10.13.19
Meme: Software Patents at the EPO
Summary: The evolution of “technical effect” nonsense at the EPO
Summary: The evolution of “technical effect” nonsense at the EPO
There’s also an apparent connection to Epstein’s notorious pedophile/child trafficking ring — perhaps a subject to explore another day
Birds of a feather… Nathan Myhrvold with Epstein
Summary: The patent troll of Bill Gates and Nathan Myhrvold has fed a patent troll that’s attacking GNU/Linux and a firm owned by Microsoft’s former litigation chief says it proves “Open Source Software Remains a Target”
WHAT do the men at the top have in common? Both are close friends of Bill Gates, the famous criminal with his scam/sham ‘charity’. We keep gathering new and interesting facts about Gates. “Both of his “Science” advisors were Epsteinites,” told us an anonymous source close to Microsoft, “one of which is shacked up with Steve Sinofsky, the other was the backup executor of his will. Even Nathan Myhrvold got caught hanging out with him. Such a small world…”
“Firm of Microsoft people celebrating (or leveraging for FUD) a lawsuit against GNU/Linux by a patent troll armed by a Microsoft proxy? If Groklaw was still around, PJ would have something to say about it.”We were also sent the above photo. So even Intellectual Ventures (IV) — the world’s largest patent troll created by a close friend of Bill Gates — is possibly connected to this pedophile ring.
Last month GNU/Linux was sued by a troll that this bigger troll had armed and supported. This hasn’t been mentioned in a while, but here’s all the media/blog coverage. Notice how nobody except us [1, 2] took note of the connection. Are they blind? Are they unwilling to research a little? It’s not hard. It’s right there in the public domain.
Shook, Hardy & Bacon LLP, a firm headed/created by Microsoft’s former litigation bigwig (we wrote about this before, e.g. in [1, 2, 3]), has just weighed in by saying “Open Source Software Remains a Target as GNOME Foundation Hit with Patent Infringement Lawsuit” (the words between the lines are, “FOSS is dangerous!”).
“The GNOME Foundation is the non-profit organization that coordinates the development and operation of the popular open source desktop environment with which it shares a name,” they said. “The GNOME desktop environment supports many free and open source software applications.”
The USPTO granted a likely bogus patent and the likes of OIN plan to leverage against it prior art instead of 35 U.S.C. § 101 (typical IBM).
In a move that evidences an emerging pattern, Rothschild Patent Imaging LLC, a non-practicing entity (“NPE”), has filed a complaint asserting patent infringement against the open source software organization, the GNOME Foundation. The GNOME Foundation is the non-profit organization that coordinates the development and operation of the popular open source desktop environment with which it shares a name. The GNOME desktop environment supports many free and open source software applications. Rothschild alleges in the only count of the complaint filed in the U.S. District Court for the Northern District of California, that the GNOME image management software “Shotwell” infringes their U.S. Patent 9,936,086, directed to “a wireless image distribution system and method.” Rothschild Patent Imaging did not just single out GNOME Foundation, but cast a nationwide net in asserting the ‘086 patent – since July 2019 it has filed five other cases against various defendants (Magix Computer, Cyberlink, Zoner, QNAP, and Monument Labs) in Nevada, Delaware, Illinois and California.
Firm of Microsoft people celebrating (or leveraging for FUD) a lawsuit against GNU/Linux by a patent troll armed by a Microsoft proxy? If Groklaw was still around, PJ would have something to say about it. But all we have left is so-called ‘media’ or ‘press’ better skilled at diverting all attention from a Gates scandal to a phony Stallman ‘scandal’. █
By figosdev
Summary: “Quite a few of them are people that would rather replace David with Goliath, just because he’s bigger. Quite a few are already taking money from Goliath.”
Robert Johnson’s “Cross Road Blues” tells the story of a man at the crossroads between this world and the next, “down on his knees” as he watches everybody else pass him. What’s holding “poor Bob” back? We assume it’s a deal he made with the devil.
Atheist Richard Stallman has a number of things to say about the devil — one is that Microsoft is not “the Great Satan” (though some of us aren’t as confident) and more recently, the FSF invited people attending Free software install-fests to consider a “deal with the devil” by including non-free software in their installs.
“…the FSF invited people attending Free software install-fests to consider a “deal with the devil” by including non-free software in their installs.”It’s not at all unusual for atheists to play with religious imagery; as a collection of metaphors and morals, religion has a significant footprint in our cultural and societal backgrounds.
I’m agnostic myself, with sympathy for both theism and theists, and though I’m strongly against the idea of theocracy and pushing religion on people I consider religion just another aspect of culture. It should be optional, whether you choose to reject it or choose to have it in your life. It’s probably no coincidence that this is the position of the First Amendment as well (I’ve always been a fan of it.)
“The church did the same to Galileo for the blasphemy of saying the earth was round, and society did the same to Socrates. Now we do it to Stallman.”As for meaningful concepts of evil, I think they’re often oversimplified. Once you stop paying heed to the fanatics who think of sin in terms of black and white, you are left with some interesting (possibly even amusing) stories of Adam getting “set up” by his own all-knowing creator. Adam’s weaknesses and strengths were known — under the right circumstances, he was arguably more than likely to eat the forbidden fruit.
Adam’s first sin, humanity’s first known imperfection — tells a story far more interesting than the simple prohibition of a particular food. And treating that imperfection superficially is perhaps the first big misunderstanding that leads religious zealots to persecute others for their own imperfections.
“Society too has a compulsion that involves building up heroes and then tearing them down, when it externalises virtues and then projects failures onto a deity or celebrity.”This link between superficiality and unjust persecution is extremely relevant when you are witnessing the rise of the Malleus Hackerum or “Hacker’s Hammer” that is the Code of Conduct; seemingly designed to create a relatively nerdless society by condemning and then banning the autist from his own creation in the name of “inclusion.” The church did the same to Galileo for the blasphemy of saying the earth was round, and society did the same to Socrates. Now we do it to Stallman.
Present-day scientists, engineers and doctors know that if you don’t understand the problem, you’re likely to get the solution wrong too. A way to work past this superficiality is to find a bigger picture as a framework and then pay special attention to the context of facts; because context is everything.
“This is a witch hunt, and the reason it’s a witch hunt is that nothing less — and nothing more just or more honest would be enough to take him down.”We can argue that both Adam and Stallman were “set up” — Adam with foreknowledge of his nature and Stallman with false witness, Adam (humanity) was condemned to death as a result, while others are pursuing the social and political death of Stallman. If you examine the origins of this story, whether you focus on the Judaic aspects or delve into connections with Egyptian mythology, the greater contexts of this “death” are about distance from the creator rather than simple mortality — there is a theme of death and rebirth, of distance and return.
Society too has a compulsion that involves building up heroes and then tearing them down, when it externalises virtues and then projects failures onto a deity or celebrity. Stallman is a great man, he is being defended by feminists and followers while the media places things he didn’t say into contexts that other things he actually said were not said in. This is a witch hunt, and the reason it’s a witch hunt is that nothing less — and nothing more just or more honest would be enough to take him down.
“This is an angry, frothing medieval mob that keeps tacking on additional sentences even as guilt of the crime is being brought more into question.”But we know that he is guilty of blasphemy, and the sentence is public stoning. How far we’ve come in the 21st century.
“We’ve found a witch, may we burn him!”
“How do you know he’s a witch?”
“He talks like one!”
“These aren’t my words, these are deliberate misquotes. And they imply things that are the exact opposite of what I actually said. Large media outlets are saying I defended Epstein, when actually I called him ‘serial rapist.’ How exactly is that defending him?”
The public’s reaction to finding out that the funny hat isn’t his and the pointy nose is a false one?
“And the tech press is dancing and popping champagne corks. Why shouldn’t they? They never worked for Free software in the first place, they work for Big Tech.”“Buuuuurnnnnn him anyway!”
It’s not enough to step down as president — no, he’s got to resign from the board (Bad move, FSF. Like someone said “Reload! Now aim for the other foot.”) No, that’s not enough, he still controls GNU!
This looks nothing like justice, nor due process, nor fair anything. This is an angry, frothing medieval mob that keeps tacking on additional sentences even as guilt of the crime is being brought more into question. And the tech press is dancing and popping champagne corks. Why shouldn’t they? They never worked for Free software in the first place, they work for Big Tech.
Some people will dismiss what I’m saying by calling it a religious sermon, but for them any excuse to dismiss it will do. As a boy, I didn’t predict USB drives with Tarot cards or a divining rod. I was a strong atheist myself at the time — I declared religion to be the antithesis of science at age 4. (I didn’t use the word “antithesis” of course. I didn’t even know the word “atheist” at the time.)
