Bonum Certa Men Certa

Links 15/7/2020: New PinePhone, GCC 10.2 Release Candidate



  • GNU/Linux

    • Desktop/Laptop

      • Star Lite Mk III Linux laptop now available to pre-order from $426
        Star Labs kingdom that preorders for its Linux laptop in the form of the 11.6 inch notebook the Star Lite Mk III. As the name suggests the latest Linux laptop from the company yields on previous iterations and is now available from $426. The Star Lite Mk III features an 11.6″ ARC display, a true matte display that prevents glare with an Anti-Reflective Coating. It also features a hard coat rated at 3H to prevent against damage.“It’s power-efficient LED backlighting produces bright and vibrant colours. The combination of 1920×1080 resolution and IPS technology ensures optimum viewing clarity at angles up to 178€°” says Star Labs.

    • Server

      • The Supercomputing Monoculture

        But that very competition led to fragmentation. Alpha, MIPS, SPARC, and all the others each sold to a small niche of users. Meanwhile, Intel was selling x86 processors by the truckload to every PC maker on the planet while backing up forklifts full of cash into its bank vaults. The x86 franchise was an obscenely lucrative cash cow, even if some engineers ridiculed it as outmoded technology. Intel sold more processors than all the other vendors put together. And CPU development is expensive. Very expensive. One by one, the boutique CPU makers (Sun, Digital, Silicon Graphics, Intergraph, et al.) gave up on their in-house designs and started buying commercial processors, often from Intel. And, one by one, those companies failed anyway. PCs running Windows on x86 were ubiquitous and cheap. Artisanal Unix workstations running proprietary RISC processors were expensive – and not much faster than a PC anyway. The full-custom route just didn’t add up.

        The huge uptake in x86-based supercomputers starting around 2005 wasn’t because Intel chips got a lot faster (although they did). It’s because most of the other competitors defaulted. They left an empty field for Intel to dominate. If the brains behind Alpha (to pick just one example) had had Intel levels of R&D money to work with, they probably would have stayed near the top of the performance heap for as long as they cared to. But that’s not reality or how the game is played. If my grandmother had wheels she’d be a wagon.

        Now the same story is playing out again, but in ARM’s favor. ARM has the volume lead, beating even Intel by orders of magnitude in terms of unit volume. And, although ARM collects only a small royalty on each processor, not the entire purchase price, it also doesn’t have the crushing overhead costs that a manufacturer like Intel carries. ARM’s volume encourages a third-party software market to flourish, and that fuels a virtuous feedback loop that makes ARM’s architecture even more popular. There’s nothing inherently fast about ARM’s architecture – it definitely wasn’t designed for supercomputers – but there’s nothing wrong with it, either. If the x86 can hold the world’s performance lead, any CPU can. All it takes is time and volume.

    • Audiocasts/Shows

      • Destination Linux 182: Security Keys, Disk Encryption & Two Factor Authentication (2FA)

        Coming up on this week’s episode of Destination Linux: Google & Canonical are teaming up to bring Flutter to Linux for a cross-platform game changer. How Important is Disk Encryption & Security Keys – should you be using them or do you just prefer being hacked? We’ve got community feedback, a DRM FREE Game called Drox Operative and our beloved tips/tricks and software pick. All of this and so much more on this week’s Destination Linux.

      • Jon “maddog” Hall Discusses Global Open Source Certification

        Jon “maddog” Hall, a long-time FOSS advocate and educator, joined Doc Searls and Aaron Newcomb on a recent episode of the FLOSS Weekly podcast. The wide-ranging interview touched on topics including global certification, Hall’s early career, open source licenses, Project Cauã, the “Maddog” nickname, and much more. In this article, we’ll cover a few highlights of the podcast.

        Hall currently serves as the board chair at Linux Professional Institute (LPI, which also sponsors FOSSlife). He is the cofounder of Caninos Loucos, a project to get single board computers designed and manufactured in Brazil and is President of Project Cauã, which teaches university students how to set up and run their own IT business in order to pay for school.

    • Kernel Space

      • Intel slammed by Linux founder for using 'power virus' tech

        Intel has been called out by Linux founder Linus Torvalds over the power usage of one of its most central technologies.

        Intel’s 512-bit AVX-512 SIMD extensions for x86 instruction set architecture are used for various compute-intensive workloads on workstations and servers, but AVX-512 hardware execution units are power hungry and that causes some headaches for developers.

