Meet the Slimbook Pro X 15, a new 15-inch Linux laptop from Spanish hardware company Slimbook.
Their new device is powered by an Intel i7-9750H processor (6-core, 4.5GHz turbo boost) with a beefy NVIDIA GTX 1650 Max-Q Turing graphics card and supports unto 32GB RAM — a compelling combination that certainly helps to put the “pro” in “proformance”
[...]
The Slimbook Pro X 15 touts a high-resolution 2k 15.6-inch IPS display (16:9) with thin bezels (0.4 cm) and full 100% sRGB colour coverage. This should make it especially good for graphics designers, photographers and those who work with video.
A large multi-touch trackpad and full-size backlit keyboard with choice of layout come as standard.
Two webcams are included: one at 720p for video chats; the other a biometric facial detection webcam that (once again depending on distro and DE) can be used to login in to Linux using your face!
System76 has been selling laptops and desktops, preinstalled with Linux, since 2005. But up until recently, their desktop machines were designed by third-party OEMs. That all changed in 2018 when System76 began selling their in-house designed and built desktops, the Thelio. The Thelio machines have been met by glowing reviews across the globe, and can be specced high enough to accommodate serious loads.
As for laptops? System76 has been depending on Sager and Clevo to design their hardware. These laptops have served the company (and consumers) well. But once System76 proved they could build one of the finest Linux-powered desktops on the market, they set out to discover if it was possible to also produce laptops in house.
In its study of usage data from thousands of companies and more than 1.5 billion containers, the company found "roughly 45% of Datadog customers running containers use Kubernetes, whether in self-managed clusters or through a cloud service." Not bad for a technology that's just over five years old.
What's more telling though is that almost half of all Datadog container users have already turned to Kubernetes. It's Kubernetes' growth rate that really tells the story. In the last year, Kubernetes' numbers of users grew by 10%.
In the meantime, other container orchestration programs, such as Marathon and Docker swarm mode, have simply not caught fire. Indeed, their parent companies, D2iQ, formerly Mesosphere, and Docker both started offering Kubernetes to their customers. Need more be said?
Datadog also found that Kubernetes is very popular on the public cloud. In particular, managed Kubernetes services such as Google Kubernetes Engine (GKE) dominates the Google Cloud Platform (GCP). Since Kubernetes ancestry goes back to Google that comes as no surprise.
Once, Kubernetes was just some geeky cloud-native project for orchestrating containers (a virtualized method for running distributed applications). Isn’t it funny how it’s worked its way into practically every tech conversation in just a few years? In fact, thanks to technologies that shrink and simplify it, Kubernetes is about to find its way into even more use cases.
With the technology and its uses expanding so rapidly, how do we even define it anymore? Sheng Liang (pictured), co-founder and chief executive officer of Rancher Labs Inc., has an idea: “Kubernetes is the new Linux, and you run it everywhere.”
Cloud, on-premises data center, bare metal, internet of things edge, Raspberry Pi, surveillance camera? Check. The developer ecosystem is invading more and more spaces through tweaks that make Kubernetes easier than ever to deploy.
After a couple of months in Developer Preview, the Debezium Apache Kafka connectors for change data capture (CDC) are now available as a Technical Preview as part of the Q4 release of Red Hat Integration. Technology Preview features provide early access to upcoming product innovations, enabling you to test functionality and provide feedback during the development process.
Red Hat, Inc., the world's leading provider of open source solutions, today announced the release of Red Hat CodeReady Workspaces 2, a cloud-native development workflow for developers. The new release of CodeReady Workspaces enables developers to create and build applications and services in an environment that mirrors that of production, all running on Red Hat OpenShift, the industry's most comprehensive enterprise Kubernetes platform.
RHEL ships with only a subset of packages that you'll find in Fedora Linux. This makes sense, because there's a lot of software in Fedora that isn't needed in an enterprise environment or falls outside the scope of RHEL. Red Hat maintains and supports the packages in RHEL far longer than the lifespan of a Fedora release, and we select the software we feel is necessary for our customers to be successful in deploying and using RHEL to run their workloads.
But Fedora users sometimes find that they miss this or that application that's available in Fedora but not through RHEL. So, EPEL was formed. Extra Packages for Enterprise Linux (EPEL) is a special interest group (SIG) from the Fedora Project that provides a set of additional packages for RHEL (and CentOS, and others) from the Fedora sources.
To get a package into EPEL, it has to be in Fedora first. EPEL follows the Fedora Packaging Guidelines to ensure successful integration, and only includes free and open source software that isn't patent encumbered. So you won't find any proprietary software in EPEL or things like multimedia codecs that are restricted by patents, even if software enabling them is under an open source license.
Topics covered in this episode:
Mozilla, Intel, fastly, and Red Hat Form the Bytecode Alliance Kdenlive 19.08.3 Released Volla Phone Kickstarter Google Project Nightingale If Linux Feels Slower, That’s Because It Is Shovel Knight: King of Cards and Shovel Knight Showdown Helvetii Coming To Linux
Google joins the bare-metal cloud club, Jetpack gets an important security patch, Fedora election voting begins, and Codefresh has some clarifications about its new open source fund.
Marcel Gagne and Evan Leibovitch riff on Linux, Open Source, computers, technology, privacy, the digital economy, movies, video games, the Internet, security, breakfast cereal, and anything else related to the modern, open world.
Disposing of hard drives, what a TV really is, and the veganism of software.
Plus the serious business of coffee, why modern music sucks, and making Popey feel bad.
00:00:48 With better technology, why don’t we necessarily see better art? 00:09:03 Is Linux (or FOSS) the vegan option within software? 00:13:43 Do you own a TV? 00:20:24 How do you prepare your coffee? 00:25:05 How do you forgive yourself? 00:32:19 How do you dispose of your old hard drives for security purposes?
I'm announcing the release of the 5.3.12 kernel.
All users of the 5.3 kernel series must upgrade.
The updated 5.3.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.3.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
The Khronos Group has officially confirmed Intel's new "Iris" Gallium3D driver as being a conformant OpenGL 4.6 implementation.
The Khronos Group has awarded the Intel Iris Gallium3D driver as being a conformant OpenGL 4.6 implementation in successfully passing all of the necessary OpenGL CTS test cases. As we've been saying, the Intel Gallium3D driver is in great shape with Mesa 19.3 and these Khronos conformance results confirm that it's successfully behaving in-line with their specification.
PHP 7.4 is due to be released next week as the annual major iteration to PHP7. Like we have seen through the PHP7 releases, while new features continue to be tacked on for this popular web-based programming language the performance has continued evolving. Here are the latest benchmarks of PHP 5.6 through PHP 7.4 while also looking at the PHP 8.0-dev performance that is in development on Git master.
