12.25.19
Posted in News Roundup at 4:15 pm by Dr. Roy Schestowitz

Contents
-
-
Server
-
In the era of cloud computing, building a home server may seem like a strange idea. Why would you invest time, money, and energy into building a powerful Linux home server when you can instantly create a virtual machine in the cloud and get as much compute and storage capacity as you need? Because setting up a home server is a wonderful learning experience whose result is a server built exactly according to your needs.
Building a Linux home server from the ground up and without any previous experience is not nearly as complicated as it may seem. All you need to do is pick the right hardware, install a suitable operating system, and configure the server based on your needs. You can build a Linux server for your home on a very tight budget, but you can also spend a lot of money on premium server hardware and turn your home into a small datacenter.
What Is a Home Server and What Can I Do with It?
A server is any computer that processes requests from clients and delivers data to them over the internet or a different network, such as a local area network.
Most servers are located in dedicated buildings with redundant or backup components and infrastructure for power supply, extra-fast internet connection, and precise environmental control, but there’s nothing preventing you from having a server at home.
-
-
If Docker is the new hypervisor, Kubernetes became the replacement for proprietary virtual machine managers. With containers as the deployment unit and Kubernetes as the orchestration manager, the industry finally agreed on a standard infrastructure layer.
Red Hat, VMware, Canonical, Mirantis, Rancher and other vendors offer Kubernetes-based platforms that can run in both enterprise data centers and the public cloud. The rise of Kubernetes forced hyperscale cloud vendors such as Alibaba, AWS, IBM, Google, Huawei, Microsoft and Oracle to offer managed Kubernetes services.
-
IBM
-
What does a £63m investment even mean in a country where you don’t need to declare cash flow?
IBM’s CTO of Open Technology, Chris Ferris, tells The Register that: “IBM believes firmly that open source, especially for projects that really are strategic to the industry, that the best way to manage those is under open governance, under the auspices of a foundation.”
The kinds of projects IBM has in mind are the Kubernetes-related Istio and Knative, and the TensorFlow machine learning framework – all of which happen to be managed by Google.
-
Apple’s Swift language was released in late 2014 and soon became popular as a modern programming language for iOS and Mac applications. In 2015 Apple announced that Swift would be open source – and with a build for Linux as well as for Apple operating systems. “As soon as IBM learned this, we opened up conversations through partnership channels with Apple, and we began working on porting most of the major Foundation libraries in Swift to Linux,” said an IBM blog from January this year.
-
Audiocasts/Shows
-
This video goes over what is the best Linux distro for 2020. I showcase how it is configured and how I use it to be extremely productive.
-
Kernel Space
-
Western Digital has been contributing a lot more to the Linux kernel in recent years from RISC-V architecture bits to storage enhancements. The most recent code they have been working on in recent weeks is a brand new Linux file-system.
But before getting too bent out of shape over yet-another-Linux-filesystem, the new Western Digital creation isn’t intended to be a general purpose file-system for competing with the likes of EXT4, Btrfs, XFS, and ZFS On Linux… This new file-system, Zonefs, is for specialty use-cases and running on zoned block devices. Zonefs exposes each zone of a zoned block device as a file, compared to traditional file-systems or how zoned block device support is exposed through the likes of F2FS and friends on host-managed/host-aware SMR (Shingled Magnetic Recording) disk drives.
-
Benchmarks
-
While the open-source Radeon Linux graphics stack has made some remarkable improvements this year not only from AMD but also the likes of Valve, unfortunately not as much can be said about the state of the open-source NVIDIA (Nouveau) driver. The Nouveau Linux graphics driver remains much slower than the proprietary driver, the hardware with the best support is several generations old, and due to the lack of signed firmware images there still isn’t yet any open-source 3D for the Turing GPUs that have been shipping for months. But there may be hope in 2020.
-
Applications
-
Benchmark and stress test methods are often used to gauge the performance of desktop PCs and servers. These tests are also useful in finding hardware problems and system anomalies that are observed only when a system is under heavy load.
This article will list various utilities to perform CPU benchmarks and stress tests on your system. While many of these apps provide options to test other hardware components as well, this article will focus on CPU tests only.
-
Instructionals/Technical
-
Devices/Embedded
-
Business cards are a staple in the business world and can help make a good impression. What kind of impression would you make if your business card not only shared your contact information, but also ran Linux? One embedded systems engineer did just that. George Hilliard created his own business card that can run Linux and shared the process on his website.
According to Hilliard, his idea for the business card came to him when he thought, “These processors are nearly cheap enough to give away.” He noted that he had seen electronic business cards before, but their functions tended to be rather limited. He believes that his own Linux business card could be a great idea for larger business, since they could likely get the needed materials at an even lower price.
-
Business cards continue to be a thing in the 21st century because despite the fact that many folks are carrying around smartphones capable of storing contact details for millions of people, it’s still quicker and easier to hand someone a card than to sit around while they type your details into a phone.
A lot of cards probably get tossed out… but some folks have found ways to use to tech to make truly innovative, memorable, and maybe even useful business cards.
There was the developer who made a business card that’s also a musical instrument, or the one who made a card that acts as a Magic 8-Ball game. But George Hilliard’s business cards may be the first that are actually wallet-sized computers that run Linux.
-
Open Hardware/Modding
-
Easy access to reliable electrical power is something a lot of us take for granted, but in developing countries or after natural disaster, it can be a rare commodity. [Daniel Connelly] has been working hard to develop infrastructure people can build themselves, and his latest project is a 200 W water turbine (video after the break) that can be built for about $50.
The core of the system is a wheel and motor from a hoverboard. What looks like 110 mm PVC tubing is connected together in a U-shape that can be mounted over the wall of a man-made channel. The inlet side is shorter than the outlet, and the system must be filled with water to allow the flow to start, like a siphon. The first two versions had the impeller sitting on the end of the outlet tube. V1 used a scrap plastic radial impeller of unknown origin, and did not work at all. V2 had a 3D printed impeller that worked pretty well, but the rotation speed wasn’t high enough to produce the voltage that [Daniel] wanted.
-
Bluespec is thrilled to announce the launch of their latest innovation: the Bluespec RISC-V Factory. From developers to embedded systems engineers and beyond, those working in the RISC-V field now have a brand new resource at their fingertips that enables them to become RISC-V power users and design with RISC-V open source cores far more safely and efficiently.
While open source cores provide a huge running start on the RISC-V value proposition, there is still a dangerous productization gap compared to proprietary cores. The RISC-V Factory supplies the missing layers of productization, enabling safe and easy deployment of RISC-V open source hardware.
-
Arm dominates the microprocessor architecture business, as its licensees have shipped 150 billion chips to date and are shipping 50 billion more in the next two years. But RISC-V is challenging that business with an open source ecosystem of its own, based on a new kind of processor architecture that was created by academics and is royalty free.
This month, 2,000 engineers attended the second annual RISC-V Summit in San Jose, California. The leaders of the effort, including nonprofit RISC-V Foundation CEO Calista Redmond, said they see billions of cores shipping in the future.
RISC-V started in 2010 at the University of California at Berkeley Par Lab Project, which needed an instruction set architecture that was simple, efficient, and extensible and had no constraints on sharing with others. Krste Asanovic (a founder of SiFive), Andrew Waterman, Yunsup Lee, and David Patterson created RISC-V and built their first chip in 2011. In 2014, they announced the project and gave it to the community.
RISC-V enables members to design processors and other chips that are compatible with software designed for the architecture, and it means licensees won’t have to pay a royalty to Arm. RISC-V is politically neutral, as it’s moving its base to Switzerland. That caught the attention of executives, including Infineon CEO Reinhard Ploss, according to RISC-V board member Patterson. With RISC-V, Chinese companies wouldn’t have to depend on Western technology, which became an issue when the U.S. imposed tariffs and Arm had to determine whether it could license U.S. technology to Huawei.
-
Piloting a boat is all well and good, but can get dull when you’d rather be reclining on the deck with a cold beverage in hand. For [Timo Birnschein], this simply wouldn’t do. He began to gather parts to put together an autopilot to keep his boat on the straight and narrow.
The build is based around OpenPlotter, which uses a battery of marine-ready software to handle routing charts, autopiloting, and providing a compass heading for navigation. Naturally, it all runs on a Raspberry Pi. In combination with PyPilot, it can be used to let the vessel drive itself around a series of waypoints, allowing you to soak up the atmosphere on the water without having to constantly steer the craft.
-
Mobile Systems/Mobile Applications
-
-
It’s not often I predict that one Linux distribution might change the landscape of open source, but everything I’ve seen and heard about the upcoming release for Deepin Linux has me thinking this could be the one. The developers of Deepin 15.11 are planning to release a feature that could shift the tectonic plates of Linux distributions. That feature is Deepin Cloud Sync.
This feature will sync system settings–of your choosing–to the cloud. For instance, you could install another instance of the OS, connect it to your Deepin Cloud Sync account, and have that new instance of the OS automatically sync your settings. Imagine how much time that would save for the rollout of multiple desktop instances. Couple that with how gorgeous the Deepin desktop is, and you have something special.
Deepin Linux is going to turn heads, and many users will jump the ship of their favorite distribution.
-
As a way of approaching software development, open source has been with us for decades. For over twenty years, organisations like the Apache Software Foundation have supported the development of open source software projects that led to new applications and online services enjoyed by billions globally.
However, what will happen to open source in 2020 and in the years ahead? Will the open source movement continue to support and develop software effectively, or are there future risks we need to address?
-
It’s been an amazing decade for open source. So many things have happened–some of which have profoundly changed the way in which businesses work, and some of which greatly improved the Linux desktop experience.
I’m highlighting what I believe are the best innovations to have come out of the open source community since 2010. Are there more great open source innovations? Yes, of course, but in my opinion these are some of the most important ones.
[...]
Let’s take it down a notch or two with a brief detour to the Linux desktop. Although some would argue that there are far better desktop environments, on April 6, 2011, GNOME 3 changed the game. This was the first time a popular Linux DE made a drastic shift to the popular desktop metaphor. Instead of the usual panel, main menu, system tray, etc., the GNOME developers opted to take a completely different approach—one that would not only be more efficient, but was touch-screen friendly, elegant, and unique. The GNOME team received a ton of flack for this change, but they stuck it out. Indirectly, it was the release of GNOME 3 that inspired the likes of Cinnamon and MATE, as well as Deepin Desktop. So even if you don’t like it, chances are the desktop you are using has benefited from GNOME 3.
-
Software used to be proprietary, but over the past decade, open-source tools have seen a meteoric rise. This software is freely available and is developed collaboratively, maintained by a broad network that includes everyone from unpaid volunteers to employees at competing tech companies. Here’s how the business model works.
-
Funding/Currency
-
-
Belgium-based all-in-one business software maker Odoo, which offers an open source version as well as subscription-based enterprise software and SaaS, has taken in $90 million led by a new investor: Global growth equity investor Summit Partners.
The funds have been raised via a secondary share sale. Odoo’s executive management team and existing investor SRIW and its affiliate Noshaq also participated in the share sale by buying stock — with VC firms Sofinnova and XAnge selling part of their shares to Summit Partners and others.