        This led Linux creator Linus Torvalds to recently condemn AVX-512 and call on the company to develop a better solution for complex HPC problems. The software icon went as far as calling AVX-512 a ‘power virus’ and wished it to ‘die a painful death.’

      • Measured boot with a TPM 2.0 in U-Boot

        A Trusted Platform Module, in short TPM, is a small piece of hardware designed to provide various security functionalities. It offers numerous features, such as storing secrets, ‘measuring’ boot, and may act as an external cryptographic engine. The Trusted Computing Group (TCG) delivers a document called TPM Interface Specifications (TIS) which describes the architecture of such devices and how they are supposed to behave as well as various details around the concepts.

        These TPM chips are either compliant with the first specification (up to 1.2) or the second specification (2.0+). The TPM2.0 specification is not backward compatible and this is the one this post is about.

        [...]

        A solid TPM 2.0 stack has been around for Linux for quite some time, in the form of the tpm2-tss and tpm2-tools projects. More specifically, a daemon called resourcemgr, is provided by the tpm2-tss project. For people coming from the TPM 1.2 world, this used to be called trousers. One can find some commands ready to be used in the tpm2-tools repository, useful for testing purpose.

      • Graphics Stack

        • AMD's Next-Gen Navi 22 'Navy Flounder' GPU Spied In Latest Linux Driver Release

          There's a new Linux driver release that contains a reference to an upcoming AMD graphics processing unit (GPU) codenamed "Navy Flounder," and now I can't get that Pinkard & Bowden song out of my head. You know, the fishy one titled, "I Lobster But Never Flounder." Yeah, don't judge, click that link and it will be stuck in YOUR head as well. You're welcome.

          But I digress—I'm not here to discuss goofy country songs. This is all about AMD's upcoming Navi launch, which is underpinned by the same second-generation Radeon DNA (RDNA 2) architecture that will power both Sony's PlayStation 5 and Microsoft's Xbox Series X consoles, as well as a new round of Radeon graphics cards.

        • Libinput 1.16 Will Warn You If Your System Is Too Slow

          It's been over a half-year already for the current libinput 1.15 series for this input handling library used on both X.Org and Wayland environments. But libinput 1.16 is finally en route with the first release candidate out today.

          Libinput 1.16 has been baking a while due to no pressing features that needed to be shipped right away and seeing a number of 1.15.x point releases. Coming with this new series for libinput are:

          - Monitoring of timestamps compared to when the libinput dispatch function is called by the compositor. If the difference is too large that it could result in issues for input processing, a new warning is displayed in the log that the event processing is lagging behind and the system is "too slow."

        • Intel Adds More "Elkhart Lake" IDs To Their Linux Graphics Driver Code

          Two new PCI IDs were added for Elkhart Lake and two for Jasper Lake graphics that are in new hardware configurations as well. The new 0x4555 is Elkhart Lake graphics in a two subslice configuration with eight EUs per subslice along with a similar 0x4E55 addition for Jasper Lake with the 2x8 configuration.. The two other new IDs are 0x4557 and 0x4E57 for Elkhart and Jasper, respectively, that are for a four subslice configuration with five EUs per subslice.

        • Intel Linux Graphics Driver Scheduling Improvements In The Works

          Longtime open-source Intel Linux kernel graphics driver developer Chris Wilson has out a big new set of patches.

          Last month I wrote about the work done by Chris Wilson on fair low-latency scheduling for the Intel graphics driver. At the time it amounted to 28 patches for this code inspired by the BFS/MuQSS CPU scheduler. But now it's morphed into a much larger scheduling rework that is at 68 patches.

        • Linux Seeing Kernel GPU Driver Support Two Decades Later For Matrox G200 Graphics Cards

          The Matrox G200 series desktop graphics cards released in the late 90's are now seeing open-source DRM kernel driver support emerge in 2020.

          The Linux kernel has provided a "MGAG200" Direct Rendering Manager driver going back to the early Linux 3.x kernel days. This MGA G200 DRM driver though has just been focused on the numerous server motherboards having G200 chips for display purposes. The actual MGA G200 series desktop graphics cards have not worked with this Linux kernel driver, at least until now.