Outside of the performance realm, PHP 7.4 is another exciting update thanks to finally introducing FFI support. The Foreign Function Interface for PHP allows accessing C structs/functions/variables from native PHP code for making it easier to interact with C libraries from PHP.
In addition to the headlining FFI support of PHP 7.4, this next release has a preload function to preload functions/classes to speed-up the loading of scripts by 30~50%, language alterations, TLS 1.3 support in PHP OpenSSL streams, and a variety of other smaller additions.
For those wondering if it's worthwhile for performance recompiling your key Linux binaries with the microarchitecture instruction set extensions and tuning for Ice Lake, here are some GCC compiler benchmarks looking at that impact for the Core i7 1065G7 on the Dell XPS 7390.
In particular, this article is looking at the affect on generated benchmark binaries when built under the following CFLAGS/CXXFLAGS configurations:
-O3 -march=skylake - Just optimizing for conventional Skylake processors.
-O3 -march=skylake-avx512 - Optimizing for Skylake AVX-512 processors like Skylake-SP/Skylake-X. The Skylake AVX-512 enables use of the AVX512F, CLWB, AVX512VL, AVX512BW, AVX512DQ and AVX512CD instructions.
-O3 -march=icelake-client - Optimizing for Icelake client/desktop processors. New instructions exposed here not found with Skylake/Skylake-AVX512 include AVX512VBMI, AVX512IFMA, SHA, CLWB, UMIP, RDPID, GFNI, AVX512VBMI2, AVX512VPOPCNTDQ, AVX512BITALG, AVX512VNNI, VPCLMULQDQ, and VAES. Note there is also the "icelake-server" target for future Ice Lake Xeon Scalable processors where additionally PCONFIG and WBNOINVD are flipped on.
If you aspire to become a professional video editor but hate the idea of switching to a different operating system just to use video editing software, we have good news for you: Linux has many fantastic video editing software applications that let you easily edit videos right in your favorite Linux environment.
What’s great about most Linux video editing software applications is that they tend to be free and open source, which means that anyone can peek under the hood and implement new features or fix bugs. The video editors featured in this article are loosely arranged according to their popularity, but we recommend you go through the entire list because even less popular video editors have a lot to offer.
Every person wants a customized desktop environment based on his choice. The most important visual element of a desktop environment is its wallpaper or background. You can easily set your desired wallpaper in the Linux system. Just like Windows PC, you can even create a wallpaper slideshow. But if you want full control and more customization, you need to download an extra piece of wallpaper changer for your Linux or Ubuntu system. With these Linux wallpaper changer programs, you can download wallpapers from different sources, schedule them and customize your desktop in your style.
Snaps, Flatpaks, AppImages and your distribution’s own packages. There are way too many of them and bauh enables you to use all of them from one single app.
Who loves eye candy? Don’t be shy — you can raise both hands!!
Linux Candy is a new series of articles covering interesting eye candy software. We’re only going to feature open-source software in this series.
The subject of this article is CMatrix. CMatrix is an ncurses program that simulates the display from “The Matrix”, and is based on the screensaver from the movie’s website.
If you have been living in a cave for the past few decades, you might not know The Matrix is a hugely popular 1999 American science fiction film starring Keanu Reeves, Laurence Fishburne, Carrie-Anne Moss, Hugo Weaving, and Joe Pantoliano.
Blender 2.81 features some exciting changes like a NVIDIA OptiX back-end for use on RTX/Turing GPUs for faster rendering performance than the CUDA/OpenCL back-ends, Intel Open Image Denoise support, adaptive subdivision support for Cycles, new Sculpt tools, outliner improvements, a better grease pencil tool, and a lot more.
The source told KrebsOnSecurity that NVA suffered a separate ransomware infestation earlier this summer that also involved Ryuk, and they expressed concern that the first incident may not have been fully remediated — potentially letting the attackers maintain a foothold within the organization.
“This is the second time this year Ryuk struck NVA,” the source said. “The first time, NVA was rather open to all facilities about what happened. This time, however, they are simply referring to it as a ‘system outage.'”
Half-Life: Alyx is powered by SteamVR on Valve's Source Engine 2. On Linux that means Vulkan rendering. Half-Life: Alyx will work with all PC-based VR headsets.
More details on Half-Life: Alyx at Half-Life.com and the Steam page. It's been close to a year since last pulling out the HTC Vive, so at least this will make for a fun and fresh Linux VR look next year.
Half-Life: Alyx, the first Half-Life title in far too long has now been officially revealed with the Steam store page for it now available and you can also pre-purchase. However, their email clearly stated that Half-Life: Alyx will be "Free for owners of the Valve Index VR headset".
This is a title built from the ground up for Virtual Reality, so only those with a VR kit will be able to play. Valve said it has "all of the hallmarks of a classic Half-Life game" including exploration, puzzle solving, visceral combat and a story that connects it all together with the Half-Life universe. Valve also said it will be compatible with "all PC-based VR headsets", it's powered by their own Source 2 game engine and it will release in March 2020.
You have around 72 hours to grab Serial Cleaner completely free, along with the start of the Humble Store Fall Sale.
As always, there's tons of titles on sale. Plenty of indie games, plus multiple publishers have all put their games up with big discounts on them too.
BATTLETECH Heavy Metal, the latest expansion to the turn-based strategy game that has you fight with massive lumbering 'mechs is out now.
We've been told this is the definitive expansion, so it's likely to be the last as Harebrained Schemes move onto their next game. Quite an exciting expansion though and the naming of the expansion is very on point, since it comes with a bunch of classic 'mech designs from the original ââ¬â¹BATTLETECHââ¬â¹ board game plus a new 'mech designed just for Heavy Metal.
Possibly one of the most relaxing and engrossing games release last year, Parkitect just expanded with a free update and a big Parkitect - Taste of Adventure DLC.
Sometimes a lot of newer strategy games can be a bit much, perhaps a little retro flavour is in order? Warlords I + II, two strategy titles from the 90's are now on GOG.
Both of them have been nicely packaged up for Linux gamers so you can just buy them both together, install and then it will run with a pre-configured DOSBox with no hassle. That's the way I like my retro gaming to be, a solid bit of nostalgia without some headaches.
Linux gaming got a major push when Valve announced Linux support for Steam client and their games in 2012. Since then, many AAA and indie games have made their way to Linux and the number of users who game on Linux have increased considerably. With the growth of Linux gaming, many users started to look for proper ways to display “frames per second” (FPS) counter as an overlay on running Linux games. An FPS counter helps in tweaking performance of running games as well as in benchmarking a PC’s overall ability to play games at different resolutions.
