07.19.19
Posted in Europe, Patents at 3:39 pm by Dr. Roy Schestowitz
“No man is justified in doing evil on the ground of expediency.”
–Theodore Roosevelt
Summary: The EPO’s abandonment of patent justice and quality (in pursuit of so-called ‘production’ targets) is likely to doom the Office as the whole or render it vastly less relevant to the rest of the world
Patent quality has been severely compromised by the EPO — to the point of being totally detached from the EPC and several other things. The Battistelli-appointed (de facto) António Campinos actively promotes software patents in Europe (using some buzzwords) and there’s now this pilot (CQI) to further lower patent quality while the EPO publicly lies about its concerns on the matter.
“We know whose side the law is on, but the EPO quit obeying the law several years ago.”The EPO cannot eternally rely on terrorising its judges and then covering it up. Sooner or later more and more European Patents will come under scrutiny outside EPOnia (or Haar, which is obviously outside EPOnia and thus unsuitable a venue, according to the EPC). What happens then? Can the EPO continue until eternity (or its end of life) to disregard judges’ precedents (except internal judgments which are constitutionally invalid) and carry on granting fake patents? Applications will decrease in number as soon as applicants spot these trends. This is already happening.
Earlier on this week, or yesterday, Bart van Wezenbeek wrote about a District Court of The Hague case (this case’s date is exactly one month ago, June 19th) in which dubious patents were assessed in European courts. To quote:
In the present case, it appeared from the prosecution file that the limitation had been introduced with a purpose, and the patentee had accepted the limiting examiner’s amendments. Taken together with the fact that the patentee could be considered a professional party with sufficient knowledge in the field of patents, this means that the scope of the claim was determined more by the literal interpretation of the claim than by the concept of the invention behind it.
In this particular case it’s an American ‘pharma vulture’ doing the litigation against a Dutch company. Annsley Merelle Ward from a firm that boosts patent predators (Bristows LLP) wrote about it last month, whereupon we also wrote about it, noting that “European Patents are already being leveraged by foreign (US) giants, which claim to be worth hundreds of billions of dollars based on exploitative monopolies, to bully generics out of the market. Courts decide the lawsuits are baseless, frivolous.”
It’s not a sole example. According to this new report, “European Patent Office Revokes Second Pacific Biosciences Patent” (from GenomeWeb), the EPO has once again admitted that it granted a fake patent and it’s only being ‘actioned’ because someone invested in correcting it:
NEW YORK – The European Patent Office this week revoked another patent held by Pacific Biosciences, according to Oxford Nanopore, the firm’s main competitor.
Not even the first time!
Awful patent quality is the direct result of unprecedented pressure being put on examiners, who probably do the best they can under the unreasonable conditions/circumstances. But if this carries on, why would companies still apply for European Patents? Fewer of them would. Juve very recently took note of the decline in demand for European Patents. It’s not hypothetical; it’s already happening.
We’ve just spotted this new comment in IP Kat, published about a day ago after some IP Kat puff piece about EQEs (separate thread). To quote:
No-body serious considers the EQEs to be a gold-standard of practice. Since they are time-limited exams they will necessarily not award points in Paper C for novelty/inventive step arguments against claims that are already dealt with as added matter, but this is not real life.
In real life, added matter is included as an objection in probably the majority of oppositions, but the sensible attorney will also make arguments on novelty/inventive step and other grounds if these are viable. In real life only deciding that there is added matter, and not even considering novelty/inventive step in case your decision on added matter is incorrect, will simply waste time in the long run in the majority of cases.
One of the criticisms regularly levelled at both the PEB exams and the EQEs is that they ignore commercial realities. Typcially this is because they require you to do things that the client doesn’t normally want. P6/FD4 is criticised for requiring integer-by-integer claim construction analysis that no sane client wants you to do, whilst Paper B requires you to cover-off points that no-one writing a response in real life would think worth the cost of responding to.
However, here we have an example of the exams requiring that you do not do something that the client actually typically wants – to make novelty/inventive step argument just in case your cleverly-drafted added matter arguments fail. Attorneys know that commercial reality demands this – it is only good when courts also realise this in making their decisions.
Courts should disregard this “commercial reality” and instead focus on what underlying laws (e.g. EPC, caselaw) say. The EPO likes to pretend that it is business-friendly, but the only business it’s friendly to is the litigation ‘industry’. To ordinary European SMEs the EPO became nothing but a liability and a menace. We know whose side the law is on, but the EPO quit obeying the law several years ago. █
Permalink
Send this to a friend
Posted in America, Patents at 2:43 pm by Dr. Roy Schestowitz
It is meanwhile being reported that in Japan’s JPO — like in the EPO — patent applications decrease in number
Summary: The United States, where the number of granted patents decreased last year, becomes more productive; there are more signs that patent maximalism (patent litigation, patent scope etc.) has receded
OUR LATEST daily links sum up some new patent cases/outcomes, including some that involve 35 U.S.C. § 101. USPTO-granted patents on software and life still aren’t likely to be tolerated by actual courts and in recent days we’ve seen many attacks on courts coming from Watchtroll. Do these ‘geniuses’ at Watchtroll really think that constantly attacking Federal Circuit judges (not just the Patent Trial and Appeal Board (PTAB) anymore) will lead to more favourable outcomes?
“Nowadays we focus on other topics that are deemed more relevant and strategic.”After summer recess expect nobody to mention the latest nonsense from Coons (this is his third time and third year trying). Expect courts to change nothing in their handling of 35 U.S.C. § 101. We feel somewhat vindicated for we predicted these things all along, just like the UPC’s demise.
We’re glad to know we no longer closely cover US patent cases and matters; seeing the way things are going there (and relegating articles on these matters to news clippings and picks), it doesn’t look like we’re missing much ‘action’. Nowadays we focus on other topics that are deemed more relevant and strategic. █
Permalink
Send this to a friend
Posted in News Roundup at 1:55 pm by Dr. Roy Schestowitz

Contents
-
-
Around a decade ago, an India-based company called Datawind got a nod from the Central government to make and market a low-cost tablet PC called Aakash for students in the country. About half a decade before that — 2004, to be exact — the country launched GSAT-3 aka EDUSAT, its first satellite to be used entirely for the education sector.
Cut to the present, and it is more than two months since Datawind shut down permanently. Meanwhile, EDUSAT was deactivated in 2010, and has since been moved to a part of space that the world refers to as “graveyard orbit.”
They were both examples of a political class thinking a little too ahead of time when it came to the technology needed for education. Something similar is now happening at the other end of the spectrum: While the world is agog about the latest iteration of the Raspberry Pi and an increasing number of people is adopting one or the other distro of Linux, most of India seems to be oblivious to both.
-
Desktop
-
I let the Windows setup procedure run on first boot, until I got to the point where it became clear to me that it is now impossible to install Windows without a Microsoft account. Absolutely impossible. Windows 10 has always asked for a Microsoft account during setup, but there was a tiny (nearly invisible) option to use only a local account, which I always did. Well, now that option is gone, and if you dig around long enough you can eventually find an explanation that says if you don’t want to use a Microsoft account, well, you have to anyway, but after the installation is complete you can go back into the configuration and change it to use a local account.
So, that was the end of Windows on this new system. I have never had a Microsoft account, and I never will. I booted a Linux Live USB stick, deleted the Windows partition, and set about the task of installing a few of my favorite Linux distributions.
The first thing I had to do was get into the BIOS Setup Utility to disable UEFI Secure Boot. That turns out to be a bit more tricky than you might think, because there is a “POST hotkey delay (sec)” parameter in the BIOS which is initially set to 0, so there is very little time after power-on to press F10 before it starts to boot Windows (or at least tries to). Once into the BIOS Setup, I went to System Configuration / Boot Options / Secure Boot, and changed that to Disabled. While I was in there, I also changed the POST hotkey delay to 5 seconds. Save that (F10) and exit.
[...]
Installation was easy and uneventful; I noticed that Mint has improved their installer on UEFI systems so that it now allows you to choose the EFI Boot Partition, that’s nice. Unfortunately it still installed the bootloader to a directory called “ubuntu”, which can be inconvenient if you also have Ubuntu installed on the system.
Booting after the installation completed still brought up openSUSE by default, which is actually what I wanted – but if you wanted to boot Mint by default, it would simply require a trip through the BIOS Configuration again. In my case, I just generated a new grub configuration file on openSUSE (grub2-mkconfig), and it added Mint to the Grub boot menu.
-
Recently, I bought and started using a Tuxedo Book BC1507, a Linux laptop computer. Ten years ago, if someone had told me that, by the end of the decade, I could buy top-quality, “penguin-ready” laptops from companies such as System76, Slimbook, and Tuxedo, I probably would have laughed. Well, now I’m laughing, but with joy!
Going beyond designing computers for free/libre open source software (FLOSS), all three companies recently announced they are trying to eliminate proprietary BIOS software by switching to Coreboot.
-
-
Server
-
IBM
-
Big Red has unleashed Oracle Linux version 8, which could the OS of choice for those using the database giant’s cloud or appliances – or who just can’t bear to see the words Red Hat (or IBM).
The database giant took the wraps of its Linux flavour yesterday, with director of product management Simon Coter flagging up a raft of new features, including the introduction of the concept of Application Streams which allow “multiple versions of user space components [to] be delivered and updated more frequently than the core operating system packages.”
He also flagged up improved systems management with the inclusion of the Dandified Yum package manager, which “installs, updates, and removes packages on RPM-based Linux distributions” and Cockpit, “an interactive server administration interface that offers a live Linux session via a web browser.”
-
Oracle yesterday announced the release of Oracle Linux 8. New features include Application Streams, a “Dandified Yum”, RPM improvements and much more. From the announcement: “With Oracle Linux 8, the core operating environment and associated packages for a typical Oracle Linux 8 server are distributed through a combination of BaseOS and Applications Streams. BaseOS gives you a running user space for the operating environment. Application Streams provides a range of applications that were previously distributed in Software Collections, as well as other products and programs, that can run within the user space.”
-
Perhaps, many years hence, we will call the company that, more than any other, created the enterprise computing environment Big Purple now that it has acquired the company that made open source software in the enterprise safe, sane, and affordable.
Twenty years ago next month, Red Hat went public and everything about enterprise software changed. A company with some tens of millions of dollars in revenues, providing subscription support for a commercial Linux distribution for systems within a few months had a ridiculous market capitalization in excess of $20 billion and the mad dash for open source projects to be commercialized was on.
Fast forward two decades, and Red Hat is the touchstone for how to work with upstream open source software projects related to datacenter infrastructure and to bring them downstream to harden them to be enterprise grade, package them up, and then sell support for them. Red Hat is by far and away the most successful provider of commercial support for open source code, and has moved well beyond its foundational Enterprise Linux distribution, mostly through key acquisitions including the companies behind the GNU compilers, JBoss application server, the KVM hypervisor, the Gluster parallel file system, the Ceph object storage, the innovative CoreOS Linux distribution, and the Ansible software provisioning tools as well as the OpenShift container controller (a mix of in-house and Kubernetes code these days), the OpenStack cloud controller, and the CloudForms hybrid cloud management system (also largely done in-house). Red Hat, we think, still needs to have a heavy duty open source database management system distribution – perhaps several different ones with different architectural tenets – but it was also perhaps prescient in that it stayed out of the Hadoop storage and data analytics racket, which has not panned out as planned.
-
This is the second post of our blog series on Red Hat OpenShift and Splunk Integration. In the first post, we showed how to send application and system logs to Splunk. The second part is focused on how to use Splunk Kubernetes Objects.
-
Command Line Heroes explores how beginner languages bring people into the world of programming. BASIC lowered the barrier to entry. Now, the next generation is getting their start modifying games, like Minecraft. Listen to the episode.
-
How do you want to manage your systems? That probably depends a lot on the type of environment you have — whether your systems are primarily on-prem, or if they reside in the cloud. Or a mixture of both. Either way, Red Hat is looking to meet you where you’re at and provide management tools to suit your needs with Red Hat Smart Management.
We introduced Red Hat Smart Management at Red Hat Summit earlier this year in Boston as a layered add on for Red Hat Enterprise Linux (RHEL), as well as including Red Hat Insights with RHEL subscriptions.
-
Audiocasts/Shows
-
This week we’ve been buying a new phone and playing with QEMU. We discuss the release fo Debian 10, Ubuntu users saying “Thank you”, Nvidia drivers, WSL and Ubuntu MATE for the GPD MicroPC. We also round up some events and tech news.
It’s Season 12 Episode 15 of the Ubuntu Podcast! Mark Johnson, Martin Wimpress and Stuart Langridge are connected and speaking to your brain.
-
-
How do we get kids excited about programming? Make programming tangible with embedded devices. Did you know that after kids learned to code with the BBC micro:bit, 90% of kids “thought coding was for everyone” and 86% said it made CS topics more interesting?
-
Whether Linux is inherently secure, the next phase of online interaction, and wasting our free time.
Plus where to focus your contributions, and a tricky hypothetical question.
-
Kernel Space
-
Following EXT4 getting initial (and opt-in) support for case-insensitive directories/files, the Flash-Friendly File-System has a set of patches pending that extend the case-folding support to this F2FS file-system that is becoming increasingly used by Android smartphones and other devices.
Sent out today were a revised set of two patches and just 300+ lines of code that implement case-folding support inside the F2FS file-system. This case-folding support for case-insensitive file-name look-ups is based upon the support found within EXT4 on the latest kernels.
-
While the Linux 5.3 kernel merge window isn’t even over until this weekend when it will kick off with 5.3-rc1 and headlining new features like Radeon RX 5700 series support, AMD has already sent in a batch of AMDGPU/AMDKFD fixes. Making these fixes notable are some early fixes around the new open-source Radeon RX “Navi” support.
-
With the RISC-V support in Linux 5.3 there is now support for huge-pages, image header support (based on the ARM64 kernel image header), initial page table setup is split into two stages, CONFIG_SOC support has been started with initially catering to the SiFive SoCs, high resolution timers and dynamic ticks have now made it into the default RISC-V 64-bit default configuration, and other low-level work.
-
Graphics Stack
-
Originally on Thursday was finally the Nouveau-next 5.3 pull request that offered improvements to the display color management, fixes to Secure Boot on newer hardware, and Turing TU116 mode-setting support. But that was rejected by the DRM maintainers for being way too late as usually the cut-off for new feature material is when hitting RC6 on the previous cycle, just not days before the end of the current merge window. Not that those changes were all too exciting or notable, but this pushes back the color management and other work to Linux 5.4.
Nouveau DRM maintainer Ben Skeggs of Red Hat as a result today sent in Nouveau-fixes 5.3. This pull request has support still for the TU116 GPU since that shouldn’t regress any existing support as well as having fixes around KMS, a memory leak, and a few other basic fixes.
-
Wayland’s Weston compositor for the past year has provided a remoting plug-in for virtual output streaming that was built atop RTP/GStreamer. Now though a new plug-in has landed in the Weston code-base making use of Red Hat’s promising PipeWire project.
The PipeWire plug-in was merged into Weston today and is similar to the GStreamer-powered remoting plug-in but instead leverages PipeWire. The compositor’s frames are exported to PipeWire and the same virtual output API is shared between these plug-ins. The virtual outputs can be configured using the weston.ini configuration file. Any PipeWire client in turn can read these frames.
-
Three large changes have been completed this week. The first is a change to the wire format used for waypipe. The previous protocol, dating back almost to the start of this project, sent a single large message containing a series of subblocks, each of which either contained Wayland protocol data, indicated that a new file descriptor was sent by the connected Wayland program, or provided all the information needed to update a given file descriptor. These file descriptor update messages used a 16-byte header containing the object id, size, type, and a very overloaded metadata field. Furthermore, the content following the header was sometimes context-dependent. For example, the first data transfer to replicate a shared memory buffer sent its initial data, while all successive messages sent a diff relative to the previous state. Because so much in the update messages was implicit, the code acquired a few unusual workarounds; for example, size extensions to a shared memory buffer were only supported by assuming the newly extended region to have contained all zeros and then sending a diff relative to that state.
The replacement wire format protocol operates with much smaller transfer units, with distinct types for the various file operations that used to be combined into a single generic header. To keep individual message sizes small, file data update operations can be split into distinct messages corresponding to different shards of a buffer. While having distinct messages for each operation does very slightly increase the bandwidth needed for a connection, it ensures that operations can be performed as soon as the corresponding message block arrives; a remote pipe or video-type DMABUF can be created before the data for its contents has fully arrived.
-
Linux input expert Peter Hutterer of Red Hat shipped the much anticipated release candidate today for libinput 1.14, the open-source input handling library used by both X.Org and Wayland systems.
-
The first RC for libinput 1.14 is now available.