    • Applications

      • VirtualBox 6.1.12 Released with New GLX Graphics Output

        Oracle Virtualbox 6.1.12 was released a day ago as the sixth maintenance release for the 6.1 series.

        Oracle Virtualbox 6.1.12 release highlights:

        UI fixes for Log-Viewer search-backward icon Fixes and improvements for the BusLogic SCSI controller emulation Regression fixes in FIFO data handling Experimental new type of network attachment, allowing local VM to act as if it was run in cloud Improved resource management in the guest control functionality Fixed command option parsing for the “snapshot edit” sub-command Fix crash of ‘VBoxManage internalcommands repairhd’ when processing invalid input.

    • Instructionals/Technical

    • Games

      • Conjure portals between worlds in Unbound: Worlds Apart Prologue - now on GOG

        Unbound: Worlds Apart Prologue, an impressive demo for the upcoming 2D metroidvania puzzle platformer can now be picked up on GOG and it's been updated a few times.

        In Unbound, you play as Soli, who can conjure magic portals to travel between different realities. It's a really clever and great-looking game mechanic that puts a new and challenging spin on platforming puzzles. Inside certain portals, the physical properties of the character or world elements can change, offering new gameplay possibilities.

      • RollerCoaster Tycoon 2 reimplementation OpenRCT2 needs your feedback

        OpenRCT2 is a fantastic reimplementation of RollerCoaster Tycoon 2 and the team are doing a survey to gather some feedback on how it's used and where to focus.

        Currently, OpenRCT2 is already fully playable providing you have the existing game assets while they work on a set of free replacements. Lots of advancements over the original including UI themes, fast-forward gameplay, multiplayer support, improved translations, OpenGL hardware rending and of course Linux support. It's constantly being improved too with a new release out back in April and another is coming soon with plenty more enhancements.

      • Play the classic Super Smash Bros Melee online on Linux with Slippi

        Super Smash Bros Melee, the 2001 title originally on the Nintendo GameCube is something of a classic and to this day it remains really popular. So popular, it has a dedicated project to play it online.

        That project is Slippi, a version of the Dolphin emulator that's been specifically designed to offer advanced features for Super Smash Bros Melee. These additions include: portable replay files, complex gameplay stats, improved streaming video quality, improved online netcode with rollback support, online matchmaking and much more.

      • The Battle of Polytopia: Moonrise releasing August 4 for Linux PC

        The award winning mobile game The Battle of Polytopia which we wrote about coming to Linux previously with a big revamp is now confirmed to be launching on August 4.

      • Dota 2 gets a free dungeon crawling Summer Event game mode

        Valve have updated Dota 2 with a Summer Event that's free for everyone to play even if you don't have the Battle Pass.

        This new mode, Aghanim's Labyrinth, sees you and three others team up and take on a rogue-like game mode where you go through a randomized dungeon taking down Aghanim's monsters while also getting to pick various upgrades. Valve went all-out with this too, as it even features its own special out-of-game skill tree so you can continue to advance through different runs through it.

      • Narrative-driven adventure about creative block 'Forgotten Fields' is funded

        From the creator of Rainswept, Forgotten Fields is an upcoming narrative-driven adventure about an author struggling with a creative block. Covered previously by GOL here, thankfully their Kickstarter campaign has finished and they managed to get fully funded at €£10,907 from 320 backers.

        Set in an atmospheric, warm, coastal world with a story about nostalgia, creativity and the passage of time. You follow Sid, a fiction author struggling with a creative block, attempting to recapture the feelings of inspiration he felt when he was younger. In order to pay the bills, he needs to think up a story and apply for a grant - the deadline is today - a lazy Sunday in the middle of summer. Inspired by the developers own issues with creative block.

    • Art

      • Krita

        • Compiling Krita for ARM: an AppImage tale

          Someone on #krita, can’t remember their exact nick, asked if it was possible to run Krita on ARM-based computers, specifically the Raspberry Pi 3B+. AFAIK, no one has tried to do so, so I will tell you: yes, it is possible! (Although it will run as slow as a turtle!) This work took me the whole weekend, but it was an excellent experience as well as a wonderful way to test our infrastructure.

          A key warning before moving on: DO NOT TRY THIS ON YOUR PI. It will be unbearably slow I built mine with a Ryzen 7 with 12 threads and it still took me two 12-hour shifts!