Unfortunately there is no single unified way to display FPS counter in all Linux games that is independent of underlying technologies a game is running upon. Different renderers and APIs have different ways to display FPS counter. This guide will explain various methods that can be used to display an FPS counter in Linux games.
Simplicity is the magic ingredient in any product design. For members of the KDE community, snap development has become that much simpler, thanks to the recent introduction of the KDE neon extension.
Last year, we talked about the KDE build and content snaps, which can greatly speed the build of KDE application snaps and save disk space. The extension takes this effort one step farther, and allows for faster, smoother integration of snaps into the Linux desktop. While there are no shortcuts in life, you can rely on a passionate community of skilled techies to make the journey easier.
Just back from Barcelona – with a brief pause at home for some mathematical cabaret, a board meeting for my local badminton club, music lessons and an afternoon of volunteering at a local charity second-hand shop – and I’m off to Berlin again.
The train is not particularly fast, but it’s a relatively predictable six hours from here to HBf and I do have some “home” feeling in Berlin. At least I have a favorite chocolate place. In Berlin we’re combining a KDE e.V. board meeting with the KDE Frameworks 6 sprint. Both events are basically “planning for the future” on an organizational and technical level.
For the past few months, I’ve been doing live coding sessions on YouTube showing how GNOME development goes. Usually it’s a pair of sessions per week, one in Brazilian Portuguese so that my beloved community can enjoy GNOME in their native language; and one in English, to give other people at least a chance to follow development as well.
We are quite lucky to have OBS Studio available for screencasting and streaming, as it makes our lives a lot easier. It’s really a fantastic application. I learned about it while browsing Flathub, and it’s what actually motivated me to start streaming in the first place. However, I have to switch to X11 in order to use it, since the GNOME screencast plugin never really worked for me.
This is annoying since Mutter supports screencasting for years now, and I really want to showcase the latest and greatest while streaming. We’re still not using the appropriate APIs and methods to screencast, which doesn’t set a high standard on the community.
So I decided to get my hands dirty, bite the bullet, and fix this situation. And so was born the obs-xdg-portal plugin for OBS Studio! The plugin uses the standard ScreenCast portal, which means it should work inside and outside the Flatpak sandbox, in Wayland and X11, and on GNOME and KDE (and perhaps others?).
About LAS 2019:
Linux App Summit Linux App Summit 2019
And about the previous LAS format:
Libre Application Summit Libre Application Summit 2018
And finally, I helped the local team with some minor tasks like moving items and so.
I want to congratulate all the organization team and specially the local team for the results and the love they have put in the event. The results have been excellent and this is another strong step for the interweaved relations between opensource development communities sharing very near goals.
My participation at the conference has been sponsored by the GNOME Foundation. Thanks very much for their support.
A common complaint I hear from friends and family is their Windows PC is slow and barely usable. They explain that the computer is old and they think they may need a new one. I immediately ask them what they use the PC for, and almost always, they spend most of the time in a web browser. To save them money, I often suggest installing a lightweight Linux-based operating system. Why buy new hardware if you don't need it? A better operating system can often make the computer run fast again.
Today, you can download an excellent such Linux-based operating system. Called "Zorin OS 15 Lite," it is not only lightweight, but thanks to the Xfce desktop environment and integrated Flatpak support, it should be quite familiar to those switching from Windows. In fact, the developers are intentionally targeting existing Windows 7 users, as Microsoft's operating system will be unsupported beginning January 2020. Zorin OS 15 Lite, in comparison, is based on Ubuntu 18.04 LTS and supported until 2023! It even comes with the very modern Linux kernel 5.0.
In this video, we are looking at Zorin OS 15 Lite. Enjoy!
In this video, I am going to show an overview of Oracle Linux 8.1 and some of the applications pre-installed.
Toradex has released an experimental version of an OTA updater for its new Torizon embedded Linux distribution. Torizon OTA offers fault-tolerant features and supports web-based remote management including grouping of devices into fleets.
Wi-Fi Spectrum Slicing offers breakthrough performance, slicing available spectrum, and exposing a new level of Wi-Fi spectrum granularity for developers to exploit. Edgewater’s groundbreaking MCSRâ⢠silicon solutions and advanced Linux drivers allow the global Linux community to use the widely adopted Linux and OpenWrt software platforms to harness Edgewater’s technology and invent new and creative applications for the platform.
Vecow’s Linux-friendly “IVH-9024MX ICY” in-vehicle PC runs on a 7th or 6th Gen Core or Xeon CPUs and offers triple displays, 6x SATA bays, 4x PoE+ ports, 2x mini-PCIe, and EN50155: 2017 and EN45545-2 railway compliance.
Vecow unveiled the rugged IVH-9024MX ICY back in June as an all-purpose in-vehicle and rolling-stock computer and this week announced certifications for EN50155 and EN45545-2 (fire protection) railway safety standards. This is the first 7th Gen Kaby Lake based fanless embedded system to receive these certifications, claims Vecow.
Google once again had a major presence at the yearly gathering of top Linux developers known as the Linux Plumbers Conference. This is where all the smart people who work hard to make the framework that most of the world's computers run on gather so they can iron out all the problems that any project this big is bound to have.
Since Android is by far the most popular operating system that runs atop of Linux, having it be more "standard" and comparable to the rest is really important. Regrettably, it's not even close because of the way vendors support components and manufacturers put them all together.
Much has been done and Google has some plans to make things even better. Ron Amadeo at Ars Technica has done a great job at trying to make sense of it all in a way everyone can understand, so if reading about forking, how to prevent it, and user-space application binary interfaces are your thing it's a definite read. Even if they aren't your thing, you might learn something by giving it a look.
Sourcetrail is very useful when you try to study/navigate large C++ codebases like @firebirdsql / @LibreOffice
Thanks to work done by 9elements Cyber Security for an unnamed client, there is now working open-source Intel TXT support for Coreboot with the patches under review for upstream inclusion.
This is the culmination of work that started months ago for getting Intel Trusted Execution Technology working with Coreboot. Intel TXT offers authenticity capabilities for the platform, extending the trust to the operating system, and other security features built around TPM and crypto functionality.
New this year is that some stands will switch between Saturday and Sunday, so we can give more projects the opportunity to present themselves to the community.
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced enrollment is now open for a new, free, course – Introduction to Hyperledger Sovereign Identity Blockchain Solutions: Indy, Aries & Ursa. This course is offered through edX, the trusted platform for learning.