We have new and improved thumb detection for touchpads, thanks to Matt
Mayfield. On Clickpad devices this should make interactions where a thumb is
resting on the touchpad or dropped during an interaction more reliable. A
summary of the changes can be found here:
https://who-t.blogspot.com/2019/07/libinputs-new-thumb-detection-code.html
The Dell Canvas Totem is now supported by libinput. It is exposed as a new
tool type through the tablet interface along with two new axes. Note that
this is only low-level support, the actual integration of the totem needs
Wayland protocol changes and significant changes in all applications that
want to make use of it. A summary of the changes can be found here:
https://who-t.blogspot.com/2019/06/libinput-and-dell-canvas-totem.html
Touch-capable tablets now tie both devices together for rotation. If you set
the tablet to left-handed, the touchpad will be rotated along with the
tablet. Note that this does not affect the left-handed-ness of the touchpad,
merely the rotation.
Tablet proximity out handling for tablets that are unreliably sending
proximity out events is now always timeout-based. It is no longer necessary
to add per-device quirks to enable this feature and it is completely
transparent on devices that work correctly anyway. A summar of the
changes can be found here:
https://who-t.blogspot.com/2019/06/libinput-and-tablet-proximity-handling.html
Tablets that send duplicate tools (BTN_TOOL_PEN and BTN_TOOL_ERASER) now
ignore the latter. This is an intermediate fix only but at least makes those
tablets more usable than they are now. Issue #259 is the tracker for this
particular behaviour if you are affected by it.
The handling of kernel fuzz has been slightly improved. Where our udev rule
fails to reset the fuzz on the kernel device, we disable the hysteresis and
rely on the kernel now to handle it. Previously our hysteresis would take
effect on top of the kernel's, causing nonresponsive behaviour.
Note to distribitors: the python-evdev dependency has been dropped, the
tools that used it are now using python-libevdev instead.
And of course a random assortment of fixes, improvements, etc. Many thanks
to all contributors and testers.
As usual, the git shortlog is below.
-
Instructionals/Technical
-
Games
-
Currently in “Open Access” on Fig, a hybrid Early Access/Crowdfunding model, Vagrus – The Riven Realms seems to be doing well.
It’s only been going for a couple of months but they’ve already managed to raise $23,071. It’s an interesting system, where you back the campaign with your pledge and get immediate access. At various funding points, it unlocks the next part of their development roadmap with the very next milestone very close to being hit.
-
Love insects and other creepy crawlies? Hive Quest might be a game you will enjoy, one that’s coming to Linux and it’s now crowdfunding on Kickstarter.
Inspired partially by the classic Black & White from Lionhead Studios, it’s not meant to be graphically impressive. In fact, the developer opted to go for a more retro 3D look with it. Gameplay involves you managing a tribe, along with gathering resources like food to keep them going. It’s a bit of an odd one, due to the mix of gameplay involved. It blends a strategy game with puzzles, exploration and a little mystery wrapped in an ancient magical theme with insects and spirits.
-
Carcassonne is that you? Well if you want to play something almost the same, ATRIUM just recently released from Black Potion.
ATRIUM is a tile-based digital board game, where the board gets built as you go. On each turn, a player can place down a tile which you’re given two at random each time and a person, with different tiles giving different benefits. Some might turn your people into a powerful character, some might give you extra points and so on. You basically play each turn, until you run out of tiles and the person who has the most territory wins.
-
Ask some Linux users why they still sticks with Windows dual boot, probably the answer would be – “Games!”. It was true! Luckily, open source gaming platforms like Steam and Lutris have brought many games to Linux platforms and improved the Linux gaming experience significantly over the years. Today, I stumbled upon yet another Linux gaming-related, open source tool named GameMode, which allows the users to improve gaming performance on Linux.
GameMode is basically a daemon/lib combo that lets the games optimise Linux system performance on demand. I thought GameMode is a kind of tool that would kill some resource-hungry tools running in the background. But it is different. What it does actually is just instruct the CPU to automatically run in Performance mode when playing games and helps the Linux users to get best possible performance out of their games.
GameMode improves the gaming performance significantly by requesting a set of optimisations be temporarily applied to the host OS while playing the games.
-
Leaving Early Access today after nine months with a fresh update is Elemental War, a Tower Defense game from Clockwork Origins.
This one is a little unusual, in the way that unlike a lot of Tower Defense games there’s no story campaign to play through. Instead it offers multiple game modes for single-player including a standard 60 wave defence mode, a survival mode to go as long as you can and a hero mode where your enemies are given random abilities. On top of that, there’s also a level editor and a versus online mode to send waves against other players.
-
This is awesome. TerraTech is actually a really fun game for those who like to build vehicles and then go exploring and it just got a big update.
Version 1.3 was released yesterday, building on the work they did in a previous update to give a co-op creative mode it now has a fully online co-op campaign mode. You will be sharing everything from the blocks available to the mission log, so it will require working together.
-
After waiting a whole year, the seventh chapter of the Higurashi When They Cry Hou is now available with Higurashi When They Cry Hou – Ch.7 Minagoroshi.
Continuing to support Linux just like all the other chapters, this highly rated series is worth a look for anyone who enjoys a good mystery. This is a kinetic/sound novel, not one if you like to pick lots of options and change the story. It’s a linear experience but still worth going through if you like your novels.
-
Warm up that cup of speculation, as it appears Valve are working on another game that seems to be going by the name of Citadel.
Linking into Half-Life, since the Citadel is the HQ from where the Combine govern Earth. Apparently though, this is entirely separate to the unannounced Half-Life VR game with Citadel being a completely different Source 2 project. As always though, do not take this as any form of confirmation.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
As you go about your daily tasks, you’re probably unaware that Plasma runs on the computers in one of Europe’s largest research facilities. We were also oblivious – until we met Sergi Blanch-Torné at FOSDEM 2019.
We’re always looking for interesting stories from people who use KDE software at their workplace, in school, or in government institutions. You can imagine our delight, then, when we met Sergi Blanch-Torné at this year’s FOSDEM.
Sergi is a Controls Software Engineer at ALBA, a KDE user, and a Free software advocate and contributor. Not only was he willing to tell us about his favorite KDE apps, but he also works at one of the most amazing places on Earth! In this interview, he tells us what it’s like to work at ALBA, and answers the burning question: “what even is a synchrotron?”.
ALBA is a third-generation synchrotron radiation facility in the Barcelona Synchrotron Park, in Cerdanyola del Vallès, Spain. Managed by the Consortium for the Construction, Equipping and Exploitation of the Synchrotron Light Source (CELLS), it is jointly funded by the Spanish and the Catalonian Administration.
-
-
New Releases
-
This release of Clonezilla live (2.6.2-15) includes major enhancements and bug fixes.
ENHANCEMENTS and CHANGES from 2.6.1-25
-
I already posted about French and German editions, this one is the English build.
-
-
Screenshots/Screencasts
-
Today we are looking at Feren OS Next 19.07 Beta. Feren OS Next is Feren’s distro in development, a work in progress, but it is improving a lot and this is a major release for this distro, as it is now called Beta.
It is based on Ubuntu 18.04.2, uses Linux Kernel 4.18 and KDE Plasma 5.16.3. It uses about 700MB of ram when idling.
Since the last point release, its highly customized features have been stabilized, not perfect yet as expected, and new features and graphical art has been added. It is truly becoming a beautiful and unique KDE Plasma distro.
-
In this video, we look at Feren OS Next 19.07 Beta.
-
Debian Family
-
In 2016, when serious accusations of sexual misconduct were made against a volunteer who participates in multiple online communities, the Debian Account Managers sent him a threat of expulsion and gave him two days to respond.
Yet in 2018, when Chris Lamb decided to indulge in removing members from the Debian keyring, he simply did it spontaneously, using the Debian Account Managers as puppets to do his bidding. Members targetted by these politically-motivated assassinations weren’t given the same two day notice period as the person facing allegations of sexual assault.
Two days hardly seems like sufficient time to respond to such allegations, especially for the member who was ambushed the week before Christmas. What if such a message was sent when he was already on vacation and didn’t even receive the message until January? Nonetheless, however crude, a two day response period is a process. Chris Lamb threw that process out the window. There is something incredibly arrogant about that, a leader who doesn’t need to listen to people before making such a serious decision, it is as if he thinks being Debian Project Leader is equivalent to being God.
The Universal Declaration of Human Rights, Article 10 tells us that Everyone is entitled in full equality to a fair and public hearing by an independent and impartial tribunal, in the determination of his rights and obligations. They were probably thinking about more than a two day response period when they wrote that.
Any organization seeking to have a credible code of conduct seeks to have a clause equivalent to article 10. Yet the recent scandals in Debian and Wikimedia demonstrate what happens in the absence of such clauses. As Lord Denning put it, without any process or hearing, members are faced with the arbitrary authority of the despot.
-
deepin is a Linux distribution devoted to providing a beautiful, easy to use, safe and reliable system for global users.
deepin is an open source GNU/Linux operating system, based on Linux kernel and mainly on desktop applications, supporting laptops, desktops, and all-in-ones. It preinstalls Deepin Desktop Environment (DDE) and nearly 30 deepin native applications, as well as several applications from the open source community to meet users’ daily learning and work needs. In addition, about a thousand applications are offered in Deepin Store to meet users’ various requirements.
Welcome to deepin 15.11 release. Compared with deepin 15.10, deepin 15.11 comes with new features – Cloud Sync in Control Center and disc burning function in Deepin File Manager. Besides, kwin window manager was fixed and optimized for better stability and compatibility, and a number of bugs were fixed. In deepin 15.11, you will enjoy smooth and better user experiences!
-
Canonical/Ubuntu Family
-
Kubuntu 18.10 Cosmic Cuttlefish was released on October 18th 2018 with 9 months support. As of 18th July 2019, 18.10 reaches ?end of life?. No more package updates will be accepted to 18.10, and it will be archived to old-releases.ubuntu.com in the coming weeks.
The official end of life announcement for Ubuntu as a whole can be found here [1].
Kubuntu 19.04 Disco Dingo continues to be supported, receiving security and high-impact bugfix updates until January 2020.
-
End of life is the term used for the date after which an operating system release won’t get updates. Ubuntu provides security and maintenance upgrades in order to keep your systems safe from cyber attacks.
After Ubuntu 18.10 reaches end of life, you won’t get the security updates, you won’t get maintenance updates on your installed software and soon you won’t even be able to install programs from Ubuntu repositories.
-
Canonical’s server team is working on a new means of carrying out automated installations of Ubuntu Server in time for their 20.04 LTS release.
Traditionally Ubuntu Server has supported automated installations in the same manner of Debian as they had been relying upon the text-based Debian Installer and thus allowed using pre-seeds. But since Ubuntu 18.04 LTS when they rolled out their new text-based installer for Ubuntu Server that isn’t based on the long-standing Debian Installer, they lost the pre-seed support.
Rather than trying to support pre-seeds as in the same format as the Debian Installer, they are working on a new approach they hope to have ready by Ubuntu Server 20.04 LTS. Their proposed approach is using YAML as the format for specifying the server installation data and makes different assumptions about what to do in the case of missing data and other behavior.
-
Lifecycle management entails fulfilling changing requirements over time. However, there is a gap that the existing robot development frameworks do not address, making it challenging to tackle system-level requirements (fault tolerance, system safety, maintainability, interoperability or reusability etc…). Ubuntu Core aims at closing this gap by complementing existing frameworks with a set of tools that enable the long term viability of robotic projects. Referring to system life cycle standard ISO/IEC 15288, we will describe how Ubuntu Core enables success in each specified stage.
-
Did you know that Ubuntu MATE is besties with the GPD Pocket & Pocket 2?
Well it is; the pair of pocket-sized PCs, which were made possible through various crowdfunding efforts, got their own, customised, and 100% official Ubuntu MATE 18.10 install image last year, and a follow-up with the 19.04 release this year.
I guess making a custom-spun ISO is the distro equivalent of weaving a friendship bracelet!
Accordingly, it’s no major surprise to learn Ubuntu MATE 19.10 will also come tailored for use on China-based GPD’s latest mini-marvel, the GPD MicroPC.
Interestingly, the device is sold with Ubuntu MATE 18.10 pre-loaded.
-
Devices/Embedded
-
i2SOM offers its PanGu SBC based on ST’s dual-core STM32MP1 series SoC. It supports both Yocto and Debian and provides 1GB DRAM, HDMI, Ethernet, LCD, USB OTG, USB Host, TF Card, audio and other interfaces.
i2SOM has unveiled its PanGu SBC based on the STMicroelectronics (ST) STM32MP1 series SoC. The PanGu Board uses the STM32MP157AAA3 version of the SoC series. This version combines a 650MHz Arm dual-core Cortex-A7 core and 209MHz Cortex-M4 coprocessor with an FPU, MPU, and DSP instructions.
The PanGu Board integrates HDMI, 1000Mbps Ethernet, LCD, USB OTG, USB Host, TF Card, audio and other interfaces. The 70 mm × 105.5mm form factor board is designed for applications including industrial systems, the IoT, portable consumer electronics, automotive electronics and others. The PanGu supports Yocto Linux as well as the Jessie version of Debian.
-
Our hardware and software puts users back in control of computing–but, you may be wondering, can we do the same with our services? With Librem One, the answer is yes. We have big, no, huge dreams about what we can achieve with your support and the wealth of free software that already exists. But we need to keep our feet firmly on the ground.
In this post we will outline the touchstones we have used to do just that–engineer trustworthy services that everyone can use–with a design process called user-centered software engineering. We hope it will facilitate communication with friends and colleagues as we hack towards a common goal… and also show all non-technical readers that human beings are at the center of our bits and bytes. So, how did we do it?
-
Mobile Systems/Mobile Applications
-
-
The Kubernetes API is amazing, and not only are we going to break it down and show you how to wield this mighty weapon, but we will do it while building a video game, live, on stage. As a matter of fact, you get to play along.
-
5 years ago, Kubernetes was born and quickly became one of the most important open-source platform innovations. Today, its Github repository boasts 55,384 stars and 2,205 contributors! We?re not just celebrating Kubernetes and how much easier it makes our lives, but we?re also celebrating the open-source community that added to the container management tool; making it what it is today. When you have an entire community working together to innovate and improve, the possibilities are endless.
-
F-Droid won’t tolerate oppression or harassment against marginalized groups. Because of this, it won’t package nor distribute apps that promote any of these things. This includes that it won’t distribute an app that promotes the usage of previously mentioned website, by either its branding, its pre-filled instance domain or any other direct promotion. This also means F-Droid won’t allow oppression or harassment to happen at its communication channels, including its forum. In the past week, we failed to fulfill this goal on the forum, and we want to apologize for that.
-
Yet Mozilla turns out to be much more consequential than its mixed record and middling numbers would have you believe. There are three reasons for this.
-
Events
-
The Travel Support Program (TSP) provides travel sponsorships to openSUSE community who want to attend the openSUSE.Asia Summit and need financial assistance. openSUSE.Asia Summit 2019 will be in Bali, Indonesia, at Information Technology Department, Faculty of Engineering, Udayana University on October 5 and 6.
The goal of the TSP is to help everybody in and around openSUSE to be able to attend the openSUSE.Asia Summit!
-
Openness/Sharing/Collaboration
-
Open Access/Content
-
The JNU Data Depot is a joint project between rogue archivist Carl Malamud (previously), bioinformatician Andrew Lynn, and a research team from New Delhi’s Jawaharlal Nehru University: together, they have assembled 73 million journal articles from 1847 to the present day and put them into an airgapped respository that they’re offering to noncommercial third parties who want to perform textual analysis on them to “pull out insights without actually reading the text.”
This text-mining process is already well-developed and has produced startling scientific insights, including “databases of genes and chemicals, map[s of] associations between proteins and diseases, and [automatically] generate[d] useful scientific hypotheses.” But the hard limit of this kind of text mining is the paywalls that academic and scholarly publishers put around their archives, which both limit who can access the collections and what kinds of queries they can run against them.
-
-
Programming/Development
-
HackMD.io is an open source, collaborative Markdown editor. It allows people to share, comment, and collaborate on documents. As open source software, users can choose between using the online platform or installing it as a local service using the upstream project CodiMD.
HackMD’s primary feature is obviously the text editor; it leverages the Markdown language, provides handy tools like inserting checkboxes and horizontal separator lines, and allows users to visualize the Markdown rendering while they’re working on a document. But HackMD’s real power is in enabling collaboration. Let’s have a closer look at those features.
-
In this article, we’ll examine multiple ways to sort lists in Python.
Python ships with two built-in methods for sorting lists and other iterable objects. The method chosen for a particular use-case often depends on whether we want to sort a list in-place or return a new version of the sorted list.
-
There are many IDEs for Python, and it’s time for one more. ExpressPython is a lightweight, small code editor for Python 3. Originally built to help teach students how to code, it can be used in programming competitions, or just when you need a fast, small, clean code editor.
There are a wide variety of Python IDEs and code editors available for programmers. Between PyCharm, VS Code, IDLE, Spyder, just to name a few, programmers have many to choose from depending on their needs and preferences. Add one more editor to the fray.
ExpressPython is a small, lightweight Python 3 editor that can help with learning and competitive programming, such as coding challenges. Its creator started work on it in 2014 in order to fulfill a few needs, such as the ability to work offline.
It is not made with the intent of becoming a fully-featured IDE, and does not include debugging features. However, it does have a few noteworthy features, so let’s take a look.