          This post covers three steps: setting up the build environment, compiling the dependencies and Krita itself, and finally packaging the AppImages themselves. As per the official instructions, we’ll target Ubuntu 16.04 ARM. I chose the armhf port to match the Raspberry Pi’s default distro, Raspbian. I also tested aarch64 – see the last section for the necessary changes.

        • Wasabi character design

          While the printed book project is doing good progress, I started writing the next episode 34. It's not an easy scenario and it still require a lot of attention (but thanks to a solid proofread team, I'm also doing good progress here). The big outline of the scenario starts to appear: it will finally explore a bit more the land of Shichimi and her magic school. So, here is a screenshot while searching for how Wasabi −master of Shichimi− would look. It feels good to put back my hand on Krita after almost a full week of only pre-press work with Scribus/Imagemagick/Bash and writing in a world of Git/Markdown. I also adopted the new watercolor brushes made by Ramon Miranda built-in Krita 4.3.

    • Distributions

      • Endeavour OS: Our first anniversary, the July release and what’s next?!?

        We’ve reached a memorable milestone, today it is one year ago that we made our fantastic debut in the Linux universe and boy, what a year it has been!

        I’ve already said it in previous blog posts, on our forum and on our Telegram group, but that fuel is provided by you, a friendly, energetic and loyal community and I’ll say it again, we’re so grateful to you all.

        EndeavourOS had very big shoes to fill in the first place, we weren’t starting with an entirely blank canvas, unlike any new starting project. The mission was to give the former Antergos community a new home and at the same time develop our own identity. According to the familiar faces and the many new ones, we had the honour to welcome in our community this past year, I think it’s safe to say that we’ve succeeded that mission.

        One year has passed with big learning curves and challenging goals that seemed unreachable but we conquered them anyway and now it’s time for EndeavourOS to re-enter the atmosphere and heralded by a twin sonic boom to announce its landing back to base…

      • Screenshots/Screencasts

        • Installation of RHEL 6.10 with Screenshots

          Red Hat Enterprise Linux is a Linux-based operating system developed by Red Hat and targeted the commercial market. The Red Hat Enterprise Linux 6.10 is available for x86, x86-64 for Itanium, PowerPC and IBM System z, and desktop versions.

          This article explains how to boot the Red Hat Enterprise Linux 6.10 installation wizard (anaconda) to install Red Hat Enterprise Linux 6.10 on 32-bit and 64-bit x86 systems.

      • SUSE/OpenSUSE

        • Why Is SUSE Acquiring Rancher Labs?

          Last week SUSE announced its intent to acquire Rancher Labs. We sat down with Dr. Thomas Di Giacomo, President of Engineering & Innovation at SUSE to discuss what the two companies would look like post acquisition. What will happen to the Rancher leadership. What will happen to products and projects and more importantly, what value does Rancher bring to SUSE.

        • Rancher’s Sheng Liang To Lead Innovation & Engineering at SUSE

          What will happen to the core Rancher team once the company becomes part of SUSE? Dr. Thomas Di Giacomo, President of Engineering & Innovation at SUSE shares some details about how the Rancher team will lead different business units at SUSE.

        • OpenSUSE board non-confidence effort fails

          The openSUSE board troubles that LWN reported on in May have continued to simmer, and the promised election for an empty seat has not yet been held. During this time, instead, the project has voted on a petition to declare a lack of confidence in the board as a whole, a result that would have forced the election of an entirely new board. In the end, the number of votes fell far short of the number required, and the existing board will move forward with the election plan.

        • How to become an openSUSE contributor?

          Every package available in openSUSE distribution goes through the Factory. This continuous integration (CI) pipeline test all the code submited by the developpement teams on various virtual machines to build code on various environment. From standard x86 to ARM Soc for IOT and Edge You can see this pipeline in real time via our dashboard and see which packages have errors.

      • IBM/Red Hat/Fedora

        • The evolution behind Red Hat Summit Virtual Labs: Pivoting to Success

          With the wrap-up of Red Hat Summit 2020 Virtual Experience, we often look back and reflect on the highlights of what we as an organization have successfully accomplished in delivering to our attendees. However, this particular Summit stands out among its predecessors, in that our entire planned on-site conference for San Francisco was completely virtualized in a matter of weeks. The first of its kind, our virtual experience reached an audience like never before.