“Odoo is largely profitable and grows at 60% per year with an 83% gross margin product; so, we don’t need to raise money,” a spokeswoman told us. “Our bottleneck is not the cash but the recruitment of new developers, and the development of the partner network.
-
Hugging Face has announced the close of a $15 million series A funding round led by Lux Capital, with participation from Salesforce chief scientist Richard Socher and OpenAI CTO Greg Brockman, as well as Betaworks and A.Capital.
New-York based Hugging Face started as a chatbot company, but then began to use Transformers, an approach to conversational AI that’s become a foundation for state-of-the-art algorithms. The startup expands access to conversational AI by creating abstraction layers for developers and manufacturers to quickly adopt cutting-edge conversational AI, like Google’s BERT and XLNet and OpenAI’s GPT-2 or AI for edge devices. More than 1,000 companies use Hugging Face solutions today, including Microsoft’s Bing.
-
Natural language processing (NLP) is at the core of breakthrough, AI technologies and has powered apps like SignAll, which is used to translated sign language into text. Hugging Face brings NLP to the mainstream through its open-source framework Transformers that has over 1M installations. Hugging Face’s NLP platform has led to the launch of several that address =customer support, sales, content, and branding, and is being used by over a thousand companies.
-
Ray is an open-source distributed framework that makes it easy to scale applications and to leverage machine learning libraries. The project was developed by the distributed programming platform company Anyscale.
Ray includes three libraries for accelerating machine learning workloads: Tune, RLlib and Distributed Training. According to the company, the machine learning libraries give developers the ability to include hyperparameter search, reinforcement learning, training and serving.
-
With the funding, Anyscale will expand its leadership team and amplify its contribution to the open source community.
-
CertiPath announced it received final sign-off on its yearlong effort to create a blockchain gateway on behalf of the Department of Homeland Security Science and Technology Directorate (S&T).
-
Gitcoin, the open-source bounties platform, makes an upliftment for the open-source community workers and aims to start the New Year by promoting the Open Source Community. Since its launch in 2019, it has already funded $797,000 to open source projects.
-
I began my career as a developer of deep-water missile systems for submarines and did this until 2001 when Google Earth was first released. This critically impacted how the industry operated and in turn, my career. After completing my PhD in photogrammetry and remote sensing, I decided to jump into the internet industry and eventually found my way to China UnionPay. There, I served as a Senior Researcher in Strategic Development, then a Senior Executive in Market Development, and finally as a Deputy General Manager of a third-party payment and clearing subsidiary of China UnionPay for two years. In 2013, I made my way to the blockchain space and focused on the development of consortium blockchain and privacy-preserving computation, and then founded PlatON to begin the development and commercial practise of blockchain-based infrastructure.
-
FSF
-
GNU Projects
-
We are pleased to announce the release of GNUnet 0.12.1.
This is a very minor release. It largely fixes one function that is needed by GNU Taler 0.6.0. Please read the release notes for GNUnet 0.12.0, as they still apply. Updating is only recommended for those using GNUnet in combination with GNU Taler.
-
Openness/Sharing/Collaboration
-
-
“It is core to our mission of transforming healthcare that we release open source research and information visualizations, like Vapepocolypse, that draws attention to and informs people about the relationship between e-cigarette use and respiratory disease,” said Juhan Sonin, director of GoInvo.
-
Programming/Development
-
GitLab announced that it is moving its observability suite to Core to its open-source codebase in 2020.
“If it’s a feature for a single developer who might be working on his or her own individual project, we want that to be in Core because it invites more usage of those tools and we get great feedback in the form of new feature requests and developer contributions,” said Kenny Johnston, the director of product of Ops at GitLab.
-
Python
-
So far, the majority of Python packages have either used distutils, or a build system built upon it. Most frequently, this was setuptools. All those solutions provided a setup.py script with a semi-standard interface, and we were able to handle them reliably within distutils-r1.eclass. PEP 517 changed that.
Instead of a setup script, packages now only need to supply a declarative project information in pyproject.toml file (fun fact: TOML parser is not even part of Python stdlib yet). The build system used is specified as a combination of a package requirement and a backend object to use. The backends are expected to provide a very narrow API: it’s limited to building wheel packages and source distribution tarballs.
The new build systems built around this concept are troublesome to Gentoo. They are more focused on being standalone package managers than build systems. They lack the APIs matching our needs. They have large dependency trees, including circular dependencies. Hence, we’ve decided to try an alternate route.
Instead of trying to tame the new build systems, or work around their deficiencies (i.e. by making them build wheel packages, then unpacking and repackaging them), we’ve explored the possibility of converting the pyproject.toml files into setup.py scripts. Since the new formats are declarative, this should not be that hard.
-
I have been writing a small scraping application these days. I wanted it to send metrics and use chromedriver. I also wanted to be able to run it locally and don’t send metrics while running locally. So, I needed some way to separate local and production environments. The easiest way to do that — use flags.
-
Today, a new version (3.2.5) of Thonny has been released. It incorporates support for Friendly-traceback (which needs to be installed separately). Currently, the download link on Thonny’s homepage still links to version 3.2.4. The latest version can be found on Github.
Thonny is a fantastic IDE for beginners, especially those learning in a classroom environment, as it offers many useful tools that can be used effectively by teachers to demonstrate some programming concepts. Thonny is the work of Aivar Annamaa, who is apparently recognized as an excellent lecturer — which does not suprise me given the thoughtful design of Thonny. He has been interviewed about Thonny on PythonPodcast.
-
-
Integrity/Availability
-
Proprietary
-
Pseudo-Open Source
-
Openwashing
-
-
-
It’s hard to find a tech company that isn’t attempting some sort of AI-related product, service, or initiative these days, but eBay went all-in by building its own AI platform, called Krylov. Sanjeev Katariya, eBay’s VP and chief architect of AI and platforms, described Krylov in an interview with VentureBeat: “At the very highest level, Krylov is a machine learning platform that enables data scientists and machine learning engineers to ship all different kinds of models for all kinds of data quickly into production, which gets integrated into user experiences that eBay ships globally.”
-
Akamai is using a congestion control algorithm that was originally developed by Google to optimize streaming video traffic on its content delivery network (CDN) platform. The algorithm is called the Bottleneck Bandwidth and RTT (BBR).
Internet traffic rides on an underlying transport protocol, the most popular of which is TCP. As CDN traffic is delivered into last mile networks, it often hits a lot of interference that increases degradation. Congestion control algorithms are used to combat that degradation. Alex Balford, senior product marketing manager at Akamai, said Akamai uses about five different congestion control algorithms that work with TCP. Some of these algorithms are proprietary and some are open source.
-
APIs have become omnipresent in the world of software and mobile app development.
Right from private solutions to public-facing services apps and partner integrations, it is present everywhere.
They are helping developers in creating apps that caters to diverse set of customer needs. They are transforming the architectural patterns with much sophisticated approach of mobile application development.
-
flexiWAN, the world’s first modular and open source SD-WAN has announced today that it is cooperating with Telefónica for creating value added SD-WAN based services through the flexiWAN open source and modular SD-WAN solution.
Service differentiation, feature modularity with the ability to easily integrate 3rd party applications and tiered service cost structure are some of the drivers for the cooperation between Telefónica and flexiWAN.
-
Israel-based start-up FlexiWAN announced that it’s collaborating with Telefonica on the creation of SD-WAN based services through its flexiWAN open source and modular SD-WAN product. The partnership started in June 2019 and during 2020, flexiWAN and Telefonica will be running proof-of-concept trials to test flexiWAN performance and functionality on white-box CPEs.
The aim is to test the technology for customer branches that need throughputs from 50 Mbps to 1 Gbps of encrypted traffic, said flexiWAN, adding that service differentiation, feature modularity with the ability to easily integrate third party applications and tiered service cost structure are some of the drivers for the cooperation.
-
Telefónica and flexiWAN started their collaboration in June, and plan to run flexiWAN’s open source, modular SD-WAN solution on white box customer premises equipment next year. The PoCs will test flexiWAN on customers branches that need throughput from 50 Mbps to 1 Gig of encrypted traffic.
-
Is getting paid to write open source a privilege? Yes and no [Ed: Mac Asay now says "open source is inherently selfish"; and no, he never wrote any code. He cannot. But he's promoting exploitation of coders. Asay who works for AWS calling coders "selfish" is like parents who have many kids and call those who choose not to have any "selfish". Amazon is the selfish, greedy one.]
-
Customer-driven open source is the future of software [Ed: Mac Asay continues to push for proprietary agenda under "open" umbrella in publications his employer pays for -- to relay this propaganda under the guise of 'journalism']
-
Amazon, Apple, Google & Zigbee Alliance are working to simplify product manufacturers ‘ production and increasing market connectivity.
-
-
-
-
-
-
-
-
-
-
-
Our commitment to open source [Ed: The surveillance giant Telstra – spying not only on Australia but many parts of Asia too – is openwashing now]
-
Privatisation/Privateering
-
DataStax has taken the Christmas wrapping paper off of DataStax Luna, a subscription-based support offering for open source Cassandra.
The company says it is offering this service due to the rapid growth of Apache Cassandra.
-
DataStax was among the Apache Cassandra specialists wobbled by AWS’s decision to offer a managed service of the open source distributed database earlier this month.
-
-
-
-
-
-
-
At the recent AWS re:Invent, Amazon announced the Amazon Managed Apache Cassandra Service (MCS), a new way of managing Cassandra databases on AWS. With this new service the public cloud vendor can offer Cassandra directly to customers instead of relying on third-party vendors.
-
-
According to the Times, Amazon quickly surpassed Elastic and began making more revenue by offering deeper integration with its other products. Elastic responded to that by offering premium features on top of its product, only for AWS allegedly to copy many of those features and make them available to its users at no extra cost.
-
Turns out even with the luxury and protection of billions of dollars, you still can’t take any criticism
-
-
Linux Foundation
-
Angel, an artificial Intelligence project contributed by Tencent, successfully graduated from LF AI on December 19th after evolving from a pure model training platform to a full-stack machine learning platform, an umbrella foundation of the Linux Foundation said in a statement released on Thursday.
Angel is the first Chinese open-sourced project to achieve this status, the LF AI Foundation added.
-
The Linux Foundation’s latest project brings together many of the key developments in next generation networks, which the open source organization is taking such a prominent role in shaping. DENT will create an open network operating system (NOS) for disaggregated network switches in campuses or remote offices. This has clear implications for telcos as they build out edge clouds, often in tandem with smaller 5G cells. In doing this, they are targeting enterprise business with on-premise or managed edge/connectivity services, while looking to transform their own network costs with white box and open source architectures. This is the latest example of the Foundation’s growing role in defining telecoms and enterprise networks, as operators move out of their strictly proprietary worlds…
-
The Xen Project 4.13 release incorporates many new features and improvements to existing features.
-
-
The Xen Project, an open source hypervisor hosted at the Linux Foundation, today announced the release of Xen Project Hypervisor 4.13, which improves security, hardware support, added new options for embedded use cases and reflects a wide array of contributions from the community and ecosystem. This release also represents a fundamental shift in the long-term direction of Xen, one which solidifies its resilience against security threats due to side channel attacks and hardware issues.