-
The Go language will not be adding a “try” keyword in the next major version, despite this being a major part of what was proposed for version 1.14.
Go, an open source language developed by Google, features static typing and native code compilation. It is around the 15th most popular language according to the Redmonk rankings.
Error handling in Go is currently based on using if statements to compare a returned error value to nil. If it is nil, no error occurred. This requires developers to write a lot of if statements.
“In general Go programs have too much code-checking errors and not enough code handling them,” wrote Google principal engineer Russ Cox in an overview of the error-handling problem in Go.
-
Feature work is over on LLVM 9.0 as the next release for this widely-used compiler stack ranging from the AMDGPU shader compiler back-end to the many CPU targets and other innovative use-cases for this open-source compiler infrastructure.
Ongoing LLVM release manager Hans Wennborg branched the LLVM 9.0 code-base this morning while in turn opening LLVM 10.0 development on trunk/master. This also marks the 9.0 branching for all LLVM sub-projects.
-
Mu made a number of appearances at last week’s wonderful EuroPython 2019 conference in Basel, Switzerland.
-
PyCharm 2019.2 is almost ready to be released, and we’re happy to announce that a release candidate is available for download now.
-
-
Science
-
NASA’s plan to return to the Moon is called Artemis, and like Apollo, the program requires a giant rocket as well as landers to take people to the lunar surface. Perhaps the biggest thing that sets Artemis apart from the Apollo program is that this time, the emphasis is on sustainability. Rather than just send people to walk around the Moon for a few hours, NASA wants to build some kind of sustainable outpost near the lunar surface for the foreseeable future. That’s why Artemis includes a separate component dubbed the Gateway — a space station meant to be built in orbit around the Moon. Instead of people traveling directly to the lunar surface from Earth, they’d travel to the Gateway first and then travel in landers to the Moon.
-
The development of space thus far has been focused on facilitating activity down below—mainly satellite communications for broadcasting and navigation. Now two things are changing. First, geopolitics is stoking a new push to send humans beyond the shallows of low-Earth orbit. China plans to land people on the Moon by 2035. President Donald Trump’s administration wants Americans to be back there by 2024. Falling costs make this showing off more affordable than before. Apollo cost hundreds of billions of dollars (in today’s money). Now tens of billions are the ticket price.
-
The feds charged Darryl Varnum in late June after he told the Congresswoman he was ‘gonna kill your ass if you do that bill,’ report The Beast’s Jackie Kucinich and Lachlan Markay.
-
“I’m gonna kill your ass if you do that bill. I swear,” Varnum’s voicemail began. “I will fucking come down and kill your fucking ass. And you’re a Congressperson, that’s fine. I hope the fucking FBI, CIA and everybody else hears this shit.”
-
Hardware
-
-
-
-
-
-
-
-
-
-
-
-
-
As it relates to memory technologies, the future looks very promising and very exciting. Will the SSD completely replace the traditional spinning HDD? I doubt it. Look at tape technology. It’s still around and continues to find a place in the archival storage space. The HDD most likely will have a similar fate. Although until then, the HDD will continue to compete with the SSD in both price and capacity.
-
At the end of last year I decided it was time to upgrade my home server. I built it back in 2013 as an all-in-one device to be my only always-on machine, with some attempt towards low power consumption. It was starting to creak a bit – the motherboard is limited to 16G RAM and the i3-3220T is somewhat ancient (though has served me well). So it was time to think about something more up to date. Additionally since then my needs have changed; my internet connection is VDSL2 (BT Fibre-to-the-Cabinet) so I have an BT HomeHub 5 running OpenWRT to drive that and provide core routing/firewalling. My wifi is provided by a pair of UniFi APs at opposite ends of the house. I also decided I could use something low power to run Kodi and access my ripped DVD collection, rather than having the main machine in the living room. That meant what I wanted was much closer to just a standard server rather than having any special needs.
The first thing to consider was a case. My ADSL terminates in what I call the “comms room” – it has the electricity meter / distribution board and gas boiler, as well as being where one of the UniFi’s lives and where the downstairs ethernet terminates. In short it’s the right room for a server to live in. I don’t want a full rack, however, and ideally wanted something that could sit alongside the meter cabinet without protruding from the wall any further. A tower case would have worked, but only if turned sideways, which would have made it a bit awkward to access. I tried in vain to find a wall mount case with side access that was shallow enough, but failed. However in the process I discovered a 4U vertical wall mount. This was about the same depth as the meter cabinet, so an ideal choice. I paired it with a basic 2U case from X-Case, giving me a couple of spare U should I decide I want another rack-mount machine or two.
-
Health/Nutrition
-
WHO defines a global emergency as an “extraordinary event” that requires a co-ordinated international response.
“This is still a regional emergency and by no means a global threat,” Robert Steffen, head of the emergency committee on Ebola in Congo, told reporters.
-
According to the complaint, the two “fraudulent” acts alleged to have been performed by defendants were 1) failing to disclose that “one of its competitors had not obtained FDA approval [for its competing drug] during the time period for which Defendants were making critical market share comparisons between Zytiga and its biggest competitor, Xtandi®” and “withheld material information from the Patent Office that the claimed commercial success of Zytiga lacked any nexus” to the invention claimed in the ’438 patent. Their allegation is “but for” — by engaging in inequitable conduct, Defendants were able to exclude generic competition and thus their reimbursement by the Federal government amounted to filing false claims with the government. The complaint lays out the course of patent prosecution for the ’438 patent, whose claims were repeatedly rejected on obviousness grounds under 35 U.S.C. § 103. Defendant patent owner Janssen asserted so-called “secondary considerations” or objective indicia of non-obviousness in response to these rejections, specifically that the commercial success of Zytiga rebutted the prima facie obviousness case established by the Office. The course of prosecution of the application (U.S. Application No. 13/034,340) was not excessively lengthy, the application having been filed in February 2011 and granted on September 2, 2014. The defect in applicants’ assertion of commercial success is purportedly due to a failure to properly establish commercial sales with the benefits of the putatively obvious invention to be patented, which the complaint further states must show “increasing market share and the maintenance of such shares in the face of competitors and other adverse market forces,” citing Gaderma Labs L.P. v. Tolmar Inc. and Ashland Oil v. Delta Resins & Refractories. (The complaint includes the further caveat that the success cannot be due to blocking patents or other “reasons other than the merits of the claimed invention.”)
-
Security (Confidentiality/Integrity/Availability)
-
Many server hardening or server security guides directly start with installing software packages and changing some configuration files. This is fine for experienced server administrators. However, people who try to set up their first server hit on problems and most importantly they very likely forget things that aren’t covered by such guides.
So, please do not start to set up your first server by blindly following any guide on the internet (including our guides!).
-
I need all reviews back by 5 August. This gives me time (if everything goes well) to have the book in print for vBSDCon. Assuming they accept my proposal, that is.
-
Basically, this doesn’t strike me as even a tiny bit interesting. The template of ‘$EVILCODE does $STUFF to your system if you run it’ raises the obvious question of ‘What about _not_ running it?’ By and large, code doesn’t run itself, so failure to answer that ‘one interesting question’ means the interesting bit got omitted.
-
EvilGnome Is A Linux Spyware That Records Audio And Steals Your Files [Ed: FOSSBytes has moved on from pushing non-FOSS misinformation to actually doing anti-FOSS FUD. Painting malware one needs to actually install as a real threat.]
-
A veteran Linux kernel developer at Germany-based SUSE says the one thing that keeps him and his team busy these days is CPU vulnerability mitigations…
-
Security updates have been issued by Debian (bzip2), Fedora (freetds, kernel, kernel-headers, and knot-resolver), openSUSE (bubblewrap, fence-agents, kernel, libqb, libu2f-host, pam_u2f, and tomcat), Oracle (vim), SUSE (kernel, LibreOffice, libxml2, and tomcat), and Ubuntu (libmspack and squid, squid3).
-
Many of us have extremely sensitive data on our systems. Emails to family, medical or bank records, Bitcoin wallets, browsing history, the list goes on. Although we have isolation between our user account and root, we have no isolation between applications that run as our user account. We still, in effect, have to be careful about what attachments we open in email.
Only now it’s worse. You might “npm install hello-world”, and audit hello-world itself, but get some totally malicious code as well. How many times do we see instructions to gem install this, pip install that, go get the other, and even curl | sh? Nowadays our risky click isn’t an email attachment. It’s hosted on Github with a README.md.
Not only that, but my /usr/bin has over 4000 binaries. Have every one been carefully audited? Certainly not, and this is from a distro with some of the highest quality control around. What about the PPAs that people add? The debs or rpms that are installed from the Internet? Are you sure that the postinst scripts — which run as root — aren’t doing anything malicious when you install Oracle Virtualbox?
[...]
One thing a person could do would be to keep the sensitive data on a separate, ideally encrypted, filesystem. (Maybe even a fuse one such as gocryptfs.) Then, at least, it could be unavailable for most of the time the system is on.
Of course, the downside here is that it’s still going to be available to everything when it is mounted, and there’s the hassle of mounting, remembering to unmount, password typing, etc. Not exactly transparent.
I wondered if mount namespaces might be an answer here. A filesystem could be mounted but left pretty much unavailable to processes unless a proper mount namespace is joined. Indeed that might be a solution. It is somewhat complicated, though, since nsenter requires root to work. Enter sudo, and dropping privileges back to a particular user — a not particularly ideal situation, and complex as well.
Still, it might well have some promise for some of these things.
-
Transparency/Investigative Reporting
-
Workers, peasants and youth in Ecuador began a five-day strike Monday against the draconian policies of the Lenín Moreno administration, which is seeking to strengthen its ties to Washington and its military-intelligence apparatus.
The strike constitutes the first major industrial action in the world demanding the freedom of Julian Assange. The demand is presented in the framework of growing opposition to the attacks against social and democratic rights associated with the Moreno administration’s totally servile policy toward US imperialism.
[...]
The organizers of the strike include the Peasants National Movement (FECAOL), the main Workers Union Federation (FUT), dozens of activist organizations grouped in the National Citizens’ Assembly (ANC), and Social Compromise, the new party of ex-president Rafael Correa. They claim this is the broadest strike in 14 years.
On Tuesday, the main day of planned demonstrations, protesters set up dozens of roadblocks—from the coastal highways of Manabí, Guayas and El Oro, surrounding the port city of Guayaquil, to the capital of Quito, east on the PanAmerican Highway to Colombia and south to the Morona Santiago province and Perú along the Andean range—that brought the country to a virtual standstill.
Most of the signs of protesters were hand-made and focused on firings, social cuts and the role of the “International Misery Fund,” as the International Monetary Fund (IMF) is labelled, in the cities, and on land, water rights and mining concessions in the rural areas. Ecuadorian migrants in Bolivia, Spain, the United States and other countries carried out rallies in support of the strike.
About 11,800 public employees, mostly in the health care sector, were fired during Moreno’s first year in office as part of the austerity conditions of a $4.2 billion loan approved by the IMF in March.
Another issue raised in the strike call is “the rejection of the handing over of the Galapagos for the interests of North American imperialism,” referring to a recent agreement with the Pentagon to use the Ecuadorian archipelago, designated by the UN as a biosphere reserve and World Heritage Site, as an air base.
-
Environment
-
All 83 counties in Michigan are getting hotter, and a report released Tuesday predicts it will only get worse, as the number of days with heat indexes over 90 degrees will quadruple in the next 20 years.
The report from the Union of Concerned Scientists, a Massachusetts-based nonprofit science advocacy group, predicts extreme temperatures will soar nationwide if nothing is done to curb climate change.
-
Van Tilburg says all those vacationers are causing damage to the island’s delicate ecosystem, on top of “disrespecting the statues by climbing on them, sitting on graves, and trampling preserved spaces.” There are signs reminding people to act like adults and stay the heck off the statues, but noses that large are just begging someone to step right up and pick a winner.
And though the Moai may be huge and heavy, the volcanic rock from which they were carved is actually quite porous and easily damaged … as rock goes, anyway. Now, in addition to being slowly destroyed by wind, rain, and lichen, their demise is being accelerated by a bunch of outsiders climbing all over them and shoving fingers up their snot boxes. Such is the price of progress, and by “progress” we mean “a Facebook profile picture you’ll change in two weeks.”
-
Wildlife/Nature
-
For years now conservationists have warned that many of Madagascar’s iconic lemur species face the risk of extinction due to rampant deforestation, the illegal pet trade and the emerging market for the primates’ meat.
Yes, people eat lemurs, and the reasons they do aren’t exactly what we might expect.
One 2016 study found — perhaps not surprisingly — that Madagascar’s extreme poverty drives the poorest families to hunt and eat lemurs and other wildlife. The study was conducted in Masoala National Park, home to ten of Madagascar’s 110-plus lemur species, including several critically endangered species.
Local hunters know that killing lemurs is against the law, but there’s a reason that doesn’t stop them. The study, published in Biological Conservation, found that “almost all children in lemur-hunting households were malnourished.” Wild-caught meat, tragically, is the only readily available solution for hungry families. The authors concluded that “unless lemur conservation efforts on the Masoala [peninsula] prioritize child health, they are unlikely to reduce lemur hunting or improve lemur conservation.”
Although poverty is endemic in Madagascar, it’s not the only factor driving lemur consumption. Two additional studies published that year in PLOS One and in Environmental Conservation revealed that Madagascar’s wealthier and middle-class citizens are equal participants. The studies uncovered a massive supply chain that transports meat from lemurs and other endangered species into urban and semi-urban areas, where it is sold in restaurants, open-air markets and even supermarkets.
-
Finance
-
Ironically, such values-based arguments, however one feels about them, are undercut by rising inequality. As the rich pull away from the rest, their increased political power may stymie tax rises needed to fund universal public services. Meanwhile for progressive politicians the need to target available funds at the worst-off in society grows more urgent; in America, the argument that the children of billionaires should not receive a government-funded education takes on greater moral as well as practical weight. It is probably no coincidence that tuition fees are lowest in places with the most equal income distributions (see chart). Strong safety-nets compress the income distribution. But inequality may also make the sorts of comprehensive public services that underpin egalitarian societies ever harder to sustain.
-
Privacy/Surveillance
-
To quote a friend: “If you upload your address book to ‘the cloud’, I don’t want to be in it.” (And while I think so, I’m not angry for past actions. But if would like you to be considerate in the future.)
As an SMS user from 1997 until today it’s very interesting to taste some of the same survailance as the rest of the the whole planet. And I have to admit, it’s tasty, but consciously I know it’s tasty in a bitter-sweet way. What also puzzled me that Telegram chats are unecrypted by default. In 2019.
And now let’s do something about it. Or sing this karaoke version of the yellow submarine: we all live in global world surveillance, global world surveillance. Cheers!
-
The European Commission has announced a formal anti-trust investigation into Amazon to find out whether the firm’s use of sensitive data from independent retailers, who use its marketplace, breaches competition rules within the political bloc.
-
Artificial intelligence, machine learning and other technologies are enabling detailed studies of patient information that weren’t dreamed of until a few years ago. Now, researchers, drugmakers and tech companies are clamoring for access to data to help streamline patient care, develop better products — and even prevent serious disease.
-
In order to operate the application, users must provide the company full and irrevocable access to their personal photos and data. According to its privacy policy, users grant FaceApp license to use or publish content shared with the application, including their username or even their real name, without notifying them or providing compensation.
Furthermore, it is unclear how long FaceApp retains a user’s data or how a user may ensure their data is deleted after usage. These forms of “dark patterns,” which manifest in opaque disclosures and broader user authorizations, can be misleading to consumers and may even constitute a deceptive trade practices. Thus, I have serious concerns regarding both the protection of the data that is being aggregated as well as whether users are aware of who may have access to it.
-
Indeed, China does not share the United States’ values on individual freedoms and privacy. And yes, breaking up Facebook could weaken its products like WhatsApp, providing more opportunities for apps like Chinese tech giant Tencent’s WeChat to proliferate.
But letting Facebook off the hook won’t solve the problems China’s influence poses to an open and just internet. Framing the issue as “strong regulation lets China win” creates a false dichotomy. There are more constructive approaches if Zuckerberg seriously wants to work with the government on exporting freedom via the web. And the distrust Facebook has accrued through the mistakes it’s made in the absence of proper regulation arguably do plenty to hurt the perception of how American ideals are spread through its tech companies.
-
The Ugandan police statement cited a July 8 Facebook post by Kabuleta criticizing Ugandan President Yoweri Museveni as the reason for his arrest, and said police will “continue using the acquired capabilities to monitor comments on social media.”
The police statement alleged that the post was a criminal violation of Section 25 of Uganda’s 2011 Computer Misuse Act, which pertains to “[a]ny person who willfully and repeatedly uses electronic communication to disturb or attempts to disturb the peace, quiet or right of privacy of any person with no purpose of legitimate communication.”
