on working as if this was a normal day. He justified this by arguing that, with 5 million allied soldiers killed, the survivors had to work even harder to make best use of the victory for the good of civilisation and could not afford to take holidays. “We must go on,” he said. “Now is the time for effort.”
The United States has great tolerance for wholesale killings. Think Hiroshima and Nagasaki. Think civilians killed in Korea, Vietnam, Afghanistan, Iraq – in U.S. wars. Think biological weapons.
An article appearing October 4, 2018 in Science magazine deals with a U.S. Defense Department project named “Insect Allies” which began in 2017 and runs for four years. The Defense Advanced Research Projects Agency (DARPA)is providingfour U.S. Universities with $45 million in funding to enable researchers to alter the gene make-up of plants grown as crops on farms. DARPA claims to be “addressing national security challenges in agriculture domestically and abroad.” Genes are being “edited”, says DARPA, so that plants can resist diseases, drought, floods, excessive heat, or “natural or engineered harmful biological agents,”
Yet the five authors of the report, evolutionary biologists and lawyers at German and French Universities, see the U.S. Defense Department as probably developing offensive biological-warfare capabilities. The United States, they explain, actually may be working on an innovative mechanism of genetic modification programmed to reduce productivity rather than to maintain or increase it.
The authors write that the “knowledge to be gained from this program appears very limited in its capacity to enhance U.S. agriculture or respond to national emergencies.” They condemn the project “as probably in violation of the Biological Weapons Convention (BWC), which tookeffect under United Nations auspices in 1975.
The 182 nations ratifying the BWC as of 2018 are committed to prohibiting the “development, production, and stockpiling” of such weapons. In 1969 President Richard Nixon announced that the United States would no longer be making offensive biological weapons.
“I love WikiLeaks!” candidate Trump proclaimed in 2016. Now Julian Assange has learned what Donald’s love is worth: a sealed criminal indictment.
If the consequences for the First Amendment weren’t so sobering, it would be a savage cosmic joke. First, Assange—convinced the Obama administration would snatch him up if given half a chance—sentences himself to indefinite confinement in the Ecuadorean embassy in London. Then, believing Hillary Rodham Clinton is a “sadistic sociopath,” he publishes those Russia-hacked Democratic National Committee e-mails at a pivotal moment in the campaign. Now the administration that Assange helped elect (headed by a genuinely sociopathic president who actually endorsed torture and rendition) takes the very step against him that Obama and his attorney general, Eric Holder, consistently refused.
What to make of this bizarre turn? The murky hints inadvertently revealed in a Justice Department filing leave much about the Assange indictment unclear. Do the charges relate to Robert Mueller’s Russian-hacking inquiry? Or to earlier leaks of classified documents? (My money says the latter: A sloppy breach of news about Assange would seem out of character for the fiercely disciplined and silent Mueller team.) Is it an unprecedented charging of a publisher under the Espionage Act, or some more conventional criminal complaint? Is there even an active indictment at all, or merely a determination by Trump’s Justice Department to pursue one? Regardless, what we know is enough: The notion of sealed charges against a publisher of leaked documents ought to have warning sirens screaming in every news organization, think tank, research service, university, and civil-liberties lobby.
Assange, of course, doesn’t make it easy. From the founding of WikiLeaks he has been a confounding figure. His historic innovation—an anonymous dropbox for otherwise-secret data—changed investigative reporting. The breadth of WikiLeaks’ disclosures, commingled with Assange’s own idiosyncratic motivations for what to publish and what to withhold, have tied lawyers and press-freedom advocates into knots for the better part of a decade. But now—with the charge against Assange coming amid the Trump administration’s broader assault on journalists—this once-academic debate takes on fierce urgency.
Is Assange a journalist at all? That’s where the argument usually begins, and too often ends. As NYU law professor Stephen Gillers points out in his penetrating and essential new book Journalism Under Fire: Protecting the Future of Investigative Reporting, the most far-reaching federal shield law proposed in recent years to protect reporters—the Free Flow of Information Act, introduced by Senators Chuck Schumer and Lindsey Graham in 2013 but never passed—explicitly wrote WikiLeaks out of the equation, denying protection to outfits whose “principal function” is publishing “primary source documents…without authorization.” The dividing line, says Gillers, is “editorial judgment”: What defines WikiLeaks as non-journalism is that it is an undiscriminating document dump. For years that same argument has allowed many traditional news organizations to keep their distance from WikiLeaks’ overtly activist publishing.
A court document surfaced last week confirming that the United States Department of Justice has secretly filed criminal charges against Australian citizen Julian Assange for his journalistic work as the editor of WikiLeaks. For exposing US and allied war crimes and diplomatic conspiracies, Assange has been threatened since 2010 with extradition to the US for a show trial on charges of “espionage” or “conspiracy.”
The revelation that US charges have been laid vindicates the position taken by Assange and his defenders to fight against the arrest warrant issued against him, in November 2010, to answer “questions” over spurious allegations he had committed sexual assault in Sweden. The allegations were fabricated to give ammunition for pro-US mouthpieces to discredit Assange and as the means of rendering him to a country from where he could be rapidly extradited.
The US-motivated Swedish warrant, and the support given to it by the British government and courts, forced Assange to seek political asylum in the small Ecuadorian embassy in London on June 19, 2012. For over six years, he has lived under fraught conditions, deprived of direct sunlight and adequate medical care.
Julian Assange can’t stay in the Ecuadorian Embassy in London forever – and when he finally does leave, he’ll likely be extradited to the US, former CIA director John Brennan mused in a recent interview.
Asked by MSNBC’s Brian Williams on Monday if he thought “we’ll ever seen Julian Assange on American soil” or “inside an American courtroom,” the Obama-era top spook responded in the affirmative.
As the US Department of Justice files undisclosed criminal charges against Wikileaks founder Julian Assange, critics such as the American Civil Liberties Union (ACLU) warn that prosecuting Assange could lead to crackdowns on other journalists and news organizations. Lionel of Lionel Media joins Steve Malzberg to share his insights.
The Justice Department has prepared criminal charges against WikiLeaks founder Julian Assange and is working behind the scenes to have him extradited to the United States. Press freedom and the right to dissent may hang in the balance.
The criminal charges were accidentally revealed last week when Assange’s name was found on the court filing of an unrelated case, suggesting that prosecutors had copied a boilerplate text and forgotten to change the defendant’s name.