“None of this was a result of Stallman simply being misquoted — it was a result of long-standing effort to remove him.”I predicted USB drives because as a boy, floppies seemed really impractical as a medium and I was interested in EEPROMS. It seemed far more likely to me that when it became practical, we would use chips instead of magnetic devices. Well, what can I say? (I do prefer spindrives to SSD, but for portability — or the modern equivalent of floppies, you can’t beat solid-state.)
Similarly, there was already writing on the wall before Red Hat was purchased (a few months after I mentioned it) and Techrights was already talking about the problems Stallman faced before this all happened. None of this was a result of Stallman simply being misquoted — it was a result of long-standing effort to remove him. If you think all humanity suffers death for “just an apple” or that Stallman is being put through this because he deserves it, I think there’s very obviously a story that makes a lot more sense. One that’s not going to be impossible for people to fit together.
I’ve talked about Stallman being in a public stoning, because they haven’t stopped throwing them yet — and being burned as a witch, because it was necessary to dress him up that way first — and I think it’s very fair to say that what some people really want for him is a crucifixion.
“I don’t ever want to support a company that poses an existential threat to libraries, by reserving full control of titles by the publishers and booksellers.”After all, we stone heretics and blasphemers and we burn witches, but we crucify beloved teachers and prophets. When Stallman wrote “The Right to Read” he didn’t predict DRM in ebooks any differently than I predicted USB drives or the purchase of Red Hat.
Like any science fiction author, he looked at the present day, made notes of the problems that already existed and considered the reasons they exist — and made predictions based on likely next steps. For an atheist, this is no more divination than an expert game of chess is.
And though we would prefer that he had not been right, DRM in ebooks exists today. I started boycotting Amazon the day I heard they were doing this to books, because at the time I considered adding DRM to books nearly the most evil thing they could do with the technology. I don’t ever want to support a company that poses an existential threat to libraries, by reserving full control of titles by the publishers and booksellers.
“If the New Testament tells us anything, it’s that literally no amount of virtue can make you immune from being crucified by an angry mob sponsored by a threatened empire.”As for my interest in mythology and religion, Kirby Ferguson’s “Everything is a Remix” talks about how Star Wars was inspired by Joseph Campbell’s “The Hero with a Thousand Faces”. I already knew about that connection, but “Everything is a Remix” is really worth a watch; you can find it on invidio.us.
If the New Testament tells us anything, it’s that literally no amount of virtue can make you immune from being crucified by an angry mob sponsored by a threatened empire. I’m certainly not implying that Stallman is Jesus; I would sooner point out the commonalities between Big Tech and Rome.
It’s not a metaphor I spend a lot of time on, but consider the reaction of the Church to the printing press — or possibly the matter of lead pipes (a great technological achievement, you can’t deny it) versus today’s backdoors in our network technology.
Will Big Tech fall as Rome did, due in part to the failure inherent in digital plumbing? I don’t know, and I don’t even know enough about Roman history to be sure it’s a good metaphor. I do know that the Tech CEOs are as arrogant as Nero. Somewhere there’s a scholar who is rolling his eyes right now, and I’m sorry. But the point of history is to learn lessons from it, if we can.
In various cultural traditions, there are great crucifixions — not only of Jesus but Rabbi Akiva’s death by torture and the crucifixion of Osirus and Horus.
The cross itself, prior to its use in Christianity (for example, the Celtic cross) can be a symbol of the sun, and by extension the seasons, and by abstraction the heavens (where the sun is) or time itself.
“You can’t simply take the life of a hero — if you want to truly destroy him, you have to first steal his virtue.”When you crucify a beloved hero, you create a martyr; you symbolically bestow timelessness and immortality. You can’t simply take the life of a hero — if you want to truly destroy him, you have to first steal his virtue. Replace his halo with a crown of thorns, spit on him and mock him as a “king.” Bear false witness, and attack his legacy and teachings. Only when you succeed in that is he destroyed.
This is not a sermon dressed up as a history lesson, it is a history lesson dressed up as a sermon.
There are a few instances, at least — of religious stories with a hero dying in a crucifixion and gaining immortality. There are cliches of artists “suffering for their art” or even literally dying from their own soul’s torment as they try to become immortal as well.
And let’s not ignore Assange or Aaron, as other recent examples that paint a picture of this happening a bit too often.
Along with this recurring story of crucifixion and immortality, history contains far more examples of building up a hero so that they can be destroyed. Sometimes that hero is false, though he doesn’t have to be. Often the reason is jealousy, spite, or simply unreasonable hopes (or impossible standards) that were dashed when they went unmet.
“Unfortunately, we live in an increasingly superficial and narcissistic society — it demands heroes in its great desperation, and destroys everyone who falls short of impossible standards.”The narcissist is also constantly building heroes and producing metaphorical idols — of idealised people who let him down and must be destroyed and punished for their sins. In the too-rare instance where someone discovers this habit and turns away from it, they can try to become fair and rational in their expectations of other people.
Unfortunately, we live in an increasingly superficial and narcissistic society — it demands heroes in its great desperation, and destroys everyone who falls short of impossible standards. I’ve heard people say that this attitude signals a coming dark age. But aren’t we in a dark age already? Aren’t we surrounded by the gradual slaughter of everyone good and the triumph of evil?
History tells us things will get worse before they really improve, but the path of the hero is to live and sometimes suffer, for better things and higher purposes regardless of the state of the world. Or as George Bernard Shaw tells us, “all progress depends on the unreasonable man.”
After Stallman “dies” the manufactured death of his virtue, many will rush in to take his place and demand your loyalty and expect your praise.
There will be arguments and debates about what it truly means to be “free.” But false Stallmans and real-life Judases aside, freedom is fundamentally very simple. You don’t stand for freedom by worshiping idols but by seeking the truth. The truth will not be handed down from Goliath-like corporations, but expressed by David-like individuals who serve as an example to others. Freedom is a struggle, it is not the medals they give you for it.
“But Stallman was not our God, he was (and is) a messenger of freedom. That message is a threat to power, and history makes it very clear how that often works out in the end.”You can choose to stand with the Roman Empire, if you believe it has more virtue than those they prefer to see crucified. But Stallman was not our God, he was (and is) a messenger of freedom. That message is a threat to power, and history makes it very clear how that often works out in the end.
Watch the people who try to make an example of him — and watch carefully what they propose now that he has fallen. Those of us who think freedom is the most important thing, will not crucify the people who stand against us — but we will never follow them either. We will fight their lies with truth, their rabid, drooling spite with reason, and their efforts to destroy Stallman with a renewal of his effort to make all software free. Even Michael Jackson has a project to defend his legacy — you can guarantee that Stallman will. Billionaires have their philanthropy, most likely for the same reason.
Free software is for everybody that wants freedom, regardless of their beliefs.
“Quite a few of them are people that would rather replace David with Goliath, just because he’s bigger. Quite a few are already taking money from Goliath.”There are people who don’t agree with that, who don’t include Stallman and want to exclude him. They don’t speak for us, and they never will. If you try to find the context of what they really want, you barely have to scratch the surface. Quite a few of them are people that would rather replace David with Goliath, just because he’s bigger. Quite a few are already taking money from Goliath.
Of course, it’s very much up to you what you do with your freedom — the purpose of a watchdog isn’t to boss you around, it’s to alert you to problems. We can work on the solutions together, when it suits us to voluntarily do so. We propose and advocate our ideas — you propose and advocate yours. We all decide what to do with what we know. That’s a big part of what freedom is.
When we agree on something, we struggle together. When we can’t agree, we struggle apart. It’s very useful to find our commonalities, and understand our differences. For many of us, Stallman and freedom are two things we are not willing to compromise on.
Compromise can be a wonderful thing, when nothing vital is sacrificed and the net benefit to each side is positive. When the level of compromise exceeds what is net beneficial, the word becomes synonymous with failure, security issues and misplaced trust. The more trust people demand, especially when it is one-sided, the more likely it is that trust is misplaced.
I believe we have put too much trust in the wrong people, and particularly the wrong ideas, and those mistakes have left Free software compromised. And I don’t believe that either fundamentalism or becoming too lax will help, nor do I disagree with Stallman on the matter of making money with Free software.
“I believe we have put too much trust in the wrong people, and particularly the wrong ideas, and those mistakes have left Free software compromised.”But I do think the secular cults of Mammon (who worship wealth and power over goodness itself) are the real reason our respected teacher now lives in exile. He’s only a man after all, but he’s certainly greater than many who enjoy the idea that they’ve finally beaten him.
He’s already fallen, but this has gone on for 20 years — they won’t stop until he’s dead, and they will continue even after that.