-
To reiterate the madness at hand: Your name, exact age, address, vehicle make, vehicle model, vehicle year, vehicle registration status, weight, height, eye color, hair color, and more is all for sale at the right price and used to target you in direct mailer advertisements – and there is nothing you can do about it because it is essentially compulsive to get an identification card to be a productive member of society. When the government can’t be trusted, it’s necessary to take privacy into your own hands.
-
I-Team Investigator Adam Walser obtained records showing the state sold information on Florida drivers and ID cardholders to more than 30 private companies, including marketing firms, bill collectors, insurance companies and data brokers in the business of reselling information.
-
DWeb Camp is going on from July 18-21 in Pescadero, CA.
Q: What excites you most about the decentralized web?
A: The Internet for me has always been a vision of autonomy among equals — being able to create, share and communicate with your peers as quickly and easily as possible.
Somehow, so much of that communication now goes through a handful of chokepoints: silos where the data of our lives goes in, but never escapes.
Decentralizing — or re-decentralizing — the Web, is about continuing the project, after a brief diversion into the Google/Amazon/Facebook world.
-
The pair began collaborating on what they called BMW Group China High Performance D3 Platform, which is scheduled to begin operations by the end of the year, according to a statement on Friday. Tencent operates one of the largest cloud platforms in China, providing services from data storage to online computing.
-
-
Managing IP reports from the England & Wales High Court as discussions on database rights and copyright, plus a debate over the inadvertent revealing of trade secrets, formed the opening of a dispute pitting mapping agency Ordnance Survey against an SME
A court case pitting Ordnance Survey (OS) against a geospatial data specialist may have to be heard largely in private after a disagreement between counsel and the judge over whether a public hearing could reveal trade secrets inadvertently.
-
Freedom of Information/Freedom of the Press
-
According to CPJ research, journalists have been imprisoned, threatened, and detained by all parties to the conflict in Yemen.
-
Civil Rights/Policing
-
A Moroccan court on Thursday sentenced three suspected jihadists to death for the murders of two Scandinavian women beheaded while on a hiking trip in Morocco.
-
Another defendant received a life sentence, while 20 others were sentenced to terms ranging from five to 30 years on charges of being accessories to the crime, abetting or propagating material that condoned the attack, the Medias24 news website reported. The verdicts can be appealed.
-
Morocco has had a freeze on executions since 1993.
-
It got so bad that Nuril recorded one of the explicit phone calls as evidence of the sexual harassment she said she endured on more than 50 occasions, starting in 2012.
The recording, she says, was forwarded by a colleague to the local Department of Education. Shortly after, Nuril was fired from her job and her boss sued her for defamation.
Nuril — who says she put up with the sexual harassment for more than a year — spent two months in jail during the initial investigation in 2017.
-
Needless to say, this has raised “significant concerns” by the sort of people most likely to be concerned about false positives. Needless to say, this does not include the London Metropolitan Police, which continues to deploy this tech despite its only marginally-improved failure rate.
In 2018, it was reported the Metropolitan Police’s tech was misidentifying people at an astounding 100% rate. False positives were apparently the only thing the system was capable of. Things had improved by May 2019, bringing the Met’s false positive rate down to 96%. The sample size was still pretty small, meaning this had a negligible effect on the possibility of the Metropolitan Police rounding up the unusual suspects the system claimed were the usual suspects.
Perhaps this should be viewed as a positive development, but when a system has only managed to work its way up to being wrong 81% of the time, we should probably hold our applause until the end of the presentation.
As it stands now, the tech is better at being wrong than identifying criminals. But what’s just as concerning is the Met’s unshaken faith in its failing tech. It defends its facial recognition software with stats that are literally unbelievable.
-
Digital Restrictions (DRM)
-
Netflix has certainly enjoyed its flight to the top of the heap of the streaming space, now streaming video to 60.1 million US subscribers. That’s more than pay TV giants like AT&T or even Comcast, who’ve done their best (via usage caps and lobbying shenanigans) to unsuccessfully hamper Netflix’s meteoric rise.
But there’s some indication that the company may have started to reach its high water mark. Netflix this week revealed it lost 130,000 subscribers last quarter, the company’s first quarterly subscriber loss in history. The losses come despite Netflix having spent $3 billion on programming last quarter, and another $600 million to market its its wares.
-
Monopolies
-
The European Commission has hit American processor maker Qualcomm with a €242 million ($385.6 million) fine for abusing its market dominance in 3G baseband chipsets.
-
Uber has never made a profit and has actually lost over $14 billion in the last four years alone. In the prospectus, Uber insists that these five major metropolitan markets are essential to its path to profitability. In reality, what Uber actually relies on is the $20 billion in funding raised over the past decade and the $8 billion in new investments after going public in May. This investor welfare covers the cost of low prices that render each rideshare trip unprofitable, of driver incentives to combat the high turnover rate of drivers, and of promotions used to drive up demand.
The investors have continued piling that money onto Uber because they believe Khosrowshahi when he talks about becoming the “Amazon of transportation” or the platform on which all transportation happens. In other words, a monopoly. After achieving a monopoly, some commentators warn that Uber will then charge whatever price it wants and use its dominant position to both pay back investors and kill potential competitors. As an added bonus, Uber promises it will turn its labor costs to zero by deploying a fleet to autonomous vehicles (which may prove to be difficult to widely adopt). That is Uber’s path to profitability.
-
Patents and Software Patents
-
On July 3, the Federal Circuit issued a per curiam Order in Athena Diagnostics, Inc. v. Mayo Collaborative Services, LLC, denying a petition for rehearing en banc filed by Plaintiffs-Appellants Athena Diagnostics, Inc., Oxford University Innovation Ltd., and the Max-Planck-Gesellschaft zur Forderung der Wissenschaften E.V. The Court also denied Plaintiffs-Appellants a panel rehearing.
The four page per curiam Order was accompanied by eight opinions, four concurring in the denial of the petition and four dissenting in the denial of the petition, adding an additional 82 pages to the Order. The four concurring opinions were authored by Circuit Judges Lourie, Hughes, Dyk, and Chen, with Chief Judge Prost and Circuit Judges Reyna, Taranto, and Hughes joining in one of the concurrences and Circuit Judge Chen joining in one concurrence and several parts of another. The four dissenting opinions were authored by Circuit Judges Moore, Newman, Stoll, and O’Malley, with Circuit Judges O’Malley and Stoll joining in one of the dissents and Circuit Judge Wallach joining in three of the dissents. Thus, a total of seven members of the Court (Chief Judge Prost and Circuit Judges Lourie, Dyk, Reyna, Taranto, Chen, and Hughes) authored or joined opinions concurring in the denial, and a total of five members (Circuit Judges Newman, Moore, O’Malley, Wallach, and Stoll) authored or joined opinions dissenting in the denial.
[...]
Judge O’Malley begins her opinion by providing some “historical perspective” on “the ‘invention requirement’—itself ‘invented’ by the Supreme Court rather than Congress or the Constitution,” noting that “[i]f the invention requirement and its criticisms sound familiar, that is because they are.” And Judge O’Malley suggests that even though, in 1952, “Congress attempted to address these criticisms by amending the Patent Act to replace the ill-defined and judicially-created invention requirement with the more workable anticipation and obviousness tests codified in Sections 102 and 103,” “the search for an inventive concept—now enshrined in the § 101 inquiry via Mayo—calls back to the invention requirement that Congress quite deliberately abrogated through the Patent Act of 1952.”
-
Back in 2018, Heat Tech sued Koehler Paper in N.D. Georgia federal court requesting correction of inventorship under 35 U.S.C. § 256 as well as damages for unjust enrichment and conversion under Georgia state law. U.S. Patent No. 9,851,146. The basic background of the lawsuit was that Heat Tech’s president (Plavnik) invented the paper-drying mechanism that was then disclosed to Koehler as part of a collaboration evaluation. In addition, Heat Tech argued that almost all of the information disclosed in Koehler’s patent was included in a prior Heat Tech patent application.
At the district court, Koehler filed a motion to dismiss the case — arguing that Heat Tech’s actual claim is for invalidity and that an inventorship-correction lawsuit is not appropriate when the same alleged facts would invalidate the patent for lack of novelty or obviousness. The district court denied the motion to dismiss, but agreed to certify the question for appeal to the Federal Circuit — noting some disagreement among the courts on the state of the law.
[...]
On appeal now, the Federal Circuit HeatTechDecisionhas denied the 1292(b) petition and effectively indicated that the district court’s decision was correct. In particular, the appellate panel found no “substantial ground for disagreement” because Section 256 jurisdiction “does not depend on whether the patent may be shown to be invalid.” Slip op. The appellate panel noted its lack of prior precedent directly and expressly on-point, but concluded that prior cases compel the answer. For example, in Frank’s Casing Crew & Rental Tools, Inc. v. PMR Techs., Ltd., 292 F.3d 1363, 1377 (Fed. Cir. 2002), the court wrote that an inventorship action could be maintained for an unenforceable patent.
-
The doctrine of equivalents, a Supreme Court-created patent doctrine of vintage similar to inequitable conduct, arose in Graver Tank & Mfg. Co. v. Linde Air Products Co., 339 U.S. 605 (1950) (an uncharacteristically pro-patent decision by the Court, the doctrine recognized that an “unscrupulous copyist” could practice a claimed invention without literal infringement in some circumstances, and as a consequence the patent right could be turned into a “hollow and useless thing”)…
[...]
The District Court arrived at this conclusion despite evidence of differences in polarity, the presence of different functional groups, and the capacity to interact with crosslinking groups between polyisobutylene and acrylate-based and silicone-based adhesives, which the Court held were not substantial based on comparisons between Neupro and Defendants’ generic alternatives.
Regarding Defendants’ invalidity arguments, the panel affirmed the District Court’s decision that failed prior art efforts to develop rotigotine transdermal patches neither anticipated nor rendered obvious the claims of the ’434 patent. That art did not disclose a water-free patch having rotigotine in free base rather than salt form and thus comprised significant amounts of water (10-15% w/w) to solubilize the salt form of the drug. And none of the other art asserted by Defendants “fill[ed] the gap” in this disclosure, because they did not disclose rotigotine or other anti-Parkinson’s disease drugs, and in particular did not disclose the free base form of the drug in the absence of water in the formulation. The Federal Circuit also affirmed the District Court’s finding that other art, disclosing transdermal rotigotine administration by direct application to skin and transdermal patches not comprising water, did not render the claims of the ’434 patent obvious because there was no “adequate rationale for combining the references’ teachings” nor reasonable expectation of success at treating Parkinson’s disease using a transdermal patch. The opinion finds the cited art as being “a list of thousands of possibilities out of which a skilled artisan would have to select the claimed combination as one to try” and thus would not have provided the skilled worker with a reasonable expectation of successfully achieving the claimed patch.
Turning to the ’414 patent, the Federal Circuit affirmed the District Court’s determination that the claimed rotigotine polymorph was used in the art prior to the earliest claimed priority date based on the presence of the polymorph in patches produced prior to that date, which constituted prior public use of the polymorph. Because (as with all factual determinations) appellate review of questions of fact before the district court is reviewed for clear error, the Federal Circuit found no clear error that Defendants had shown anticipation by clear and convincing error, and thus affirmed.
-
The English Court of Appeal yesterday handed down judgment in ZyXEL v TQ Delta [2019] EWCA Civ 1277. Guest blogger, Tristan Sherliker, reports:
This appeal judgment tells a tale of tactics and legal agility. After completely waiving any right to rely on RAND undertakings, ZyXEL have tested the bounds of the developing English law.
When a defendant has lost a patent trial, when would they decide that submitting to an injunction is better than taking a licence?
This claim was about enforcement of a number of TQ Delta’s patents relating to the ITU-T’s DSL telecoms standards.
Since the patents in suit had been declared essential to the ITU-T standards, they were encumbered by a RAND undertaking — that is, an undertaking made by TQ Delta that it would grant a licence to the patents on Reasonable and Non-Discriminatory terms.
[...]
Potentially of wider significance is the question of how this ruling might interplay with the pending cases of Unwired Planet v Huawei and Conversant v Huawei and ZTE. At the time of writing, the Court of Appeal’s decisions are under appeal and to be heard before the Supreme Court in October 2019. The defendants (appellants) in both cases have criticised the currently-developing law before the High Court and Court of Appeal as being a case of jurisdictional expansionism, which they ask the Supreme Court to overturn.
It seems likely that the Supreme Court in those cases will be assisted by Floyd LJ’s judgment and analysis here. Specifically, his statement of the principles extracted from Unwired Planet makes clear what the limits of the prevailing law are, and that the effect of the test will always depend on the facts of the case. What is more, he makes clear the Court of Appeal’s view that FRAND does not only operate on a global scale, but that a national licence can be FRAND in the appropriate circumstances. He made this emphatic and disagreed with the judge at first instance in that regard. Equally however, he emphasised that in some cases, a global licence is an appropriate solution to the FRAND question.
But perhaps most profoundly, the decision in ZyXEL v TQ Delta illustrates by example the bounds of the developing case law under Unwired Planet. It may be taken to indicate that this is not an out-of-control expansionism, but that the tests operate within limits. Here, the Court of Appeal has applied the same law that previously benefited the patent holders in their cases — and it has shown that the right facts may well turn the tide in favour of the implementer.
-
Japan Patent Office (JPO) published an annual report on July 12 2019. According to the report, 313,567 patent applications were filed in Japan in 2018. And, 253,000 patent applications among them were filed by domestic applicants. It slightly decreased than last year.
[...]
This report also shows the utilization of Japanese patents. The utilization ratio in 2017 is 48.4%. This includes licensing to other parties. So, more than half of Japanese patents are not utilized. Also, it states that 37.0% of patents are maintained only for defensive purpose, and they are not used by themselves or other parties. As a result, the remaining 14.5% of patents are maintained for nothing. IP department must be asked for an explanation on that by their higher management sooner or later. Then, such patents may be withdrawn or put in the market.
-
The term of the Juncker Commission is nearing its end, and while I’m far from enthusiastic about his successor, I’m relieved that neither that conservative-in-name-only Weber nor “Poor Man’s Bernie” (Timmermans, who’s less reasonable than the real Senator Sanders) got the top job. However, my preference among reasonably likely candidates would have been Margrethe Vestager, the EU’s competition commissioner, as I made clear on social media, despite disagreeing with some parts of her regulatory activism, such as the “state aid” case against Ireland and certain aspects of the Android case.
Last year I wrote that Qualcomm “won” the “Antitrust Grand Slam” when the European Commission joined the U.S. Federal Trade Commission and a couple of Asian regulators in fining Qualcomm. The Commission imposed a fine of €997 million ($1.2 billion) over exclusionary conduct in the years 2011-2016 when Apple was precluded from sourcing baseband chipsets from Qualcomm’s competitors such as Intel. That exclusive dealing is one of the four counts on which the U.S. FTC defeated Qualcomm in court this year (my previous post discussed some support Qualcomm got for its motion for an enforcement stay).
Yesterday’s fine, based on a supplemental Statement of Objections that came down in July 2018, amounts to “only” 242 million euros (272 million U.S. dollars), so it now got a “double whammy” from the EU. The latest one is about predatory pricing. At first sight, that’s counterintuitive. We all know that the allegations usually brought against Qualcomm, besides exclusive dealing, are all about maximizing revenues even in the very short term, not just for the long haul. However, we have to keep in mind that Qualcomm is not just “a monopoly” (in the sense of U.S. antitrust law; over in the EU, this is called “market dominance”), but a dual monopoly: its SEP portfolio bestows monopolistic rights (not only on Qualcomm but also on any other patent holder, provided at least one patent in a portfolio is truly standard-essential), as does its position in certain segments of the chip market, and those monopolies are mutually-reinforcing as a result of Qualcomm’s practices.
-
In a statement today, the Courts and Tribunals Judiciary announced his death with “great sadness.”
“On behalf of the entire judiciary, the Lord Chief Justice wishes to record his admiration for Sir Henry’s outstanding contribution to the administration of justice, which has been so tragically cut short.”
After studying jurisprudence at Hertford College, Oxford and obtaining an LLM from the University of British Columbia in Canada, Mr Carr begun his career as a barrister in 1982. He took silk 16 years later, in 1998, specialising in all areas of IP law.
[...]
Just over three weeks ago, on June 27, Managing IP interviewed Mr Carr at the Rolls Building in London. We found him to be warm, accommodating and eloquent. It goes without saying that as a judge at the England & Wales High Court who had previously been a successful IP barrister, he was one of the finest IP minds in the country.
During conversations before the interview, every lawyer we spoke to made it clear how highly regarded Mr Carr was. They said they enjoyed appearing in front of the judge and that he was a very nice man. This was obvious from our interview, in which Mr Carr spoke passionately and thoughtfully on a range of topics.
-
In-house counsel consider whether a new IP right for software inventions could help the UK compete after Brexit and discuss whether IP is enough of a priority for decision makers
In-house lawyers in the insurance and sustainable transport arenas say that developing new areas of business focus – including through full scale rebrands – prompts them to consider their approach to IP enforcement and administration.