-
Anchore Inc., the container analysis and security experts, today announced the integration of Anchore Engine with the Cloud Native Computing Foundation’s (CNCF) Harbor container image registry project. Harbor is an open source, cloud-native container image registry that is currently an incubating project within the Cloud Native Computing Foundation. With this new integration, Harbor users can use Anchore to automatically scan container images to identify known vulnerabilities and enforce best practices before allowing them to be published.
[...]
Anchore Engine, first released in 2017, is an open source tool for deep image inspection and vulnerability scanning. It is the only tool focused 100% on container-native scanning; it goes beyond basic source and binary scanning by probing into the configuration and contents of container images. Anchore Engine is the core of Anchore Enterprise, a fully-featured container security workflow solution for enterprises in highly-regulated industries.
-
Entrapment (Microsoft GitHub)
-
-
-
The SRT Alliance, a group that supports an open source video transport protocol and technology stack, said it now has more than 300 member companies.
Alibaba Cloud, Internet Initiative Japan, Kiswe and Red5 Pro recently joined the group, which is pushing for adoption of SRT (Secure Reliable Transport). The protocol, which was developed by Haivision, optimizes streaming performance to account for varying speeds and reliability within different networks. SRT says it can offer secure streams and easy firewall traversal. The protocol is royalty free and available on GitHub.
-
A GitHub Subsidiary In China Threatens National Security And Internet Freedom [Ed: If Google had done that, and it hasn't yet BTW, the American politicians would be screaming for blood; but for the gang that is Microsoft this is perfectly acceptable?]
According to the Financial Times, GitHub is working with the Chinese government to open a subsidiary in China. GitHub COO Erica Brescia said the Chinese government was “very encouraging” of the move, and the company was planning a “phased approach” to expansion. The FT explained this first phase involves setting up a “wholly foreign-owned subsidiary in China for the purposes of hiring staff” followed by “joint ventures and the possibility of hosting GitHub content in China”
-
-
Security
-
Google is modifying the reward program it has that provides rewards to open source projects for security improvements and will now give monetary support in advance for projects that don’t have the financial resources to do it on their own.
The patch reward program is an offshoot of Google’s vulnerability reward program, which pays researchers rewards for discovering and submitting security flaws in certain Google products and services. Google started the patch reward program in 2013 as a way to encourage the maintainers of open source projects to address security weaknesses. It doesn’t pay out money for fixing vulnerabilities, but rather rewards developers for hardening certain elements or eliminating known vulnerable libraries, for example.
-
Besides rewarding ethical hackers from its pocket for responsibly reporting vulnerabilities in third-party open-source projects, Google today announced financial support for open source developers to help them arrange additional resources, prioritizing the security of their products.
The initiative, called “Patch Rewards Program,” was launched nearly 6 years ago, under which Google rewards hackers for reporting severe flaws in many widely used open source software, including OpenSSH, OpenSSL, Linux kernel, Apache, Nginx, jQuery, and OpenVPN.
-
-
Google LLC said today it’s planning to revamp its six-year-old Patch Rewards program for open-source software developers beginning next year.
Patch Rewards is one of Google’s oldest security programs. It began life in 2013 when the company said it would provide financial aid to developers of open-source projects that implement important security features.
-
-
Open source tools have taken center stage in the DevOps toolchain. As organizations become increasingly dependent on open source tools, the risks that affect these tools is transferred to these organizations. To mitigate this risk, it is essential for organizations to practice continuous monitoring of open source tools. Let’s look at the various layers in an open source stack, and identify key points of concern that need monitoring.
-
Internet Policy/Net Neutrality
-
Still fearing Huawei is a pipeline for US secrets to be eavesdropped by the Chinese government, the Pentagon is pushing for open-source 5G software to give networks a more trusted alternative. The US Department of Defense has long alleged that Huawei represents compromised security, and has made several attempts to prevent carriers and other American companies from using its networking hardware.
[...]
Now, the US DoD is pushing for an alternative. The agency has apparently been pushing US firms to develop open radio access networks, which would use open-source technologies rather than proprietary systems. As such, customers – like ISPs and carriers – could effectively mix and match hardware, rather than being limited to a single provider.
While the motivation is mistrust of Huawei – one of the key 5G infrastructure vendors – the Pentagon is pitching a different reason to companies, the FT reports. US officials are apparently considering various ways to encourage open-source alternatives, such as promising tax breaks, and warning that those who don’t buy into the idea risk being left behind as the market gathers pace.
-
Monopolies
-
Patents
-
In so concluding, the Federal Circuit rejected Hospira’s argument that the jury instructions improperly focused on why each EPO batch was manufactured rather than how the batches were used or whether those uses were reasonably related to the development and submission of information to the Federal Drug Administration (FDA). The court then determined substantial evidence supported the jury’s conclusion that Hospira did not manufacture the 14 batches at issue “solely for uses reasonably related to the development and submission of information” to FDA.
[...]
A jury found that Hospira failed to show the patents invalid by clear and convincing evidence. It further found that Hospira infringed two claims of the ’298 Patent, but not any claims of the ’349 Patent, and that only seven of the 21 accused drug substance batches were entitled to the Safe Harbor defense. The jury awarded Amgen $70 million in damages.
Both Amgen and Hospira moved for JMOL, which the district court denied. On appeal, Hospira challenged (1) the district court’s claim construction, (2) the jury instructions regarding the Safe Harbor defense, (3) the jury’s findings regarding the Safe Harbor defense and denial of JMOL on the Safe Harbor issue, (4) the evidentiary rulings regarding Amgen’s damages expert, and (5) the denial of JMOL of non-infringement and invalidity. On cross appeal, Amgen challenged the district court’s denial of JMOL of infringement of the ’349 Patent and the denial of its motion for a new trial.
-
Copyrights
-
A Russian police raid on Nginx’s Moscow office last Thursday has raised concerns among users of the popular web and proxy server software.
Several employees, including chief developer Igor Sysoev and co-founder Maxim Konovalov, were interviewed by police over a criminal copyright infringement complaint, The Financial Times reports.
The raid arrived a week after Russian search engine and internet firm Rambler, Sysoev’s former employer, claimed full ownership of the Nginx code. Rambler Internet Holding is reportedly requesting $51 million RUB ($810,000), Forbes.ru reports via The Moscow Times.
Nginx, a firm created in 2011 to provide support for users of the eponymous open source web server software, was bought by US firm F5 Networks for $670 million back in March. Nginx was first released in 2004.
In response to queries from The Daily Swig, F5 confirmed the police raid (without elaborating) in what amounts to a holding statement.
“Yesterday [Thursday], Russian police came to the Nginx Moscow office,” it said. “We are still gathering the facts and as such we have no further comments to make at this time.”
-
Following intense backlash from the open-source and Russian tech communities, Russian internet company Rambler sait it would drop its criminal case against NGINX Inc, the company behind the world’s most popular web server.
Instead, Rambler will pursue any ownership claims over the NGINX source code in civil court, a Rambler spokesperson told ZDNet today.
The decision was taken on Monday in a meeting of Rambler’s board of directors. The meeting was called by Sberbank, one of Russia’s largest banks and Rambler’s largest shareholder, with a stake of 46.5% in the company.
Permalink
Send this to a friend
Posted in Kernel at 4:00 pm by Dr. Roy Schestowitz
Born 28th of December, 1969. Helsinki, Finland.

Summary: The kernel guy and birthday boy can receive greetings on torvalds@linux-foundation.org
(even if he’s unlikely to respond to these)
Permalink
Send this to a friend
Posted in Free/Libre Software, Humour, Microsoft at 2:34 pm by Dr. Roy Schestowitz


Summary: Eating the cake and keeping it fake (GitHub is merely a proprietary software trap, just like WSL)
Permalink
Send this to a friend
Posted in Bill Gates, Courtroom, Deception at 10:52 am by Dr. Roy Schestowitz
Summary: There has certainly been a degree of coordination with the media (delays and choice of time), in effect suppressing public access to an important case pertaining to crimes of pedophilia
IN part one we explained the importance of these revelations and why they’re grounded in verifiable facts, unlike the Franklin child prostitution ring allegations. In part two we clarified progress in obtaining a full police report. Gates tried hard to deflect or 'neutralise' media attention, but we’re difficult to censor and dissuade. Techrights is a different kind of publisher because it latches onto suppressed topics and doesn’t let go. A lot remains to be shown and we’ve split it into parts in order to make the facts easier to digest while allowing enough time between each part for more sources/informants to contact us (this has historically proven to be strategically significant). There’s a degree of collaboration here and elaborating on that collaboration may jeopardise the investigation. We use encryption, at the very least so as to reduce predictability of what will be published next. So please bear with us as we divulge one bit of information at a time. We write this slowly and carefully. There are some deadlines associated with police activity and we take these self-imposed deadlines into account.
“Why did it take a YEAR for people to report on it? His criminal court file is opened 12/29/2013. They don’t report on it until a year later.”
–AnonymousFor those just joining us, please read the first and second parts now. As a recap, Bill Gates said (to the media, repeatedly even!) that he was close to Mr. Epstein because he needed to know lots of rich people and Epstein knew lots of rich people. Hello? You’re like the richest American, Mr. Gates (or were at the time). Also, why would you pay MIT through Epstein and not the fake charity? Why fly his child molestation plane when you have a private jet of your own? Saving air miles? Reports say that Epstein’s plane had beds in it (with underage “subjects”). No matter how one looks at it (from which perspective), it doesn’t look too good and the excuses from Gates “don’t compute” — to borrow “geek speak”.
“It’s almost like the attorney was defending Gates and not the employee.”
–AnonymousA couple of days ago we published this meme/teaser about this series. Its key message was that there’s a massive — truly massive — police report. There’s also some public information about a legal case, albeit not so much press coverage. Hardly any! We’ll come to this at a later stage in the series (this in itself is quite an injustice that merits further investigation and exposure).
As a source of ours put it: “Why did it take a YEAR for people to report on it? His criminal court file is opened 12/29/2013. They don’t report on it until a year later.”
The timing of a press report? Guess when. We alluded to that earlier in this series.
But wait, it gets worse.
“Have you seen this?”
So said a source of ours. “Look who the employee’s criminal attorney is following on Twitter” (page archived here just in case that changes). Here are screenshots:

A screenshot of Jeff D. Cohen, a key lawyer in the case

Further details on the 10 people he follows (click for larger view)
“It’s almost like the attorney was defending Gates and not the employee,” our source remarked. We’ll get back to that in a future part.