Barry Pollack, a US lawyer on Assange’s team, told the New York Times: “The news that criminal charges have apparently been filed against Mr. Assange is even more troubling than the haphazard manner in which that information has been revealed.” Pollack continued, “The government bringing criminal charges against someone for publishing truthful information is a dangerous path for a democracy to take.”
Assange has been holed up in the Ecuadorian embassy in London since 2012, after seeking protection against sexual assault allegations in Sweden. While the initial arrest warrant has since been revoked, if Assange leaves the embassy he runs the risk of being apprehended by UK authorities and extradited to the United States, a process greatly facilitated by the recent criminal charges.
President Trump said Tuesday that he doesn't "know anything" about WikiLeaks publisher Julian Assange, who is reportedly facing a secret criminal case filed by the Trump administration.
"I don't know anything about him, really," Trump said on the south lawn of the White House after being asked if Assange should go free and if the Justice Department should drop its case. "I don't know much about him. I really don't"
President Donald Trump said he doesn’t “know much” about WikiLeaks co-founder Julian Assange, dodging a reporter’s question on whether the editor should go free. The claim follows reports that the US has secretly charged Assange.
Speaking to reporters at the White House on Tuesday, Trump produced a stunning claim, saying that he has a very superficial knowledge about the most famous self-exiled fugitive in the world.
Mueller grand jury witness Randy Credico’s relationship with an attorney for WikiLeaks is emerging as a key point of contention in the special counsel’s investigation.
Roger Stone, the longtime Trump confidant, has asserted that Credico passed him information about WikiLeaks’ pre-election plans from activist lawyer Margaret Ratner Kunstler.
A few days ago CNBC reported that the US Justice Department had prepared to indict WikiLeaks founder Julian Assange, although it remains unclear whether any charges had already been filed. US President Donald Trump said that he didn’t know “much” about Julian Assange when reporters outside the White House asked him whether the whistle-blower should go free and the Justice Department should drop the case against him.
There are some in the West who are fully convinced that Assange deserves to be tried and thrown in jail for "threatening" US national security and "undermining" its democratic processes. Former US presidential candidate Hillary Clinton and former Vice President Joe Biden have called him a "terrorist", US Secretary of State Mike Pompeo, then the director of the CIA, has described WikiLeaks as a "non-state hostile intelligence service" and US Attorney General Jeff Sessions has said prosecuting Assange is a "priority" for him.
Many have also come to see him as a political player who purposefully sought to influence the outcome of the 2016 US presidential elections, while others consider him a stooge of Russian President Vladimir Putin, although no evidence for this was ever found. It is more likely that Assange's indictment is coming not as part of Special Counsel Robert Mueller's investigation into Russia's role in the 2016 US election, but in response to WikiLeaks publishing the biggest leak in the history of the CIA called #Vault7.
Whatever Assange's political leanings or views, his case is not about whether you like him or not, but about freedom of the press. As Edward Snowden rightly said: "You can despise WikiLeaks and everything it stands for. You can think Assange is an evil spirit reanimated by Putin himself, but you cannot support the prosecution of a publisher for publishing without narrowing the basic rights every newspaper relies on."
If Assange is eventually arrested, extradited to the US and stands trial there, he is almost certainly going to be found guilty - just as Chelsea Manning was. He would probably end up in a Guantanamo-like prison. And his prosecution and jailing would have global repercussions for whistle-blowers, publishers and journalists.
Rock icon Roger Waters, a founding member of the British band Pink Floyd, expresses support for Wikileaks founder Julian Assange, whom he says "needs to be protected".
During a question-and-answer session with reporters outside the White House on Tuesday, President Donald Trump was asked if he thinks WikiLeaks founder Julian Assange should “be able to go free.” The president attempted to deflect the question with a bizarre rant about how Chuck Schumer’s daughter works for Facebook.
But a few minutes later, the reporter tried asking Trump about Assange again. This time, the president claimed that “I don’t know anything about him. Really, I don’t know much about him, I really don’t.”
[...]
Trump may not know Assange personally, but it’s impossible to believe he’s not familiar with his work.
As ThinkProgress documented, in the final month before the 2016 presidential election, Trump mentioned WikiLeaks and the hacked emails it published at least 164 times during speeches, media appearances, and debates. Trump’s own intelligence officials acknowledge Russian hackers were responsible for obtaining emails from the DNC and Clinton campaign that were later published by WikiLeaks.
“WikiLeaks, I love WikiLeaks!” Trump professed during a speech on October 10. “And I said write a couple of them down. Let’s see. ‘During a speech crooked Hillary Clinton’ — oh she’s crooked folks. She’s crooked as a three-dollar bill. Okay here’s one. Just came out. ‘Lock her up’ is right.”
During an interview that aired the next day, Trump told Bill O’Reilly: “The press is hardly even talking about WikiLeaks. You know that. WikiLeaks is amazing. The stuff that’s coming out, it shows she’s a real liar.”
On October 21, Trump told his audience at a rally that “We love WikiLeaks. WikiLeaks. They have revealed a lot. They’ve revealed that there is a great hostility toward Catholics. They reveal a great hostility toward evangelicals.”
Agency policies and state-level data privacy protections become background noise when billions of records pour into a central database maintained by ALPR manufacturers. On average, law enforcement agencies are sharing data with 160 agencies. But there are outliers. MuckRock has compiled a list called the "800 Club:" agencies that share their captured plate data with at least 800 other government agencies, most of which are located in California or Texas.
The dataset [available to download here] appears to be as comprehensive as anyone can make it, given the reluctance to release this information and some lack of clarity in law enforcement agency responses. The good news is most law enforcement agencies were cooperative with requesters. The bad news is pretty much everything else. Billions of plate records are collected every year and stored indefinitely by ALPR manufacturer Vigilant. But if there's any inconsistencies or errors in the data received from the agencies polled, one entity in particular could clear up any and all misunderstandings.
It’s not a stretch to say that few people are disliked more within media circles than WikiLeaks founder Julian Assange. Yet with the news that Trump’s Justice Department has filed secret charges against him, the rights of many journalists who despise Assange may also hang in the balance.
It’s still unclear what charges the Justice Department is bringing against Assange, who has lived under diplomatic protection in the Ecuadorian Embassy in London for the past six years. But if the secret charges implicate any of WikiLeaks’ publishing activities, it could ironically be just the precedent the Trump administration needs to directly go after journalists at the New York Times and Washington Post.