          Completely free for anyone to attend, talk to subject matter experts, learn about new and exciting advancements in open source technologies, and understand what makes Red Hat an industry leader. More than 56,000 attendees globally joined over two full days of keynotes, general sessions, live chats with experts, breakout sessions and virtual labs.

          To have an event with such a broad reach required a significant undertaking in ensuring that the supporting structure behind the scenes could handle the load. This included the supporting structure for attendees to take part in lab environments to get hands-on experience with popular applications and platforms, including Red Hat Ansible, Red Hat Ansible Tower, Red Hat OpenShift Container Platform and Red Hat OpenStack Platform. Without the ability to be physically present at the event, a new solution was necessary.

        • Fedora Classroom Session: Git 101 with Pagure

          The Fedora Classroom is a project to help people by spreading knowledge on subjects related to Fedora for others, If you would like to propose a session, feel free to open a ticket here with the tag classroom. If you’re interested in taking a proposed session, kindly let us know and once you take it, you will be awarded the Sensei Badge too as a token of appreciation. Recordings from the previous sessions can be found here.

      • Canonical/Ubuntu Family

        • Ubuntu Will No Longer Track Which Packages Users Install

          The “popularity-contest” tool that has shipped as part of the standard Ubuntu install since the distro debuted in 2006 is being removed.

          What does popcon do? To quote the Ubuntu help page for it...

          The stats that popcon gathers is used to help “improve future versions of Ubuntu so that the most popular packages are the ones which are installed automatically for new users.”

          Except it’s been a long time since Ubuntu added or removed apps to its default install.

          And with Snaps, Flapaks, and PPAs giving developers more direct ways to market to users (not to mention more accurate numbers on how many people use their software) the relative merits of “what’s popular in the repos” is …Well, a touch moot.

        • Canonical launches enhanced GSI partner programme, bringing scalability and automation to modernise enterprise IT deployments

          Canonical, the publisher of Ubuntu, today announces the launch of its enhanced Global System Integrator (GSI) Programme. Alongside new partnership benefits, it includes resell and integration opportunities for the entirety of Canonical’s secure, open source portfolio for the data centre, multi-cloud, edge and IoT. GSIs can now drive increased revenue by building customer solutions on an automated and scalable platform that accelerates time to market, decreases customer OPEX and delivers IT modernisation to their enterprise clients.

          “GSIs are at the forefront of bringing digital transformation to the enterprise in the form of best-fit solutions around AI, multi-cloud, high performance computing (HPC), IoT and intelligent automation. Our re-designed programme helps them to deliver this to customers quickly, securely and with better economics over a deployment’s lifetime,” said Regis Paquette, VP of Alliances at Canonical. “GSIs increasingly need to recommend, incorporate and deliver open source technologies to build bespoke solutions for enterprises while addressing their complex IT requirements. With this GSI programme, Canonical makes that process easy for them.”

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Mozilla

          • Rust code in Linux kernel looks more likely as language team lead promises support
          • Armen Zambrano: New backfill action

            In the screenshot above you can see that the task mdaturned orange (implying that it failed). In the screenshot we can see that a Mozilla code sheriff has both retriggered the task four more times (you can see four more running tasks on the same push) and has backfilled the task on previous pushes. This is to determine if the regression was introduced on previous pushes or if the failure is due to an intermittent test failure.

          • Mozilla Puts Its Trusted Stamp on VPN

            Starting today, there’s a VPN on the market from a company you trust. The Mozilla VPN (Virtual Private Network) is now available on Windows. This fast and easy-to-use VPN service is brought to you by Mozilla, the makers of Firefox, and a trusted name in online consumer security and privacy services.

            The first thing you may notice when you install the Mozilla VPN is how fast your browsing experience is. That’s because the Mozilla VPN is based on modern and lean technology, the WireGuard protocol’s 4,000 lines of code, is a fraction in size of legacy protocols used by other VPN service providers.

            You will also see an easy-to-use and simple interface for anyone who is new to VPN, or those who want to set it and get onto the web.

            With no long-term contracts required, the Mozilla VPN is available for just $4.99 USD per month and will initially be available in the United States, Canada, the United Kingdom, Singapore, Malaysia, and New Zealand, with plans to expand to other countries this Fall.