Concepts such as “coverup trial” come to mind. Saudi Arabia has just sentenced 5 people to death without the court even bothering to mention the mastermind/perpetrator, who controls this court (and also happens to be a close associate of Bill Gates). They try to make it seem as though Saudi Arabia is tough on people who murder journalists without bothering to hold accountable those who do this again and again (usually domestically). Just about nobody doubts who’s responsible at the higher level (recall this interview with PBS, a network funded by Gates). █
Permalink
Send this to a friend
Posted in Europe at 10:41 am by Dr. Roy Schestowitz
Nearly done, but let’s remember what matters

The corporate sovereignty phenomenon is a global one (and it spreads further)
Summary: The Thierry Breton series has almost reached its end, but it is easy to lose sight of why it’s important and in what way
THE Breton series’ epilogue is still in preparation and there’s a mere possibility of extending it in light of the prosecution of Breton’s successor (all over the news last week! Even SUEPO mentioned it with several links in the official Web site five days ago).
We’ve come to recognise that there’s a bit of a problem; at the start of the series (which we had preceded with disclaimers a number of times [1, 2]) we sought to clarify the intent, purpose and importance of it. Some of that was likely missed or forgotten when we composed/published the 24 parts (the latter of which were rather long, spanning about 10 pages of 4A papers each). For those who missed or skipped these, here’s the whole lot:
We’ve published all the above under the polite/neutral heading Understanding Thierry Breton and it has since then attracted much interest from various circles, both political and technical. It’s regretful that nowadays a lot of feedback gets ‘lost’ in the web of social control media. People had much to say, but it is difficult to locate; it’s scattered.
The articles are very well ranked in search results (for English texts) as a lot of information on these matters is otherwise available only in French. In one particular regard the service we provide here is making key facts widely accessible to an audience outside France (or to people who cannot comprehend French).
“In one particular regard the service we provide here is making key facts widely accessible to an audience outside France (or to people who cannot comprehend French).”Our series can easily be mistaken for EU bashing, but nothing can be further from the truth. Those who respect the EU — as I personally have for decades — want to guard it from abuse. This means calling out foul play and nepotism or entryism — the same sort of thing that ruined the European Patent Office (EPO).
One person asked us: “Where can I get a two or three paragraph summary of the series and why France’s choice of European Commissioner is problematic?”
The answers ought to be evident from the above parts which, if put in paper form, span well over 100 pages in length. It’s almost like a mini-thesis, a research project which is a well-sourced accumulation of facts. What readers make of these is up to them (links can be followed and stories studied in greater depth).
“It’s almost like a mini-thesis, a research project which is a well-sourced accumulation of facts.”A reader conceded that “it looks like a very exhaustive (no pun intended) investigation. While the epilogue is fresh in your head would you be able to do two general-audience paragraphs introducing the situation? Something introducing two or three of the major questions people unfamiliar with the situation should ideally ask and why it matters to them.”
To properly convey all the pertinent issues one might want to quantify or enumerate them. Thierry Breton has a long career in a lot of places and scandals are difficult to keep abreast/count of. We’ve been told that the Wikipedia entry about Thierry Breton is very much sanitised, but Wikipedia wars (edit wars with PR agencies) aren’t worth the time/effort. Thierry Breton is actually a symptom of a broader issue, which implicates a mostly French cabal that includes French IMF chiefs, several EPO Presidents (not just Battistelli), and the current French President, who puts in charge of the EU people who would likely let the EPO off the hook, even when it grossly violates long-cherished treaties to the detriment of the European public (and, expectedly perhaps, to the benefit of the rich, including Europe’s richest, who is French and notoriously well-connected).
“…let’s face it — it’s not too hard to check who owns pertinent publishers and why they cover particular affairs (or don’t at all!) the way they do.”Techrights never shied away from politics; when Obama was elected as president in 2008 we expressed worries he would serve corporate agenda (whilst acknowledging McCain would have been no better) and we constantly complain about Trump, whom we deem to be a symptom of an overstretched empire with growing inequality, poverty, conspiracy theories, and what some dub “late stage capitalism”. To subject Europe to a similar level of scrutiny would only be fair and rational. People deserve to know the sort of world they live in (who’s in charge, who’s not accountable etc.) and if that means ‘badmouthing’ even so-called ‘liberals’ like Macron and Obama, then so be it. I myself don’t come from a political or from a rich family; I don’t think anyone involved in Techrights is particularly privileged; we compensate for that lack of so-called ‘privilege’ with curiosity and a constant thirst for knowledge. Our fact-checking skills are probably much better than that of oligarchs-owned media. And let’s face it — it’s not too hard to check who owns pertinent publishers and why they cover particular affairs (or don’t at all!) the way they do. One need not be cynical to insinuate that the public isn’t being told the full/true story, as that might enrage some people and harm remaining legitimacy of the status quo. The “yellow vests” movement may be mocked by the media, but we know whose media. █
Permalink
Send this to a friend
Posted in News Roundup at 9:53 am by Dr. Roy Schestowitz

Contents
-
-
It takes a lot of work to get a functional PCB business card that’s thin, cheap, and robust enough to be practical. If you can even blink a few LEDs on the thing and still hand them out with a straight face, you’ve done pretty well for yourself. So you can imagine our surprise when [George Hilliard] wrote in to tell us about his $3 business card computer that boots into a functioning Linux environment. If this were a bit closer to April, we might have figured it was just a joke…
-
I’m an embedded systems engineer. I spend a lot of my free time looking for things I could use in future designs, or things that tickle one of my fancies.
One of those things is cheap Linux-capable computers, the cheaper the better. So I started diving into the very deep rabbit hole of obscure processors.
I thought to myself, “These processors are nearly cheap enough to give away.” After a while I hit upon the idea of making a barebones Linux board in a business card form factor.
As soon as I had the idea I thought it would be pretty cool to do. I have seen electronic business cards before, with various fun features including emulating USB flash drives, blinkenlights, or even wireless transceivers. I have never seen one running Linux, however.
-
In a detailed write-up, Hilliard goes on to explain how he came up with the design and assembled all the components. Naturally, there were some problems that arose during the construction that he had to troubleshoot: “first, the USB port wasn’t long enough to reliably make contact in many USB ports. Less critically, the flash footprint was wrong, which I worked around by bending the leads under the part by hand…”
Impressively, the total cost of the card (not including his time) was $2.88 — “cheap enough that I don’t feel bad giving it away, as designed!”
-
I started by looking for processors that were the magic combination: inexpensive, USB, no BGA footprints, and purchasable somewhere, even if I had to get it from Taobao. (You usually can’t buy these processors from Mouser or the manufacturer.) Ideally, there would also be a known-good piece of hardware I could get as a development board.
I also really wanted a part that had RAM included in the package. This is fairly rare for microprocessors, in contrast to micro_controllers_ which typically don’t have enough juice to run Linux. This constraint really narrowed down my choices, but I stuck with it because it would make design and assembly a lot easier.
Many of the processors in this price class are made by Chinese companies and there’s not a lot of info about them available in English, so finding them takes some digging. (If you know of other Chinese-only processors in this category, please let me know about them as I would be excited to learn about them.)
My first attempt was using an STM32F4, which can be persuaded to run Linux if it’s hooked up to external SDRAM, like in this Emcraft Systems system-on-module.
-
Anytime millions switch to GNU/Linux is a good few years by me.
-
Paranoia is not entirely unwarranted with the plethora of these attacks today. It was with this mix of curiosity and fear that I began using hardware security keys two years ago. In a nutshell, security keys are little devices (typically USB, NFC or Bluetooth) that compute cryptography keys and serve as a more secure second factor2 that only you can physically possess.
My evangelism of the benefits of these security keys amongst my friends has come up so often that I decided to write this beginner’s guide (albeit rather detailed) to security keys—a topic generally left to very tech savvy people—to accomplish a few things: [...]
-
Audiocasts/Shows
-
In our Innards section, we ask where we went wrong? We revisit last year’s predictions…
-
Open source won the last decade, but what if it hadn’t? We look back at some major milestones and reflect on a world where they never existed.
Special Guests: Alex Kretzschmar and Brent Gervais.
-
Kernel Space
-
Graphics Stack
-
In going through the AMDGPU kernel driver changes currently queuing ahead of the Linux 5.6 cycle, “virtual DCN” support is coming in working on SR-IOV display support.
For those interested in display-driven GPU virtualization, it looks like AMD is working on some improvements as we move into 2020.
Catching our eye was support virtual DCN (Display Core Next) being queued for eventual landing in DRM-Next ahead of the Linux 5.6 merge window coming in just over one month.
-
Benchmarks
-
Since March of this year I began benchmarking various open-source video encoders every other day in our lab. Here is a look at how Intel’s SVT encoders and other popular options saw their performance evolve over the course of the year.
Over on LinuxBenchmarking.com are those bi-daily results for different video encoders built from Git sources on a variety of systems (including two more systems recently brought online). Over on LinuxBenchmarking.com is all the automatically updated data, more system information, and the historical figures, among other daily-ish benchmarks powered via the Phoronix Test Suite and OpenBenchmarking.org.
While there have been requests for video encoder benchmarks on more systems and with some of the other video encoders and at different presets/configurations, unfortunately, resources are limited. LinuxBenchmarking.com isn’t ad-driven or receiving any other funding for doing these routine video encoder benchmarks. So due to hardware expenditures but mainly the associated ongoing electrical/cooling costs put a damper on making these video encode tests more interesting. But if you would like to see them improved, consider partaking in the Phoronix holiday special or making a PayPal tip and mentioning in the notes/comments about your interest in seeing more video encode tests so it can be earmarked appropriately. It’s tough enough as is operating the site due to ad-blocker users while extra gratis efforts like this video encode tracker would be among the first services to be cut otherwise as a result of those users.
-
Applications
-
When it comes to customization of desktop functionality, look and feel, Linux users have got plenty of choice. The freedom to choose a desktop environment, file manager, terminal, icon packs, themes, applets, extensions etc. is one of the many perks of using a Linux distribution.
This article will list various docks, panels and taskbar apps that allow you to tweak and improve multitasking experience on Linux. So let’s jump in.
-
Time really flies! It is December again and the year is coming to an end. So for a lot of publishers, like bloggers, vloggers, news channels and magazines, it’s time for their yearly lists to look back on what happened, what was best or what was the most memorable in their past year. As a Linux blogger I look at and try out a lot of different software solutions and I always do my best to write useful and valuable reviews that help others in their decision making on software selection. Out of all the applications I try, many of these applications have my real preference over other applications and I therefore regularly use them for my personal tasks.
It was only a couple of years ago that I completely switched to Linux and open source, after more than 10 years of being an enthusiastic macOS user. But due to defects in my Apple equipment at the time, I looked for alternative ways to solve my computer needs that were more financially friendly, but that also enabled me to escape from the somewhat stifling Apple ecosystem. So I’ve been using Linux for a number of years now as my main platform, but it was only halfway through 2018 I started my Linux-based website RealLinuxUser.com to write about Linux, Open Source and related applications and workflows. This website is just a hobby for me because I just love to write, but with more than 20,000 monthly visitors now from all over the world, I am glad to see a lot of Linux starters, switchers and enthusiasts, value the stuff I write and keep coming back. I thank you for that.
So now that we are at the end of the year, it’s time to share my most favorite Linux applications that I used in 2019. These are all applications that I am very satisfied with and really use in a productive way frequently, at least on a weekly basis, but often on a daily basis. I hope you will find some inspiration from my list as well. Here are my 35 most favorite Linux applications in 2019.