Perhaps that’s justice for a dictator or mass murderer, but we do it for folk heroes too. Say what you will about the scale of Stallman’s legacy — but if you think he’s anything less than a folk hero, you are truly fooling yourself. █
Licence: Creative Commons CC0 1.0 (public domain)
This is not a good thing. Ultimately, I want computing power to be in my hands, not Microsoft’s or any other company’s. If you go along with this, as any poor sod working in Venezuela with Adobe products can tell you, you’re asking for pure misery.
The Denver-based Linux PC manufacturer announced plans to start shipping two laptop models with its Coreboot-powered open source firmware later this month. Jason Evangelho, Senior Contributor at Forbes, cited this move as a march towards offering open source software and hardware from the ground up.
System76, which also develops Pop OS, is now taking pre-orders for its Galago Pro and Darter Pro laptops. It claims that Coreboot will let users boot from power off to the desktop 29% faster.
Coreboot is a lightweight firmware designed to simplify the boot cycle of systems using it. It requires the minimum number of tasks needed to load and run a modern 32-bit or 64-bit operating system. Coreboot can offer a replacement for proprietary firmware, though it omits features like execution environments. Our own Don Watkins asked if Coreboot will ship on other System76 machines.
Red Hat Inc.’s finance chief Eric Shander has been dismissed from the company, forfeiting a $4 million retention award that was agreed to ahead of Red Hat’s acquisition by International Business Machines Corp.
The Raleigh, N.C.-based software company confirmed late Thursday that Mr. Shander was no longer working at Red Hat. “Eric was dismissed without pay in connection with Red Hat’s workplace standards,” a company spokeswoman said in a statement.
The company, which said that its accounting and control functions remain healthy, on Friday declined to provide specifics about what led to Mr. Shander’s dismissal.
“Red Hat Inc.’s finance chief Eric Shander has been dismissed from the company, forfeiting a $4 million retention award that was agreed to ahead of Red Hat’s acquisition by IBM,” reports the Wall Street Journal…
I’m announcing the release of the 5.3.6 kernel.
All users of the 5.3 kernel series must upgrade.
The updated 5.3.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.3.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-s…
Lead developer of the open-source Godot 2D/3D game engine Juan Linietsky has continued working daily on the engine’s Vulkan renderer ahead of Godot 4.0.
With many of the prominent fixes that we’ve talked about for GNOME Shell and Mutter since last month’s 3.34 release having been back-ported to 3.34.1, this weekend’s release of GNOME Shell 3.35.1 and Mutter 3.35.1 as the first steps towards GNOME 3.36 aren’t all that big. But at least in the case of this new Mutter development release are some worthwhile fixes.
GNOME Shell 3.35.1 has just different bug fixes and clean-ups but nothing particularly special. While no big features yet, at least the useful fixes over recent weeks were back-ported to the 3.34 stable series.
While longtime X11 developer Keith Packard is now working for SiFive on RISC-V processors by day, he’s still involved in the Linux graphics world through his contract work for Valve. At the XDC2019 conference earlier this month he presented on display timing, the current Linux plumbing for it, and also bringing up Vulkan will better support variable rate displays in the future.
Keith for a while now has done contract work for Valve with Linux graphics infrastructure improvements around better supporting VR HMD hardware on the Linux desktop and more recently on display / refresh rate timing and ensure it works punctually.
The DCH Health System said its hospitals in the west Alabama cities of Tuscaloosa, Northport and Fayette resumed admitting patients Thursday, and its imaging and patient scheduling services were going back online Friday.
The system said key operations were back to normal 10 days after a ransomware attack encrypted information and prevented its computer systems from communicating with each other. The hospitals kept treating people, but new patients were sent to alternative locations in Birmingham or Mississippi.
The company hasn’t said how much ransom it paid to regain control of its systems, but an executive said insurance covered the cost.
It’s pretty standard for at least a few third-party developers to get crushed during Apple’s annual press conference. At some point in the presentation, Apple will announce a new OS feature, while some developer watches in disbelief as Apple swindles their entire business.
It’s a phenomenon widely referred to as getting “sherlocked” (you can read more about how the term came to be here). It’s oddly flattering and intensely infuriating, and I know this first hand because it happened to the company I work for.
Lots of great backend work happened this week which is very important, but not terribly flashy. And most of the in-progress work I alluded to last week hasn’t landed yet. So I’m afraid the user-visible changes will have to be a bit light this week. But fear not! For Plasma 5.17 is undergoing its last rounds of final polish and bugfixing before the release next week, and work churns along on lots of great stuff slated for Plasma 5.18 and the next apps versions!
With KDE Plasma 5.17 releasing soon, it’s been seeing a lot of last minute fixes while feature activity is also brewing around Plasma 5.18.
Plasma 5.17 reached beta last month while next week is the anticipated release of Plasma 5.17.0! Just a few days to go for that big update to the KDE desktop. As such, developers have been tidying it up while also brainstorming about what should be in store for Plasma 5.18.
There are several ways you can tweak Ubuntu to customize its looks and behavior. The easiest way I find is by using the GNOME Tweak tool. It is also known as GNOME Tweaks or simply Tweaks.
I have mentioned it numerous time in my tutorials in the past. Here, I list all the major tweaks you can perform with this tool.
I have used Ubuntu here but the steps should be applicable to any Linux distribution using GNOME desktop environment.
If you are an avid Linux user who hops distros every weekend, it can be confusing at times to pick a distro to install. Well, not anymore. There exists a website named DistroTest that lets you test Linux operating systems from your web browser without requiring any sort of installation so that you can get a better idea regarding what to expect from the operating system without even downloading it.
The website offers 807 versions of Linux distros across 244 operating systems and hence, it is more likely that the distro you’re planning to check out will have its version on DistroTest. Cool, right?
The best part is, it won’t ask any of your personal information and will not require you to create an account on the website. This way, you don’t have to worry about any privacy-related risk.
Open source vendor Suse has pulled the plug on its OpenStack Cloud a few months after its latest release, the company announced on Wednesday.
Suse is throwing in the towel on OpenStack in favor of its Cloud Application platform, which is based on the open-source Cloud Foundry platform, and a Kubernetes based-container platform.
As part of that move to Kubernetes, Suse is no longer producing new versions of its OpenStack Cloud while ceasing the sales of its existing OpenStack product.
The decision is part of a shift in company strategy from infrastructure enablement to enabling application delivery, the company said in a blog post announcing the decision Wednesday.
The blog post quotes IDC analyst Al Gillen, who says “applications and experiences, rather than … infrastructure deployments,” are key to differentiation. SUSE’s decision “moves the company’s value-add higher up the technology stack, to a level where customers want and need tools that empower them to achieve differentiation,” Gillen says.
SUSE is focusing itself on cloud-native and container technologies for application delivery, Kubernetes and DevOps, the company says. Specifically, it’s putting its resources behind its Cloud Application Platform, based on Cloud Foundry, as well as SUSE CaaS Platform, for Kubernetes container management (a.k.a. “containers as a service”).
Linux company SUSE Group is killing off its OpenStack Cloud product, stopping development in order to focus more on application delivery.
SUSE OpenStack Cloud is the company’s distribution of the open-source OpenStack platform that provides a framework to create and manage both public cloud and private cloud infrastructure.
The surprise announcement comes just a few months after the release of SUSE OpenStack Cloud 9, which was based on the most recent OpenStack Rocky release. That version was also the first to integrate with Hewlett-Packard Enterprise Co.’s Helion OpenStack, which was acquired by SUSE along with other cloud assets three years earlier.
The openSUSE’s Open Build Service (OBS) has been picking up the ability to build Windows Subsystem for Linux (WSL) images for those wishing to craft their own WSL distribution or just rebuild openSUSE from source as a reproducible/verifiable build.
For those not following on Twitter, recently I picked up one of the new Dell XPS 7390 laptops for finally being able to deliver Linux benchmarks from Intel Ice Lake! Yes, it’s real and running under Linux! For those eyeing the Dell XPS 7390 with this being the first prominent laptop with Ice Lake, here is a brief look at the initial experience with using Ubuntu 19.10.
The Dell XPS 7390 laptop that’s being used for testing features the Intel Core i7 1065G7 processor, an Icelake quad-core processor with 1.3GHz base frequency and 3.9GHz peak turbo frequency. This Ice Lake processor features Gen11 Iris Plus Graphics, which we are eagerly testing with the latest Linux graphics drivers.
The tools include three components: A plug-in for MaaS, a bare-metal deployment tool from cloud industry leader and Ubuntu creator Canonical Ltd.; a scripted service formula, or ‘charm’, created with Canonical’s Juju modelling tool that enables users to remotely deploy Adaptec ARCCONF in any type of cloud environment so the adapters and connected devices can be configured and managed remotely using the Juju dashboard; and a plug-in for the OpenStack Horizon GUI that enables users to discover, configure and conveniently manage both Adaptec Smart Storage standard adapters and custom embedded solutions.