To the surprise of absolutely no one, trust is broken on the Internet. Any identity-related data available online can be subject to theft. Breach Level Index says that over 5,880,000 records are stolen every day. The 2019 MidYear QuickView Data Breach Report shows that reported breaches in the first half of 2019 were up 54% compared to midyear 2018 (over 4.1 billion records exposed), with web being the number one breach type for records exposed, and hacking being the number one breach type for incidents. Wherever you go online, the advice is the same–make sure you understand what is behind each button before you click it.
"[The] first thing we did was open source our model. In the new economy, we make things accessible to everybody. Anybody with 20 acres and a boat and $30,000 can start their farm and be up and growing the first year. Our farms require minimal capital costs and minimal skill. The potential of replication is tremendous: A network of small ocean farms about the size of Washington State could feed the world and, as bio-fuel, replace all the oil in the United States, while simultaneously capturing five times the amount of carbon as land-based plants," Smith predicts.
The 3D ocean farming model consists of an underwater rope scaffolding system, anchors on the floor, and ropes up to the surface as well as horizontal ropes. Farmers grow their crops within this system, such as kelp ("the soy of the sea"). Mussels, scallops, and oysters are grown on the floor, and plants are grown in the mud.
GreenWave is disseminating its model for restorative 3D ocean farms through open source manuals, farmer training programs, and an online collaboration platform to create a network of restorative ocean farming communities. Outside of ongoing replication along the waters of Long Island Sound, 3D ocean farmers anywhere in the world will be able to select appropriate native species to restore productive ecosystems along the coast, as reported by the Buckminster Fuller Insititute.
I'd like to congratulate Microsoft on a truly excellent PR stunt, drawing attention to two important topics about which I've been writing for a long time, the cultural significance of open source software, and the need for digital preservation. Ashlee Vance provides the channel to publicize the stunt in Open Source Code Will Survive the Apocalypse in an Arctic Cave. In summary, near Longyearbyen on Spitzbergen is: [...]
Deep learning refers to an emerging area of machine learning that uses artificial neural networks to make decisions on our behalf as they are more reliable than human decisions. It consists of many interrelated fields including natural language processing (NLP), cognitive computing, recommender systems, board game programs, and image recognition.
Ever since its takeover by Google, DeepMind has become the world’s foremost deep learning neural network. Let’s look at the story behind the AI engine, its ongoing applications and whether you should have concerns about privacy in the smart devices where it’s used.
Yes, you read that title right, and no, you haven’t accidentally stumbled upon the Arduino Foundation’s website. Today, we’re pleased to announce a new addition to the Raspberry Pi Press family: Get Started with Arduino, a complete how-to guide to help you get hands on with the other€ pocket-sized board.
Earlier this year the NSA released Ghidra, a reverse engineering suite with support for a large number of CPU/MCU instruction sets. While I have some experience with Hopper and radare2 I wanted to play with Ghidra to poke around the firmware for my Zyxel GS1900-8 switch which runs on a 32-bit MIPS CPU. All in all this has turned out to be an interesting exploration of both Ghidra and the GS1900-8-2.40(AAHH.2)C0.bix firmware image.
Initially I wanted to write about poking around the firmware image and showing how one can use Ghidra to explore unknown binaries, but whilst looking around some libraries that are used by this switch I realised there is actually an interesting vulnerability to write about.
This morning's system update went smoothly; some websites did take a bit longer than we expected to start up afterwards, but all is well now.
There are two big new features that we have introduced which are going through some final post-deploy tests before they go live -- a new system image (called fishnchips) to support Python 3.8 and to add on a number of extra OS packages that people have been asking us for, and an update to our virtualization system that will fix a number of problems with specific programs. We'll be posting more about those when they're ready to go live.
The release of PyCharm 2019.3 is right around the corner and we’re excited to announce we now have available a release candidate version. Check it out by downloading it from our website!
As you can see, in order to get things done, you have to actually start doing something and be creative at that. We’ve presented those points that we believe can be the most beneficial when attempting home education. But these are more like preferable advice rather than strict rules to success. Find something that suits you and work around it. We believe that anyone with enough desire to try can achieve great things!
This is the latest release of the project that I started to replace bumpversion. Update your version while having a drink!
Punch is a configurable version updater, and you can use to automate the management of your project’s version number.
Last week we looked at goto-definition, find uses, and project-wide search as tools for navigating Python code in Wing 7. This time, we'll take a look at the code indices that Wing provides.
There are a few scenarios where compilers are forced to jump through hoops when producing multiple stack values for core Wasm. Workarounds include introducing temporary local variables, and using local.get and local.set instructions, because the arity restrictions on blocks mean that the values cannot be left on the stack.
Consider a scenario where we are computing two stack values: the pointer to a string in linear memory, and its length. Furthermore, imagine we are choosing between two different strings (which therefore have different pointer-and-length pairs) based on some condition. But whichever string we choose, we’re going to process the string in the same fashion, so we just want to push the pointer-and-length pair for our chosen string onto the stack, and control flow can join afterwards.
I'm not a pythonista, and what little I know about Python for data work amounts to a few published recipes. Out of curiosity, I sometimes re-do those recipes with the GNU/Linux tools I use every day. Below are three such re-doings from Python 2.7 (default on my Debian 10 system, but soon to reach end-of-life).
Please note that this post isn't meant to be a "which is best?" contest between Python and shell tools. Each world of commands has its pro's and con's, and Python users have access to a large number of general and specialised data-processing tools. Personally, I like the versatility of shell tools and command chains, and I like AWK's speed and flexible syntax (as readers of this blog will know).
After many days and weeks of thinking and waiting for better person to appear (nobody appeared) I decided to take the initiative (it took a lot) and try my luck at becoming new KDevelop release coordinator.
My reasoning as I mentioned in my mail is that if there was someone better for the job the position would be filled by now. And I wish for KDevelop to be a healthy project which can rival those monsters like MSVS, NetBeans, Eclipse, Atom, MSVC…
Java is no spring chicken and some are even referring to it as a “vintage language”. Despite its popularity, there are some complaints about it. In our new cloud-native world, why does Java need to evolve? In order to evolve to keep up with modern, cloud-native apps, Java needs to keep all of what makes it so dependable, while also being able to function in new app environments. Don’t worry, you are not the only one who feels old when you hear Java being described as a “vintage” programming language. While Java has been around since 1995, it is certainly not ready to retire (or rather, be retired), and continues to rank among the top languages TIOBE index. In fact, no other language has been so popular for so long.