-
Trademarks
-
Avid followers of Formula 1 racing are likely to be familiar with the energy drink brand “Rich Energy”, and its colourful co-founder William Storey. In March 2018 it was reported that the company was in talks to buy the Force India team out of administration (the purchase did not ultimately proceed). Then, in October 2018, Rich Energy became the title sponsor of the Haas team, and quickly grabbed attention through its bold claims and marketing style.
But there seem to have been a few bumps in the road [sorry]. In recent weeks, relations between Haas and Rich Energy have broken down, and the sponsorship has been terminated. In parallel, a boardroom battle between Storey and his investors has resulted in Storey being forced out as a director of Rich Energy Limited (REL). It also seems that Rich Energy will now instead be “Lighting Volt” (despite the fact that a UK trade mark for RICH ENERGY was filed but two weeks ago). Goodbye, Rich Energy – we hardly knew ye.
Unfortunately, REL still faces a ghost of social media posts past. Along with Mr Storey, it is a defendant in a claim [IP-2019-000064] recently issued in the English High Court by Red Bull GmbH (RBG), owner of Haas’ rival F1 team Red Bull Racing. RBG accuses REL and Mr Storey of trade mark infringement.
-
Copyrights
-
Sometimes ideas based in good intentions are so poorly thought out that they would actually make things worse. This seems to be especially prevalent in the copyright world of late (I’m looking at you, Articles 15 and 17 of the EU Copyright Directive), but the most recent example is the Copyright Alternative in Small-Claims Enforcement Act of 2019 (CASE Act). This bill intends to give photographers and small businesses a more streamlined way to enforce their rights with respect to online infringements by reducing the costs and formalities associated with bringing infringement claims in federal court. Pursuing infringement claims can be expensive and time-consuming, so this may sound like a good thing, especially for rightsholders with limited resources. It is not.
The CASE Act would establish a quasi-judicial body within the Copyright Office (part of the legislative branch) empowered to hear a limited set of claims, make “determinations” about whether those claims are valid, and assign “limited” damages. The bill structures the process so that it is “voluntary” and lowers the barriers to filing claims so that plaintiffs can more easily defend their rights. Without the “quotes”, this description might sound like a reasonable approach, but that’s because we haven’t talked about the details. Let’s start at the top.
The bill would establish a Copyright Claims Board (CCB) in the Copyright Office. This would not be a court and would be entirely separated from the court system. The only option to appeal any of the CCB’s determinations, based on the CCB’s legal interpretation, would be to ask the Register of Copyrights to review the decision. It would be theoretically possible to ask a federal court to review the determination, but only on the grounds that the CCB’s determination was “issued as a result of fraud, corruption, misrepresentation, or other misconduct” or if the CCB exceeded its authority. So if you disagree with the CCB’s legal interpretation, or even its competence to make a decision, you are out of luck. This raises red flags about potential due process and separation of powers problems under the Constitution.
-
Creative works made by animals and discussions on their copyright ownership have frequently featured on the IPKat, be it Ella, the extensively covered selfie-taking black macaque [here, here] or the animal orchestra and its related questions of copyright ownership [here]. Noting the increasing attention paid to animal-created works, we consider whether such creations can and should be folded within the copyright system. We argue that, in some circumstances, animal-created works can be protected by a form of sui generis protection, which does not involve the strict standards of the conventional copyright regime.
We suggest that animal-created works have a spectrum of their own, on which independent creativity of the animal lies on one end while a degree of human agency interaction lies on the other. For the purposes of further discussion, we divide animal-created works into two categories: works created by animals acting independently, and works created by an animal under some form of human intervention. We propose a different framework of protection for each type of animal-made works. The welfare of the animal is a concern at the centre of each framework.
-
Perhaps the most interesting one there is the music. Spotify says it has over 50 million tracks on its service. That means a 256 terabyte microSD could probably hold every track on Spotify, and thus most of the recorded music that is generally available in a digital form. Even with today’s one terabyte card, you can probably store the complete catalog of songs in a particular style or genre, which is what many people will be most interested in.
In any case, assuming Moore’s Law continues to hold, it will soon be possible to buy a 256 terabyte microSD card. Yes, it will be pricey to begin with, but progressively cheaper. At that point, moves to stop unauthorized sharing of music online will be even more pointless than they are now. People won’t need to download lots of stuff from dodgy sites any more; they’ll just find a friend who has a 256 terabyte microSD card loaded up with all recorded music, and make a copy. After that, they just need to update the parts that interest them — or find someone with a more recent complete collection.
-
As the EFF’s Parker Higgins wrote:
Simply put, Section 1201 means that you can be sued or even jailed if you bypass digital locks on copyrighted works—from DVDs to software in your car—even if you are doing so for an otherwise lawful reason, like security testing.;
Section 1201 is obviously a big problem for software preservation, especially when it comes to games.
Permalink
Send this to a friend
Posted in Free/Libre Software at 4:01 am by Dr. Roy Schestowitz
“I think the idea of art kills creativity.”
–Douglas Adams
“I’m going to kill you” isn’t creative expression (and some intentionally misinterpret obvious jokes as ‘threats’)
Summary: Free speech is certainly under attack and the debate is being framed within the context of Nazism; but this overlooks the fact that there are actual death threats (unlike the above) and calls for genocide in the mix
“F-Droid abandons neutrality to censor Gab oriented apps,” LXer said this morning (there’s more to that effect in recent LXer comments). It pointed to this week’s statement from F-Droid, which said: “F-Droid won’t tolerate oppression or harassment against marginalized groups. Because of this, it won’t package nor distribute apps that promote any of these things. This includes that it won’t distribute an app that promotes the usage of previously mentioned website, by either its branding, its pre-filled instance domain or any other direct promotion. This also means F-Droid won’t allow oppression or harassment to happen at its communication channels, including its forum. In the past week, we failed to fulfill this goal on the forum, and we want to apologize for that.”
One person said things along the lines of [1, 2], “if you are at war against free software, f-droid has just handed you a new weapon” and “then there were three freedoms– no more freedom 0.”
“Death threats aren’t to be respected or tolerated.”I spent nearly a year cross-posting in Gab before realising that the site had truly become toxic. Some time last year or the year before that there was little left in the site other than extremists, who issued even death threats to me. Then they started banning people who opposed the extremists as though the “trolls” were in fact decent people. I wrote about it last year in my personal blog and similar conversations could be found online. Here in Techrights we’ve long been free speech absolutists who don’t regard physical threats and/or violence to be “speech”; that’s crossing a line, based on underlying laws that forbid it explicitly. There’s also a news story to that effect right now [1,2]. Death threats aren’t to be respected or tolerated. Only sick people would defend such public discourse. █
“The essence of all art is to have pleasure in giving pleasure.”
–Dale Carnegie
Related/contextual items from the news:
-
The feds charged Darryl Varnum in late June after he told the Congresswoman he was ‘gonna kill your ass if you do that bill,’ report The Beast’s Jackie Kucinich and Lachlan Markay.
-
“I’m gonna kill your ass if you do that bill. I swear,” Varnum’s voicemail began. “I will fucking come down and kill your fucking ass. And you’re a Congressperson, that’s fine. I hope the fucking FBI, CIA and everybody else hears this shit.”
Permalink
Send this to a friend
Posted in News Roundup at 1:26 am by Dr. Roy Schestowitz

Contents
-
-
The current and future potential for Linux based systems is limitless. The system’s flexibility allows for the hardware that uses it to be endlessly updated. Functionality can, therefore, be maintained even as the technology around the devices change. This flexibility also means that the function of the hardware can be modified to suit an ever-changing workplace.
For example, because the INSYS icom OS has been specifically designed for use in routers, this has allowed it to be optimised to be lightweight and hardened to increase its security.
Multipurpose OS have large libraries of applications for a diverse range of purposes. Great for designing new uses, but these libraries can also be exploited by actors with malicious intent. Stripping down these libraries to just what is necessary through a hardening process can drastically improve security by reducing the attackable surfaces.
Overall, Windows may have won the desktop OS battle with only a minority of them using Linux OS. However, desktops are only a minute part of the computing world. Servers, mobile systems and embedded technology that make up the majority are predominately running Linux. Linux has gained this position by being more adaptable, lightweight and portable than its competitors.
-
Desktop
-
It has Android Apps (Google Play) and Linux Apps (crostini) support and it will receive auto-updates until September 2021.
-
It has Android Apps (Google Play) and Linux Apps (crostini) support and it will receive auto-updates until June 2024.
-
Back in March, I reported on an effort that would enable resizing of the Linux partition for Crostini-supported Chromebooks. At that time, I expected the feature to land in Chrome OS 75. I’ve checked for the feature now that Chrome OS 75 is available (again) and it’s nowhere to be seen. That’s because it was recently pushed back to Chrome OS 78.
[...]
However, other aspects need to be considered: Storage of large media files, for example, or enabling Google Drive synchronization with the Chrome OS Files app for offline file access. And then there are Android apps, so of which – particularly games – can require one or two gigabytes of space.
So far, I haven’t run into any storage issues on my Pixel Slate with 128 GB of data capacity. But it’s easy to see that the Linux container is using up the bulk of my tablet’s storage: As I understand it, /dev/vdb is the Crostini container with Linux, which is 88 GB in size with 58 GB free.
-
Server
-
In what sounds surprising, a Linux Kernel Developer who has been working with Microsoft has revealed that Microsoft’s Azure Cloud platform has more number of Linux-based operating systems than the Windows-based operating systems. The details came up on an Openwall Open-source Security List which had an application urging Microsoft developers to join the list. The Security list left open an argument that Microsoft plays a key role in Linux development.
-
SUSE CaaS Platform 4, our next major release is now in beta. It has major architectural improvements for our customers. In the process of planning and developing it, we took a close look at bootstrapping clusters and managing node membership, and we listened to our customers. One of the things we heard from many of them was that they wanted a way to deploy multiple clusters efficiently, by scripting the bootstrap process or by integrating it into other management tools they use.
To address this, we committed even more strongly to our upstream participation in Kubernetes development. Instead of building SUSE-specific tools as we had in earlier versions, we contributed the efforts of SUSE engineers to the upstream kubeadm component, helping it bridge the gap between its current state and the abilities we had previously implemented in the Velum web interface. Our bootstrap and node management strategy in version 4 is built on kubeadm.
-
As the Kubernetes API evolves, APIs are periodically reorganized or upgraded. When APIs evolve, the old API is deprecated and eventually removed.
-
IBM
-
We are pleased to announce that the Red Hat Learning Community has reached more than 10,000 members! Since its launch in September 2018, the community has shown itself to be a valuable hub for those seeking to share knowledge and build their open source skill set.
When we first started out, this was just an idea. We set out to support, enable, and motivate new and experienced open source learners as they learn how to work with Red Hat technologies, validate their technical skill sets, build careers and pursue Red Hat Certifications. We soft launched the community in July 2018 and invited 400 Red Hat Training instructors, students, curriculum developers and certifications team members to jump-start community discussion boards and earn a founding member badge.
-
-
In early May right before the release of Red Hat Enterprise Linux 8.0 we saw the public beta of Oracle Linux 8 while today Oracle Linux 8.0 has been promoted to stable and production ready.
Oracle Linux 8.0 is available today as Oracle’s re-build of Red Hat Enterprise Linux 8.0 and the features it brings while adding in some extras like the Unbreakable Enterprise Kernel option along with D-Trace integration and other bits.
The default kernel shipped by Oracle Linux 8.0 is a Linux 4.18 derived kernel that remains compatible with Red Hat’s official RHEL8 kernel package.
-
Red Hat OpenShift 4.1 offers a developer preview of OpenShift Pipelines, which enable the creation of cloud-native, Kubernetes-style continuous integration and continuous delivery (CI/CD) pipelines based on the Tekton project. In a recent article on the Red Hat OpenShift blog, I provided an introduction to Tekton and pipeline concepts and described the benefits and features of OpenShift Pipelines.
OpenShift Pipelines builds upon the Tekton project to enable teams to build Kubernetes-style delivery pipelines that they can fully control and own the complete lifecycle of their microservices without having to rely on central teams to maintain and manage a CI server, plugins, and its configurations.
-
At OSCON, IBM unveiled a new open source platform that promises to make Kubernetes easier to manage for DevOps teams.
-
As a software developer, it’s often necessary to access a relational database—or any type of database, for that matter. If you’ve been held back by that situation where you need to have someone in operations provision a database for you, then this article will set you free. I’ll show you how to spin up (and wipe out) a MySQL database in seconds using Red Hat OpenShift.
Truth be told, there are several databases that can be hosted in OpenShift, including Microsoft SQL Server, Couchbase, MongoDB, and more. For this article, we’ll use MySQL. The concepts, however, will be the same for other databases. So, let’s get some knowledge and leverage it.
-
The system administrator of yesteryear jockeyed users and wrangled servers all day, in between mornings and evenings spent running hundreds of meters of hundreds of cables. This is still true today, with the added complexity of cloud computing, containers, and virtual machines.
Looking in from the outside, it can be difficult to pinpoint what exactly a sysadmin does, because they play at least a small role in so many places. Nobody goes into a career already knowing everything they need for a job, but everyone needs a strong foundation. If you’re looking to start down the path of system administration, here’s what you should be concentrating on in your personal or formal training.
-
Audiocasts/Shows
-
Debian 10, Linux Kernel 5.2, Pi 4 more Flaws, AMD News, System 76 Thelio and AMD, Nvidia Responds, Ubuntu Snaps, Red Hat & IBM Merge, Valve Rolls Out Steam Labs, Valve Early Access Dota Underlords
-
-
Katherine Druckman and Doc Searls talk to Linux Journal’s Danna Vedder about the current state of advertising.
-
FreeBSD 11.3 has been released, OpenBSD workstation, write your own fuzzer for the NetBSD kernel, Exploiting FreeBSD-SA-19:02.fd, streaming to twitch using OpenBSD, 3 different ways of dumping hex contents of a file, and more.
-
-
Kernel Space
-
Often, a kernel developer will try to reduce the size of an attack surface against Linux, even if it can’t be closed entirely. It’s generally a toss-up whether such a patch makes it into the kernel. Linus Torvalds always prefers security patches that really close a hole, rather than just give attackers a slightly harder time of it.
Matthew Garrett recognized that userspace applications might have secret data that might be sitting in RAM at any given time, and that those applications might want to wipe that data clean so no one could look at it.
There were various ways to do this already in the kernel, as Matthew pointed out. An application could use mlock() to prevent its memory contents from being pushed into swap, where it might be read more easily by attackers. An application also could use atexit() to cause its memory to be thoroughly overwritten when the application exited, thus leaving no secret data in the general pool of available RAM.
The problem, Matthew pointed out, came if an attacker was able to reboot the system at a critical moment—say, before the user’s data could be safely overwritten. If attackers then booted into a different OS, they might be able to examine the data still stored in RAM, left over from the previously running Linux system.
As Matthew also noted, the existing way to prevent even that was to tell the UEFI firmware to wipe system memory before booting to another OS, but this would dramatically increase the amount of time it took to reboot. And if the good guys had won out over the attackers, forcing them to wait a long time for a reboot could be considered a denial of service attack—or at least downright annoying.
-
Hi Linus,
The following changes since commit 0ecfebd2b52404ae0c54a878c872bb93363ada36:
Linux 5.2 (2019-07-07 15:41:56 -0700)
are available in the Git repository at:
https://github.com/ceph/ceph-client.git tags/ceph-for-5.3-rc1
for you to fetch changes up to d31d07b97a5e76f41e00eb81dcca740e84aa7782:
ceph: fix end offset in truncate_inode_pages_range call (2019-07-08 14:01:45 +0200)
There is a trivial conflict caused by commit 9ffbe8ac05db
("locking/lockdep: Rename lockdep_assert_held_exclusive() ->
lockdep_assert_held_write()"). I included the resolution in
for-linus-merged.
-
Ceph for Linux 5.3 is bringing an addition to speed-up reads/discards/snap-diffs on sparse images, snapshot creation time is now exposed to support features like “restore previous versions”, support for security xattrs (currently limited to SELinux), addressing a missing feature bit so the kernel client’s Ceph features are now “luminous”, better consistency with Ceph FUSE, and changing the time granularity from 1us to 1ns. There are also bug fixes and other work as part of the Ceph code for Linux 5.3. As maintainer Ilya Dryomov put it, “Lots of exciting things this time!”
-
At the start of the month we reported on out-of-tree kernel work to support Linux on the newer Macs. Those patches were focused on supporting Apple’s NVMe drive behavior by the Linux kernel driver. That work has been evolving nicely and is now under review on the kernel mailing list.
Volleyed on Tuesday were a set of three patches to the Linux kernel’s NVMe code for dealing with the Apple hardware of the past few years in order for Linux to deal with these drives.
On Apple 2018 systems and newer, their I/O queue sizing/handling is odd and in other areas not properly following NVMe specifications. These patches take care of that while hopefully not regressing existing NVMe controller support.
-
The Android system has shipped a couple of allocators for DMA buffers over the years; first came PMEM, then its replacement ION. The ION allocator has been in use since around 2012, but it remains stuck in the kernel’s staging tree. The work to add ION to the mainline started in 2013; at that time, the allocator had multiple issues that made inclusion impossible. Recently, John Stultz posted a patch set introducing DMA-BUF heaps, an evolution of ION, that is designed to do exactly that — get the Android DMA-buffer allocator to the mainline Linux kernel.