      • Productivity Software/LibreOffice/Calligra

        • New Czech translation of Getting Started Guide 6.4

          The Czech translation of the LibreOffice 6.4 Getting Started guide is now available! The history behind this book is quite long: first, another team translated the version 4.2 guide in 2014, but they never fully finished it (didn’t do corrections, publishing etc.) Then they started to update for version 5.1, but never finished the translation. I was not part of the team in these days, so this is what I’ve found out from the mailing lists. Thanks to CA tool OmegaT, we could used their old translations and build upon it. In 2020 we started translation again with version 6.0, but we quickly jumped to version 6.4 and followed the documentation team’s updates.

      • Programming/Development

        • GCC 10.2 Release Candidate available from gcc.gnu.org
          The first release candidate for GCC 10.2 is available from
          
          

          https://gcc.gnu.org/pub/gcc/snapshots/10.2.0-RC-20200715/ ftp://gcc.gnu.org/pub/gcc/snapshots/10.2.0-RC-20200715/

          and shortly its mirrors. It has been generated from git commit 932e9140d3268cf2033c1c3e93219541c53fcd29.

          I have so far bootstrapped and tested the release candidate on x86_64-linux. Please test it and report any issues to bugzilla.

          If all goes well, I'd like to release 10.2 on Thursday, July 23th.
        • GCC 10.2 Gearing Up For Release Next Week - RC Available For Testing

          The GCC crew is preparing to issue their first stable point release to the GCC 10 series next week.

          GCC 10.1 as the first stable GCC 10 version released back in early May while now GCC 10.2 as the first point release is preparing to make its way out, hopefully on 23 July.

        • GNU Toolchain Continues Phasing Out Native Client Support (NaCl)

          WebAssembly has seen much greater industry interest and adoption than Google's former Native Client (NaCl) effort for sandboxed applications that can be run within web browsers. Native Client hasn't seen any real activity in years and continues fading away.

          Google has been encouraging any Native Client users to migrate to WebAssembly for years with just a few remnants remaining.

        • LLVM 11 Feature Development Is Over With Many Changes

          LLVM 11 feature development has ended with the code having been branched in Git this morning and the first release candidate expected shortly.

          LLVM 11.0 was branched today in its mono repository including sub-projects like Clang. This branching is going as planned with aiming to ship LLVM 11.0 officially around 26 August.

        • Python

          • Pandas Project: Make a Gradebook With Pandas

            One of the jobs that all teachers have in common is evaluating students. Whether you use exams, homework assignments, quizzes, or projects, you usually have to turn students’ scores into a letter grade at the end of the term. This often involves a bunch of calculations that you might do in a spreadsheet. Instead, you can consider using Python and pandas.

            One problem with using a spreadsheet is that it can be hard to see when you make a mistake in a formula. Maybe you selected the wrong column and put quizzes where exams should go. Maybe you found the maximum of two incorrect values. To solve this problem, you can use Python and pandas to do all your calculations and find and fix those mistakes much faster.

          • How should I start learning Python

            After you have made up your mind that you are going with Python, Here are certain steps that I followed to get started with it and I am sure it will work out for anybody,

          • Python 101 – Creating Multiple Processes

            Most CPU manufacturers are creating multi-core CPUs now. Even cell phones come with multiple cores! Python threads can’t use those cores because of the Global Interpreter Lock. Starting in Python 2.6, the multiprocessing module was added which lets you take full advantage of all the cores on your machine.

          • A Hundred Days of Code, Day 008 - Python Basics, Lists, Tuples, Dictionaries, Sets and Done!
        • Rust

  • Leftovers

    • Integrity/Availability

      • Proprietary

        • Security

          • Hack Brief: Microsoft Warns of a 17-Year-Old ‘Wormable’ Bug

            Since WannaCry and NotPetya struck the internet just over three years ago, the security industry has scrutinized every new Windows bug that could be used to create a similar world-shaking worm. Now one potentially "wormable" vulnerability—meaning an attack can spread from one machine to another with no human interaction—has appeared in Microsoft's implementation of the domain name system protocol, one of the fundamental building blocks of the internet.

            As part of its Patch Tuesday batch of software updates, Microsoft today released a fix for a bug discovered by Israeli security firm Check Point, which the company's researchers have named SigRed. The SigRed bug exploits Windows DNS, one of the most popular kinds of DNS software that translates domain names into IP addresses. Windows DNS runs on the DNS servers of practically every small and medium-sized organization around the world. The bug, Check Point says, has existed in that software for a remarkable 17 years.