With that in mind, I recently spoke to James Goodaleââ¬Å —ââ¬Å the famed First Amendment lawyer and former general counsel the New York Times, who led the paper’s legal team in the famed Pentagon Papers caseââ¬Å —ââ¬Å about the dire impact the Justice Department’s move may have on press freedom, regardless of whether people consider Assange himself a “journalist.”
All new cars and trucks sold in B.C. in the year 2040 will have to be zero-emission vehicles, the premier promised Tuesday.
John Horgan said the government is planning to introduce legislation in the spring to gradually phase in targets for the sale of electric cars and hydrogen fuel cell vehicles and will take steps to make those vehicles cheaper.
"If we want British Columbians to be part of the solution for reducing air pollution, we need to make clean energy vehicles more affordable, available and convenient," Horgan said in a news release.
I'm unreasonably interested and excited by this. There is a simple fact that we need to do this and car companies will not do it, they are too invested in the existing carbon economy. My first thought is that 2040 is way too far off, but this really isn't a simple change and the political and societal desire to change is not strong enough to force a sudden change yet.
American political power is based on fossil fuels, and the US military is the engine that consumes those fuels to produce that power. So long as there is an American political elite that craves lucrative personal prestige and the ability to dominate internationally, the US economy will be fossil-fueled capitalism that maintains the military colossus that enables and protects those elite ambitions.
US military-enabled imperial power is of two varieties:
first: the hard power that overtly invades and seeks to control territory to impose American capitalist domination, as for example capturing pipeline routes south through Afghanistan and Pakistan–away from China–out of Central Asian oil fields; the guarding of sea lanes crucial for petroleum transport west, as at Suez and the Strait of Hormuz, and east to Japan, Korea and Australia (if they behave); and the securing of scarce metal ore and rare earth deposits in Afghanistan and Africa (for elements used in solid state electronics); and
second: the soft power of buying compliance to US hegemony from client states by gifting them with arms sales that enable them to exercise their own mini-imperialistic ambitions, as with Israel’s threat-projection in the Levant that is consistent with US aims of regional control, and Zionism’s own manifest destiny colonialist mania of persecuting the occupied Palestinians and shrinking their reservations; and with arms sales to Saudi Arabia enabling its genocidal war against Yemen, and giving the U.S. leverage to induce the opulent Saudi royalty to keep oil production high and oil prices low on the world market, so as to grease Western capitalism and also undercut the revenue streams supporting Venezuelan socialism and Iranian economic development.
Because of the fracking (oil shale) boom of the last two decades, the U.S. now produces as much oil as Saudi Arabia and is energy independent as a fossil fueled economy, but hegemonic ambition compels it to seek global control of petroleum distribution because to control the flow of oil around the globe is to throttle the imperial ambitions and economic development plans of all others.
I watched Puerto Rican relief workers pull a shopping cart on ropes across a riverbed after Hurricane Maria destroyed the bridge. The food it carried kept families trapped on the hillside from starving. It was 2017. I drove along the island, shocked at the battered buildings and telephone wires spilled on the street and thought, we’ll need tons of money to rebuild.
As I flew back home, Texas was just recovering from Hurricane Harvey. A year later, Californian wildfires burned neighborhoods to ash, then Hurricane Michael smashed homes in Florida. Now, more fires on the West Coast have caused a quarter of a million people to flee, and hundreds are missing. Each new disaster adds to a growing crisis. Our nation’s survival means a new role for its citizens and a larger one for the federal government.
Climate change demands changes that conflict with Republican and even Democratic dogma. Ultimately, the nation’s survival may mean the GOP is impossible. “Big government” will be necessary. Populist solidarity will be, too. The poor and the working class, long divided by Republicans, may be forced by their shared vulnerability to climate change into a new coalition.
"While employees aren’t permitted to buy and sell stocks based on nonpublic information, several real estate lawyers said they were aware of no such prohibition for real-estate transactions."
Amazon’s HQ2 search was not a contest but a con. Amazon will soon have 3 HQs. And guess what? The Bezos family owns homes in all 3 cities. And, you’ll never believe it, the new HQs (if you can call them that) will be within a bike ride, or a quick Uber, from Bezos’s homes in DC and NYC. The middle finger on Amazon’s other hand came into full view when they announced they were awarding their HQ to not one, but two cities. So, really, the search, and hyped media topic, should have been called “Two More Offices.” Only that’s not compelling and doesn’t sell. Would that story have become a news obsession for the last 14 months, garnering Amazon hundreds of millions in unearned media?
The world’s wealthiest individual went on to acknowledge, “Technologies always are two-sided. There are ways they can be misused.” Convinced that they are being misused, Google employees mounted a protest that caused Alphabet (Google’s parent company) to step back from a contract to develop AI pattern recognition technology for targeting military drones, worrying the Pentagon.
More recently, thousands of employees at scores of Google facilities worldwide staged a walkout (chronicled here) over gender inequality and sexual harassment. At a time when women in tech are demanding to be treated respectfully and paid and promoted equally, two pioneering women engineers in the male-dominated national intelligence community have quietly been shaping the technology landscape for three decades. Any complaints they may have had about working conditions along the way are presumably classified, but we can probably guess what they are.
At least one of the women, Sue Gordon, is among defense and intelligence officials scurrying to Silicon Valley on damage control missions, prodding tech leaders to “have the same fierce commitment to align technology with public purpose,” as Ash Carter, who directs the Harvard Kennedy School of Government’s Belfer Center recently editorialized in Wired (9/14/18). The former Secretary of Defense, who also runs the Kennedy School’s Project on Technology and Public Purpose, disparagingly contrasted current high tech leaders to his “mentors in subatomic physics …from the Manhattan Project. They were proud to have created nuclear weapons that helped end World War II.” If those scientists were so proud of their work, why did they straightaway wind up that still-ticking Doomsday Clock?
The Bomb, digital computers, the Internet, Google Maps, and the Maven project that Google is abandoning were or stemmed from government-funded R&D projects employing scientists and engineers from government, academia and industry. NASA has long partnered likewise, as has the Department of Energy. The government likes to call such projects “dual use,” as they have both civilian and military applications. Yet, many serve a single purpose, which of course is to align corporate agendas with US foreign policy to achieve world domination.
For months, federal housing officials and prosecutors have alleged that the New York City Housing Authority misled them about conditions, rendering federal oversight ineffective as conditions worsened.
New York City officials used “every trick in the book to conceal building violations from federal inspectors,” U.S. Attorney Geoffrey Berman alleged at a news conference this summer announcing a federal complaint against the authority.
Berman declared it a “cover-up.”