However, it is not without its issues, including sometimes being too clunky to keep up with some of the newer programming languages, not agile and flexible enough to work in this new world of containers, and not really relevant in applications that are not coded to be Java first. While they say you can’t teach an old dog new tricks, you can rethink how it performs what they already know.
There are multiple ways of representing the same moment in time. Each representation can store one or more distinct pieces of information. The more information we have, the wider we can use the DateTime unit. In the example of tracking package delivery times, we want to know two different things: the local date and time, as well as the absolute UTC date and time.
Without the inspiration and innovation of two disabled individuals, the digital world likely wouldn’t be what it is today. Yet that same world so summarily excludes disabled individuals today that we’re eliminating the very people we will need to solve the web’s future problems.
Since the Americans with Disabilities Act was passed in 1990, our nation has worked to accommodate the needs of the disabled. Because of this, almost one in five disabled adults are now employed. But equal access has been ignored in the digital world. Almost 98 percent of the homepages of the top million websites are to some degree inaccessible today.
Will this be enough to quell the furies railing against Andrew in the wake of his car-wreck BBC interview in which he attempted to explain why he remained friends with Epstein long after Epstein pleaded guilty to sex crimes in Florida in 2008?
And will Virginia Roberts Giuffre, the woman who says she was forced by Epstein to have sex with Andrew when she was 17, be satisfied with Andrew's disappearance from his public royal life?
"The healthcare industry has caused more pain and harm and anxiety for the American people than practically any other industry, and we should never side with candidates that say we're going to keep this private profit-making thing going."
A new report finds most adolescents around the world do not get enough physical activity on a daily basis to be healthy and to stay healthy as adults. This World Health Organization study presents the first-ever global estimates of insufficient physical activity among adolescents ages 11 to 17.
Data for this study was collected from 1.6 million adolescents across 146 countries. It finds girls were less active than boys in all but four countries —Tonga, Samoa, Afghanistan and Zambia.
The report says the biggest gender gaps are seen in the United States and Ireland where 15 percent more girls than boys were physically inactive. The World Health Organization recommends adolescents do moderate or vigorous exercises for one hour every day of the week to stay fit.
Shares of companies connected to the marijuana industry soared Thursday following a House Committee’s vote Wednesday to pass a bill that effectively legalizes marijuana on a federal level.
The latest bill, which has more than 50 co-sponsors, enables states to set their own policies while allowing to expunge federal marijuana convictions and arrests.
Additionally, the bill will authorize a 5% federal sales tax on marijuana products that are manufactured in or imported into the United States.
If you’re following the presidential race, you’ve heard plenty of sniping about Medicare for All and whether we can afford it. But when it comes to endless war or endless profits for Pentagon contractors, we’re told we simply must afford it—no questions asked.Where can we find it? In a giant pot of money that’s already rampant with waste and abuse: the Pentagon. | By Lindsay
Security updates have been issued by Fedora (oniguruma and thunderbird-enigmail), openSUSE (chromium, ghostscript, and slurm), Oracle (kernel), Red Hat (kpatch-patch), Slackware (bind), SUSE (python-ecdsa), and Ubuntu (bind9 and mariadb).
When the Disney+ streaming service rolled out, millions of people flocked to set up accounts. And within a week, thousands of poor unfortunate souls reported that their Disney passwords were hacked. According to media reports, some Disney+ account holders have lost their account access while hackers have sold their logins online.
[...] When setting up accounts, Lockwise can help you select something complex and unique that you never would have thought of on your own. Then you can save that tricky password straight into your browser and use it directly from the app, secured behind a master password or fingerprint login protected in the most delightful way for when you need it.
We can’t guarantee that various services and platforms you use won’t ever be compromised, but we can help you create complex unique passwords to minimize your exposure should it occur. And with Firefox Monitor, we can alert you when breaches happen.
We’re entering another holiday shopping season, and while you’re browsing around on the internet looking for thoughtful presents for friends and loved ones, it’s also a good time to give yourself the gift of privacy. Your research and shopping behavior has the potential to be a huge gift to the advertisers collecting data about your habits. If you’re not using Firefox, every weird search for every weird gift could get packaged up in a marketplace where companies and advertisers will be buying, selling and trading this data about you in their own holiday shopping bonanza. Using Firefox is the preventative measure you need during the holiday season (but really anytime you’re shopping online) to protect you from two potential problems...
A newly-discovered peer-to-peer (P2P) botnet has been found targeting a remote code execution vulnerability in Linux Webmin servers.
Vulnerable Linux Webmin servers are under active attack by a newly-discovered peer-to-peer (P2P) botnet, dubbed Roboto by researchers.
On 19 November, a Reddit user warned the Monero community about CLI binaries being compromised. Soon after it was brought to light, the issue escalated and the official Monero website acknowledged having been hacked. The hack was intended to deliver currency-stealing malware to users who were downloading wallet software, according to a blog released by officials.
Ekho Moskvy: Have you seen the report that includes a video from Syria taken in 2017 where a group of people — one of whom, as Novaya Gazeta found, is a Russian citizen — brutally kill and then dismember the body of a Syrian servicemember?
Sen. Bernie Sanders was the only presidential candidate on the debate stage who has condemned the coup that ousted Bolivia's elected socialist President Evo Morales.
The Hong Kong Human Rights and Democracy Act passed the House of Representatives by 417 to 1 on Wednesday, one day after the Senate unanimously passed the measure.
The Bill requires the US president to annually review the favourable trade status that Washington grants to Hong Kong, and threatens to revoke it if the semi-autonomous Chinese territory's freedoms are quashed.
But China does not consider Taiwan to be an independent nation, and under its "One China" policy has vowed to bring the island back under Beijing's control, whether by diplomatic or military means.
Beijing is deeply sensitive to any sentiment from Taiwan pushing for formal independence. Tsai and Lai's Democratic Progressive Party has traditionally supported formalizing Taiwanese autonomy from the mainland, though Tsai has said she is not currently pushing to change the current balance.
Now, new research and previously unseen data show that the Manukai, and thousands of other vessels in Shanghai over the last year, are falling victim to a mysterious new weapon that is able to spoof GPS systems in a way never seen before.
Nobody knows who is behind this spoofing, or what its ultimate purpose might be. These ships could be unwilling test subjects for a sophisticated electronic warfare system, or collateral damage in a conflict between environmental criminals and the Chinese state that has already claimed dozens of ships and lives. But one thing is for certain: there is an invisible electronic war over the future of navigation in Shanghai, and GPS is losing.