          • Security when you're suddenly remote

            Imagine a scenario where forces outside of your control have suddenly made it impossible for people to be in close proximity to each other, forcing them to vacate their offices but somehow continue "business as usual." This upheaval of daily life is all to help limit the spread of a virus that is spreading across the globe.

            It sounds like the opening scenes to a sci-fi movie, but it's our reality. In late January here in the US, and earlier in many other parts of the world, the global pandemic known as COVID-19 forced authorities to respond by recommending and/or requiring that we all stay at home and avoid non-essential contact with people outside of our households. This, of course, makes it very difficult to maintain a business.

            If you're reading this blog, you're probably either already working in IT or adjacent industry, or you're considering it. Most IT workers have the ability to think and work at a keyboard all day, no matter where they're geographically located. Other than a few datacenter roles that require you to be physically onsite, most IT jobs can be done from anywhere in the world. That also goes for most of the support, customer service, billing, and even human resources roles at an organization.

          • Patching OpenSSL and GNU C Libraries Without Service Restarts

            According to the 2020 Global Threat Intelligence Report, “cyber-attack volumes increased across all industries between 2018 and 2019.” Web shells, exploit kits and targeted ransomware are just a few tools that bad actors use for attacks. Mostly, such attacks are still successful due to organizational practices related to networks, operating systems and application configurations, testing, security controls and overall security posture. Attackers are still trying to exploit vulnerabilities which are several years old and have patches available, but nevertheless are not being addressed by many organizations’ patch and configuration management programs.

            Persistent exploitation of old and famous vulnerabilities such as HeartBleed (CVE-2014-0160) make OpenSSL the second most targeted software technology involved in 19% of hostile activity globally. According to researchers, OpenSSL was the most targeted technology in both the manufacturing and technology industries.

          • IPFire on AWS: Update to IPFire 2.25 - Core Update 146

            Today, we have updated IPFire on AWS to IPFire 2.25 - Core Update 146 - the latest official release of IPFire.

            Since IPFire is available on AWS, we are gaining more and more users who are securing their cloud infrastructure behind an easy to configure, yet fast and secure firewall.

            This update brings a new kernel as well as many other exciting changes.

          • Security updates for Wednesday

            Security updates have been issued by CentOS (dbus), Debian (python3.5), Fedora (podofo and roundcubemail), Oracle (dbus, dovecot, jbig2dec, kernel, nodejs:10, nodejs:12, sane-backends, and thunderbird), Red Hat (.NET Core and kernel), SUSE (ansible, ansible1, ardana-ansible, ardana-cluster, ardana-freezer, ardana-input-model, ardana-logging, ardana-mq, ardana-neutron, ardana-octavia, ardana-osconfig, caasp-openstack-heat-templates, crowbar-core, crowbar-openstack, documentation-suse-openstack-cloud, grafana, kibana, openstack-dashboard, openstack-dashboard-theme-HPE, openstack-heat-templates, openstack-keystone, openstack-monasca-agent, openstack-monasca-installer, openstack-neutron, openstack-octavia-amphora-image, python-Django, python-Flask, python-GitPython, python-Pillow, python-amqp, python-apicapi, python-keystoneauth1, python-oslo.messaging, python-psutil, python-pyroute2, python-pysaml2, python-tooz, python-waitress, storm, bind, jasper, java-1_8_0-openjdk, LibVNCServer, libxml2, python-ipaddress, rubygem-bundler, rubygem-puma, samba, slirp4netns, xen, and xrdp), and Ubuntu (firefox and webkit2gtk).

          • ‘Wormable’ Flaw Leads July Microsoft Patches

            Microsoft today released updates to plug a whopping 123 security holes in Windows and related software, including fixes for a critical, “wormable” flaw in Windows Server versions that Microsoft says is likely to be exploited soon. While this particular weakness mainly affects enterprises, July’s care package from Redmond has a little something for everyone. So if you’re a Windows (ab)user, it’s time once again to back up and patch up (preferably in that order).

            [...]