But inspection records from the U.S. Department of Housing and Urban Development suggest there’s more to the story. HUD officials were well aware of the severe mold, infestation and countless other health and safety violations inside New York City’s public housing units, according to a review of the two most recent inspection records for a dozen properties. The Southern Illinoisan obtained the records, which date from 2013 to 2017, from HUD in October through a public records request.
In most of the apartments reviewed, inspectors found severe cases of mold and mildew, broken and missing appliances, inoperable windows and doors, electrical system problems and water leaks.
A few years back, I was asked to create a presentation for a few visiting European executives, to explain "what makes Silicon Valley, Silicon Valley." It was a fun presentation, and one of the people who saw it later had me give it to an ever rotating crew of visiting European execs and policymakers (I even got to give the talk once over in the UK). I believe I did the presentation half a dozen times or so. The person who set up most of those talks later moved on to another job and it's been years since I last gave the presentation. It always led to an interesting discussion, though, because so much of what I talked about seemed to go against their core instincts about innovation (the presentation also debunks some of the common myths about the success of Silicon Valley). Maybe, one day, I'll get to give the talk again.
However, what fascinated me most was the general resistance to understanding the fundamentals of both innovation and the internet. But in the past few years, it's become increasingly clear that the EU's concept of the internet is almost entirely out of sync with how digital innovation works, especially with the ways in which the EU has gone about regulating the internet -- from the GDPR to the Copyright Directive, to the antitrust efforts, to the Terrorism regulation.
In recent years, Jordan Peterson, the 56-year-old Canadian clinical psychologist, has become the new star of the political right. His books are bestsellers, and his YouTube videos are watched by hundreds of thousands of people, sometimes even millions. Although he is an educated man with a lot of interesting things to say, some of his views are very disturbing, if not potentially dangerous. Perhaps the best illustration of this is his position on inequality and capitalism.
According to Peterson, inequality is both natural and inevitable. In his talks, he likes to invoke Price’s Law, which states that the square root of the number of people in a domain do 50% of the work, while the rest, the majority, takes care of the other half. This inequality, Peterson continues, can be found everywhere. A tiny number of musicians, for instance, create 50% of the music that is played; a few of the best hockey players score most of the goals; a small number of stars contain most of the mass and so on. So the fact that a small number of people own most of the wealth is, according to his reasoning, an inevitable result caused by a natural law. Capitalism, therefore, cannot be held responsible for the inequality that we observe today.
This argument by Peterson has some serious problems. While he is probably right that it is impossible to create and maintain a perfectly equal world, it is without a doubt that capitalism nurtures inequality. After all, inequality is built into the very core of any capitalist system.
Perhaps capitalism’s most fundamental feature is the way how it organizes the economy. In a capitalist society, one will find two groups. The first group consists of the ‘owners’ who possess the means of production. And since they own everything, they get to decide. The second group is made up of ‘workers’, people who do not own any capital and thus have to offer their labor to one of the owners whom they then have to obey. The owners, in their position of power, not only decide what is produced by whom and how, they also decide how the rewards are shared. Unsurprisingly, they give a disproportionate amount to themselves, thus creating inequality.
Unfortunately, capitalism’s ability to generate inequality does not end here. The power and wealth which the owners accumulate are used by them to gain control over the political system, making sure that politicians implement policies that are beneficial to them, no matter the consequences to others. This then increases their wealth even more, which allows them to further extend their control over politics. It is this vicious cycle that for the past several decades has resulted in increasingly higher levels of inequality. And, as will be discussed below, there is nothing inevitable about this process.
“I nearly went to the hospital for the 22nd time in 7 months. As you can imagine this has depleted all of my money,” writes Tara. She continues: “My family has done so much and will help me once I’m there, but I need to move on my own…So look, I’m a responsible girl, I’ve been holding it down for 16 years while feeling like I could be taken at any time.”
Tara is running a campaign on the popular crowdfunding site GoFundMe. She has fibromyalgia and a host of complications, and needs to relocate to access health care. She started fundraising in March 2017, and a year and a half later, she’s raised less than a quarter of what she needs. She’s not alone. Medical expenses are already the leading crowdfunding cause and donations can’t keep up with demand; a 2017 study showed that 90 percent of medical crowdfunding campaigns failed to reach their goals.
[...]
Perusing crowdfunding sites reveals ample glossy, well-prepared pleas for help that are netting healthy proceeds, like “Join Oscar’s Village,” featuring a baby with acute flaccid myelitis, a brief, emotive story, and pictures of a happy family. Other campaigns have few to no donations and haven’t been optimized for an audience, like Tara’s: rambling, poorly-punctuated pleas for help, lengthy and apologetic stories, and blurry photos that don’t catch the eye of visitors. It’s a brave new world of health care financing in which those with socioeconomic privilege are better positioned for success than others.
Berliner and Kenworthy fear crowdfunding may be exacerbating socioeconomic inequalities. “Crowdfunding normalizes a means of health care financing that runs counter to a more rights-based system of values,” says Berliner. “
The English and Welsh voted to leave the EU. They are entitled to leave the EU, and it is not the job of the leader of the Scottish National Party to frustrate their intention, or even try to influence the terms on which the English and Welsh leave the EU. Just as it is not the job of the Scottish National Party to stop Westminster having the Tory governments the English people inexplicably keep voting for.
It is the job of the leader of the Scottish National Party to secure Independence for Scotland, and to ensure that the vote of the Scottish people, to remain within the EU, is respected. I am therefore entirely unconvinced that for Nicola Sturgeon to try to play a role as the darling of the Remainer population of England is of any use to the people of Scotland. And the truth is that knowing the very last detail of the eventual Brexit outcome, of which we know the essential outlines, will have virtually no effect on the prospects of an Independent Scotland.
Now is the moment of maximum chaos; whatever eventually emerges between London and Brussels will work without immediate catastrophic effects. People will not starve and run out of medicine, in the real world. The UK will continue to be a Tory hell with some changes of arrangements. Scotland should not be in Tory Hell, whatever Tory Hell’s relationship with the EU.
I am here considering Brexit only as it affects Independence.
According to White House counsel, this was all a misunderstanding. Apparently, Ivanka Trump wasn't aware of the rules governing the discussion of official government business on private channels. This would only be excusable if her father hadn'tspent a great deal of time calling for Hillary Clinton to be locked up for the same behavior.
Given the (still!) ongoing excoriation of Clinton by Donald Trump, you'd think his administration would have tried to lead by example and make sure everyone was on official channels from day one. Instead, his admin team did the same thing Clinton did, minus the setup of a private server.