-
Here’s the Christmas gift for the photography enthusiasts. Darktable 3.0 has just released.
Darktable is one of the best applications for editing RAW images on Linux. You can consider it as a free and open source alternative to Adobe Lightroom.
Darktable 3 is a major new release with tons of feature improvements and a complete rework of the user interface. The GUI is now completely controlled by GTK+ CSS rules, which makes the whole GUI themable. There are eight themes available by default.
With the help of over 3000 commits and 553 pull requests, the new release has fixed 66 bugs and added many new features.
Let’s see what features this new release brings.
-
I just got a Yubikey 5 and set it up on a bunch of things. You should too, because WebAuthn is awesome.
Now the long version!
Two-factor authentication has been a thing for a while now. You’re probably familiar with it in various forms. There’s SMS-based 2FA, commonly used by banks, where they text you a code you have to re-type when logging in. Then there are token/one-time-password based systems where you can use a hardware key like a Yubikey or a software authenticator like Google Authenticator or FreeOTP to generate and enter a one-time password when logging into a system.
If you’re like I was yesterday, maybe you’ve got two Yubikeys on your keyring and another in a drawer somewhere and you have to remember which four systems you have set up on which slots on which key, and you’ve got FreeOTP as a backup.
Maybe you’ve also kinda heard about “U2F” and had the vague idea that it sounded neat. And also maybe you’ve read some stuff about “WebAuthn” recently and thought it sounded maybe cool but also maybe confusing and what’s going on and maybe this isn’t the most important thing you could be figuring out today?
-
Instructionals/Technical
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
It’s a great pleasure to announce that KIOFuse finally has a Beta release available for testing! We encourage all who are interested to test and report any bugs or odd behaviour (and feature requests) to our bugzilla entry. You can find the repository here.
-
-
New Releases
-
I made a little bet with myself last night. If I finished work early, I was going to use the time to fix a couple of nagging issues with a new version of Simplicity that I’ve been working on and release it. Normally I finish at 5:30pm. Today I finished at 1pm.
Which is why I am releasing an Alpha of Simplicity Linux Gaming Edition. It comes with Steam, Vortex Cloud Gaming and OBS. I’ve been using it a lot lately, and today played Brawlhalla using Proton on this version. There are still a few issues with it, hence it being released as an Alpha rather than a Beta.
I’m also releasing Simplicity Linux Base 20.1 Alpha. Base is the version I build on and modify to create the other versions. However, recently I’ve been using it as my daily desktop and have found that it works pretty well. So I decided to release it.
You might also notice that I’m using BitBucket to store the ISOs. I’m not abandoning SourceForge, instead I am trying BitBucket and comparing them. I thought an Alpha release was a fairly safe way of trying it out and comparing features.
-
Screenshots/Screencasts
-
In this video, we are looking at EndeavourOS 2019.12.22 the KDE edition.
-
Devices/Embedded
-
Open Hardware/Modding
-
In theory, you shouldn’t need any help to develop a software-defined radio (SDR) application. But in real life you really don’t want to roll your own code every time to read the IQ samples, perform various transformations on them, and then drive audio output. At worst, you’ll use some libraries (perhaps GNU Radio) but usually, you’ll use some higher-level construct such as GNU Radio Companion (GRC). GRC is a bit heavyweight, though, so if you’ve found it daunting before, you might check out some of the material on the LuaRadio website.
We’ve looked at LuaRadio several years ago, but it has undergone a lot of changes since then and has some excellent documentation. Like Lua itself, LuaRadio emphasizes fast scripting. It supports quite a few pieces of common hardware and nearly anything that feeds data through a soundcard.
Why not use GNU Radio? LuaRadio has an official answer. However, LuaRadio doesn’t have a GUI — at least, not yet. Maybe a Hackaday reader will fix that. It also isn’t as mature as GNU Radio, but it does have a lot of positive features such as a small footprint, easy embedding, and a simple way to add additional features.
-
This article is the first of a series on creating a Bluetooth speaker from an old vacuum tube radio and spare parts I had lying around in the house. At the time I am writing this, the speaker is not done yet, so there is still a chance that I never finish it… As you will see, the journey so far as not been straight, I hit a few roadblocks and changed my mind while working on this project.
[...]
But then, while I was sanding again the case before applying a second coat of varnish, I noticed there were some varnish runs, so I sanded stronger in that area, but that removed the stain :(. Back to square one: sand again the varnish, stain again, apply a first coat of varnish being extra careful not to produce new runs, lightly sand and apply a second coat of varnish.
-
Mobile Systems/Mobile Applications
-
-
Are you looking to challenge your children (or even yourself) to learn new things about open source technologies? Whether you’re in elementary school, high school, or college, or even a parent or teacher, Opensource.com has some great reading about open source technologies suitable for the younger generation. Here are our top 12 articles from 2019 on open source for students (and those who love them).
As a student, I had difficulty with the abstraction of mathematics. Traditional classroom instruction didn’t work for me. Peter Farrell has another approach for learners who are challenged by conventional mathematics instruction. His unique approach, which teaches math using Python, resonated with me when I interviewed him about how he is Hacking math education with Python.
-
Open source is ready to get to work, and in 2019, Opensource.com had many great articles about how organizations have adopted open source software or open methods to drive their business. As open source matures, we’ve seen open source not just replace proprietary software, but create entirely new business models.
Check out this list of five outstanding articles from Opensource.com in 2019 about running a business with open source.
-
The open organization community at Opensource.com published more than 50 articles in 2019. That’s more than 50 new, openly licensed resources to help you explore the ways open principles are changing the way we work, manage, and lead in modern organizations.
-
With the end of the year approaching fast, it is a good time to look back at 2019 and go through the most popular articles on Fedora Magazine written by our contributors.
In this article of the “Best of 2019” series, we are looking at developers and how to use Fedora to be a great developer workstation
-
Productivity Software/LibreOffice/Calligra
-
The LibreOffice team is testing the first release candidate of version 6.4, which is set for release at the end of January.
What’s new in version 6.4? There are numerous fresh features; most are small, but they do include the ability to insert QR codes into any document. The Generate QR Code feature lets you enter a hyperlink (or any text) and generate a QR code with four options for complexity. A low complexity is better for long URLs while high has better error correction if there are errors in reading.
Another neat feature is called full sheet previews. This is for spreadsheets, and lets you specify that you want an entire sheet on one page in PDF export. In effect this is a “shrink to fit” option that is handy if you are frustrated to find that your spreadsheet has been broken into separate pages, ruining its appearance. If your sheet is hundreds of rows long though, it will be rendered unreadable, so use with caution.
When you select all the rows in a table in a word processor document, and then choose Cut, should it cut all the text but leave the table? Or cut the table? LibreOffice used to do the former, but now does the latter. In Word it would do the former, unless you specifically “select table”. The new LibreOffice behaviour is probably what the user expects, but it is a tricky issue, particularly since if you select online one row and choose Cut, it only cuts the text, not the row. Table-editing controls have also been added to the Writer sidebar.
-
BSD
-
While not attracting as much interest as Linux in the cloud, AI, and other growing markets, the BSDs have seen their share of adoption in many of these areas too as well as the likes of powering some of today’s video game consoles. FreeBSD is also well known for powering much of the networking infrastructure of Netflix and other large enterprises. The BSDs advanced a lot from hardware support to new security features and other capabilities this decade setting them on a good trajectory as we get into the 2020s.
Though not many websites cover BSD news, on Phoronix during the 2010s we wrote more than 750 articles on their progress and that is not counting our many BSD benchmark articles with still seemingly being the only site or so serving widespread BSD benchmarks. With that said, below is a look at the most popular BSD news items on Phoronix during the 2010s for those wanting to relive those memories.
-
Not only has LLVM’s Clang compiler proven to become a viable alternative to C/C++ and is now widely used by many different vendors for building production software and nearly at parity for performance to GCC, but the LLVM compiler infrastructure has proven to be a huge success. Beyond Apple as one of the original stakeholders, LLVM is also used by multiple software projects within Intel, AMD is making extensive use of it for their graphics compiler and other purposes, and many other companies leveraging the LLVM projects for various often innovative purposes — Microsoft is even using it within select projects.
-
Not only has LLVM’s Clang compiler proven to become a viable alternative to C/C++ and is now widely used by many different vendors for building production software and nearly at parity for performance to GCC, but the LLVM compiler infrastructure has proven to be a huge success. Beyond Apple as one of the original stakeholders, LLVM is also used by multiple software projects within Intel, AMD is making extensive use of it for their graphics compiler and other purposes, and many other companies leveraging the LLVM projects for various often innovative purposes — Microsoft is even using it within select projects.
Over the past ten years, or rather the past five years or so, LLVM has matured into an extremely successful open-source project on multiple levels. There are even some Linux distributions like OpenMandriva building their Linux software packages with it and succeeding for nearly their entire archive — as of this year, the Linux x86_64 kernel in Linux 5.3+ and Clang 9.0+ can even be built without out-of-tree patches or other extra steps.
-
FSF
-
GNU Projects
-
After many delays, and seemingly as a Christmas miracle, Eric S Raymond now believes his Reposurgeon utility is officially ready to convert GCC’s SVN repository over to Git.
If you aren’t familiar with the long and drawn out process it’s taken for migrating GCC from SVN to Git given the size of the code-base and its long history, see this earlier article about the big task at hand and ultimately how multiple solutions were devised to cover the conversion process accurately. ESR has been on the task the longest with his Reposurgeon effort but it involved delays due to RAM prices, the decision to rewrite the code in Go rather than Python, and many other challenges along the way.
-
Programming/Development
-
I hope this post motivated you a little to have a look at tmux and maybe give it a try. With above tips applied, it shouldn’t be too painful to set up and get started.
-
JavaScript, Linux and R were among the most learned technology skills in 2019, according to research from Pluralsight.
Drawing on data from its users, as well as from job sites Indeed and Dice, the technical skills provider found that JavaScript was the most learned software development skill over the last year, alongside Linux, which was the most learned skill in IT ops, and R, which was the most learned skill in data.
The top five software development skills learned over the past year were JavaScript, Java, HTML, Python and C++, with the top five IT operations skills being Linux, MacOS, HTTP, Ubuntu and Microsoft Windows.
-
Perl / Raku
-
Vadim Belman as the headliner once again? Well, last week the news was that their work on roles of the past months was merged. This week, they blogged extensively about it! With a little introduction on how they got to work on this part of Raku, how it works with language versioning, and the introduction of the Rolified MRO. If you’re into Raku roles, a must read!
-
Python
-
Pipx is a Python package management tool much like pip. This tool, on the other hand, enables us to install and run Python packages. What is really neat with pipx is that it installs the Python packages in an isolated virtual environment (see also pipenv). It will also let us run the Python packages without activating the environment. This means that we can install multiple versions of a Python package and still have access to it. Moreover, pipx enables us to run a Python package from a temporary environment.
-
Reading code, by its nature, happens after the code has been added to the system. Often, it happens long after. Neglecting readability is the easiest choice since it does not hurt right now. Whatever the reason for adding new code—a painful bug or a highly requested feature—it does hurt. Right now.