Travis CI will now allow developers to test open source software on ARM-based architectures under a just announced alpha program.
The CI vendor said it has been working with Canonical, ARM and cloud provider Packet “for the past few months” on the programme, the first fruits of which are free ARM-based builds.
Micropalaeontologist Martin Tetard has been developing a Raspberry Pi microscope aptly named the microscoPI. The Raspberry Pi based microscope can capture, process, and store images and image analysis results. Watch the video embedded below to learn more about the unique Raspberry Pi microscope, which features a rechargeable battery secured under the base of the microscope, making the system completely portable and measuring less than 30 cm in height.
Between nuclear weapons, climate disaster, and tech bros’ unbridled thirst for control over our lives, it sure does feel like the end is approaching “nigh” status.
In a post-apocalyptic future, be it nuclear wasteland or Anthropocene nightmare, a common sci-fi trope is that those able to harness old world technology will have the upper hand. Collapse OS is a new open source operating system built specifically for use during humanity’s darkest days. According to its creator, software developer Virgil Dupras, Collapse OS is what the people of the future will need to reconfigure their scavenged iPhones. For now, though, he’s hosting the project on GitHub and looking for contributors.
Multiple threats like climate disaster, nuclear war, depletion of resources keep looming over the world, and the idea of apocalypse seems inevitable.
In any case, it’s never a bad idea to prepare for the future in advance. So a software developer named Virgil Dupras has developed a new self-replicating open-source ‘Collapse OS‘ that can survive humanity’s darkest days.
In the post-apocalyptic world, we’d probably have to return to old-world technology by scavenging whatever we have built so far.
Dupras envisions a future where the global supply chain collapses — and there won’t be mass production of electronics anymore. But those who manage to get hold if it will have the upper hand.
Wondering what kind of operating system you would use in a post-apocalyptic world after the collapse of society might sound like kind of a low priority. But that’s because you’re not actually in the situation and don’t have to worry about how humankind can make a go of it in Earth’s darkest hour yet. This is where Collapse OS, a new Z80 processor-based open-source operating system being developed by software developer Virgil Dupras, comes into play.
New Vector has announced $8.5 million in funding to scale its open-source, secure communication network, a bid to revolutionise data privacy and ownership in the messaging app space. The investments come from European VCs who specialize in enterprise tech: Notion Capital, Dawn and firstminute capital.
Necessary for understanding New Vector’s business is to first understand Matrix. Matrix is an open-source project, building a global network for decentralised communication. Users can collaborate securely via end-to-end encryption, and notably, they retain all ownership and control over their data.
Tech giants like Facebook, Google, Apple, and Microsoft needn’t be gatekeepers to communication. That’s the idea upon which Matrix, an open standard and decentralized protocol for real-time communication, was formulated. It’s designed to allow users of one service provider to communicate with users of different providers via online chat, voice over IP, and videotelephony, ideally as seamlessly as SMTP (Simple Mail Transfer Protocol) facilitates email exchanges across clients and services.
Implementing the Matrix protocol at scale requires infrastructure and technical expertise, however — and that’s where startups like New Vector have carved out a niche for themselves. In a little over two years, the startup has helped to grow the Matrix network 400% to 11 million users across 40,000 deployments, including French and U.S. government agencies, Wikipedia parent Wikimedia, KDE, RedHat, and more.
Around 35 per cent of Paris’ 1,000 IT applications are Lutece-driven and 15 per cent are based on other open-source software, with the remaining 50 per cent using proprietary systems. As applications are upgraded or new ones added, Lutece and open-source tools will be deployed as much as possible, Lanouar said, noting that this approach enables greater autonomy and agility for the City, as well as the ability to be more transparent and create a better user experience for the citizen.
There has been plenty of coverage of the very expensive failures of TechShare, Dallas County’s attempt to create case-tracking software that could be used in any Texas criminal court. Like many battles over operations-level issues, it is easy to miss the forest for the trees.
One basic principle of good governing was flagrantly violated in this instance: Government shouldn’t be involved in a for-profit operation. TechShare’s leadership sought profit, rather than to merely recoup costs. I hope members of both parties can agree this is a principle we should consciously adopt. A public discussion will help avoid future misadventures that cost the county $30 million for a hot plate of nothing.
The term “crony capitalism” gets tossed around a lot, and it sometimes unfairly tarnishes good models of public-private partnerships. Crony capitalism usually means the government gives preference to certain favored private firms without seeking the best price (or quality) for a service or good. That preference is odious because it denies taxpayers the best price. Crony capitalism props up firms that would otherwise fail, using taxpayer money as insurance.
Although the techniques are generic, AllenNLP Interpret is intended for use in NLP. Inputs to NLP systems are strings of text, usually sentences or whole documents, and the text is parsed into its constituent words or tokens. AllenNLP Interpret includes saliency maps that show each token’s contribution to the model prediction; a use case for this might be explaining which words in a sentence caused its sentiment to be classified as positive or negative. The toolkit also includes two adversarial methods that show how changing the tokens in the input could affect the output. The first, HotFlip, replaces the input word that has the highest gradient with other words until the model output changes. The other attack, input reduction, iteratively removes the word with the smallest gradient without changing the output; this results in input texts that are “usually nonsensical but cause high confidence predictions.”
InfoWorld — the technology media brand committed to keeping IT decision-makers ahead of the technology curve — announces the winners of its 2019 Best of Open Source Software Awards, better known as the Bossies. The annual Bossie awards recognize the most important and innovative open source projects for businesses and the IT professionals who serve them. The 26 winners in this year’s Bossie Awards are the next-generation tools and technologies that are enabling digital transformation, allowing businesses to succeed and IT organizations to excel at a time when the technology is more complex than ever.
Given the growth of data and the Internet of things, insofar as data is concerned, the fibre industry must adopt open source architecture in terms of designing and building networks.
This is the sentiment shared by Andile Ngcaba, president of the FTTx Council Africa, at the annual Fibre Optic Conference that kicked-off at the Sandton Convention Centre yesterday.
Ngcaba was speaking about the future of the industry and how to be part of it, pointing out that modern businesses are being built on open source, while modern telcos are going to be built on open source.
In its seventh year, All Things Open is preparing for more than 5,000 attendees. The conference will feature more than 250 talks from some of the top technologists and decision-makers discussing open source technology during three days of programming at the Raleigh Convention Center.
Haven’t decided whether to attend the All Things Open conference in Raleigh? Well, Open Source is growing more important in technology so you might want to keep an open mind about attending. And more than 4,500 people are already scheduled to attend. Action begins Sunday.
The event will be hosted in Bulawayo in the 1st floor of the NetOne Building, Corner Fife Street and L.Takawira. Opposite Central Police Station.
Maintainers -the guys/girls who build source code into a binary package for distribution, commit patches, or organize code in a source repository– will be present to help out would-be contributors to help move open-source projects forward.
Mozilla announced plans this week to add native support for the OpenPGP email encryption standard inside Thunderbird, the organization’s open-source email client.
Not too long ago I attended Linux Foundation’s Open Source Summit in San Diego, and this declaration of world dominance (tongue in cheek) was a fairly prominent refrain throughout. From best practices in OS development to emerging technologies to getting started—how to create an open source strategy, sustain it, and the right path to developing an Open Source Program Office (OSPO).
All open source all the time.
What became abundantly clear to me through the cacophony of voices representing developers, technologists and enthusiasts is that at the center of all that is open source are three key components critical to ultimate success (however you define it): people, processes, and technology.
[...]
The entire tech space is being redesigned by a digital transformation and the emergence of new open source technology platforms. It’s a revolution of sorts, led by groundbreaking innovations in machine learning, open source IoT, cyber security, virtual reality, big data analytics, blockchain and open source development tools. Additionally, there’s technology to help you know what’s in your code and automate the detection and remediation of license compliance and security issues in your DevOps life cycle.
Extreme Networks, Inc. (EXTR) today announced it has turned governance of StackStorm™ platform, its popular open-source workflow automation platform, over to The Linux Foundation. In making this transition, Extreme expects the Foundation’s open source community to accelerate development and adoption of the platform so enterprises everywhere can reap the benefits of new applications and use cases.
Scylla (the company) takes its name directly from Scylla [pronounced: sill-la], a Greek god sea monster whose mission was to haunt and torment the rocks of a narrow strait of water opposite the Charybdis whirlpool.
Outside of Greek history, Scylla is an open source essentially distributed NoSQL data store that uses a sharded design on each node, meaning each CPU core handles a different subset of data.