Applications interacting with devices often require a memory buffer that is shared with the device driver. Ideally, it would be memory mapped and physically contiguous, allowing direct DMA access and minimal overhead when accessing the data from both sides at the same time. ION’s main goal is to support that use case; it implements a unified way of defining and sharing such memory buffers, while taking into account the constraints imposed by the devices and the platform.
-
The kernel development community continues to propose new system calls at a high rate. Three ideas that are currently in circulation on the mailing lists are clone3(), fchmodat4(), and fsinfo(). In some cases, developers are just trying to make more flag bits available, but there is also some significant new functionality being discussed.
clone3()
The clone() system call creates a new process or thread; it is the actual machinery behind fork(). Unlike fork(), clone() accepts a flags argument to modify how it operates. Over time, quite a few flags have been added; most of these control what resources and namespaces are to be shared with the new child process. In fact, so many flags have been added that, when CLONE_PIDFD was merged for 5.2, the last available flag bit was taken. That puts an end to the extensibility of clone().
-
On NUMA systems with a lot of CPUs, it is common to assign parts of the workload to different subsets of the available processors. This partitioning can improve performance while reducing the ability of jobs to interfere with each other. The partitioning mechanisms available on current kernels might just do too good a job in some situations, though, leaving some CPUs idle while others are overutilized. The soft affinity patch set from Subhra Mazumdar is an attempt to improve performance by making that partitioning more porous.
In current kernels, a process can be restricted to a specific set of CPUs with either the sched_setaffinity() system call or the cpuset mechanism. Either way, any process so restricted will only be able to run on the specified CPUs regardless of the state of the system as a whole. Even if the other CPUs in the system are idle, they will be unavailable to any process that has been restricted not to run on them. That is normally the behavior that is wanted; a system administrator who has partitioned a system in this way probably has some other use in mind for those CPUs.
But what if the administrator would rather relax the partitioning in cases where the fenced-off CPUs are idle and going to waste? The only alternative currently is to not partition the system at all and let processes roam across all CPUs. One problem with that approach, beyond losing the isolation between jobs, is that NUMA locality can be lost, resulting in reduced performance even with more CPUs available. In theory the AutoNUMA balancing code in the kernel should address that problem by migrating processes and their memory to the same node, but Mazumdar notes that it doesn’t seem to work properly when memory is spread out across the system. Its reaction time is also said to be too slow, and the cost of the page scanning required is high.
-
NVMe is a protocol used by Apple for PCIe solid state drives. It replaces the older Advanced Host Controller Interface (AHCI). On Tuesday, three NVMe patches were submitted to the Linux kernel to deal with Mac SSDs that use this protocol.
-
In addition to Linux 5.3 bringing a VirtIO-IOMMU driver, this next kernel version is bringing another new VirtIO virtual device implementation: PMEM for para-virtualized persistent memory support for the likes of Intel Optane DC persistent memory.
-
Benchmarks
-
One of the first PCIe Gen 4 NVMe SSDs to market has been the Corsair Force MP600. AMD included the Corsair MP600 2TB NVMe PCIe4 SSD with their Ryzen 3000 reviewer’s kit and for those interested in this speedy solid-state storage here are some benchmarks compared to various other storage devices on Ubuntu Linux.
The 2TB Force Series Gen 4 MP600 SSD is rated for sequential reads up to 4950MB/s and sequential writes up to 4250MB/s and 600k IOPS random writes and 680k IOPS random reads. The MP600 relies upon 3D TLC NAND and relies upon a Phison PS5016-E16 controller. This 2TB PCIe 4.0 SSD will set you back $450 USD while a 1TB version is a modest $250 USD.
-
Applications
-
A file manager is the most used software in any digital platform. With the help of this software, you can access, manage, and decorate the files on your device. For the Linux system, this is also an important factor to have an effective and simple file manager. In this curated article, we are going to discuss a set of best Linux file manager tools which definitely help you to operate the system effectively.
-
Maestral is a new open source Dropbox client for macOS and Linux, that’s currently in beta. It can be used both with and without a GUI, and it was created with the purpose of having a Dropbox client that supports folder syncing to drives which use filesystems like Btrfs, Ext3, ZFS, XFS or encrypted filesystems, which are no longer supported by Dropbox.
-
Over the past few months, I’ve written lots of reviews of open source audio software, focusing mainly on music players. Linux has a mouthwatering array of open source multimedia tools, so I’m going to turn my attention wider afield from music players. Let’s start with some multimedia candy.
GLava is an OpenGL audio spectrum visualizer for Linux. An audio visualizer works by extracting waveform and/or frequency information from the audio and feeds this information through some display rules, which produces what you see on the screen. The imagery is usually generated and rendered in real time and in a way synchronized with the music as it is played.
GLava makes a real-time audio visualizer appear as if it’s embedded in your desktop background, or in a window. When displayed as the background, it’ll display on top of your wallpaper, giving the appearance of a live, animated wallpaper.
GLava is a simple C program that sets up the necessary OpenGL and Xlib code for sets of 2D fragment shaders. The software uses PulseAudio to sync the desktop visualizer with any music source.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Learn the concept of hard links in Linux and its association with inodes in this tutorial.
-
Games
-
Netherguild is a recent discovery that’s currently in development from David Vinokurov. It’s a turn-based rogue-lite strategy game, about sending a team deep below ground.
-
Queen’s Quest 5: Symphony of Death from Brave Giant LTD and Artifex Mundi has released today, another fantastic looking hidden object game for a more casual experience.
-
Today Proxy Studios and Slitherine have released the latest DLC for the turn-based strategy game Warhammer 40,000: Gladius, with the Chaos Space Marines making their way across the planet.
Also available today is a big save-breaking patch. Update 1.3, which is actually a pretty huge patch for the game adds in new items, new achievements, new tips, new settings, performance improvements, fixes to the AI, save game format improvements to reduce UI lag with large saves, a mod management screen and there’s quite a bit more. Good to see it really well supported a year after the original release.
-
Lookout! Another sale is approaching! This time it’s Valve’s turn, with Steam having a space themed sale for the 50th anniversary of the Apollo 11 moon landing.
-
Thanks to the help of nearly a thousand backers on Kickstarter, the very sweet looking puzzle-platform that mixes in some visual novel elements is fully funded.
-
This is quite exciting and very pleasing to see. Path of Titans from Alderon Games has hit the funding goal!
After writing about the IndieGoGo campaign starting only a few days ago, Alderon Games added a PayPal backing option to their official website. Their initial goal was only $25,234 and with both campaigns together they’ve managed to pull in $32,704 and they have 28 days left to go so hopefully they will get more than enough to bring us another great Linux game.
-
Three crowdfunding campaigns in one day? Yes! After Evan’s Remains and Path of Titans getting funded, we also have the action-platformer “GIGABUSTER” which has also been fully funded and so it’s coming to Linux.
Inspired by the likes of both Mega Man Zero and Mega Man X, the developer said they wanted a more modern and balanced game that was similar, so they decided to create their own hoping it will scratch your itch as well as their own. After appearing on Kickstarter, GIGABUSTER managed to jump, dash and shoot its way to victory with $11,666 in funding.
-
If you’re a game developer or you just like making good-looking retro art you might want to take a look at SpriteStack.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
I know you waited for this so long but believe me there were really good reasons. Check out the past articles concerning Latte git version and you can get a picture what major new features are introduced for v0.9. Of course this is an article for a beta release and as such I will not provide any fancy videos or screenshots; this is a goal for official stable release article.
-
It’s been over one year since the release of Latte Dock 0.8 as this KDE-aligned desktop dock while now the v0.9 release isn’t too far away.
Latte Dock 0.9 continues maturing its Wayland support though is still deemed a technology preview for the v0.9 series but should be in much better standing all-around.
-
GNOME Desktop/GTK
-
Pitivi is a video editor, free and open source. Targeted at newcomers and professional users, it is minimalist and powerful. This summer I am fortunate to collaborate in Pitivi development through Google Summer of Code.
My goal is to implement an interval time system, with the support of Mathieu Duponchell, my menthor, and other members of the Pitivi community.
An interval time system is a common tool in many video editors. It will introduce new features in Pitivi. The user will be able to set up a range of time in the timeline editor, playback specific parts of the timeline, export the selected parts of the timeline, cut or copy clips inside the interval and zoom in/out the interval.
Mi proposal also includes the design of a marker system to store information at a certain time position.
-
-
Screenshots/Screencasts
-
Today we are looking at the first stable release of Endeavour OS. It is a project that started to continue the spirit of the recently discontinued Antergos. The developing team exists out of Antergos developers and community members.
As you can see in this first stable release, it is far from just a continuing of Antergos as we know it. The stable release is an offline Calamres installer and it just came with a customized XFCE desktop environment. They are planning to have an online installer again in the future, which will give a person an option to choose between 10 desktop environments, similar to Antergos.
It is based on Arch, Linux Kernel 5.2, XFCE 4.14 pre2 and it uses about 500mb of ram.
-
In this video, we look at Endeavour OS 2019.07.15.
-
PCLinuxOS/Mageia/Mandriva Family
-
I am pleased to announce the July 2019 release of the PClinuxOS KDE Darkstar is ready for download.
-
Fedora Family
-
Recently I gave a syslog-ng introductory workshop at Pass the SALT conference in Lille, France. I got a lot of positive feedback, so I decided to turn all that feedback into a blog post. Naturally, I shortened and simplified it, but still managed to get enough material for multiple blog posts.
-
Release Candidate versions are available in testing repository for Fedora and Enterprise Linux (RHEL / CentOS) to allow more people to test them. They are available as Software Collections, for a parallel installation, perfect solution for such tests (for x86_64 only), and also as base packages.
RPM of PHP version 7.387RC1 are available as SCL in remi-test repository and as base packages in the remi-test repository for Fedora 30 or remi-php73-test repository for Fedora 28-29 and Enterprise Linux.
RPM of PHP version 7.2.20RC1 are available as SCL in remi-test repository and as base packages in the remi-test repository for Fedora 28-29 or remi-php72-test repository for Enterprise Linux.
-
RPM of QElectroTech version 0.70, an application to design electric diagrams, are available in remi for Fedora and Enterprise Linux 7.
A bit more than 1 year after the version 0.60 release, the project have just released a new major version of their electric diagrams editor.
-
The kernel team is working on final integration for kernel 5.2. This version was just recently released, and will arrive soon in Fedora. This version has many security fixes included. As a result, the Fedora kernel and QA teams have organized a test week from Monday, July 22, 2019 through Monday, July 29, 2019. Refer to the wiki page for links to the test images you’ll need to participate. Read below for details.
-
Debian Family
-
Like each month, here comes a report about the work of paid contributors to Debian LTS.
-
Canonical/Ubuntu Family
-
This week the team behind Linux Mint announced the release of Linux Mint 19.2 beta, a desktop Linux distribution used for producing a modern operating system. This release is codenamed as Tina.
This release comes with updated software and refinements and new features for making the desktop more comfortable to use.
-
Continuing my previous Mem. Comparison 2018, here’s my 2019 comparison with all editions of Ubuntu 19.04 “Disco Dingo”. The operating system editions I use here are the eight: Ubuntu Desktop, Kubuntu, Lubuntu, Xubuntu, Ubuntu MATE, Ubuntu Studio, Ubuntu Kylin, and Ubuntu Budgie. I installed every one of them on my laptop and (immediately at first login) took screenshot of the System Monitor (or Task Manager) without doing anything else. I present here the screenshots along with each variant’s list of processes at the time I took them. And, you can download the ODS file I used to create the chart below. Finally, I hope this comparison helps all of you and next time somebody can make better comparisons.
-
This is a follow-up to the End of Life warning sent earlier this month
to confirm that as of today (July 18, 2019), Ubuntu 18.10 is no longer
supported. No more package updates will be accepted to 18.10, and
it will be archived to old-releases.ubuntu.com in the coming weeks.
The original End of Life warning follows, with upgrade instructions:
Ubuntu announced its 18.10 (Cosmic Cuttlefish) release almost 9 months
ago, on October 18, 2018. As a non-LTS release, 18.10 has a 9-month
support cycle and, as such, the support period is now nearing its
end and Ubuntu 18.10 will reach end of life on Thursday, July 18th.
At that time, Ubuntu Security Notices will no longer include
information or updated packages for Ubuntu 18.10.
The supported upgrade path from Ubuntu 18.10 is via Ubuntu 19.04.
Instructions and caveats for the upgrade may be found at:
https://help.ubuntu.com/community/DiscoUpgrades
Ubuntu 19.04 continues to be actively supported with security updates
and select high-impact bug fixes. Announcements of security updates
for Ubuntu releases are sent to the ubuntu-security-announce mailing
list, information about which may be found at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Since its launch in October 2004 Ubuntu has become one of the most
highly regarded Linux distributions with millions of users in homes,
schools, businesses and governments around the world. Ubuntu is Open
Source software, costs nothing to download, and users are free to
customise or alter their software in order to meet their needs.
On behalf of the Ubuntu Release Team,
Adam Conrad
-
CMake is an open-source, cross-platform family of tools designed to build, test and package software. It is used to control the software compilation process and generate native makefiles and workspaces that can be used in any compiler environment.
While some users of CMake want to stay up to date with the latest release, others want to be able to stay with a known version and choose when to move forward to newer releases, picking up just the minor bug fixes for the feature release they are tracking. Users may also occasionally need to roll back to an earlier feature release, such as when a bug or a change introduced in a newer CMake version exposes problems within their project.
Craig Scott, one of the co-maintainers of CMake, sees snaps as an excellent solution to these needs. Snaps’ ability to support separate tracks for each feature release in addition to giving users the choice of following official releases, release candidates or bleeding edge builds are an ideal fit. When he received an invitation to the 2019 Snapcraft Summit, he was keen to work directly with those at the pointy end of developing and supporting the snap system.
-
Looking ahead to Ubuntu 19.10 as the cycle before Ubuntu 20.04 LTS, one of the areas exciting us with the work being done by Canonical is (besides the great upstream GNOME performance work) easily comes down to the work they are pursuing on better ZFS On Linux integration with even aiming to offer ZFS as a file-system option from their desktop installer. A big role in their ZoL play is also the new “Zsys” component they have been developing.
-
Devices/Embedded
-
Kali is based on Debian Linux (like Raspbian, the default Raspberry Pi OS) and includes specialist tools to support penetration testing by devices such as the Pi.
Kali Linux (version 2019.2a) for Raspberry Pi 2, 3 and 4 is available in a 32-bit image (893 MB), but the 64-bit version is promised soon.
-
Mobile Systems/Mobile Applications
-
-
Events
-
he third edition of the Operating-System-Directed Power-Management (OSPM) summit was held May 20-22 at the ReTiS Lab of the Scuola Superiore Sant’Anna in Pisa, Italy. The summit is organized to collaborate on ways to reduce the energy consumption of Linux systems, while still meeting performance and other goals. It is attended by scheduler, power-management, and other kernel developers, as well as academics, industry representatives, and others interested in the topics.
-
The kernel’s deadline scheduling class (SCHED_DEADLINE) enables realtime scheduling where every task is guaranteed to meet its deadlines. Unfortunately SCHED_DEADLINE’s current view on CPU capacity is far too simple. It doesn’t take dynamic voltage and frequency scaling (DVFS), simultaneous multithreading (SMT), asymmetric CPU capacity, or any kind of performance capping (e.g. due to thermal constraints) into consideration.
In particular, if we consider running deadline tasks in a system with performance capping, the question is “what level of guarantee should SCHED_DEADLINE provide?”. An interesting discussion about the pro and cons of different approaches (weak, hard, or mixed guarantees) developed during this presentation. There were many different views but the discussion didn’t really conclude and will have to be continued at the Linux Plumbers Conference later this year.
The topic of guaranteed performance will become more important for mobile systems in the future as performance capping is likely to become more common. Defining hard guarantees is almost impossible on real systems since silicon behavior very much depends on environmental conditions. The main pushback on the existing scheme is that the guaranteed bandwidth budget might be too conservative. Hence SCHED_DEADLINE might not allow enough bandwidth to be reserved for use cases with higher bandwidth requirements that can tolerate bandwidth reservations not being honored.
-
Validating scheduler behavior is a tricky affair, as multiple subsystems both compete and cooperate with each other to produce the task placement we observe. Valentin Schneider from Arm described the approach taken by his team (the folks behind energy-aware scheduling — EAS) to tackle this problem.
-
“One task per CPU” workloads, as emulated by multi-core Geekbench, can suffer on traditional two-cluster big.LITTLE systems due to the fact that tasks finish earlier on the big CPUs. Arm has introduced a more flexible DynamIQ architecture that can combine big and LITTLE CPUs into a single cluster; in this case, early products apply what’s known as phantom scheduler domains (PDs). The concept of PDs is needed for DynamIQ so that the task scheduler can use the existing big.LITTLE extensions in the Completely Fair Scheduler (CFS) scheduler class.