[...]
If a government official has used private email accounts for official business, Techdirt has criticized them. Ivanka Trump doesn't get a pass and neither does anyone on the other side of the gaping political divide. She may not have known the specifics governing official communications but the Trump Administration has no one to blame but itself for the black eye it's now sporting.
HER EMAILS was a major plank in Trump's election platform. His administration team could have prevented this but was too busy keeping their own communications off the record to straighten out Ivanka Trump.
Hillary, too, came from a dysfunctional family environment.
Basically, the White House seems to be setting itself up with the absolute bare minimum framework that it could kinda-sorta claim constitutes viewpoint-neutral due process the next time it wants to kick out a reporter. Functionally the rules don't seem to change much, since who gets the floor at White House press conferences has always ultimately been at the discretion of the person at the podium, but this formalizes the threat of pass revocation for those who don't play nice enough for Trump's tastes. Though many reporters are (rightfully) speaking out against the clear anti-press tone of the rules, and (correctly) pointing out that followup questions are one of the most critical components of good journalism, the reality is that this just puts things in a holding pattern until the next time Trump kicks someone out.
The US midterm elections of November 6, 2018, produced a divided Congress and essentially reaffirmed the existence of two nations in one country. But they also revealed, once again, the deep state of moral and political depravity that prevails in the country’s political culture — at least insofar as political campaigns go. In the exclusive interview below, world-renowned scholar and public intellectual Noam Chomsky discusses how the major issues confronting the United States and the world at large were barely addressed by the majority of candidates of both parties.
Despite left-wing efforts to revoke the permit for Saturday’s “We the People” rally, the late morning demonstration occurred at Independence National Historical Park, a landmark in Philadelphia’s historic district.
The rally, which has ties to the white supremacist groups the Proud Boys (recently deemed a white nationalist group by the FBI) and the Three Percent movement, drew attendance that varied from 20 to 40 participants throughout the afternoon. They were accompanied by four American flags, one Gadsden (“don’t tread on me”) flag, and two different Trump flags.
One flag bore a navy blue Trump campaign logo. The other had the same logo on one side, and a slight modification of the Thin Blue Line/Thin Red Line flag, which represents support for police and firefighters, on the other. The latter is a variation of the Blue Lives Matter flag, which represents a reactionary movement to defend Officer Darren Wilson, the cop who shot Michael Brown in Ferguson, Missouri.
But the Blue Lives Matter flag wasn’t the cause for alarm at the rally.
Initially, Philly.com reported there was “no indication of attendance by neo-Nazis, white supremacists, or members of hate groups such as the Proud Boys or Three Percenters.” Despite having three reporters assigned on the story, the news outlet failed to recognize several Proud Boys and people wearing the Three Percenter logo on their sweatshirts.
Last week, the Federalist Society grand poobah Leonard Leo, widely credited as the mastermind behind Trump's extremist court-packing scheme, got into a bit of spat with another high powered conservative legal luminary. That would be George Conway, the prominent Trump critic who is also the husband of Trump senior adviser Kellyanne Conway. Leo was upset because Conway had started a legal organization called Checks and Balances, which is dedicated to opposing Trump's abuse of presidential power and degradation of the rule of law.
Leo said he found the whole concept outrageous. Just because the president spouts off day and night wondering why the Department of Justice isn't jailing his political rivals and demanding that its top officials pledge fealty to him as he imagines Joe McCarthy's lawyer (and Trump mentor) Roy Cohn would have done -- well, isn't an abuse of power unless he takes action.
Throughout his life, Edward Bernays (1891âËâ1995), known as the “father of public relations,” argued in favor of using “third parties” to influence public opinion.
“If you can influence the leaders, either with or without their conscious cooperation, you automatically influence the group which they sway,” Bernays wrote in Propaganda (1923), his popular book that explored the psychology behind manipulating public opinion.
“Because man is by nature gregarious he feels himself to be member of a herd, even when he is alone in his room with the curtains drawn. His mind retains the patterns which have been stamped on it by the group influences,” wrote Bernays.
In the age of Citizens Unitedââ¬Å —ââ¬Å and with Trump in the White Houseââ¬Å —ââ¬Å Bernays’s insights on public manipulation have become plain to see for anyone willing to look.
This is because President Trump doesn’t use propaganda to just sell hotels, steaks, and hats—he also uses his platform to rile up his racist and xenophobic supporters, and channel hatred toward immigrants, people of color, women, the LGBTQ community, and progressives.
In October 2018, a Trump supporter was arrested for mailing bombs to high-profile figures within the Democratic party and critics of the President. Shortly after, a right-wing extremist, who has been linked to anti-Jewish and anti-immigrant posts on social media, killed 11 Jewish Americans inside of a Pittsburgh synagogue.
I expected this, actually. I just didn’t think it would be so crude, so buttheadedly amoral.
Trump’s view of the Saudis, in a nutshell, was announced last week: “They’re a truly spectacular ally in terms of jobs and economic development.” Okay, ’nuff said.
The Saudis buy billions in war planes, missiles, tanks, helicopters and other military equipment every year. Over half of their arms come from the U.S., Britain serving as number two supplier. This means jobs. The annihilation of 50,000 Yemeni men, women and children puts bacon on the tables of Lockheed and Boeing workers in Seattle. The meddling in Syria, where Riyadh has supported al-Nusra-linked (al-Qaeda-linked) jihadis against the secular regime, means more jobs. The suppression of protesters during the Arab Spring in Bahrain was carried out by Saudi-led troops using U.S. small arms.
Trump was briefed on the Khashoggi matter last Friday. He knows that the CIA has concluded, with a “high degree of confidence” that Saudi Crown Prince Muhammad bin-Salman is “personally responsible” for the murder of Jamal Khashoggi in the Saudi Istanbul consulate Oct. 5 But Trump said after the meeting that it was “premature” to assess responsibility.
I suspect it wasn’t premature at all. An announcement was merely timed to give the appearance of a decision after a formal procedure. The moral decision had been made. Billions in arms sales, billions from cheap oil, the priceless gift of Saudi help in destroying Iran (to help Israel assert hegemony over the region in tandem with the U.S.), the invaluable retention of the Jared-MbS blood brotherhood bond made the decision easy.