In the face of immense pressure to throw readability to the side and just “solve the problem,” the Zen of Python reminds us: readability counts. Writing the code so it can be read is a form of compassion for yourself and others.
-
In this intermediate-level course, you’ll take a deep dive into how to iterate through a dictionary in Python. Dictionaries are a fundamental data structure, and you’ll be able to solve a wide variety of programming problems by iterating through them.
-
This is the question for today in order to lineup the Django features with any web framework from my point of view.
-
Shell/Bash/Zsh/Ksh
-
Are you on call today, or hiding in the back room to avoid being your family sysadmin over the holidays? Why not celebrate the holidays by adding some winter cheer to your Bash prompt?
Your Bash prompt currently might be a simple dollar sign ($), or more likely, it’s something a little longer. If you’re not sure what makes up your Bash prompt right now, you can find it in an environment variable called $PS1.
-
-
Dressed in full-on 18th-century-style tricorn hats and bonnets, Freedom Trail tour guides can look out of place amid Boston’s skyscrapers and bumper-to-bumper traffic. They keep the city’s Revolutionary past alive, but in 21st-century conditions.
-
Thousands of Christian pilgrims on Tuesday flocked to the West Bank town of Bethlehem, celebrating Christmas Eve in the traditional birthplace of Jesus.
-
In the spring of 1917, in the days following Operation Alberich, a strategic withdrawal by the German army to the heavily fortified Hindenburg Line dividing the French countryside, two soldiers are dispatched with a warning. They have only 24 hours to deliver orders to the Second Battalion, 1,600 strong, to cancel attack plans that unwittingly play into a German plot. This tale, reportedly told to filmmaker Sam Mendes by his paternal grandfather who fought in World War I, is the basis for his captivating cinematic reimagining, “1917.”
-
Science
-
Humans have a “natural” lifespan of around 38 years, according to a new method we have developed for estimating the lifespans of different species by analysing their DNA.
Extrapolating from genetic studies of species with known lifespans, we found that the extinct woolly mammoth probably lived around 60 years and bowhead whales can expect to enjoy more than two and a half centuries of life.
Our research, published today in Scientific Reports, looked at how DNA changes as an animal ages—and found that it varies from species to species and is related to how long the animal is likely to live.
-
Health/Nutrition
-
Medicare for All would eliminate the debilitating health insecurity caused by skyrocketing costs while guaranteeing everyone will get the health care they need, when and where they need it.
-
Would you believe that something as standard as buying a t-shirt can directly impact someone halfway around the world? That the chemicals used to color your clothes are likely polluting waterways? That with every clothing purchase you make, you are essentially voting for or against the future of the planet?
-
Much of what we accept as legal in medical billing would be regarded as fraud in any other sector.
-
Integrity/Availability
-
Proprietary
-
Security
-
If you’re reading this in 2019, it’s almost Christmas (as celebrated according to the Western Christian calendar), and, like all children and IT professionals, it’s time to write your letter to Santa/St. Nick/Father Christmas. Don’t forget: those who have been good get nice presents and those who haven’t get coal. Coal is not a clean-burning fuel, and with climate change well and truly upon us,1 you don’t want to be going for the latter option.
Think back to all of the good security practices you’ve adopted over the past 11 or so months. And then think back to all of the bad security practices you’ve adopted when you should have been doing the right thing. Oh, dear. It’s not looking good for you, is it?
-
Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation
-
Security experts from Netlab 360 have uncovered[1] a new Remote Access Trojan (RAT) used on Linux and Windows operating systems – currently being used in the wild by exploiting a known code execution vulnerability. Dubbed Dacls, the malware was in use since at least May this year and is attributed to the North Korean advanced persistent threat group Lazarus, also known as Hidden Cobra, Guardians of Peace, or Zinc.
[...]
As soon as malware is loaded, it will connect to its C2 server – it uses TLS and RC4 double-layer encryption while communicating with it. Additionally, Dacls uses AES to encrypt files that are used for malware’s configuration settings. Once established, RAT is capable of performing a variety of malicious activities on the compromised servers, including stealing sensitive information, importing and deleting files, stopping processes, accessing Log server, obtaining PID and PPID reports, and much more.
-
Privacy/Surveillance
-
Last week, Karl wrote up a fascinating post about a NY Times effort to use a dataset that a whistleblower at a data broker firm gave them to track the whereabouts of President Trump, by spotting the location data of what appears to be a Secret Service agent detailed to the President. Karl included two quotes from two different Senators in the article, and I found both of them amusing, as they both basically took the story and responded with their own “hobby horse” solution to the problem, even though neither one of them seemed to accurately understand or describe it:
-
Facebook on Friday removed what it called a global network of more than 900 accounts, pages, and groups from its platform and Instagram that allegedly used deceptive practices to push pro-Trump narratives to about 55 million users. The network used fake accounts, artificial amplification, and, notably, profile photos of fake faces generated using artificial intelligence to spread polarizing, predominantly right-wing content around the web, including on Twitter and YouTube.
It represents an alarming new development in the information wars, as it appears to be the first large-scale deployment of AI-generated images in a social network. In a report on the influence operation, researchers from disinformation groups Graphika and DFRLab noted that this was the first time they had seen the technology used to support an inauthentic social media campaign.
-
We recently wrote about how Senators Lindsey Graham and Richard Blumenthal are preparing for FOSTA 2.0, this time focused on child porn — which is now being renamed as “Child Sexual Abuse Material” or “CSAM.” As part of that story, we highlighted that these two Senators and some of their colleagues had begun grandstanding against tech companies in response to a misleading NY Times article that seemed to blame internet companies for the rising number of reports to NCMEC of CSAM found on the internet, when that should be seen as more evidence of how much the companies are doing to try to stop CSAM.
-
Defence/Aggression
-
The US-made mess in Afghanistan has much to do with its failed policies and shoot-first-ask-questions-later attitude.
-
The media has been overflowing with wisecracks about the absurdity of Trump’s praise for the Belgian Malinois, Conan, one of several dogs used to hunt Isis founder and leader Abu Bakr al-Baghdadi on October 26. On the one hand, Trump tweeted that the “wonderful,” “beautiful” and “talented” dog did a “GREAT JOB” and posted a photoshopped image of himself placing a medal around Conan’s neck with the caption, “AMERICAN HERO!” On November 25, he received Conan at the White House to honor him with a plaque and a medal, holding a press conference with the “brilliant” dog at his side. At the same time, Trump tweeted that Al-Baghdadi “died like a dog,” “whimpering and crying,” like other ISIS leaders who behaved like “frightened puppies” when killed. Reporters have pointed to the ridiculousness of Trump’s apparent obsession with dogs given his contamination phobias and the fact that he is the first U.S. president in one hundred and thirty years not to have one. But, as with so much of his discourse, Trump’s dog comments are no joking matter.
-
On December 16 both houses in the US approved the appropriation bill to be signed by President Trump. Aside from the mind-boggling amount of $1.4 trillion that was approved in total our interest was in looking at the details concerning Venezuela.
-
Foreign policy should prioritize the needs of ordinary civilians and civil society—and wars of choice should always be off the table.
-
As 1914 drew to a close, Europe had been at war for months. On the Western Front, opposing armies faced each other across a stalemated front line running from the North Sea to the Swiss border. On December 24, 100,000 soldiers from both sides of that line decided to create some peace on Earth.
-
-
Police and federal agents needed more than an hour to subdue Evgeny Manyurov, the lone gunman who attacked the FSB headquarters in Moscow with an automatic firearm on the evening of December 19. As Meduza previously reported, some of the men injured in the shootout may have been wounded by friendly fire due to a lack of coordination among the different law-enforcement agencies. Meduza investigative correspondent Maxim Solopov asked Dmitry Tselyakov, an ex-member of the “Whirlwind” KGB and “Alpha” FSB units, to study what we know about last week’s incident and explain why security officials did what they did.
-
Transparency/Investigative Reporting
-
There’s a whistleblower talking about TSA stuff, but it’s not the sort of whistleblowing you’re probably accustomed to. Frustrated by the internal routing of his complaints, the TSA’s highest-ranking official in [checks notes] Kansas has brought his complaints to CNN.
-
Environment
-
“McConnell’s not protecting the economy. He’s stalling while his friends loot the safe.”
-
“They believe they have the situation in hand. That is definitely not the case.”
-
Energy
-
-
In debates over protecting the environment, and especially global warming, it is standard practice to refer to the pro-protection side as being in favor of government regulation and the anti-protection side as being pro-free market. This is nonsense and it is nonsense in a way that strongly benefits the enemies of environmental protection.
-
Wildlife/Nature
-
The Amazon rainforest is a crucial life-support ecosystem. Without its wondrous strength and power to generate hydrologic systems across the sky (as far north as Iowa), absorb and store carbon (CO2), and its miraculous life-giving endless supply of oxygen, civilization would cease to exist beyond scattered tribes, here and there.
-
Finance
-
The consequences of Trump’s and the Republicans’ excessive corporate giveaways and their failure to improve the lives of ordinary working Americans are becoming clearer by the day.
-
Over the past year, a rebranded International Monetary Fund (IMF) returned to Latin America with promises of loan agreements that would be different than the dreaded “structural adjustment programs” of the past. Behind statements about inclusive growth and protecting the most vulnerable, are policies similarto the structural adjustments of the Washington Consensus era. While the Argentina program has already imploded, leaving behind soaring poverty and a collapsed economy, the IMF seems determined to push forward its agreement with Ecuador.
-
For a century the GOP has been bankrolled by big business and Wall Street. Trump wants to keep the money rolling in. His signature tax cut, two years old last Sunday, has helped U.S. corporations score record profits and the stock market reach all-time highs. To spur even more corporate generosity for the 2020 election, Trump is suggesting more giveaways. Chief of staff Mick Mulvaney recently told an assemblage of CEOs that Trump wants to “go beyond” his 2017 tax cut.
-
When Danielle Robinson got a letter in the mail from Methodist Le Bonheur Healthcare in October, she braced herself.
She’d missed a court-ordered payment to the hospital after she was laid off from her job in September.
-
Only a small fraction of the half-million Chicago motorists with debt from unpaid city sticker tickets signed up for an amnesty program that ended this month.
City officials said about 11,400 people applied for some $11.6 million in debt forgiveness by the Dec. 15 deadline. When the debt relief program was unveiled in September, city officials said some 500,000 motorists with $500 million in unpaid city sticker tickets stood to benefit.
-
Rapper Blueface is being accused of humiliating homeless people after he threw a large wad of cash at them from his car in Los Angeles’ infamous Skid Row, in an apparent publicity stunt gone awry.
-
The federal minimum wage has been stuck at $7.25 an hour for more than a decade due to continued inaction by Congress, but a record 72 jurisdictions across the U.S. are raising their minimum wage floors in 2020 in response to grassroots pressure led by the Fight for $15 movement.
-
Fundraising phone calls are the bane of many campaigns’ (and voters’) existence. When it comes to wooing the wealthiest donors, elected officials typically complain about the amount of time spent soliciting funds. “There have been decades and decades of members of Congress losing their lives to ‘dialing for dollars,’ ” Ciara Torres-Spelliscy, a law professor at Stetson University who studies political fundraising, told Marketplace in March.