Multi-core Geekbench consists of several tests during which N CFS tasks perform an equal amount of work. The synchronization mechanism pthread_barrier_wait() (i.e. a futex) is used to wait for all tasks to finish their work in test T before starting the tasks again for test T+1.
The problem for Geekbench on big.LITTLE is related to the grouping of big and LITTLE CPUs in separate scheduler (or CPU) groups of the so-called die-level scheduler domain. The two groups exists because the big CPUs share a last-level cache (LLC) and so do the LITTLE CPUs. This isn’t true any more for DynamIQ, hence the use of the “phantom” notion here.
The tasks of test T finish earlier on big CPUs and go to sleep at the barrier B. Load balancing then makes sure that the tasks on the LITTLE CPUs migrate to the big CPUs where they continue to run the rest of their work in T before they also go to sleep at B. At this moment, all the tasks in the wake queue have a big CPU as their previous CPU (p->prev_cpu). After the last task has entered pthread_barrier_wait() on a big CPU, all tasks on the wake queue are woken up.
-
The typical systems used in industrial automation (e.g. for axis control) consist of a “black box” executing a commercial realtime operating system (RTOS) plus a set of control design tools meant to be run on a different desktop machine. This approach, besides imposing expensive royalties on the system integrator, often does not offer the desired degree of flexibility for testing/implementing novel solutions (e.g., running both control code and design tools on the same platform).
-
As is probably well known, a scheduler is the component of an operating system that decides which CPU the various tasks should run on and for how long they are allowed to do so. This happens when an OS runs on the bare hardware of a physical host and it is also the case when the OS runs inside a virtual machine. The only difference being that, in the latter case, the OS scheduler marshals tasks among virtual CPUs.
And what are virtual CPUs? Well, in most platforms they are also a kind of special task and they want to run on some CPUs … therefore we need a scheduler for that! This is usually called the “double-scheduling” property of systems employing virtualization because, well, there literally are two schedulers: one — let us call it the host scheduler, or the hypervisor scheduler — that schedules the virtual CPUs on the host physical CPUs; and another one — let us call it the guest scheduler — that schedules the guest OS’s tasks on the guest’s virtual CPUs.
Now what are these two schedulers? That depends on the virtualization platform. They are always different, in the sense that it will never happen that, at runtime, a scheduler has to deal with scheduling virtual CPUs and also scheduling tasks that want to run on those same virtual CPUs (well, it can happen, but then you are not doing virtualization). They can be the same, in terms of code, or they can be completely different from that respect as well.
-
In the opening session of OSPM 2019, Rafael Wysocki from Intel gave a talk about potential problems faced by the designers of CPU idle-time-management governors, which was inspired by his own experience from the timer-events oriented (TEO) governor work done last year.
In the first place, he said, it should be noted that “CPU idleness” is defined at the level of logical CPUs, which may be CPU cores or simultaneous multithreading (SMT) threads, depending on the hardware configuration of the processor. In Linux, a logical CPU is idle when there are no runnable tasks in its queue, so it falls back to executing the idle task associated with it (there is one idle task for each logical CPU in the system, but they all share the same code, which is the idle loop). Therefore “CPU idleness” is an OS (not hardware) concept and if the idle loop is entered by a CPU, there is an opportunity to save some energy with a relatively small impact on performance (or even without any impact on performance at all) — if the hardware supports that.
The idle loop runs on each idle CPU and it only takes this particular CPU into consideration. As a rule, two code modules are invoked in every iteration of it. The first one, referred to as the CPU idle-time-management governor, is responsible for deciding whether or not to stop the scheduler tick and what to tell the hardware to do; the second one, called the CPU idle-time-management driver, passes the governor’s decisions down to the hardware, usually in an architecture- or platform-specific way. Then, presumably, the processor enters a special state in which the CPU in question stops fetching instructions (that is, it does literally nothing at all); that may allow the processor’s power draw to be reduced and some energy to be saved as a result. If that happens, the processor needs to be woken up from that state by a hardware event after spending some time, referred to as the idle duration, in it. At that point, the governor is called again so it can save the idle-duration value for future use.
-
If you’ve been following Apache Software Foundation (ASF) announcements for ApacheCon 2019, you must be aware of the conference in Las Vegas (ApacheCon North America) from September 9 to September 12.
And, recently, they announced their plans for ApacheCon Europe 2019 to be held on 22-24 October 2019 at the iconic Kulturbrauerei in Berlin, Germany. It is going to be one of the major events by ASF this year. In this article, we shall take a look at the details revealed as of yet.
-
Aaron discussed various ways to record RTSP streams when used with playbin and brought up some of his pending merge requests around the closed captioning renderer and Active Format Description (AFD) support, with a discussion about redoing the renderer properly, and in Rust.
George discussed a major re-work of the gst-omx bufferpool code that he has been doing and then moved his focus on Qt/Android support. He mostly focused on the missing bits, discussing builds and infrastructure issues with Nirbheek and myself, and going through his old patches.
-
Pseudo-Open Source (Openwashing)
-
The clearest sign of AWS’ open source success wasn’t built by Amazon [Ed: AWS is proprietary software, but one can always rely on Mac Asay to spin proprietary (like his employers past and present) as "open". There's nothing "open" about AWS and in some sense it is even worse than traditional proprietary software because of the surveillance.]
-
The RedMonk Programming Language Rankings: June 2019 [Ed: Microsoft-funded 'analyst' RedMonk bases its "Programming" 'study' on Microsoft GitHub data, which is notoriously biased]
-
TenneT is the first European cross-border electricity transmission system operator (TSO), with activities in the Netherlands and in Germany, providing uninterrupted electricity to over 41 million people. The security of our supply is among the best in Europe, with 99.99% grid availability. With the energy transition, TenneT is contributing to a future in which wind and solar energy are the most important primary sources to produce electricity.
-
-
BSD
-
While the Linux 4.4 kernel is quite old (January 2016), DragonFlyBSD has now re-based its AMD Radeon kernel graphics driver against that release. It is at least a big improvement compared to its Radeon code having been derived previously from Linux 3.19.
DragonFlyBSD developer François Tigeot continues doing a good job herding the open-source Linux graphics driver support to this BSD. With the code that landed on Monday, DragonFlyBSD’s Radeon DRM is based upon the state found in the Linux 4.4.180 LTS tree.
-
Programming/Development
-
-
-
Python does not lack for web frameworks, from all-encompassing frameworks like Django to “nanoframeworks” such as WebCore. A recent “spare time” project caused me to look into options in the middle of this range of choices, which is where the Python “microframeworks” live. In particular, I tried out the Bottle and Flask microframeworks—and learned a lot in the process.
I have some experience working with Python for the web, starting with the Quixote framework that we use here at LWN. I have also done some playing with Django along the way. Neither of those seemed quite right for this latest toy web application. Plus I had heard some good things about Bottle and Flask at various PyCons over the last few years, so it seemed worth an investigation.
Web applications have lots of different parts: form handling, HTML template processing, session management, database access, authentication, internationalization, and so on. Frameworks provide solutions for some or all of those parts. The nano-to-micro-to-full-blown spectrum is defined (loosely, at least) based on how much of this functionality a given framework provides or has opinions about. Most frameworks at any level will allow plugging in different parts, based on the needs of the application and its developers, but nanoframeworks provide little beyond request and response handling, while full-blown frameworks provide an entire stack by default. That stack handles most or all of what a web application requires.
The list of web frameworks on the Python wiki is rather eye-opening. It gives a good idea of the diversity of frameworks, what they provide, what other packages they connect to or use, as well as some idea of how full-blown (or “full-stack” on the wiki page) they are. It seems clear that there is something for everyone out there—and that’s just for Python. Other languages undoubtedly have their own sets of frameworks (e.g. Ruby on Rails).
-
Standards/Consortia
-
Before there was Big Tech, there was “adversarial interoperability”: when someone decides to compete with a dominant company by creating a product or service that “interoperates” (works with) its offerings.
In tech, “network effects” can be a powerful force to maintain market dominance: if everyone is using Facebook, then your Facebook replacement doesn’t just have to be better than Facebook, it has to be so much better than Facebook that it’s worth using, even though all the people you want to talk to are still on Facebook. That’s a tall order.
Adversarial interoperability is judo for network effects, using incumbents’ dominance against them. To see how that works, let’s look at a historical example of adversarial interoperability role in helping to unseat a monopolist’s dominance.
The first skirmishes of the PC wars were fought with incompatible file formats and even data-storage formats: Apple users couldn’t open files made by Microsoft users, and vice-versa. Even when file formats were (more or less) harmonized, there was still the problems of storage media: the SCSI drive you plugged into your Mac needed a special add-on and flaky driver software to work on your Windows machine; the ZIP cartridge you formatted for your PC wouldn’t play nice with Macs.
But as office networking spread, the battle moved to a new front: networking compatibility. AppleTalk, Apple’s proprietary protocol for connecting up Macs and networked devices like printers, pretty much Just Worked, providing you were using a Mac. If you were using a Windows PC, you had to install special, buggy, unreliable software.
And for Apple users hoping to fit in at Windows shops, the problems were even worse: Windows machines used the SMB protocol for file-sharing and printers, and Microsoft’s support for MacOS was patchy at best, nonexistent at worst, and costly besides. Businesses sorted themselves into Mac-only and PC-only silos, and if a Mac shop needed a PC (for the accounting software, say), it was often cheaper and easier just to get the accountant their own printer and backup tape-drive, rather than try to get that PC to talk to the network. Likewise, all PC-shops with a single graphic designer on a Mac—that person would often live offline, disconnected from the office network, tethered to their own printer, with their own stack of Mac-formatted ZIP cartridges or CD-ROMs.
[...]
Someone attempting to replicate the SAMBA creation feat in 2019 would likely come up against an access control that needed to be bypassed in order to peer inside the protocol’s encrypted outer layer in order to create a feature-compatible tool to use in competing products.
Another thing that’s changed (for the worse) since 1993 is the proliferation of software patents. Software patenting went into high gear around 1994 and consistently gained speed until 2014, when Alice v. CLS Bank put the brakes on (today, Alice is under threat). After decades of low-quality patents issuing from the US Patent and Trademark Office, there are so many trivial, obvious and overlapping software patents in play that anyone trying to make a SAMBA-like product would run a real risk of being threatened with expensive litigation for patent infringement.
-
-
Health/Nutrition
-
Drug prices are sky high. This is not news. A bunch of incredibly dumb policy decisions have been stacked up for decades and brought us to this place where drug prices — especially for life-saving drugs — would bankrupt most people. A huge part of the problem is our patent system and how we literally grant monopolies to companies over these drugs. Combine “life saving” with “monopoly” and, uh, you don’t have to have a PhD in economics to know what happens to the price. Add into that our fucked up and convoluted hospital and insurance healthcare system, in which prices are hidden from patients, and you have a recipe for the most insanely exploitative “marketplace” ever.
[...]
Furthermore, while the Times is correct that this could be “done now,” it seems like yet another way of treating the symptoms not the disease. Fix the fucking patent system. Fix our broken healthcare system. Do those two things and you don’t have insane drug pricing any more. And, to be fair, at least the NY Times piece does acknowledge the idea that maybe we need to “blow up the patent system and start over” when it comes to pharmaceuticals. But it labels this idea as “fantastical.” It may be “fantastical” to those with limited imaginations and focused on living under today’s crappy, broken system. But if we want to deal with the real problems, that’s one area to start.
-
As the 2020 election draws near, presidential candidates are putting forth numerous other solutions to the drug cost crisis. Those solutions range from the practical (tax drug companies on their price hikes) to the ambitious (let the federal government make its own drugs) to the fantastical (blow up the patent system and start over). If the plans get serious consideration, they would advance a long overdue dialogue about how the country wants to evaluate medications and what it is and isn’t willing to spend on them — a question that sits at the heart of America’s deeply flawed prescription drug system.
-
Having reported on this subject a few times, I will say that this is a seedier, deeper rabbit hole than you might think. While Russian news outlets do seem to be enjoying amplifying fear on this subject, there’s plenty of home grown folks pushing 5G health risk claims as well. I’ve found a long line of academics happy to go on the record claiming 5G could pose a health risk. I’ve also found plenty of others proclaiming any health concerns are fluff and nonsense. But pretty uniformly you’ll find one consensus buried under the mess: far, far more study is necessary before anybody engages in absolutism one way or the other.
-
Security
-
Security updates have been issued by Arch Linux (chromium, firefox, and squid), CentOS (thunderbird and vim), Debian (libonig), SUSE (firefox, glibc, kernel, libxslt, and tomcat), and Ubuntu (libreoffice and thunderbird).
-
Dubbed EvilGnomes by researchers; the malware was found masquerading as a Gnome shell extension targeting Linux’s desktop users.
-
They were written by a user named ruri12. These packages were removed by the PyPI team on July 9, 2019. However they were available since November 2017 and had been downloaded fairly regularly.
See the original article for more details.
As always, when using a package that you aren’t familiar with, be sure to do your own thorough vetting to be sure you are not installing malware accidentally.
-
We’ve noted a few times now how the protectionist assault against Huawei hasn’t been supported by much in the way of public evidence. As in, despite widespread allegations that Huawei helps China spy on Americans wholesale, nobody has actually been able to provide any hard public evidence proving that claim. That’s a bit of a problem when you’re talking about a global blackballing effort. Especially when previous investigations as long as 18 months couldn’t find evidence of said spying, and many US companies have a history of ginning up security fears simply because they don’t want to compete with cheaper Chinese kit.
That said, a new report (you can find the full thing here) dug through the CVs of many Huawei executives and employees, and found that a small number of “key mid-level technical personnel employed by Huawei have strong backgrounds in work closely associated with intelligence gathering and military activities.”
-
Unless you’ve been under a rock, you’ve noticed hardly a day goes by without another serious security foul-up. While there’s plenty of blame to go around for these endless security problems, some of it goes to developers who write bad code.
That makes sense. But when GitLab, a DevOps company, surveyed over 4,000 developers and operators, they found 68% of the security professionals surveyed believe it’s a programmer’s job to write secure code, but they also think less than half of developers can spot security holes.
-
A report based on a survey of 4,071 software professionals published this week by GitLab, a provider of a continuous integration and continuous deployment (CI/CD) platform, found that while appreciation of the potential value of DevSecOps best practices is high, the ability to implement those practices is uneven at best.
-
In a survey conducted by GitLab, software professionals recognize the need for security to be baked into the development lifecycle, but the survey showed long-standing friction between security and development teams remain. While 69% of developers say they’re expected to write secure code, nearly half of security pros surveyed (49%) said they struggle to get developers to make remediation of vulnerabilities a priority. And 68% of security professionals feel fewer than half of developers are able to spot security vulnerabilities later in the lifecycle.
-
Over on his blog, Kees Cook runs through the security changes that came in Linux 5.2.
-
Environment
-
While most of Louisiana was spared Barry’s wrath last week, Isle de Jean Charles, a quickly eroding strip of land among coastal wetlands in the Gulf of Mexico, was not. A storm surge swept over the island, about 80 miles southwest of New Orleans, early in the morning on July 13 before Barry was upgraded from a tropical storm to a category 1 hurricane.
On July 15, I met with Albert Naquin, Chief of the Isle de Jean Charles Biloxi-Chitimacha-Choctaw Tribe (IDJC) and Wenceslaus Billiot Jr., the Tribe’s deputy chief, to travel to the island and assess the damages. That afternoon, we made our way through the receding waters that still covered Island Road, the only route connecting the island to the mainland. Days after the storm, some parts of the road on the island were still submerged in three feet of water.
-
Chester County officials Wednesday afternoon issued a Code Red health alert for extreme heat that is expected to continue into Monday.
-
Energy
-
On every front, academics, journalists and policymakers compare the fossil fuel industry to the tobacco industry. The two industries share the same playbook: strategies of delay, exculpating blame by making the consumer responsible, denying scientific consensus, publishing industry-funded science and fostering public confusion over the real impacts of their products.
A major difference between the two industries, however, is the timescale and scope of the harms caused. While public health professionals are executing coordinated efforts for a “tobacco endgame” to reduce smoking and tobacco prevalence to five percent of the population or less, with the possibility of ending the tobacco epidemic in certain areas within a couple decades — we’re far from making similar progress when it comes to climate change.
Even if all fossil fuel production and consumption ended today, the fallout from 50 years of delay caused by industry obfuscation will have ramifications for humans and other species for centuries or even millennia. If disruptive climate change continues unabated, the impacts on the planet may be essentially irreversible, at least as far as any humanly relevant scale.
-
Censorship/Free Speech
-
Every few years this kind of thing pops up. Some ignorant organization or policymaker thinks “oh, hey, the easy way to ‘solve’ piracy is just to create a giant blacklist.” This sounds like a simple solution… if you have no idea how any of this works. Remember, advertising giant GroupM tried just such an approach a decade ago, working with Universal Music to put together a list of “pirate sites” for which it would block all advertising. Of course, who ended up on that list? A bunch of hip hop news sites and blogs. And even the personal site of one of Universal Music’s own stars was suddenly deemed an “infringing site.”