Now Trump, albeit in peculiar language that virtually advertises his amorality, language that frankly acknowledges that maybe the prince did it —“Our intelligence agencies continue to assess all information, but it could very well be that the Crown Prince had knowledge of this tragic event – maybe he did and maybe he didn’t!”—has proclaimed his satisfaction with the Saudi explanation. Much of his base might accept it.
Google pulled out of mainland China in 2010, when founders Sergey Brin and Larry Page decided that removing controversial links from search results, as the government in Beijing requires, was unacceptable. But in 2016 a small team that included Pichai began working on China-related projects, including a program, known as Dragonfly, to bring Google’s search engine back into the country.
The plans included protocols to censor results to the government’s liking, barring search terms such as “Tiananmen Square” and ensuring that users looking for information about air quality would only get data approved by Beijing. Pichai has called the efforts "exploratory," but they have caused a firestorm inside and outside the company.
Computer science boffins have demonstrated a side-channel attack technique that bypasses recently-introduced privacy defenses, and makes even the Tor browser subject to tracking. The result: it is possible for malicious JavaScript in one web browser tab to spy on other open tabs, and work out which websites you're visiting.
This information can be used to target adverts at you based on your interests, or otherwise work out the kind of stuff you're into and collect it in safe-keeping for future reference.
Researchers Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom – from Ben-Gurion University of the Negev in Israel, the University of Adelaide in Australia, and Princeton University in the US – have devised a processor cache-based website fingerprinting attack that uses JavaScript for gathering data to identify visited websites.
You really have to wonder if there is a ban on columnists and reporters mentioning wanton violation of the copyrights and patents of U.S. companies as a potential weapon for China in its trade war with the United States. Incredibly, as aspects of the trade war get highlighted and debated, wholesale violations of copyrights and patents held by U.S. companies never gets mentioned.
The latest conspicuous ignorer is Nicholas Kristof. In a column that warns Trump of all the non-trade measures China could pursue, he never once mentions patents and copyrights.
If this sounds obscure, let me be as specific as possible. Suppose China announces that it is working with a large domestic computer manufacturer to make tens or even hundreds of millions of computers, using Windows and other Microsoft software, which will be sold not only in China but exported to any country interested in getting low cost computers. Microsoft will not get a dime in royalty payments.
We've long noted how the painful lack of security and privacy standards in the internet of (quite broken) things is also a problem in the world of connected toys. Like IOT vendors, toy makers were so eager to make money, they left even basic privacy and security standards stranded in the rear view mirror as they rush to connect everything to the internet. As a result, we've seen repeated instances where your kids' conversations and interests are being hoovered up without consent, with the data frequently left unencrypted and openly accessible in the cloud.
When this problem is studied, time and time again we're shown how most modern, internet-connected toys can be fairly easily hacked and weaponized. Granted since we haven't even gotten more pressing security and privacy problems tackled (like the vulnerability of our critical infrastructure), problems like Barbie's need for a better firewall tend to fall by the wayside.
Another recent case in point: A location-tracking smartwatch worn by thousands of children has proven... you guessed it... rather trivial to hack. The MiSafes Kid's Watcher Plus is a "smart watch for kids" that embeds a 2G cellular radio and GPS technology, purportedly to let concerned helicopter parents track their kids' location at all times. But security researchers at UK's Pen Test Partners have issued a report calling the devices comically unsecure.
The New York Times reported last week that Sandberg sought to prevent the public from learning more about Russia’s propaganda campaign on the social network ahead of the 2016 election. Even when the public was eventually told about misinformation spreading through fake Facebook accounts, it took many more months before the company directly linked that activity to Russia.
Following the various scandals Facebook has been getting entrapped in, Mark Zuckerberg has cleared the air by stating that he is not leaving Facebook. During an interview with CNN, an emphasis was laid on whether or not Mark Zuckerberg is stepping down as Facebook chairman, and he confirmed that he is not going anywhere.
The report also said Facebook used a Republican opposition research firm called Definers Public Affairs to accuse liberal financier George Soros of funding some of the groups that were speaking out against Facebook.
A Russian company whose accountant was charged by federal prosecutors for attempting to meddle in US elections has sued Facebook, claiming it is a legitimate news outlet and its Facebook account should be restored.
The Federal Agency of News LLC, known as FAN, and its sole shareholder, Evgeniy Zubarev, filed the lawsuit in federal court in the northern district of California, seeking damages and an injunction to prevent Facebook from blocking its account.
The following year, when he raised concerns with Venezuelan officials, Daquin told Reuters, he was detained, beaten and extorted by intelligence agents. They knocked several teeth out with a handgun and accused him of treasonous behavior, Daquin said, prompting him to flee the country.
Government spokespeople had no comment on Daquin's account.
[...]
As part of a US$70 million government effort to bolster "national security," Venezuela last year hired ZTE to build a fatherland database and create a mobile payment system for use with the card, according to contracts reviewed by Reuters.
A team of ZTE employees is now embedded in a special unit within Cantv, the Venezuelan state telecommunications company that manages the database, according to four current and former Cantv employees.
This pressure is not sustainable in the long term. No matter how benevolent and thoughtful tech executives appear to be, the lack of transparency and accountability will continue to breed allegations that they are uncaring, incompetent, biased, or even just downright evil. No matter how much technology companies protest, their central power as focal nodes on the internet makes them irresistible targets for people who want better control over users.
As Illinois’ child welfare agency works to clear out its remaining patients at a Chicago psychiatric hospital beset by allegations of sexual abuse and assault, problems continue to emerge.
The Illinois Department of Children and Family Services on Monday opened an investigation into a 9-year-old girl’s allegation that a staff member at Aurora Chicago Lakeshore Hospital choked and restrained her.
The girl did not have any bruises or marks, DCFS officials said, and the employee is not currently working on the unit. The report brings the number of DCFS investigations into allegations of abuse or neglect at the hospital to 19 since January.
[...]
The American Civil Liberties Union of Illinois, which monitors DCFS as part of a consent decree, had demanded that the agency put in place several safeguards after a ProPublica Illinois investigation first revealed the troubles at Lakeshore. The two groups have been locked in contentious negotiations as they continue to hammer out details of an independent review at the hospital, among other proposals. (The Chicago Tribune also has reported on the issues at Lakeshore.)
At Tuesday’s hearing, the ACLU blasted the agency for providing little or no information on matters the group said were key to the children’s safety. ACLU lawyers argued that the DCFS employees doing the monitoring should have training, clinical experience and knowledge of psychiatric hospitalizations.