A year after its controversial switch to the Server Side Public License (SSPL), and with new products livening up the summer, MongoDB remains unrepentant.
The change was aimed at making vendors selling a service using the company’s code share the source of applications used to run the service as well as any tweaks. The move appeared to be aimed squarely at cloud vendors, content to “capture all the value and give nothing back to the community,” as Dev Ittycheria, CEO of MongoDB, told us at the time.
Elements of the open source community were less than impressed. The Open Source Initiative (OSI) rejected the company’s attempts to get the licence approved and eventually MongoDB withdrew the thing from the process, although the company continued to use it for its own products. Indeed, at MongoDB’s London .Local event, where we met co-founder and CTO Eliot Horowitz, the company was trumpeting the opening up of its Compass GUI for MongoDB under the SSPL.
At Percona Live Europe last week, one such example came up around the open source scene that is developing in Russia and how one of the projects that is now starting to open up to international use.
Open source has changed, obviously it has. Starting from its origins among the hobbyist programmers and hackers who dared to defy the proprietary Silicon Valley behemoths, the open community-centric model for software development has now been widely adopted by the commercial software sector.
In many cases, open source has become the norm for modern platforms, tools and applications. But how has this affected the nature of open development and what impact has this shift left in its wake on the data landscape that we view today?
Ontotext has announced GraphDB 9.0, which is aimed at lowering the effort required for development and continuous operation of knowledge graphs by opening multiple integration extension points for its users and developers.
GraphDB is a database for managing semantic information with more than 30 large production installations in big enterprises. With the growing complexity of enterprise data integration, many organizations are starting the journey of building knowledge graphs.
Ververica, the original creators of Apache Flink, today announced at Flink Forward Europe the launch of Stateful Functions (statefun.io), an open source framework that reduces the complexity of building and orchestrating stateful applications at scale. Stateful Functions enables users to define loosely coupled, independent functions with a low footprint that can interact consistently and reliably in a shared pool of resources. Ververica will propose the project, licensed under Apache 2.0, to the Apache Flink community as an open source contribution.
DataStax has opened up ‘early access’ to its DataStax Change Data Capture (CDC) Connector for Apache Kafka, the open source stream-processing (where applications can use multiple computational units, similar to parallel processing) software platform.
As a company, DataStax offers a commercially supported ‘enterprise-robust’ database built on open source Apache Cassandra.
Stream processing is all about speed and cadence, so, the DataStax CDC Connector for Apache Kafka gives developers ‘bidirectional data movement’ between DataStax, Cassandra and Kafka clusters.
EllisLab founder Rick Ellis announced yesterday that ExpressionEngine has been acquired by Packet Tide, the parent company of EEHarbor, one of the most successful EE add-on providers and development agencies in the community. A year ago EllisLab, the developers of EE core, was acquired by Digital Locations but Ellis said the company ended up not being a good fit for the future of the CMS…
RideAustin will make its ride-hailing software open to the public. The company announced Thursday it will open source its platform so other entities can make use of its market-proven non-profit model
Winsor: What advice would you offer to businesses who are building out open source programs?
Hlivko: Before you launch, you’ll start running into engineering challenges, funding questions, dev/ops pipeline integration, branding considerations and a host of other small items to work through. I would recommend identifying key talent, both leadership and team members, which are good at leaning into the model and thinking through these problems horizontally. A small core internal team can advocate for the crowd and evangelize it when ready.
Facebook today released the latest version of its deep learning library PyTorch with quantization and Google Cloud TPU support for speedier training of machine learning models.
Tensor processing unit support begins with the ability to train a model with a single chip and will later be extended to Cloud Pods, Facebook CTO Mike Schroepfer said today.
Facebook Hydra is a new open-source framework aimed to speed up the creation of Python applications by simplifying the implementation of common functionality such as command-line argument handling, configuration management, and logging.
Facebook developed Hydra to accelerate development of several research projects where the ability to cope with changing requirements was key.
According to the report, open source monetisation strategies vary and evolve. One of the most popular models at present is what is referred to as “open core”. This involves a blend of free open source and proprietary software, with different levels of openness within the model. Docker, Elastic, GitLab, MongoDB and Redis are all identifiable as open core companies.
Another open source monetisation strategy is the development of a corporate-sponsored open source project which is often used as a business development resource rather than as the company’s primary offering. An example of this is Kubernetes, which has been developed primarily by Google and which, through its widespread adoption, has boosted awareness of Google Cloud Platform.
“Within the increasingly competitive cloud services market, building developer trust with open source initiatives (like Kubernetes) provides valuable differentiation,” CB Insights comments.
“Packetcraft is excited to offer open source Bluetooth protocol stacks that are qualification tested and up to date with the latest specifications,” said John Yi, founder and CEO of Packetcraft. “We are offering BLE software solutions with a combination of quality, features, and licensing flexibility that is unmatched in the industry.”
Enea this week announced a joint Proof of Concept (PoC) with flexiWAN and Intel, demonstrating a reference solution for secure SD-WAN based on open source applications. It will be showcased at the SDN NFV World Congress in The Hague, October 14-17.
How can communication service providers best use open source development and deployment models, and how does the increasing viability and visibility of open source software impact how CSPs and their suppliers do business? Does it really result in lower equipment and development costs for operators, and how much of an investment – in terms of time and money – does a CSP need to make in open source and the community in order to maximise its returns? If open source results in an unmanageable increase in software components with too many variants, then do we instead need a “curated” open source model driven by CSP-led reference designs? Above all, is open source beneficial or detrimental to the telecoms supply chain?
Alluxio, developer of open source data orchestration technology used by seven of the world’s top 10 Internet companies, today announced it has been named to the Database Trends and Applications “Big Data 50 – Companies Driving Innovation in 2019” list featured in its Big Data Quarterly and Solutions Review “The Top 13 Free Open Source Storage Solutions” list.
AMP, Google’s somewhat controversial project for speeding up the mobile web, has always been open-source, but it also always felt like a Google project first. Today, however, Google announced that the AMP framework will join the OpenJS Foundation, the Linux Foundation-based group that launched last year after the merger of the Node.js and JS foundations. The OpenJS Foundation is currently the home of projects like jQuery, Node.js and webpack, and AMP will join the Foundation’s incubation program.
AMP enters the open source foundation to broaden open governance, drive diverse, cross-industry adoption and continue improving the web for all.
Google is keeping its Knative and Istio projects close to the vest, which could limit their reach long term, early adopters say.
“The cost savings of open networking are certainly compelling, but for our team it is the fabric-wide visibility together with the SDN automation that make the Pluribus Networks solution so valuable to us, said Bart Myszkowski, AMS-IX network engineer.
IBM has announced that the ABAP SDK for IBM Watson is now available. The open-source project is designed to allow developers to use IBM Watson Developer Services within SAP environments and directly from Advanced Business Application Programming (ABAP) code.
IBM has rolled out a new open source Software Developer Kit (SDK) that lets users call Watson services directly from ABAP code in SAP systems.
The project’s lead developer, IBM’s Bradley Knapp described the release to Computer Business Review as a “perfect entrance point for the democratisation of AI and machine learning for the SAP ERP space.”
In a bid to provide interoperability and data-sharing across several cybersecurity products and companies, IBM Security and McAfee are spearheading an open-source cybersecurity alliance along with 14 other cybersecurity companies across the globe.
Cybersecurity is headed to open source with a new initiative backed by IBM and McAfee, among other companies.
The Open Cybersecurity Alliance (OCA) was formed to pull the fragmented elements of the cybersecurity landscape under one roof by using open source code and practices. The new open source group is under the umbrella of the Organization for the Advancement of Structured Information Standards (OASIS).
That’s about to change as dozens of tech companies have joined together to create the Open Cybersecurity Alliance, which is an effort to share security solutions and increase mutually beneficial security cooperation.
The open-source movement has a history that captures both its community spirit and renegade impact. Sometimes, that history even involves a yapping animal.
In Linux, the “biff” command notifies users when mail arrives and identifies the deliverer. Was “biff” a cleverly conceived acronym for a remarkably sophisticated programming language?
No. It was named after a dog owned by the developer of Berkeley Software Distribution or BSD, a Unix-similar operating system built in the 1970s. Biff used to run out and bark every time the mailman showed up.
Open-source code has moved way beyond its early days as a barking dog in the computer world. Today, open-source companies are commanding huge multiples on Wall Street and major players are opening wallets, as evidenced by IBM Corp.’s purchase of Red Hat Inc. in October for $34 billion.
Guenther Steiner has called out Haas’ rivals’ hypocrisy with some teams keen to adopt an open-source approach to parts of their design but not go down the standard parts route.