Osadzinski is a U.S. citizen who resides in Chicago. The complaint alleges that Osadzinski designed a process that uses a computer script to make ISIS propaganda more conveniently accessed and disseminated by users on a social media platform. Osadzinski earlier this year shared his script – and instructions for how to use it – with individuals whom he believed to be ISIS supporters and members of pro-ISIS media organizations, the complaint states. Unbeknownst to Osadzinski, the individuals were actually covert FBI employees and a person confidentially working with law enforcement, according to the complaint.
[...]
The public is reminded that a complaint is not evidence of guilt. The defendant is presumed innocent and entitled to a fair trial at which the government has the burden of proving guilt beyond a reasonable doubt. The material support charge is punishable by up to 20 years in prison. If convicted, the Court must impose a reasonable sentence under federal statutes and the advisory U.S. Sentencing Guidelines.
The comments followed a hearing regarding jury selection ahead of the alleged ISIS militant’s trial for driving a truck down a crowded bike path on Halloween 2017, killing eight people.
There’s change afoot even where scientists least expect it, among the Arctic’s oldest ice. If it goes, so does the wildlife.
Jacobson's study, published last month in the peer-reviewed€ journal Energy and Environmental Science,€ concludes€ that€ carbon capture technologies are€ inefficient at pulling out€ carbon, from a climate perspective, and often€ increase local air pollution from the power required to run them, which exacerbates€ public health issues. Replacing a coal plant with wind turbines, on the other hand, always decreases local air pollution and doesn't come with the associated cost of running a carbon capture system,€ says€ Jacobson.
Ten years later, decarbonization will have to happen much faster. The transition could be brutal for workers in the fossil fuel and related industries—but it doesn’t have to be. Climate action doesn’t have to mean lost jobs—it can mean better work for most people than what’s on offer today. Mere job training, however, isn’t going to cut it. Beyond high-quality retraining and new work in the clean-energy sector, a just transition for labor would transform work more broadly and increase the power of all workers in relation to their bosses, by offering real alternatives to bad jobs and strengthening labor’s right to organize.
To win all this, workers themselves will have to fight for it. That means we need a long-term vision that delivers material improvements along the way, building worker power step by step.
"Governments are planning to produce about 50% more fossil fuels by 2030 than would be consistent with a 2€°C pathway and 120% more than would be consistent with a 1.5€°C pathway."
Manhattan District Attorney Cyrus Vance Jr.’s criminal investigation of the Trump Organization is scrutinizing the actions of one of the president’s oldest and most trusted deputies, ProPublica has learned.
The focus on Trump Organization CFO Allen Weisselberg, a 72-year-old accountant now running the business with Trump’s two adult sons, stems from his involvement in arranging a payment to porn actress Stormy Daniels in exchange for her silence about an alleged sexual encounter with Trump (which Trump has denied).
The International Monetary Fund’s Executive Board should delay a planned December 2019 vote on a $280 million loan agreement with Equatorial Guinea, eight human rights and good governance organizations and eight prominent experts said today in a letter to the IMF Executive Board. The program preceding the loan agreement and planned conditions for the loan are insufficient to address deep-rooted rights violations, corruption, and related impunity in Equatorial Guinea in line with IMF requirements.
The past few years have seen a rash of union victories in supposedly white-collar workplaces, from prestige publications to art museums to nonprofit think tanks and service organizations.
The Anti-Corruption Foundation (FBK), a Russian investigative organization led by opposition politician Alexey Navalny, has submitted a lawsuit against President Vladimir Putin in Moscow’s Tverskoy Court.
The disgraced former mayor of Baltimore pleaded guilty Thursday to federal conspiracy and tax evasion charges in a case involving sales of her self-published children’s books and exposing once again the depths of corruption in the city.
(includes a recipe brought to you by Discomfort Foods)
Key impeachment witnesses said Thursday it was clear that President Donald Trump’s personal lawyer Rudy Giuliani was pursuing political investigations of Democrats in Ukraine, in testimony undercutting Trump’s argument that he only wanted to root out Ukrainian corruption.
Testifying on Thursday are Dr. Fiona Hill, former Senior Director for Europe and Russia at the National Security Council, and David Holmes, who served as the Political Counselor at the U.S. Embassy in Ukraine.
“Statistically sound audits may be the simplest and most direct way to ensure confidence in the integrity of the vote,” the committee wrote. “States should begin to implement audits of election results.”
The sites are the work of Ken LaCorte, the former Fox News executive who was accused of killing a story about President Trump’s affair with Stormy Daniels, the pornographic film actress, before the 2016 election.
Their content is written by a network of young Macedonians in Veles, a sleepy riverside town that was home to a collection of writers who churned out disinformation during the 2016 presidential election in the United States. Among Mr. LaCorte’s network was one writer who helped peddle a conspiracy theory that Hillary Clinton had ties to a pedophile ring.
Until now, it was unclear who was behind the sites. But an investigation by The New York Times and researchers at Nisos, a security firm in Virginia, found that they are among several sites owned by Mr. LaCorte that push inflammatory items — stories, petitions and the occasional conspiracy theory — to the American public.
“Silence vis-à-vis the crimes against humanity perpetrated in Iran every day is absolutely unacceptable, Mrs. Rajavi underscored, adding that the Security Council must declare the regime and its leaders responsible for the crime against humanity for which they must face justice.
U.S. officials have asked the Massachusetts Institute of Technology (MIT) to turn over documents regarding the university's contacts with foreign governments and donations from foreign sources, including those coming from Russia, China, and Saudi Arabia.
"Everyone was in the loop," Sondland told the committee. "It was no secret."
"The real issue is the senators are watching."
Over the past few years, democratic socialists have rightfully spent a considerable amount of time honing their arguments on domestic policies, such as healthcare, education, and criminal justice reform. Bernie Sanders’ Our Revolution and Bhaskar Sunkara’s recently released The Socialist Manifesto are two good examples of this focus on the domestic. On the foreign policy end, however, confusion still persists concerning what a democratic socialist foreign policy might look like.
SLAPP suits and SLAPP threats are flying back and forth these days. The latest is that Lt. Col. Alex Vindman, who is a key player in the impeachment hearings, is threatening a highly questionable defamation lawsuit against Fox News and Laura Ingraham, because she had on a guest who suggested Vindman was guilty of espionage (he's not). The threat letter was sent by David Pressman, a lawyer who works for Boies Schiller Flexner, a law firm which has a history of sending around bogus threat letters to the media for doing reporting.
John Oliver recently dedicated his HBO show to why we need a federal anti-SLAPP law. Like most of his stuff, the episode was witty and engaging. It was also sloppy, thoughtless and poorly researched. From now on, I’ll wonder whether I can trust anything he says.