“To act as if someone can walk off the street, even with a child welfare background, and understand what to watch for, I think is really misguided,” ACLU general counsel Heidi Dalenberg said. “Would someone know that one of the things to watch for is don’t let two kids sit together under the same blanket?”
Dalenberg was referring to an allegation this month in which two patients, a 14-year-old male and a 16-year-old transgender female, fondled each other under a blanket in a hospital day room while a staff member was present.
Israeli intelligence officials desperately tried to prevent Ronen Bergman from writing “Rise and Kill First: The Secret History of Israel’s Targeted Assassinations,” a stunning book exposing the details of Israel’s extrajudicial killing program. Israel even changed and extended secrecy laws to prevent Bergman from gaining access to historical documents. Despite this, Bergman gained unprecedented access while writing the book, scouring thousands of documents and meeting with some 1,000 sources. The result is a stunning investigation that dives deep into the targeted killing programs of Israel, which has assassinated more people than any other country in the Western world since World War II. We speak with Ronen Bergman about Israel’s many attempts to kill the former chair of the Palestine Liberation Organization, Yasser Arafat, and the possibility that they succeeded.
As the speakers began sharing survivors’ stories of sexual assault and trauma, the crowd of several hundred rally attendees stood in breathless silence in a downtown Portland, Oregon, park on Saturday, November 17. This event, called Survivors Are Everywhere: A Survivor Shout Out, had been organized by the anti-fascist coalition Pop Mob (short for Popular Mobilization) and was meant to bring together survivors’ stories as a challenge to another event being held only feet away, one organized by affiliates of the far-right Patriot Prayer organization. In response to the growing movement toward accountability for sexual assault and abuse, Patriot Prayer followers organized a #HimToo rally to address what they claim without evidence is a rash of “false rape allegations.”
In Oregon, Patriot Prayer has been front and center of this far-right revival, and the far-right events have escalated into vicious strikes on counterdemonstrators. Along with aggressive policing tactics, Portland has become dangerous for the growing number of activists who flood the city streets to stop Patriot Prayer from advancing.
“The ‘alt-right’ is trying to silence survivors, erase trans identities, control the bodies of women and people of color, and criminalize families and individuals seeking safety,” Alyssa Pariah, the co-chair of Portland Jobs with Justice and rally speaker, told Truthout. Instead of just organizing to counter the far-right contingent that was occupying a public park, organizers decided to use this as an opportunity to make the stories of survivors a hard edge of the anti-fascist resistance.
US president Donald Trump has long lambasted the migrants. He first characterised them as “invaders”, who sheltered among their ranks “unknown Middle Easterners”. Later, Trump admitted that this thinly veiled attempt to portray the migrants as terrorists was not based on any “proof” but nevertheless went on to calm the public by declaring that the US military would be waiting for the caravan at the Mexican border. Initially announcing that he would send as many as 5,200 troops, he later upped this number to a possible 15,000 soldiers.
[...]
Interestingly, the president, secretary of state, and DHS did not pluck these allegations out of thin air. They are simply repeating claims made in a 2014 report published by the US right-wing Tea Party organisation.
The report described the movement of migrants as an “offensive whereby the southern borders of America are being swarmed”, adding: “This offensive is an invasion, not led by troops, but by divisions of mothers, children and young adults marching north from Central America and Mexico”.
According to children's rights organization Plan International, the girl was bid on by five men, some of whom were reportedly high-ranking South Sudanese government officials.
The original post marketing the 17-year-old was published on October 25th. It was only removed by Facebook on November 9th, days after the girl is said to have been married. According to a spokesperson for Plan International, a girls’ rights activist group, the post went viral in South Sudan. “So anyone who was on Facebook in South Sudan was well-aware of this situation far before the rest of the world,” they said.
Nearly a month ago, a post on Facebook advertising a teenage girl for marriage went viral in South Sudan. Several men engaged in a bidding war over a 16-year-old girl. The post circulated online for two weeks before Facebook finally came to its senses and took it down.
However, the social media giant was too late to take the necessary steps, and by the time Facebook removed the post, the girl was already purchased by a wealthy businessman to be his wife.
The department arbitrarily labels immigrant teenagers as gang members and helps the federal government deport them.
In the face of the Trump administration’s stepped-up deportation efforts, officials in Boston and other progressive cities have declared their communities safe spaces for immigrants. But behind the scenes, progressive havens like Boston are facilitating the deportations of some of our most vulnerable young people.
As the federal government’s rhetoric and action around immigration have sharpened and hardened, young immigrants are being systematically slandered and deprived of their rights here in Massachusetts. Too many are inaccurately and unfairly alleged to be involved in gangs, according to a Boston Police Department database, and as a result, find themselves on the fast track to deportation.
There’s a lot we don’t know about Boston Police Department’s “gang database” — which is why this week, the ACLU of Massachusetts, the Children’s Law Center of Massachusetts, and other groups filed a public records lawsuit to bring some transparency to the system. Here’s what we do know: Being included in it can have dire consequences for a young person’s life.
Back in 2011 the FCC launched something called the Measuring American Broadband program. It was revolutionary in the fact that for the first time, the FCC refused to simply take ISPs at their word in terms of the speed and connection quality of their broadband offerings. Instead, the FCC hired UK firm Samknows to embed custom-firmware modified routers in the homes of thousands of real world broadband volunteers, providing insight into the real state of US broadband network performance, not the rosy picture of US broadband telecom industry lobbyists like to paint.
Not surprisingly, actually using real world data to inform policy paid dividends. The FCC's first report (pdf) in 2011 showed that some ISPs, like New York's Cablevision, were delivering just 50% of the bandwidth they advertised during peak usage hours. Cablevision didn't much like being called out in this way, and by the next report (pdf) in 2012 was shown to have fixed its problems, now offering actually more bandwidth than they had previously advertised (120%). It was, in the absence of more competition, a novel way to nudge ISPs toward doing the right thing.
Each year like clockwork these reports were released to the public. Until last year, that is, when then new FCC boss Ajit Pai simply refused to release the report at all, despite the fact that taxpayer dollars were still funding it and volunteers were still participating.
We’re thankful that California’s lawmakers listened to your demands and signed the state’s landmark net neutrality bill, S.B. 822, into law. States such as California had to step up to offer these protections after the Federal Communications Commission repealed the national Open Internet Order in 2017. Despite heavy lobbying from the telecommunications industry to gut the bill, popular support for net neutrality helped send a measure with strong net neutrality protections to the governor’s desk.