-
A former nanny for Mariah Carey is suing the pop star, alleging ‘severe emotional distress.’
-
AstroTurf/Lobbying/Politics
-
“Whoever emerges from the primary process, I will work my tail off to make sure that they are the next president.”
-
“Hit pieces on progressive candidates become questionable when run by a news outlet owned by one of their rivals. This as much as anything shows why Bloomberg must sell Bloomberg News.”
-
Here’s the question at hand — and I guarantee you that you’ll read it here first: Is Donald Trump the second or even possibly the third 9/11? Because truly, he has to be one or the other.
-
“We’d be in much better shape if Trump and company were merely heartless misers. What they really are is much, much worse.”
-
Joe Biden’s presidential bid got a boost Monday from one of the leading Latinos in Congress, with the chairman of the Hispanic Caucus’ political arm endorsing the former vice president as Democrats’ best hope to defeat President Donald Trump.
-
Modi’s Hindutva populism, backed by naked threats against India’s Muslim minority and the suppression of dissent, is crashing India’s economy and its democracy.
-
So imagine you heard someone say or write about Jews as people who control the media, being shady business people, greedy, who exploited immigrant labor, and hurdled around the red-light district looking for “a bit of black.” Who also, let me quote from this, “Some kind of fiddling of the figures in an election by oligarchs of Jewish origin.”
-
After the shock and the grief comes reflection. After reflection comes renewed determination. But under Britain’s sham of a democracy, the public won’t get the chance to remove the vile creature put into No. 10 by 14 million or so voters for at least five years; and even then, a government has the legal right to seek a general election prior to the five-year period if it is doing well in the public opinion polls, effectively giving itself long-term reign. The defeated Labour party’s forthcoming decision will be fateful. With Jeremy Corbyn’s leadership position now untenable, will the party members elect another Blairite (i.e., someone to the right of the party and the voting public) amid the media clamor of “we told you so,” in reference to Corbyn’s dangerous “radicalism” (read: centrism). Or will they elect a Corbynista to lead the party into the next general election and stick to the principles of democratic-socialism, at least to a degree?
-
“Nothing says Merry Christmas like hurling insults at relatives.”
-
Jackie Fielder, a member of the Three Affiliated Tribes, is only 25, but she’s been pretty busy for the past few years. Fielder is an activist who has campaigned against the construction of the Dakota Access Pipeline; helped organize public banking efforts in San Francisco; and worked to defeat a city initiative that would loosen taser use for police in the Bay Area. She’s also authored several pieces for Teen Vogue about her activist work.
Now, she’s adding another point to her résumé: running to represent San Francisco in the California state Senate. Teen Vogue caught up with Jackie to talk about how her environmental activism and her experience with homelessness are informing her campaign, and the inspiration she’s drawing from other young politicians.
This interview has been condensed and edited for clarity.
-
Former Michigan Rep. Dave Trott (R) called President Trump unfit for office and said, based on the president’s behavior, he would now consider voting for a Democrat.
-
Trump is psychologically, morally, intellectually, and emotionally unfit for office. We can only hope Congress impeaches and removes him so we have a choice between two adults in 2020.
Dave Trott
Former Republican Member of the House of Representatives
Birmingham, Mich.
-
Twitter on Friday announced that it had taken down more than 88,000 accounts linked to Saudi Arabia, citing concerns they were involved in spreading misinformation and spam.
The company wrote in a blog post that it is adding data and information on almost 6,000 of the accounts to its public archive of state-backed information campaigns.
-
Censorship/Free Speech
-
Anti-Corruption Foundation (FBK) employee Ruslan Shaveddinov has been forcibly drafted into Russia’s military. Leonid Volkov, the chief of staff for FBK founder Alexey Navalny, first reported Shaveddinov’s disappearance. Navalny himself soon posted a video on Twitter that showed law-enforcement officers putting the activist into a minibus. Navalny said at first that Shaveddinov was being taken to “somewhere in Arkhangelsk,” a region in Russia’s extreme northwest. Military service is mandatory for young men in Russia, but avoiding service through education or other means is common.
-
-
A media company responsible for music at thousands of U.S. businesses has banned the song “It’s Beginning to Look a Lot Like Christmas” from its playlists because the song’s lyrics refers to guns.
-
Saudi blogger Raif Badawi and his lawyer, both imprisoned for years, have started a hunger strike to protest against their isolation and treatment at Dhahban Prison, near Jeddah in Saudi Arabia.
The information was made public by Badawi’s Canadian lawyer, Irwin Cotler, of the Raoul Wallenberg Centre for Human Rights.
In a statement released late Wednesday, Cotler said the two men are behind bars for promoting freedom of expression and human rights in Saudi Arabia.
-
The U.S. Commission on International Religious Freedom (USCIRF) condemns Saudi Arabia’s intensified mistreatment of religious prisoner of conscience Raif Badawi. The Saudi government has moved Badawi to solitary confinement and he has declared a hunger strike in protest. This is Badawi’s second hunger strike since September 2019. Saudi Arabia arrested Badawi in 2012 on charges of “apostasy” and insulting Islam. USCIRF has advocated for Saudi Arabia to release him since 2013 and has recommended that Congress and the administration continue do the same in its 2019 annual report.
-
Canada’s new foreign affairs minister is raising fresh concerns about two human rights advocates jailed in a Saudi Arabian prison who have begun hunger strikes, among them Raif Badawi, whose wife and three children live in Canada.
Foreign Affairs Minister François-Philippe Champagne, speaking after attending an international human rights conference in Berlin and travelling to Egypt this week, told reporters he intends to raise Badawi’s case with his Saudi Arabian counterpart in the next two weeks.
-
Civil Rights/Policing
-
I usually don’t jump in on things like these until a few more facts are in. As much as law enforcement complains about people “rushing to judgment” before every conceivable fact has been examined, here at Techdirt we prefer to be right, rather than first. Hey, we care about our reputation and we know our readers expect better of us.
-
Another stupid, pointless effort to turn protectors and servants into professional victims is being mounted in Alabama. Cops can barely be bothered to educate themselves on the laws they’re enforcing, but they’re usually all over the ones that allow them to turn things they don’t like into criminal activity.
-
-
On December 20, police officers in the town of Novotroitsk, Tatarstan, underwent a training exercise for dispersing protesters in which the role of the protesters was played by local ninth graders. The schoolchildren were reportedly called out to the school playground and told to hit the officers and their shields.
-
In October 2019, Deputy Justice Minister Mikhail Galperin responded to a series of questions from the European Court of Human Rights (ECHR) regarding the case of four Russian women who had suffered from domestic violence. He said the following:
-
Growing dissatisfaction with political leadership. Social and economic constraints. Reprisals against austerity measures. Harassment against community and political leaders. All issues that in different combinations have led to massive protests and political upheaval in recent months in Latin America. They have left a mark in 2019 and, along with them, a series of hurdles for online free expression and privacy.
While technology has been used to mobilize citizens, report violence, and share security and legal advice for protesters in places like Chile, Ecuador, Colombia, and Bolivia, tech-related measures were employed to censor, dissuade demonstrations, and increase surveillance.
-
On Michael Wongittilin’s first day in uniform as a police officer in Savoonga, Alaska, 11 years ago, a man walked into the village’s public safety office and pointed a gun at him.
Wongittillin jumped behind a desk and then lurched out, ran toward the assailant and bombarded him with pepper spray — the strongest weapon that Savoonga officers carry.
-
A proposed amendment to immigration policy endangers asylum seekers, advocates warn.
People seeking asylum pictured in front of a migrant refugee center in Jalisco, Mexico in 2018. (Photo: Daniel Arauz)
-
The Prince of Peace, he taught us that peace is not the absence of violence; it is the presence of justice and righteousness.
-
These American, Christian politicians would not have admitted the holy family when they fled Herod the Great.
-
As American Jews and non-Jews we should be outraged at how the Trump administration is endangering Iranian civil society and making their efforts for change much harder.
-
I will never forget the moment she came up to me. Tears were rolling down her face. We had just had our worship services in the street that day, in front of our local gun shop because we wanted to connect the suffering of Jesus on the cross to the suffering of our neighborhood on the North side of Philadelphia, which carries a bulk of the trauma of poverty and violence in our city. It was just before Easter. We had just read the Gospel passage describing Jesus’s violent death, leaving his mother and those who loved him weeping at the foot of the cross.
-
Many people believe that the United States government is constantly battling corporations, with the government enforcing regulations and corporations skirting them. While this is true in isolated cases, the reality is much more complex. The prison-industrial complex, for example, encompasses a state-run apparatus that is symbiotically intertwined with various private entities.
-
Expand
Shadows of people detained by Russian police, suspected of violating immigration rules during an action seen on containers at a street market in Moscow, Russia, August 7, 2013.
-
Monopolies
-
The history of American capitalism is full of corporate bullying, threats and even violence against working people when we stand up for our rights.
-
Sen. Bernie Sanders of Vermont and Rep. Ilhan Omar of Minnesota are calling on the federal Occupational Safety and Health Administration to provide injury records for all Amazon facilities, citing an investigation by Reveal from The Center for Investigative Reporting.
-
Former Uber CEO Travis Kalanick is resigning from the board of directors, severing ties to the ride-hailing company that he co-founded a decade ago and ran until a series of scandals led to his downfall.
-
Kalanick’s last day will be December 31, 2019, after which time he’ll focus on his “new business and philanthropic endeavors.” This is likely a reference to his new startup, CloudKitchens, which he has bragged will be “bigger than Uber,” according to reporting by The Information. He will have sold all his shares in Uber by Thursday, exiting his holding in Uber entirely, The New York Times reported. According to Financial Times, Kalanick has now sold all of his Uber stock.
-
Along with co-founder Garrett Camp, Kalanick started Uber in 2009, building the company up from an experimental black car service in San Francisco to a global transportation and logistics company, offering food delivery, freight shipping, helicopter rides and ushering in a new era of work. But he was ousted as CEO in June 2017 following months of chaos and controversy. Detractors pointed to his aggressive and sometimes reckless management style as breeding a toxic workplace hostile to women and overseeing morally questionable company programs including some that intentionally deceived regulators and law enforcement agencies and spied on riders.
-
Patents
-
The Federal Circuit affirmed the district court’s decision upholding a jury verdict that Hospira infringed Amgen’s patent relating to erythropoietin (EPO) and that Amgen was entitled to $70 million in damages.
After Hospira submitted a Biologics License Application to the FDA directed to a biosimilar of Amgen’s Epogen product, Amgen sued Hospira for infringement of two patents. A jury awarded Amgen $70 million in damages for Hospira’s infringement of one of the patents. Hospira filed post-trial motions relating to the jury’s findings of infringement, no invalidity, the Safe Harbor provisions of 35 U.S.C. § 271(e)(1), and damages, and Amgen filed post-trial motions relating to the jury’s finding of noninfringement of the second patent. The district court denied all of the motions.