As part of the debate over the 2021 regulations, some teams have balked against the idea of introducing more standard parts into Formula 1.
However, those same teams are keen on putting parts of their designs out on open-source, allowing others to copy them.
Employees sent an open letter to Github’s CEO asking the company to shed its contract with U.S. Immigration and Customs Enforcement
Tensions continue to grow over a GitHub contract with Immigration and Customs Enforcement, as employee activists pressure the company to cut ties with the agency.
In a standing-room-only meeting yesterday, executives answered questions from employees on the controversial contract. CEO Nat Friedman fielded questions from employees and attempted to explain why the company would renew a $200,000 contract with the immigration agency. The Verge has obtained a transcript of the conversation.
“This is an important topic not just because we find this issue of US immigration policy so odious, offensive, abhorrent, cruel, evil, such a meaningful topic,” Friedman said, according to the transcript. “I personally feel that. I know many other Hubbers share that thought.”
Winding Tree, the open-source travel distribution platform, announces today that it will be hosting its third travel hackathon with Travel Forward, the newly created technology track of World Travel Market (WTM). The hackathon will run throughout the duration of WTM London 2019, one of the largest travel trade shows in the industry, taking place in London from November 4-6, 2019.
UNICEF, the United Nations Children’s Fund, has launched a crypto fund to receive, hold and distribute donations of bitcoin and ether in its aim to back open source technology for children around the world.
UNICEF said in an announcement on Wednesday that in a first for United Nations organizations, the Cryptocurrency Fund will receive contributions in cryptocurrency and grant out in the same digital currency form.
ConsenSys, a Brooklyn, New York-based Ethereum development studio studio, is awarding $175,000 to seven different open-source projects being developed on the Ethereum (ETH) blockchain.
Revealed on October 10, the software development projects include Lighthouse, an innovative Ethereum software client, Tellor, an oracle network for handling off-chain data, Alice, a mobile-based platform for developing decentralized applications (dApps).
Benzinga is highlighting nominees for the fifth annual Benzinga Global Fintech Awards ahead of the event Nov. 19 in New York City.
One nominee is the Fintech Open Source Foundation, or FINOS, a nonprofit for the promotion of open innovation in the financial services and tech spaces.
Minsheng Life Insurance has come onboard as a partner of the PlatONE open-source blockchain infrastructure, a project recently launched by non-profit research institution Wanxiang Blockchain and the PlatON global computing network.
About 23 years ago, I created the Debian Free Software Guidelines to help the Debian developers decide what software was permissible to include in Debian, which aspired to be 100% Free Software, and what should be consigned to a “non-free” repository upon which Debian would never depend. Nine months later, those guidelines became the Open Source Definition, and I announced Open Source to the world.
[...]
Despite the seeming impossibility of its enforcement, the Vaccine License is the most professionally constructed of this pack, carefully targeting the approval process of the Open Source Initiative – and IMO missing it. But all three licenses appear to be unlikely to obtain the agreement of a court in enforcement, and scaling their requirements would be a sort of full-employment act for lawyers.
Let’s work through how these licenses would be enforced.
When these licenses are enforced, the copyright holder is the plaintiff, a fancy word for someone who makes a complaint. Their complaint is that the defendant, the licensee, committed a tort, a violation of civil law. The tort is copyright infringement.
The important point here is that the complaint isn’t that the license was violated, the complaint is that the defendant did not have a license at all, and is infringing copyright. The defendant then has to prove that they did have a license, and that they were obeying the license’s terms, or that the court should for some reason not honor those terms.
Licenses are also contracts, and thus the tort can be breach of contract. But contracts require the consent of both parties – the copyright holder, and the licensee. Real consent is indicated by signing the contract, but that doesn’t ever happen with this sort of license. Instead, there is a lesser indication of consent by the action of using, distributing, or modifying the software.
“Open source” is a trend in various industries. It started to take root in the software industry (Mozilla), followed by biotechnology (CAMBIA) and publishing, where the creative commons concepts have taken root. Several of these trends are based in an opposition against corporate power generated by exclusive rights provided by patents and copyright. Others have a positive goal, i.e. to enhance participation by a much wider population to generate, validate and share information (e.g. Wikipedia).
The seed sector has a very good story to tell with regard to its contributions to societal goals, but in parts of society, the corporate image and the use of patents create questions, so we could expect that also our sector would be challenged. It is there now. The University of Wisconsin developed an Open Source Seed Initiative several years ago, which was followed in Germany more recently. Access to “freed” plant genetic resources is made conditional to users making them available under the same “open source” conditions – that no IP is vested. The system should thus go “viral” and “force” breeders to join and thus stop protecting their products through IP.
A few weeks ago, the states of Assam and Bihar were reeling under floods. Over 200 people were reported dead, with at least 10 million (one crore) of the states’ residents estimated to have been displaced. To save more lives and prevent further infrastructural damage, search and rescue missions during such disasters need to be effective, and more importantly, need to be rapid.
The answer to this may lie in space.
Open-source access to satellite images and new technologies to process these images have been a significant breakthrough to help document the true extent of flooding. Getting this information in time is key to plan and conduct evacuation missions, response operations and damage assessments.
The European Space Agency (ESA)’s Sentinel-1 mission and the web-based Google Earth Engine (GEE) platform are two recent developments that have helped timely capture and analysis of satellite information.
A research team from the Indian Institute for Human Settlements (IIHS) used this combination (Sentinel and GEE) to come up with an illustrative example of how such mapping can be used in the future to help in rescue missions, through accurate mapping of flood extents.
The open-source movement that has driven software innovation is now creating a buzz in the microprocessor realm, thanks to the growing popularity of open-source microprocessor instruction set architecture RISC-V. Although the term “open source” conveys sentiments such as research sharing and community building, leading semiconductor IP provider Arm, which supports 95 percent of smartphone embedded processors, is not a fan.
Synced recently sat down with Rhonda Dirvin, who is Arm’s senior director of Embedded, IoT and Automotive Marketing. Dirvin believes today’s open source hardware landscape is not as simple and straightforward as it may seem: “We’re starting to see some people say free is not free. Because at the end of the day they have to look at what it takes to verify that and what it takes to implement the instruction or architecture. You don’t have the whole ecosystem out there that supports it the way that you do with Arm or some of the other more established vendors.”
The Vitis unified software platform from FPGA vendor Xilinx is the result of five-year project to create software development tools using familiar languages like C++ and Python to develop a wide range of applications for its reprogrammable chip.
“Open source back in the late nineties – and even throughout the 2000s – was really hard to use,” ActiveState CEO Bart Copeland says. “Our job,” he continues, “was to make it much easier for developers to use open source and much easier for enterprises to use open source.”
Now 10 years in the wild, Google’s Go programming language has certainly made a name for itself. Lightweight and quick to compile, Go has stirred significant interest due to its generous libraries and abstractions that ease the development of concurrent and distributed (read: cloud) applications.
But the true measure of success of any programming language is the projects that developers create with it. Go has proven itself as a first choice for fast development of network services, software infrastructure projects, and compact and powerful tools of all kinds.
The Eclipse Foundation today announced the launch of the Eclipse Cloud Development Tools Working Group (ECD WG), a vendor-neutral open source collaboration that will focus on development tools for and in the cloud. The ECD WG will drive the evolution and broad adoption of emerging standards for cloud-based developer tools, including language support, extensions, marketplaces, and developer workspace definition. Founding members of the ECD WG include Broadcom, EclipseSource, Ericsson, IBM, Intel, Red Hat, SAP, Software AG, and Typefox among many others.
With cURL having this many features (with the general mass of them being totally unknown to me, let alone how you use them) got me thinking… What if you could do a game show style challenge for them?
By an anonymous commenter, I got pointed to that Unicode (in Qt) is slightly more complicated than I had considered when writing the code: I missed to handle planes beyond the Basic Multilingual Plane (BMP) and the ‘surrogates’ between code points 0xD800 and 0xDFFF. In a series of recently pushed Git commits I addressed problem of surrogates and fixed some more issues. Some preparatory work has been done to support more planes in the future, but as of now, only the BMP is supported. For details, please have a look at the five commits posted on 2019-10-12.
However, AR and VR today are two distinct things – more like cousins than twins. VR gets much more coverage and AR can be more nebulous given the various ways in which it can be deployed, says Leon Laroue, technical product manager of augmented reality solutions for Epson. “For people who’ve never actually seen an AR or VR device, it’s very easy to assume everything is VR.”
[...]
“At a high level, AR applications are best suited for use cases where users need to be connected to and present in the real world,” Laroue explains. Some AR enterprise solutions include remote assistance, on-the-job training, remote collaboration, and computer-assisted tasks.