Steven Biss is the lawyer who filed Devin Nunes' SLAPP suit against a satirical cow on Twitter (and against Twitter and political consultant Liz Mair), as well as Nunes' various other lawsuits against a variety of journalists and critics.
People keep suing the Southern Poverty Law Center and they just keep losing. More specifically, certain types of people keep suing the SPLC and losing. The type suing most frequently are individuals with bigoted beliefs who aren't too thrilled the SPLC considers them to be bigots.
In a series of Thursday tweets, London-based internet monitoring group NetBlocks said Iran's almost-total internet shutdown began to ease after 113 hours, with the national connectivity rate rising from 5% to 10%, and later to 15% by early Friday local time. Connectivity had plummeted to about 5% late Saturday and mostly remained at that level until Thursday afternoon.
Russia’s State Duma has cast a final round of voting in favor of a new law that prohibits the sale of personal devices unless those devices have Russian-made software pre-installed.
The integration works by tethering a Google account to an Outlook account. Once that's done, all your mail, calendar entries, heck, even your Google Docs will start to appear.
Entries are kept separate in matching inboxes/calendars, so it's easy to tell what came from where. Google Drive documents can't be managed from within Outlook, but once access is granted, you'll be able to select and attach individual files to your mail - regardless of whether you're using your Outlook or Gmail account.
The increased surveillance of rides at Uber coincides with a spike in demand from U.S. and Canadian regulators and law enforcement officials for companies to share their customers’ information. The number of requests from U.S. state and federal law enforcement agencies increased to 3,825 in 2018, up 30% from the year before, according to Uber’s transparency report released Wednesday.
If you wander into the Bandit coffee shop in Midtown New York, you won’t be able to just walk up to the counter and order something. Instead, you’ll need to download a mobile app.
Facebook today confirmed what has long been rumored: Donald Trump hosted a dinner which was not disclosed to the public in October 2019 with Mark Zuckerberg and Peter Thiel, at the White House.
The secret White House dinner with Trump, Thiel, and Zuckerberg happened around the time when Zuck testified before Congress about the Libra cryptocurrency project, which failed.
A source familiar with the dinner told NBC News that Thiel was also present. It is unclear why the meeting was not made public or what Trump, Zuckerberg and Thiel discussed.
The White House declined to comment.
The dinner was the second meeting between Zuckerberg and Trump in a month. Zuckerberg also met with the president in the Oval Office during a September visit to the capital.
Terraframe was also at the centre of a press freedom scandal in December 2016 when then Prime Minister Juha Sipilä sent a number of emails to Yle journalists complaining about the broadcaster's reporting on his reported on his relatives' links to the state-supported company.
"The Trump administration is wrong to try to prosecute people who are only trying to save lives. By threatening Dr. Warren with a decade in prison, the U.S. government sought to criminalize compassion."
Last week, a Japanese television program€ outed and mocked€ a transgender woman, exposing the harsh€ reality trans people face in Japan.
Yesterday,€ Somalia€ lost a bright star. Almaas Elman, a committed Somali-Canadian civil society campaigner,€ died€ after being€ struck by gunfire€ in Somalia’s capital, Mogadishu, while driving from a meeting in the heavily fortified Halane compound, near the international airport. It is unclear whether she was targeted or hit by a stray bullet, possibly fired by one of the many local, regional, or international security forces present in the area.€ €
The organization is calling for immediate action from the international community, including the UN and the EU, to hold the Iranian authorities to account for carrying out unlawful killings and violently repressing the right to freedom of expression and peaceful assembly.
‘Welcome to Women’s History Month!’ Nike said in an internal newsletter earlier this year. The email included an image of Maryam Mirzakhani, the first and only woman to win the prestigious Fields Medal in mathematics. Mirzakhani was forced by law to cover up in her native Iran. When she moved to the United States, she removed her hijab. Nike represented Mirzakhani in a hijab, in an artist’s rendering almost identical to the Islamic republic’s own doctored image of Mirzakhani as a modest mathematician.
"World Children's Day is a day for children, yet children in this very country are denied their freedom. The Trump administration has detained children for the act of seeking safety."
Yesterday, I€ happened to catch a radio report by NPR’s Julie McCarthy on the latest round of protests in Hong Kong. While listening, I€ could not help but see the similarities between what is going on in that corner of Asia and what has been going on in the streets of Catalonia during the last month…. but with two important exceptions.
"This is not to be dismissed. People's lives are at risk.€ He needs to go now."
For a couple of years now, AT&T has been trampling net neutrality without much of anybody giving a damn. Like many ISPs eager to take full advantage of limited US broadband competition, AT&T imposes arbitrary and unnecessary usage caps and overage fees on its broadband lines. If you're an AT&T broadband customer who uses more than 150 GB (DSL) to 1 terabyte (fiber) monthly, you'll suddenly face having to pay $10 per each additional 50 gigabytes consumed. Again to be clear: there's no technical reason for these limits to exist outside of nickel-and-diming captive customers.
Chief Judge Wood explained that, in her view, there are reforms that could be helpful to rejuvenate the intersection between IP and Antitrust law, particularly on the procedural side, but also in some substantive respects. The question to be asked is: has the right balance been struck to date between intervention and restraint? To date the approach taken, whilst not being completely hands off, has been fairly cautious which begs the question as to whether that has been a mistake for 21st century industries.
Whilst there are things that can be done to preserve competition as it is in the market, once a tight oligopoly is established, the tools for fixing that are quite limited. This is true in relation to both conventional property and IP. IP is of course a type of property; it is simply harder to define, but for the purposes of antitrust the same analysis is applied: agencies do not presume that IP creates power in the antitrust context, rather it depends on the usual criteria.
Importantly, IP is a whole and should be considered that way. However, that is not how it is considered procedurally; where instead patents are carved off into one corner and everything else is dealt with separately. A choppy system is created as patent appeals are dealt with by the Federal Circuit, whereas anything else goes to the state Appeal Courts. This means that all types of cases that deal with patents more generally don’t go to the Federal Circuit, for example licensing disputes which end up in the regular Appeal Courts. Another lacuna is created by the fact that the statue dictates that “compulsory” counter claims for patents fall under the exclusive jurisdiction of the Federal Circuit, whereas “permissive” counter claims go to the regional courts.
Last month, Intel brought an antitrust ocmplaint in the Northern District of California over Softbank-owned Fortress Investment's patent aggregation, obfuscation, and litigation tactics. Fortress's web of hyperaggressive patent assertion entities includes a huge and growing number of legal entities, some of whom have such names as Uniloc (which sued Apple 25 times and Google even 35 times), VLSI, DSS, Inventergy (which threatened an alleged infringer with an "IP bloodbath"), IXI, Seven Networks, and KIP CR (the CR in that name stands for "crossroads").