The Federal Circuit affirmed as to all issues. First, regarding infringement of the first patent, the Federal Circuit determined that substantial evidence supported the jury verdict of infringement of claim 27 because, although claim 27 references claim 1 and although Amgen did not mention claim 1 at trial, “the jury heard evidence on whether Hospira’s process met the limitations of claim 1.” The Federal Circuit also rejected Hospira’s claim construction challenge that attempted “to limit claim 27 to one embodiment based on [the inventor’s] testimony.” The court was also not persuaded by Hospira’s argument that a prior art reference (Lai) anticipated the asserted claims because, according to the Federal Circuit, Lai “does not expressly disclose EPO isoforms with a predetermined in vivo specific activity.”
Regarding the Safe Harbor provisions of § 271(e)(1), the Federal Circuit disagreed with Hospira’s argument that the jury instructions “improperly focused on Hospira’s intent for manufacturing batches of EPO.” The “jury instructions properly asked whether each act of manufacture … was for uses reasonably related to submitting information to the FDA.” The Federal Circuit also upheld the jury’s finding that only a subset of Hospira’s EPO batches was within the Safe Harbor. Hospira had manufactured some batches of EPO that were not required for FDA approval, and some batches were for commercial inventory.
-
The appeal on a point of law, for which no leave was granted by the Federal Patent Court, was held admissible, because the grounds of appeal under §100 III 3 and 6 PatG were invoked. However, it was unsuccessful on the merits, since the deficiencies asserted by the patentee – namely that the decision was based on a violation of their right to be heard and lacked sufficient reasoning – were not present.
-
The two actions arose out of a patent infringement dispute between the plaintiff, Xiamen Power Electronic Technology Co., Ltd. (“Power Electronics”), and the defendant, LG Electronics (Tianjin) Appliances Co., Ltd. (“LG Electronics”). Power Electronics owns CN Patent No. 201220203855.0 (“the ’855 Patent”), which is related to the structure of an over-temperature protection circuit.
Power Electronics brought a lawsuit against LG Electronics for infringement of the ’855 Patent before the Hangzhou Intermediate Court (“trial court”). In response, LG Electronics initiated an invalidation action before the Patent Re-examination Board (PRB), challenging the validity of the ’855 Patent. The trial court made a non-infringement ruling and Power Electronics appealed before the SPC IP Tribunal. Meanwhile, LG Electronics disagreed with the PRB’s decision that affirmed the validity of the ’855 Patent issued, first appealing before the Beijing IP Court, where it lost, then appealed before the SPC IP Tribunal. The SPC IP Tribunal decided to hold a joint hearing as LG Electronics alleged that Power Electronics made different claim interpretations in the infringement and invalidation proceedings, respectively.
[...]
In the present case, the SPC IP Tribunal decided to consolidate and hear the two appeals together. The tribunal held a pretrial claim construction hearing, similar to the US Markman hearing, in which the judges heard each party’s arguments on the interpretation of claims at issue and addressed the different claim constructions presented by the patentee in the infringement and invalidity proceedings.
Perhaps the most valuable information to be gleaned from the case is that the SPC IP Tribunal has clarified that the same claim construction standard shall apply in both invalidation and infringement proceedings, thereby bringing greater certainty to the patent system.
The unique facts of the Power Electronics v. LG Electronics decision are that the appeal of the trial court decision and the appeal of the PRB decision reached the SPC IP Tribunal at the same time such that the two appeals could be heard and decided together. As mentioned earlier, most cases that could not be consolidated were due to different timings. To address this issue, the SPC IP Tribunal has confirmed that different appeals relating to the same patent will be assigned to the same SPC panel, or to the same judge, where feasible.
The outcome of this case and the SPC setting up mechanisms to allow more coordinated handling of the invalidation and infringement proceedings are positive signs towards improved patent protection in China. With China evolving as a top forum for patent litigation, with sufficient preparation and modernized strategic goals, patent owners can look forward to a more centralized, better-managed and less skewed patent legal system.
-
Software Patents
-
Last year, Judge Illston gifted patentees with a proverbial lump of coal with her decision in Illumina, Inc. v. Ariosa Diagnostics, Inc. by invalidating on summary judgment claims directed to methods for isolating cell-free fetal DNA from maternal DNA on the grounds that they are not patent-eligible under 35 U.S.C. § 101. On December 19, Rep. Danny K. Davis (IL-7), joined by Congressman Paul A. Gosar (AZ-04), introduced a bill that is more like a Christmas gift for inventors, entitled the Inventor Rights Act (H.R. 5478).
-
All too often, software patents stop more innovation than they promote. Patents are legal instruments that can be used to sue people and companies for creating, selling, or using software. Very often, the entities wielding software patents are “patent trolls”—companies that make money off suing and threatening to sue others instead of building or doing anything of their own.
We’ve been advocating against problematic patents, particularly in software, for many years. In the past few years, it’s fair to say that patent trolls have been down—but not out. Two big changes that happened several years ago have made it realistic, finally, to get bad patents kicked out of the system. The first is the creation of the inter partes review system, in 2012; and next, the Supreme Court’s Alice v. CLS Bank decision, in 2014.
-
Copyrights
-
Film distribution company Dutch FilmWorks is continuing its legal battle to identify BitTorrent pirates. The company is now taking its case against Internet provider Ziggo, where it requests the personal details of subscribers connected to 377 IP-addresses, to the Supreme Court.
-
With the infamous pirate release group Hive-CM8 appearing once again, ‘screener season’ is in full swing. The group previously promised not to upset Hollywood too much, but it isn’t shying away from major releases. In the group’s most recent release notes, it specifically requests access to some major titles, including Frozen 2 and Star Wars: The Rise of Skywalker.
-
Both YouTube and Yandex’s video platforms are edging dangerously close to being permanently blocked by ISPs in Russia. The Moscow City Court has upheld a complaint from publisher Eksmo and has ordered the services to remove pirated audiobook content. However, anti-piracy group AZAPI says it is preparing other cases too and if they are successful, “we can insist on the eternal blocking of Yandex.video and YouTube in Russia.”
-
Former MEP Julia Reda, who lead the fight to block the problematic parts of the EU Copyright Directive (and who came very close to succeeding against huge odds, but eventually lost) has published a really important piece for the Berkman Klein Center at Harvard about why the new Copyright Directive should terrify every American who recognizes the importance of an open internet. First off, these laws mostly target American companies — many of which may just choose to follow the new EU rules globally.
-
A federal court in Los Angeles has approved a settlement in a dispute between Disney and the estate of Michael Jackson, which related to the use of the late singer’s songs, music videos and live footage in a documentary.
-
After getting hit with a massive, $2.79 million copyright infringement fine for infringing upon the work for Christian rapper Flame, Katy Perry is now getting stuck with a $20,000 bill for court costs.
Permalink
Send this to a friend
Posted in Patents at 9:07 am by Dr. Roy Schestowitz
Summary: Not every random or foolish idea is an invention worth granting a monopoly on; but patent offices that measure their ‘success’ based on cashflow alone will never ‘get’ that
DEPENDING ON where one sets the threshold, everything can be considered an ‘invention’ — virtually any idea one comes up with any time of the day. Typically the large corporations use their financial power to amass many such “ideas” and turn these into patent monopolies. It’s not like the EPO or the USPTO (under Campinos, Battistelli and Iancu) like to say “no” to applicants. EPC and 35 U.S.C. § 101? Be damned! Anything with “technical effect” or “HEY HI” (AI) can now be turned into a European software patent.
“…when patent offices are themselves disregarding the law, where can they derive the moral authority by which to assert they exist to uphold or to facilitate the law?”This is of course a violation in spirit and in practice of what the patent system was originally made for. The violators aren’t patent infringers but those who infringe patent law by granting invalid patents. Put another way, when patent offices are themselves disregarding the law, where can they derive the moral authority by which to assert they exist to uphold or to facilitate the law? █
Permalink
Send this to a friend
Posted in Deception, Europe, Patents at 8:00 am by Dr. Roy Schestowitz
Talking among themselves, lying to reinforce illusions
Summary: Law firms just cannot get themselves to openly admit that the fate of the Unified Patent Court (UPC) is very grim; instead they mislead potential clients and discredit themselves (to save face in the short term)
THE previous post mentioned some of the latest patent maximalism of D Young & Co LLP, whose staff published and promoted loads of stuff the day before Christmas Eve. A couple of articles that caught our attention didn’t sweeten the holiday because it was a pile or ‘document dump’ of nonsense. Promoted in Lexology was this article which is a load of lies — the famous two lies — from Team UPC boosters of D Young & Co LLP, or Rachel Bateman in this case. It fabricates ‘facts’ to make it seem like UPC has actual progress. It’s only them who perpetuate this lie about the UPC, but it’s as dead as last year. To quote some bits:
After months of silence on the Unified Patent Court (UPC) and unitary patent (UP), we have seen some interesting news and developments in recent weeks.
[...]
More likely is that the UK will leave the EU, and there will then need to be a decision on whether the UPC and UP can come into effect when/if Germany ratifies. The European Parliament analysis explains how the UPCA will need to be amended (and approved by all parties) to remove the mention of one of the UPC Central Divisions being in London, but if the UK voluntarily withdraws from the agreement, it could be possible for the UPC and UP to come into effect because the three remaining member states with the highest number of patents (France, Germany, and The Netherlands) would have ratified.
A lot of this seems to be based on some interview with a person whose job is — by his own admission — promoting the fiction of progress. And then there’s this: “The second development relates to the German constitutional challenge. On 20 November 2019, the judge overseeing this challenge denied any rumours that the court has been delaying the decision until the outcome of Brexit is clear. The judge also confirmed that he intends to decide the case in the first quarter of 2020. Given that Brexit is currently scheduled for the end of January 2020, the start of 2020 should be an interesting one for those awaiting more information on the UPC and UP.”
Well, other judges (or Justices) have not spoken about it and the court itself sought to distance itself from that statement [1, 2, 3]. If anything, UPC ‘success’ probability only decreased this year because of the British election. They don’t fancy talking about that, do they?
Bateman’s colleague, D Young & Co LLP’s Laura Jennings, has meanwhile added to this misinformation in Lexology and her original. The last paragraph here rehashes old lies from Team UPC or is basically lobbying based upon lies. The UPC is dead, but watch what she says:
If the Unified Patent Court (UPC) comes into force, it will hear cases relating to European patents and SPCs, and unitary patents (UPs). In the event that the UPC comes into force and the UK needs to withdraw from the UPC and the unitary patent, UK and EU businesses will be able to use the UPC and unitary patents to protect inventions in the EU. Accordingly, UK businesses will also be open to litigation within the UPC based on their actions in the EU. However, UK and EU businesses would not be able to use the UPC and unitary patents to protect inventions in the UK. Instead, they must use national rights obtained via the UKIPO or the EPO.
That’s complete and utter nonsense. If the UK leaves the EU, then that dooms the UPC in any form. It’s really that simple and working to ‘ameliorate’ or reduce the damage means directly and probably consciously lying. Well, these people are lawyers, not judges, rights? Their job is to serve clients, not justice. █
Permalink
Send this to a friend
« Previous entries Next Page » Next Page »