“In our research of both technologies, we have found AR to be well-suited for industrial use cases, particularly workforce training and product maintenance,” says Michael M. Campbell, executive vice president, augmented reality products, at PTC. In particular, companies that are facing knowledge gaps and expertise loss as workers retire are capturing that knowledge digitally and sharing it with less-experienced workers via AR tools.
A security audit sponsored by Mozilla uncovered a critical remote code execution (RCE) vulnerability in iTerm2, a popular open-source terminal app for macOS. The flaw can be exploited if an attacker can force maliciously crafted data to be outputted by the terminal application, typically in response to a command issued by the user.
Any developers or admins using the iTerm2 app should install the available patch immediately, judging by Mozilla’s description, and it sounds like the bug could be exploited in as yet unknown ways.
“An attacker who can produce output to the terminal can, in many cases, execute commands on the user’s computer,” Mozilla’s Tom Ritter writes.
The author of popular macOS open source terminal emulator iTerm2 has rushed out a new version (v3.3.6) because prior iterations have a security flaw that could allow an attacker to execute commands on a computer using the application.
The vulnerability (CVE-2019-9535) was identified through the Mozilla Open Source Support Program (MOSS), which arranged to audit iTerm2 under its remit to review open source projects for security problems. A third-party security biz, Radically Open Security, performed the audit.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hello, A new snapshot, `0.0.20191012`, has been tagged in the git repository. Please note that this snapshot is a snapshot rather than a final release that is considered secure and bug-free. WireGuard is generally thought to be fairly stable, and most likely will not crash your computer (though it may). However, as this is a snapshot, it comes with no guarantees; it is not applicable for CVEs. With all that said, if you'd like to test this snapshot out, there are a few relevant changes. == Changes == * qemu: bump default version * netns: add test for failing 5.3 FIB changes Kernels 5.3.0 - 5.3.3 crash (and are probably exploitable) via this one liner: unshare -rUn sh -c 'ip link add dummy1 type dummy && ip link set dummy1 up && ip -6 route add default dev dummy1 && ip -6 rule add table main suppress_prefixlength 0 && ping -f 1234::1' We fixed this upstream here: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=ca7a03c4175366a92cee0ccc4fec0038c3266e26 This is relevant to WireGuard because a very similar sequence of commands is used by wg-quick(8). So, we've now added some tests to catch this code path in the future. While the bug here was a random old use-after-free, the test checks the general policy routing setup used by wg-quick(8), so that we make sure this continues to work with future kernels. * noise: recompare stamps after taking write lock We now recompare counters while holding a write lock. * netlink: allow preventing creation of new peers when updating This is a small enhancement for wg-dynamic, so that we can update peers without readding them if they've already been removed. * wg-quick: android: use Binder for setting DNS on Android 10 wg-quick(8) for Android now supports Android 10 (Q). We'll be releasing a new version of the app for this later today. This snapshot contains commits from: Jason A. Donenfeld and Nicolas Douma. As always, the source is available at https://git.zx2c4.com/WireGuard/ and information about the project is available at https://www.wireguard.com/ . This snapshot is available in compressed tarball form here: https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20191012.tar.xz SHA2-256: 93573193c9c1c22fde31eb1729ad428ca39da77a603a3d81561a9816ccecfa8e BLAKE2b-256: d7979c453201b9fb6b1ad12092515b27ea6899397637a34f46e74b52b36ddf56 A PGP signature of that file decompressed is available here: https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20191012.tar.asc Signing key: AB9942E6D4A4CFC3412620A749FC7012A5DE03AE If you're a snapshot package maintainer, please bump your package version. If you're a user, the WireGuard team welcomes any and all feedback on this latest snapshot. Finally, WireGuard development thrives on donations. By popular demand, we have a webpage for this: https://www.wireguard.com/donations/ Thank you, Jason Donenfeld
WireGuard is still working on transitioning to the Linux kernel’s existing crypto API as a faster approach to finally make it into the mainline kernel, but for those using the out-of-tree WireGuard secure VPN tunnel support, a new development release is available.
Now the feature is embroiled in another minor controversy after security researchers at SafeBreach said they uncovered a new vulnerability. HP Touchpoint Analytics comes preinstalled on many HP devices that run Windows. Every version below 4.1.4.2827 is affected by what SafeBreach found.
In a blog post, SafeBreach Labs security researcher Peleg Hadar said that because the service is executed as “NT AUTHORITY\SYSTEM,” it is afforded extremely powerful permissions that give it wide access.
“The CVE-2019-6333 vulnerability gives attackers the ability to load and execute malicious payloads using a signed service. This ability might be abused by an attacker for different purposes such as execution and evasion, for example: Application Whitelisting Bypass Signature Validation Bypassing,” Hadar wrote.
[...]
The company has long had to defend HP Touchpoint Analytics against critics who say it gives HP unnecessary access to users’ systems. When it first became widely noticed in 2017, dozens of users complained that they had not consented to adding the system.
Application developers incorporating open source software into their designs may only discover later that elements of this software have left them (and their customers) exposed to cyber-attacks.
Turkey restricted access to Facebook, Instagram, Twitter, and WhatsApp in at least three cities in the southern part of the country for about 48 hours earlier this week as it launched an attack on northern Syria, according to data collected by civil society group NetBlocks and reviewed by WIRED. Turkey moved against Kurdish forces in northern Syria Wednesday, launching an air and ground assault on a militia allied with the US days after President Donald Trump pulled US troops out of the area.
Turks close to the border rely on those social media services to access and share uncensored [sic] news.
Turkey plans to use the Syrian National Army, an alliance of Islamist rebels, for its operations in Northern Syria. The Army of Islam, one of the members of the Syrian National Army, has paraded around hostages from Syria’s religious minorities in cages. Its late leader, Zahran Alloush, once referred to some minorities as “filth” that should be “cleansed,” although he walked back the rhetoric in a later interview.
“Turkey can only expand outside its current borders by embracing a religious agenda,” Ishak claimed. “What would bring together a Syrian, a Kurd, an Arab, and a Turk together like it was during the Ottoman Empire? It’s the religious identity.”
Ishak, Vergili and the Assyrian Policy Institute’s statement all accused Turkey of backing ISIS.
This is where things got interesting. He went on to say that the patrol presence was needed not just for protecting mosques, but also to stop people— Muslim people, in particular—from doing what was harmful and what the Quran considers haram, or forbidden, for Muslims.
Abdul remembered Wahhaj saying, “The mosques need protection and the MCP cars can help stop people who were not following the rules and regulations of the sharia, doing what they’re not supposed to be doing, but still doing it.”
That is, they were there to physically enforce “laws” that were not U.S. or New York laws.
[...] He said Pakistan is in a fix over the situation and is trying different ways to send in the weapons. Speaking to mediapersons in Bhaderwah, Singh also refuted reports about infiltration of Afghan militants into the valley. Terrorists are facing a shortage of weapons in Kashmir. So they try to snatch weapons from Special Police Officers (SPO) or loot them from police stations, the Army commander said. Even Pakistan has been caught in a difficult situation so it uses various ways to provide weapons to the terrorists in Kashmir, he said. [...]
The Latest on Turkey’s military offensive into northeastern Syria against Syrian Kurdish fighters…
Yet coastal development, not retreat from rising sea levels, is still ascendant here and in other communities along America’s southeastern coast. The pattern is fueled by money, by age-old human affinity for “blue spaces,” and by government policies such as flood insurance that can subsidize risky residences.
Now it’s an uneven real estate market. Many at-risk homes are losing value even as others are snapped up. One home near Mr. Cobau’s is being demolished due to frequent flooding. Another just sold for $1 million. Other owners are seeking approval to elevate their homes.
“The majority of people’s retirement savings is the equity in their house,” says Ryan Lewis, a University of Colorado sea level expert. “And if you think about the timeline of [sea level rise] and people’s savings, those things are converging.”
A heavy downpour and strong winds pounded Tokyo and surrounding areas on Saturday as a powerful typhoon forecast to be Japan’s worst in six decades made landfall and passed over the capital, where streets, nearby beaches and train stations were long deserted.
The Warren ad puts Facebook in a challenging position, said Dave Karpf, an associate professor of media and public affairs at George Washington University.
“Either Facebook doesn’t touch the ad and the ad is therefore noteworthy, or they touch the ad and it’s noteworthy,” he said. “It’s a smart tactical move.”
President Donald Trump spread shoddy information about Syria, the economy and matters at the heart of the impeachment inquiry against him in a week of caustic rhetoric.
Indigenous leaders of fuel-price protests that have paralyzed Ecuador’s economy for nearly a week said Saturday they are willing to negotiate with President Lenín Moreno, signaling a possible exit from the crisis even as violence prompted the president to impose a curfew in the capital and surrounding areas.