The U.S. Government has sued to block this law, and it’s been paused while the D.C. Circuit settles a federal challenge to decide if the FCC, by abandoning its authority over Internet service providers, also abandoned any power to preempt state laws.
California’s net neutrality law sets a gold standard for the rest of the country, and we look forward to defending it as the court considers its next steps.
Three U.S. Senators are pressuring wireless carriers for answers after recent studies showed they routinely throttle video services -- not to protect the network from congestion -- but to simply make an extra buck.
One of the core goals of net neutrality was to prevent ISPs from imposing arbitrary restrictions on the network just to harm competitors or boost revenues. Of course lax enforcement and now dismantled rules have made that hard to stop. As a result, ISPs like Comcast routinely impose completely arbitrary and unnecessary usage caps, then exempt their own content from those limits, but punishing users if they step outside the Comcast walled garden. Wireless carriers have similarly throttled music, games and videos, then begun charging users more money if they want those services to operate as the creators intended.
Even with net neutrality rules intact, the FCC didn't really do a good job understanding how these arbitrary restrictions (like usage caps and zero rating) could prove anti-competitive. And in the year or two since things have only gotten worse, with wireless carriers like Verizon throttling all video on its network unless you pay the company for an even more expensive plan. The perils of this should be obvious--especially for Americans who already pay some of the highest prices for mobile data in the developed world.
I started researching the Transportation Security Administration’s “secondary security screening selection” process to understand why I was being stopped every time I got on a plane or came back home to the United States after a foreign trip. Nearly two years later, I am still being stopped and searched, and I still don’t know why.
I’m a graduate student at Harvard University, and missed flights and travel anxiety were beginning to affect my schoolwork. So with the help of the American Civil Liberties Union, I have filed a formal complaint with the Department of Homeland Security asking that I be allowed to travel freely, which is my constitutional right.
Am I being stopped because I am Muslim, or because my family once traveled to Iran to visit a holy shrine? Is it because of my criticism of U.S. policies on the multimedia website I run to raise awareness about injustices around the world? Maybe it’s all three. Federal officers have asked me about my writing and religion, both of which are protected by the First Amendment.
Corporate confidence is growing in the Chinese patent system, particularly since the introduction of new offerings such as two dedicated IP courts and the hiring of more trained IP examiners into its patent office.
According to in-house sources, there are still challenges when it comes to registering, validating and litigating patents, but considerable improvements have been made that have smoothed the path to easier patent portfolio management in the region.
"The patenting system in China has become collectively robust," says the patent lead at a Swiss confectionery company. "There was a time when most patent applications would have been challenged or questioned, but today most of our patents are granted."
Many companies are still finding it difficult to determine whether they have freedom to operate in China, but overall its IP developments are helping it shed its anti-IP and protectionist reputation and beginning to cement it as a region for top-tier patent protection.
That decision has now been fully reversed by a panel of three judges of the same Court of Milan, after having heard the appeal filed by Eli Lilly against the first instance decision. On 15 October 2018, the Court of Milan found that Lilly's patent EP1313508 is infringed by equivalence by Fresenius Kabi's product containing pemetrexed diacid and tromethamine and issued a preliminary injunction against the latter.
[...]
On the facts, the Court held that the amendments made by Lilly did not restrict the interpretation of the patent’s scope of protection in such a manner as to exclude compounds that are equivalent to pemetrexed disodium. The Court then agreed with the independent panel of experts that the skilled person would treat the disodium as a non-essential part of the invention since the invention was aimed at solving the clinical issue of toxicity by administering vitamin B12 with the pemetrexed anion. The skilled person would understand that the active moiety is the pemetrexed anion and the counterion has no therapeutic or toxic effect. The Court agreed that it would therefore have been obvious to the skilled person to replace pemetrexed disodium with pemetrexed diacid (with tromethamine as in Fresenius Kabi's product) and that Fresenius Kabi's products infringed Lilly's patent by equivalence.
In the UK the Supreme Court in its judgment of 12 July 2017 ([2017] UKSC 48) ruled that the Lilly patent is not limited to the disodium salt of pemetrexed, and that Actavis’ diacid form and other salts of pemetrexed, representing immaterial variants of the claimed invention, directly infringe the patent.
In other jurisdictions, including Germany (Federal Supreme Court X ZR 29/15 of 14 June 2016), Switzerland (Federal Supreme Court 4A_208/2017 of 20 October 2017) and Italy (Court of Milan Case No. 45209/2017 of 15 October 2018), the courts also acknowledged infringement under the doctrine of equivalence.
In the UK cross-border case, the claimant Actavis was irrevocably bound to its undertaking not to challenge the validity of the Lilly patent.
The Lilly patent had survived EPO opposition proceedings, but in Germany its validity was again challenged by third party generics.
In Converse v ITC on remand from the Federal Circuit, the ITC will have to decide "one of the most complex trade mark cases they’ve seen"
The International Trade Commission (ITC) must grapple once again with the issue of secondary meaning, in the remand of a case involving sneakers.
Much has been written at this point about the problems with various "notice and takedown" policies, including in the DMCA. Much of the problems arise from the DMCA's requirement that service providers "expeditiously" remove infringing material upon notice, which naturally leads to platforms erring on the side of removal versus taking a hard -- and manual -- look at the material in question to see if it's really infringing. This results in all kinds of takedowns of speech that is not infringing, typically as a result of human error, a dispute over the actual ownership of rights, a lack of recognizing fair use, or, perhaps most often, an automated system for sending DMCAs simply screwing up.
But another weakness in the notice and takedown policy is in how much power it places in the hands of trolls and bad actors to simply fuck with people. This can be seen in action in the case of one SoundCloud troll getting all kinds of music taken down by pretending to be a rights holder.
By pushing to the “link tax”, publishers are shooting themselves in the foot three times over. One, there is a tangible risk that Google opt for the Spanish/German jurisprudence. Two, the optics will look terrible: by persisting to collect a small revenue from snippets, publishers will seem to wage a rearguard battle. Three, the news publishing world has more appealing options when it comes to working with Google at improving the economics of their ecosystem. The search giant is already investing hundreds of millions of dollars for technologies that could directly, or indirectly, benefit to the news media. So far, publishers haven’t used the full extent of it. It’s time to “think different”.
The latest proposals surrounding the controversial Article 13 indicate that upload filters - the mechanism that has been widely warned about for months - are front and center in negotiations. Sites like YouTube will be required to obtain licenses for content they make available and cooperate with rightsholders to ensure no unauthorized communications to the public, unless they want to be held liable.