These kinds of mistakes highlight just how fraught such a process is — especially when it’s done behind the scenes by organizations that face no penalty for overblocking. In such cases you always get widespread overblocking based on innuendo, speculation, and rumor, rather than any legitimate due process or court adjudication concerning infringement. Even worse, if there was actual infringement going on, one possible legal remedy would involve getting a site to take down that content. Under a “list” approach, it’s just basically a death penalty for the entire site.
-
Privacy/Surveillance
-
Biometric databases have a hunger for data. And they’re getting fed. Government agencies are shoving every face they can find into facial recognition databases. Expanding the dataset means adding people who’ve never committed a crime and, importantly, who’ve never given their explicit consent to have their personal details handed over to federal agencies.
Thanks to unprecedented levels of cooperation across all levels of government, FBI and ICE are matching faces using data collected from millions of non-criminals. The agencies are apparently hoping this will all work out OK, rather than create a new national nightmare of shattered privacy and violated rights. Or maybe they just don’t care.
-
Germany has banned its schools from using cloud-based productivity suites from Microsoft, Google, and Apple, because the companies weren’t meeting the country’s privacy requirements. Naked Security reports, that the statement from the Hessische Beauftragte für Datenschutz und Informationsfreiheit (Hesse Commissioner for Data Protection and Freedom of Information, or HBDI) said, “The digital sovereignty of state data processing must be guaranteed. With the use of the Windows 10 operating system, a wealth of telemetry data is transmitted to Microsoft, whose content has not been finally clarified despite repeated inquiries to Microsoft. Such data is also transmitted when using Office 365.” The HBDI also stressed that “What is true for Microsoft is also true for the Google and Apple cloud solutions. The cloud solutions of these providers have so far not been transparent and comprehensible set out. Therefore, it is also true that for schools, privacy-compliant use is currently not possible.”
-
Germany just banned its schools from using cloud-based productivity suites from Microsoft, Google, and Apple. The tech giants aren’t satisfying its privacy requirements with their cloud offerings, it warned.
The Hessische Beauftragte für Datenschutz und Informationsfreiheit (Hesse Commissioner for Data Protection and Freedom of Information, or HBDI) made the statement following a review of Microsoft Office 365’s suitability for schools.
-
Did you know that Germany just banned its schools from using cloud-based productivity suites from Microsoft, Google, and Apple? The tech giants aren’t satisfying its privacy requirements with their cloud offerings, it warned. What are your thoughts?
The Hessische Beauftragte für Datenschutz und Informationsfreiheit (Hesse Commissioner for Data Protection and Freedom of Information, or HBDI) made the statement following a review of Microsoft Office 365’s suitability for schools.
-
Civil Rights/Policing
-
Our nation’s immigration agencies wield a considerable amount of power. So much power, in fact, that they’re free to dump incoming immigrants off the space-time continuum at will. If a CBP officer decides a person isn’t the age they say they are, they can alter the person’s age so it matches the officer’s beliefs.
How does the CBP accomplish this neat little trick? Well, oddly, it involves X-rays. A recent episode of This American Life details the surreal nature of this CBP-induced time warp — one it inflicted (repeatedly!) on a 19-year-old Hmong woman coming to the United States to reunite with her fiance.
Yong Xiong was questioned by Customs officers at the Chicago airport. The CBP officer thought she was being trafficked and didn’t believe the birth date on her passport. After a round of questioning meant to determine whether or not Yong was being trafficked, the CBP officer arrived at the conclusion she was, despite the officer marking “No” on ten of the eleven trafficking indicators.
So, how does the CBP try to determine someone’s age when officers don’t believe the person or the documents in front of them? They call in a dentist. Yong’s teeth were x-rayed to determine her age. This may involve science on the front end, but the back end is mainly educated guesswork.
-
When the City of Baltimore agreed to settle with a victim of police brutality, it inserted the usual clauses that come with every settlement. There was the standard non-admission of wrongdoing, along with a “non-disparagement” clause the city’s attorney told courts was used “in 95% of settlements” to prevent those being settled with from badmouthing the entity they sued.
Ashley Overbey received a $63,000 settlement from the city for allegations she was beaten, tased, verbally abused, and arrested after calling officers to her home to report a burglary. When a local newspaper published a story about the settlement, the City Solicitor chose to disparage Overbey by saying she was “hostile” when the police arrived at her home. As the comments filled up with invective against Overbey, she showed up in person to fire back at her detractors, claiming the police had been in the wrong and detailing some of the injuries she suffered.
The City — which had chosen to skew public perception against Overbey by commenting on the settlement — decided Overbey’s defense of herself violated the non-disparagement clause. So, it clawed back half of her settlement — $31,500 — for violating its STFU clause.
-
Internet Policy/Net Neutrality
-
To some extent we’ve had this discussion before, as parts of other discussions about the regulation of content online, but it’s worth calling it out explicitly: regulating internet infrastructure services the same as internet edge service providers is a really bad idea. And yet, here we are. So few people seem to even care enough to make a distinction. So, let’s start with the basics: “edge providers” are the companies who provide internet services that you, as a end user, interact with. Google, YouTube, Facebook, Twitter, Twitch, Reddit, Wikipedia, Amazon’s e-commerce site. These are all edge providers as currently built. Infrastructure providers, however, sit a layer (or more) down from those edge providers. They’re the services that make the edge services possible. This can include domain registrars and registers, CDNs, internet security companies and more. So, companies like Cloudflare, GoDaddy, Amazon’s AWS, among others are examples there.
While tons of people interact with infrastructure players all the time, your average person will never even realize they’re doing so — as the interactions tend to be mediated entirely by the edge providers. For a few years now we’ve been seeing attempts to move the liability questions up (or, depending on your viewpoint, down) the stack from edge providers to infrastructure players. This raises a lot of significant concerns.
-
Digital Restrictions (DRM)
-
Salima has a problem: her Boulangism toaster is locked down with software that ensures that it will only toast bread sold to her by the Boulangism company… and as Boulangism has gone out of business, there’s no way to buy authorized bread. Thus, Salima can no longer have toast.
This sneakily familiar scenario sends our resourceful heroine down a rabbit hole into the world of hacking appliances, but it also puts her in danger of losing her home — and prosecution under the draconian terms of the Digital Millennium Copyright Act (DMCA). Her story, told in the novella “Unauthorized Bread,” which opens Cory Doctorow’s recent book Radicalized, guides readers through a process of discovering what Digital Restrictions Management (DRM) is, and how the future can look mightily grim if we don’t join forces to stop DRM now.
“Unauthorized Bread” takes place in the near future, maybe five or ten years at most, and the steady creep of technology that takes away more than it gives has simply advanced a few degrees. Salima and her friends and neighbors are refugees, and they live precariously in low-income housing equipped with high-tech, networked appliances. These gizmos and gadgets may seem nifty on the surface, but immediately begin to exact an unacceptable price, since they require residents to purchase the expensive approved bread for the toaster, the expensive approved dishes for the dishwasher, and so on. And just as Microsoft can whisk away ebooks that people “own” by closing down its ebook service, the vagaries of the business world cause Boulangism to whisk away Salima’s ability to use her own toaster.
-
Monopolies
-
Traditional conceptions of university-industry technology transfer typically focus on patenting and licensing of academic inventions. However, effective technology transfer often requires significant knowledge exchange between academic and commercial entities in parallel to patent licensing. Although patents on university technologies nominally disclose those inventions, a significant amount of knowledge related to practicing and commercializing them remains tacit or uncodified, residing in the mind of the faculty inventor. This chapter explores the nature of tacit knowledge and mechanisms for transferring it. It notes that the “tacit dimension” of university inventions can be quite high given the embryonic nature of such technologies. It further reveals that human and institutional connections play a critical role in transferring tacit knowledge between universities and commercial firms. In particular, networks, consulting engagements, sponsored research, proof of concept centers and incubators, and university spinoffs facilitate direct interactions between academic and commercial entities, thus promoting tacit knowledge exchange.
-
Industrializing emerging economies like Nigeria and Sudan through the protection of patent right holders is not an easy process; as it is possible with a strong political will on the part of government discharge its responsibilities. In this regard, one modern type of technology which can catalyze massive industrialization in these countries is reverse engineering. Success stories of most advanced nations in the world today are partly attributed to this modern type of technology. This paper explores the state of industrialization in countries like Nigeria and Sudan to assess their current status with a dire need for change in both nations. It also briefly highlights extant patent regimes in both countries, the importance of such regimes and challenges faced in their everyday implementation process. Emphasis is also on the correlation existing between industrialization and protection of patents in both countries with a view acknowledging the fact that one can hardly exist without the other. The tripartite relationship existing among reverse engineering, patent protection, and trade secrets is cursorily discussed. Further, the paper discusses the importance of employing reverse engineering as a contemporary technology for national development and industrialization. Its advantages to National Development are also discussed in the paper. It is concluded that it is necessary for Nigeria and Sudan to reconsider their policies on patent protection so as to foster economic development.
-
Vestas and GE Renewable Energy settle multi-patent dispute [Ed: GE being aggressive with patents -- to the point of attacking companies that do "green" energy -- makes perfect sense considering that the company, GE, came from a famous patent troll; patents and patent lawsuits that deny access to technology that can fight back against global warming...]
Vestas Wind Systems A/S (Vestas) and General Electric Company (GE), acting through its Renewable Energy Business, have reached an amicable settlement of all disputes related to multiple patent infringement claims in the U.S., resulting in the discontinuation of the case pending in the U.S. District Court for the Central District of California as well as all other pending proceedings related to the patents-in-suit.
[...]
Today’s announcement resolves the initial lawsuit GE filed against Vestas and Vestas-American Wind Technology Inc. on 31 July 2017, claiming infringement of its U.S. Patents No. 7,629,705 and No. 6,921,985; Vestas’ two counterclaims against GE claiming infringement of its U.S. Patents No. 7,102,247 and No. 7,859,125 on 15 December 2017; and all pending inter-partes review proceedings with respect to the patents-in-suit.
-
Patents and Software Patents
-
Pushback on Decreasing Patent Quality Narrative [Ed: It is not a "narrative," Michael Risch, it is a HARD reality. Abstract patents and number of US patents doubling in a decade DOES mean decrease in quality.]
It’s been a while since I’ve posted, as I’ve taken on Vice Dean duties at my law school that have kept me busy. I hope to blog more regularly as I get my legs under me. But I did see a paper worth posting mid-summer.
Wasserman & Frakes have published several papers showing that as examiners gain more seniority, their time spent examining patents decreases and their allowances come more quickly. They (and many others) have taken this to mean a decrease in patent quality.
-
As the longest-standing and staunchest Donald Trump supporter among IP bloggers, I must admit I’m more than a little bit disappointed at three very recent events, two of which are related to the mobile industry.
[...]
Antitrust Assistant Attorney General Makan Delrahim’s subordinates made a bizarre filing in early May when they asked Judge Lucy H. Koh of the United States District Court for the Northern District of California to hold a special remedies hearing. I said “bizarre” because of the substance of the brief, the timing (more than three months after the San Jose bench trial), and the way the DOJ antagonized the FTC. That was the first time they were in the tank for Qualcomm (not counting public comments by Mr. Delrahim, a former Qualcomm outside counsel). The second time, in connection with Qualcomm’s appeal of Judge Koh’s certification of a consumer class, their intervention was infinitely more reasonable. But yesterday’s Statement of Interest (of the United States, as the DOJ is authorized to speak on behalf of the federal government regardless of whether an independent government agency like the FTC agrees) is closer in (un)reasonableness to the DOJ’s first pro-Qualcomm filing than to the second.
The district court’s well-reasoned ruling is the FTC’s biggest success in a long time. The DOJ should have more respect for the independent Federal Trade Commission and for the independent judiciary. Instead, the brief, filed yesterday with the United States Court of Appeals for the Ninth Circuit, arrogantly asserts that the FTC and Judge Koh failed to figure out the law.
The DOJ attacks Judge Koh’s decision from three angles: merits (liability), remedies, and the public interest. As for the public-interest part, the DOJ mostly relies on the aforementioned declarations by two other departments, and Reuters’ Stephen Nellis accurately described the gist of those statements as follows…
-
Trademarks
-
Earlier this month, we discussed how Gibson Guitar CEO James Curleigh had recently announced a shift in its IP enforcement strategy to try to be more permissive. That has since calcified into an actual formal plan, but we’ll get into that more in a separate post because there is enough good and bad in it to be worth discussing. What kicked Curleigh’s reveal, however, was backlash from a recent lawsuit filed by Gibson against Armadillo Distribution Enterprises, the parent owner of Dean Guitars. Dean sells several guitars that Gibson claims are trademark violations of its famed “flying v” and “explorer” body shapes. There are differences in the designs, to be clear, but there are also similarities. Even as Curleigh’s plans for a more permissive IP attitude for Gibson go into effect, this lawsuit continues.
But not without Armadillo punching back, it seems. In response to the suit, Armadillo has decided to counter-sue with claims that Gibson’s designs are not only too generic to be worthy of trademark protection, but also that Gibson’s actions constitute interference with its legitimate business. We’ll start with the trademarks.
-
Copyrights
-
The Senate Judiciary Committee voted on the Copyright Alternative in Small-Claims Enforcement Act, aka the CASE Act. This was without any hearings for experts to explain the huge flaws in the bill as it’s currently written. And flaws there are.
We’ve seen some version of the CASE Act pop up for years now, and the problems with the bill have never been addressed satisfactorily. This is still a bill that puts people in danger of huge, unappealable money judgments from a quasi-judicial system—not an actual court—for the kind of Internet behavior that most people engage in without thinking.
During the vote in the Senate Judiciary Committee, it was once again stressed that the CASE Act—which would turn the Copyright Office into a copyright traffic court—created a “voluntary” system.
“Voluntary” does not accurately describe the regime of the CASE Act. The CASE Act does allow people who receive notices from the Copyright Office to “opt-out” of the system. The average person is not really going to understand what is going on, other than that they’ve received what looks like a legal summons.
-
Between crowdsourcing and the explosion of indie video game developers, many of which are far more permissive in IP realms and far better at actually connecting with their fans, we are perhaps entering a golden age for fan involvement in the video games they love. And it’s not just the indie developers getting into this game either; the AAA publishers are, too. One example of this came up last year, when Ubisoft worked with HitRECord to allow fans of the Beyond Good and Evil franchise to submit potential in-game music creations. On HitRECord, other fans would be able to vote and even remix those works. At the end of it all, any music Ubisoft used for Beyond Good and Evil 2 would be paid for out of a pool of money the company had set aside. Cool, right?
Not for some in the gaming industry itself. Many who work in the industry decried Ubisoft’s program as denying those who make music professionally income for the creation of the game music. Others called Ubisoft’s potential payment to fans for their creations “on-spec” solicitations, in which companies only pay for work that actually makes it into the game, a practice that is seen as generally unethical in the industry. Except neither of those criticisms were accurate. Ubisoft specifically carved out a few places for fans to put music into the game, not the entire game. And the “on-spec” accusation would only make sense if these fans were in the gaming music industry, which they weren’t. Instead, Ubisoft was actually just trying to connect with its own fans and create a cool program in which those fans could contribute artistically to the game they love, and even make a little money doing so.
Permalink
Send this to a friend
Posted in GNU/Linux, Kernel, Microsoft at 12:42 am by Dr. Roy Schestowitz
A “spectacular move” by Microsoft and former Microsoft manager promoted to deputy at the Linux Foundation
Summary: The signs aren’t particularly encouraging when one considers that the leadership of the Linux Foundation is a fan of Microsoft and sometimes connected to Microsoft
LINUX.COM has just stopped hiding its sole author’s name (previously it was only visible through the username in the RSS feeds). Story selection is still rather awful. It boils down to openwashing of proprietary software from SAP (Salesforce did a very similar publicity stunt some weeks back), some links to the Linux Foundation’s press releases and other fluff. Nothing about desktop obviously. Never! Very few people in this Foundation actually use GNU/Linux (we’re guessing maybe a handful among 2-3 dozen).
“The “Linux” Foundation works a lot more for Microsoft’s interests than it does for GNU/Linux, especially as a desktop platform.”Linux.com also links to this new example of openwashing by the Foundation in a sector that usually relies on greenwashing to ‘seem’ or ‘feel’ “ethical”. Jim Zemlin is very much a part of it; watch this other tweet of his about openwashing surveillance capitalism at the Foundation.
The “Linux” Foundation works a lot more for Microsoft's interests than it does for GNU/Linux, especially as a desktop platform. That’s a verifiable fact. There are those who might tell Torvalds inane things like, “trust the plan!” (whose?)
We’re really unhappy about what we’ve seen so far this year. Not looking good. Worse than ever before! And it seems like Microsoft is already in third E (as in “extinguish”). The Foundation is now cheering for Microsoft’s GitHub, which is the first and second E (“embrace” and “extend”). See the tweets at the top. █
Permalink
Send this to a friend