Apple CEO Tim Cook, it apparently giving in to Chinese demands of removing apps used by pro-democracy protesters in Hong Kong. The company removed the HKmap.live app from its app store.
The app was used by protesters to track police movements inside Hong Kong. The fact came to light after the Communist Party of China owned newspaper China Daily accused the company of listing the app in its App Store.
In September, ESL announced that it was forming a partnership with Huya, a Chinese streaming service backed by Chinese internet conglomerate Tencent. Huya pledged to buy US$30 million (HK$235 million) in ESL shares. The partnership was expected to expand ESL’s access to China’s huge competitive gaming market.
When asked by HKFP if it was concerned about its China market, and whether it respected free speech, a spokesperson said ESL maintains social media policies for staff.
The pictures of Chloe and Jasper Papa as kids are typically goofy fare: grinning with their parents; sticking their tongues out; costumed for Halloween. Their mother, Dominique Allman Papa, uploaded them to Flickr after joining the photo-sharing site in 2005.
None of them could have foreseen that 14 years later, those images would reside in an unprecedentedly huge facial-recognition database called MegaFace. Containing the likenesses of nearly 700,000 individuals, it has been downloaded by dozens of companies to train a new generation of face-identification algorithms, used to track protesters, surveil terrorists, spot problem gamblers and spy on the public at large.
The Chinese Communist Party appears to have “super-user” access to all the data on more than 100 million cellphones, owing to a back door in a propaganda app that the government has been promoting aggressively this year.
An examination of the code in the app shows it enables authorities to retrieve every message and photo from a user’s phone, browse their contacts and Internet history, and activate an audio recorder inside the device, according to a US-funded analysis.
[...]
The app collects and sends detailed log reports on a daily basis, containing a wealth of user data and app activity, the investigation found.
On Monday, October 7, at around 7 am, WBAI-NY essentially went off the air. A small group organized at the direction of the Pacifica Foundation’s Interim Executive Director John Vernile (who’d only been the job for two months) threw the staff out of the WBAI studios in Brooklyn, handed them termination letters, posted a guard at the door, and switched WBAI programming to a feed from Pacifica’s KPFA station in Berkeley, California. In a style that would make a CIA destabilization crew proud, they went through the station, disconnected computers and the soundboard, placing them in inner rooms with padlocks, took out the Emergency Alert system (required for all broadcast facilities), and told the landlord that the studio would be unoccupied within 24 hours. She was advised to find a new tenant.
Vernile had given instructions to the facility that housed the station’s antenna, which broadcast at 99.5 FM, to bar any WBAI staff. The WBAI website was redirected to a page that announced that programming would now emanate from Pacifica Across America, presenting the “best” of programming from other Pacifica stations.
By the close of October 7, WBAI’s Local Station Board (Pacifica has both a National Board and Local Station Boards) had gotten a temporary restraining order barring the takeover, but Pacifica refused to comply. As a contempt-of-court hearing was about to be begin, Pacifica’s lawyers moved the case to Federal Court in Manhattan. Litigation continues.
Her path to the Nobel Peace Prize began when she joined an activist group in Germany. It took her to the U.N., where she became a human rights ambassador and then wrote a book. The U.N. recognizes the genocide that happened to the Yazidis, but there are more steps to secure a trial. Clooney agreed to help.
“I saw it as a test of the international system. It was so egregious because it involved ISIS and involved a clear case of genocide. It involved sexual slavery at a scale that we haven’t seen in modern times,” says Clooney. “I thought if the U.N. can’t act in this case then what does the international rule of law even mean?”
The Eugene CAHOOTS team shows up in work boots, jeans and T-shirts — and without police officers — in response to 911 calls diverted to the program.
“That difference in uniforms can assist folks with letting their guard down and being open to accepting the help that is being offered,” said Tim Black, the Eugene CAHOOTS’ operations coordinator.
For people with a history of volatile arrests often while in mental health crisis, this could make treatment more accessible, less traumatic and safer. One in 4 deaths from police shootings represent people with mental illness, according to the Treatment Advocacy Center.
What’s now criminal is being male. All you need to be is male and accused of something, whether or not it fits any definition of a crime. It sounds unbelievable, but it’s increasingly the case.
As a review of the book published on Qaradawi’s own website (islamonline.net) explains, jihad is not about “spiritual values and behavioral virtues”; it is an armed struggle, and that “without jihad, the Ummah’s boundaries will be violated, the blood of its people will be as cheap as dust, its sanctuaries will be less worthy than a handful of desert sand, and it will be insignificant in the eyes of its enemies.”
Qaradawi’s work, by the way, is frequently cited by leading American clerics.
A 200-year-old book republished in 2016 by Al-Azhar — the most important Islamic seminary in the world — only refers to jihad as an “armed struggle.” And when, as NPR put it in 2003, “around the Muslim world, mainstream Muslim clerics are calling on their followers to make jihad, or holy war, against American troops” in Iraq, were they only asking for Muslims to practice a quiet internal struggle?
Rusul has been married dozens of times — some marriages lasting just three hours.
Each time, she’s given a dowry — which can be around $360 — and is forced into a quick wedding ceremony, after which she is expected to have sex with her new husband.
But her spouses — usually old men — can be violent, with some forcing her to perform their favourite sex acts even when she resists.
And the marriages always have an end date, leaving Rusul alone following the horrendous assaults.
The brave teen appears in a new BBC documentary that shines a light on the illegal practice of “pleasure marriage” and how it’s being used to pimp out vulnerable girls in war-torn Iraq. Obviously, the vast majority of Muslims find the practice absolutely abhorrent.
The day, aimed at highlighting the needs and challenges girls face, while promoting girls’ empowerment and fulfilment of their human rights, was observed on Friday under the theme “Girl Force: Unscripted and Unstoppable “. The celebrations were held at Kasana playground in Luweero town.
At the function, girls and activists decried rampant early marriages, teenage pregnancies and other sexual abuses which have led girls to drop out of school. Shalom Kaitesi, a Senior three student of Janan Secondary School in Luweero said that two of her friends were forced into marriage.
California’s passage of Assembly Bill 5 (AB-5) would effectively force Uber and its many “gig economy” imitators to recognize their workers as employees and, unsurprisingly, they’re doing everything they can stop it. It’s time to bring back the #DeleteUber campaign for good this time — and expand it to Lyft, DoorDash, and all the rest.
2018: Bill Gates in the White House? Trump offered him a job as White House science advisor, he says
Summary: There are many ways by which to game the media’s news cycle — an art mastered by the groper in chief
They never speak about freedom
Summary: The word “core” is increasingly being (mis)used to portray user-hostile proprietary software as something more benign if not “open”
YESTERDAY in the IRC channels there was this discussion about how Microsoft had leveraged the word “core”. It’s so flexible a word. Just about everything has a core. Consider Microsoft’s Open Cloud Summit and the infamous Open Core Summit which censors people. Be very wary and suspicious of the word “core” (e.g. “.NET Core”) unless it refers to a processor. Otherwise it’s a shrewdly-marketed trap. █
“When you speak about interoperability [...] He meant among different versions of Windows.”
–Joe Wilcox, Microsoft Fan, 14 June 2006
“With nonfree software, support is a monopoly, because only the developer has the source code and only the developer can make any change.” –Richard Stallman in TN, India
“Proprietary software usually means a monopoly for support because only the developer has the source code…” –Richard Stallman in Zagreb, Croatia
Summary: Support for Software Freedom — like support for Free software (think Red Hat/IBM and systemd) — should be decentralised and compartmentalised to make the movement stronger and adaptable
THE most recent events served to show that in order to make Free software more resilient and its support network a lot more robust (resistant to malicious/misguided dissenters, entryism etc.) we may need to federate advocacy of it.
“We thank people who have joined us in recent months as readers, IRC lurkers, contributors and so on.”A contributor of ours is working on this timeline of Free (as in freedom, libre) software and it hopefully helps explain the history and how/why it all came about. Free software is a response or a reaction to particular events of significance. Yes, it was largely reactionary because prior to it (e.g. in the 1970s) sharing and passing around code had been the ‘norm’.
We thank people who have joined us in recent months as readers, IRC lurkers, contributors and so on. We’re currently working to better advance Software Freedom, not only by means of reporting and advocacy; those wishing to participate and are eager to help can contact us on bytesmedia@bytesmedia.co.uk
(multiple recipients). █
RSS Feed: subscribe to the RSS feed for regular updates
Site Wiki: You can improve this site by helping the extension of the site's content
Site Home: Background about the site and some key features in the front page
IRC Channels: Come and chat with us in real time