[...]
The amounts that some Fortress trolls are seeking from Apple are shocking. For an example, "VLSI claims up to $7.1 billion in connection with eight patents in the California Action and multiple billions of dollars in damages in the Delaware I Action." And that's just a small and limited part of the overall litigation activity by Fortress-controlled companies against Apple. Another group of Fortress entities, Uniloc, is seeking damages from Apple in the range of $2.6 billion to %5.1 billion from only 4 (!) of the 25 aforementioned Uniloc v. Apple cases as you can see on pages 30 and 31 of the complaint. According to Apple, "Uniloc "simply adopted the amounts that Apple sought from Samsung in litigation for Apple's patents." What Apple means is what Uniloc wants on a per-unit basis. I've criticized Apple very strongly for some of its damages claims against Samsung, but even if one agreed with what Apple wanted from Samsung at the time, it just wouldn't make sense to copy and paste an amount when it's about completely unrelated patents.
One obvious quirk is that the petition was filed with the 5th Circuit Court of Appeals and not the Federal Circuit. The 5th Circuit has some good law for the patentee — having previously told Judge Hughes that “he cannot enter an order after a Rule 41(a)(1)(A)(i) dismissal.” (quoting from patentee’s brief). In Bechuck v. Home Depot U.S.A., Inc., 814 F.3d 287, 291 (5th Cir. 2016), Judge Hughes had similarly issued a post-dismissal order that “If Bechuck sues Advantage (ASM) for the same cause of action, he must do so before this court.” The 5th Circuit ruled that statement ineffective — rather the plaintiff’s dismissal under “Rule 41(a)(1)(A)(i) necessarily allows him to choose his forum anew.”
By Statute, the Federal Circuit has jurisdiction over patent cases appealed from district courts. 28 U.S.C €§Ã¢â¬Â¯1295. However, the statute specifically is directed toward an “appeal from a final decision.” The statute does not indicate the proper course of appeal of mandamus actions. However, the Federal Circuit has also ruled that extraordinary writs associated with district court patent cases are also “plainly” within the court’s jurisdiction. In re Princo Corp., 478 F.3d 1345, 1351 (Fed. Cir. 2007); In re Regents of the Univ. of Cal., 964 F.2d 1128, 1130 (Fed. Cir. 1992). Although the Federal Circuit has grabbed-power, the 5th Circuit has not clearly relinquished power — in that I’m not aware of a 5th Circuit decision affirming Princo. (I have not done an exhaustive search).
Last week, the Supreme Court granted certiorari in Google v. Oracle, preparing to review the Federal Circuit’s decision that application programming interfaces (APIs) are copyrightable and that the replication of an API to implement compatibility is not a fair use. There are numerous legal flaws with the Federal Circuit’s decisions, flaws addressed at length in the Disruptive Competition Project’s comprehensive coverage of the case, but one thing that isn’t in the case is a patent—it’s all about copyright.
So why did the Federal Circuit, the appellate court whose jurisdiction centers largely around hearing patent cases, decide key issues of copyright?
[...]
It’s not impossible to fix, though. Several alternatives to the present situation come to mind.
First, the Federal Circuit could lose jurisdiction over a case if no patent issue existed when the case was appealed. However, simply changing the law so that they would not hear such cases would incentivize plaintiffs to leave patent claims in a case during the appeal as a means of forum shopping, a counterproductive result.
Second, the Federal Circuit could lose its exclusive jurisdiction over patent matters. This would result in some appeals being directed to the regional circuits. However, since the party that appeals would effectively be able to pick its appellate forum, we’d likely see forum shopping and races to appeal that would produce more expensive and less predictable appellate litigation. It also runs the risk of reducing the uniformity of patent law as regional circuits apply Federal Circuit law—though the alternative is having the Federal Circuit apply regional circuit law. And that uniformity has been more elusive than hoped, given the significant differences between district courts reflected in the forum shopping that went on prior to the TC Heartland decision.
Third, we could implement a predominance test. If the predominance of the issues in a given appellate case are governed by regional law, the regional circuit would take the case; if patent law predominates, the Federal Circuit would. This would be closest to the Senate Judiciary Committee’s vision of cases not being forum-shopped to the Federal Circuit if a patent claim is added in order to manipulate jurisdiction. At the same time, it would add one more issue to be litigated as part of appeals, prolonging cases, and the question of who decides predominance in contested cases would need to be resolved.
Fourth, we could codify bifurcation of appeals. If a case has both patent and non-patent components, the Federal Circuit would hear the appeal of the patent issues and the regional circuit would take on the non-patent issues. This would increase litigation cost and complexity due to the need to have separate appeals, and potentially raises complex questions as to how to bifurcate the case when the regional and patent law questions are interdependent. It would avoid non-uniformity of patent law and misapplication of regional circuit law by the Federal Circuit. (An alternative, but similar, approach would be a certification procedure similar to that used between federal courts and some state courts, where the Federal Circuit takes the case and asks the regional circuit to certify what the appropriate rule is on an issue of state law. Despite its attraction, that approach might have Constitutional infirmities.)
Finally, the Federal Circuit might simply be a failed experiment. Earlier commissions reviewing the question of whether to create a specialized patent court worried that specialized judges would succumb to “tunnel vision”, making the law in its area even more esoteric and arbitrary and even allowing the judges to “impose their own views of policy” rather than complying with the law. There’s some evidence that that may have happened with the Federal Circuit, resulting in its capture by pro-patent interests. Maybe it’s time to end the specialized court experiment and return patent law to generalist judges.
“I know this is going to be the most controversial thing I say. I don’t know where we got messed up along the way that we decided being politically correct is more important than having conflict resolution. … People are allowed to grow as human beings. They’re allowed to have conversations. They’re allowed to change their mind. They’re allowed to go from not liking to each other to liking each other, and vice versa. But you don’t find that out just yelling at each other. You find that out by showing each other respect and having a conversation.”
A UK man who sold access to pirate streaming services admitted to copyright and fraud charges in court today. According to a police investigation, instigated by anti-piracy group FACT, the man sold roughly €£400,000 worth of unauthorized streaming subscriptions.
YouTube sensation and founder of 'pirate' IPTV Gears Reloaded 'OMI IN A HELLCAT' says that he's been raided by the FBI who "took everything", including his huge car collection. With a rumored net worth of around $50m, OMI was recently seen on YouTube apparently buying $300K of diamonds. According to him, the FBI are investigating IPTV, tax, and money laundering.