            “We consider this to be a wormable vulnerability, meaning that it has the potential to spread via malware between vulnerable computers without user interaction,” Microsoft wrote in its documentation of CVE-2020-1350. “DNS is a foundational networking component and commonly installed on Domain Controllers, so a compromise could lead to significant service interruptions and the compromise of high level domain accounts.”

            CVE-2020-1350 is just the latest worry for enterprise system administrators in charge of patching dangerous bugs in widely-used software. Over the past couple of weeks, fixes for flaws with high severity ratings have been released for a broad array of software products typically used by businesses, including Citrix, F5, Juniper, Oracle and SAP. This at a time when many organizations are already short-staffed and dealing with employees working remotely thanks to the COVID-19 pandemic.

    • Defence/Aggression

      • Forced displacement and violence fester four years after Colombia peace deal

        The elderly were shaking in fear as they disembarked their slender boats, having escaped the violence that has plagued villages in Colombia’s southwestern department of Nariño for decades. Many, including Gonzalez’s nephews, uncles, and aunts, were from her own village of Palambi, on the banks of the River Chagüi, near Tumaco.

        Around 3,100 people – 1,179 families – had fled as clashes broke out between armed groups vying for control of drug-trafficking routes and coca crops. Many more were unable to leave, “confined”, as local residents described it, to their villages by the armed groups.

        “They said there were explosions going off,” Gonzalez told The New Humanitarian. “Their wooden houses shook and they were hiding under beds, behind doors; there was no safe place – they thought they were coming to kill them.”

        This scene took place in late January, but reflects what continues to happen – not only in Nariño, but in other communities nationwide – four years after the signing of Colombia’s historic peace agreement, and as the country now hosts 1.8 million Venezuelans, many forced from their homeland by hunger and struggling to get by due to the COVID-19 fallout.

      • Is a new Plan Colombia putting a fragile peace at risk?

        On 14 May, bombers from the Colombian air force deployed to a remote rural area in the north of Bolivar province. Their target: a camp of National Liberation Army (ELN) guerrillas, in particular one of its leaders, a commander who went by the name of Macho Tierra.

        The mission was a success, at least from the government's perspective: Macho and two other guerrillas were killed. But it was also the latest in a series of dramatic escalations to threaten the increasingly shaky 2016 peace accord, which brought an end to a 50-year civil war.

        During that war, Colombia earned the dubious distinction of the country with the highest number of internally displaced in the world: some 7.6 million people, roughly 15 percent of the total population, fled violence from both armed groups and Colombian military forces.

        As the state ratchets up aggressive military action once again, the UN is also reporting increased displacements in conflict zones where the peace never truly arrived in practice, with armed groups continuing to vie for territory even during the supposed COVID-19 lockdown.

        The bombing in Bolivar was part of a larger plan by the Colombian government to militarise five conflict regions dubbed “future zones" – Pacífico nariñense, Catatumbo, Southern Cauca, Arauca, and Chiribiquete. The goal, according to a statement by President Iván Duque, is to “stabilise, develop, and transform illicit economies into licit ones”.

    • Finance

      • The Return of the Labor Question

        Has the pandemic brought the labor question back to life? It may not have achieved the salience of the public-health-in-the-time-of-pandemic question, but it’s surely the most prominent subset of it. The coronavirus has brought a new visibility to a huge share of America’s working class—treated as both essential and disposable—that was previously invisible to much of the nation’s political elite.

        The pandemic’s disproportionate effect on the working class and people of color came to light at the end of a decade in which the labor question had already crept back into the nation’s discourse. Since Occupy Wall Street sounded the alarm in 2011, stratospheric levels of economic inequality in the United States have been a growing concern in left, liberal, and, more recently, centrist circles. Until recently, many on the center left confined their concerns to inequality itself—favoring, for instance, a hike in the minimum wage. Workers, in this view, suffered from a deficiency of training, not a deficiency of power.

        Millennials—disproportionately powerless, underpaid, and radical—wanted none of that. Mobilized by two Bernie Sanders presidential campaigns, they joined unions wherever they could (on campuses, in the media, and in nonprofits) and helped push the conversation beyond inequality to one of its root causes: deunionization. This shift coincided with the shockingly belated realization among Democratic politicos that deunionization was also a root cause of the white working class’s defection from Democratic ranks.

    • Internet Policy/Net Neutrality

      • Reliance Jio claims to have developed in-house 5G solution

        “Each of these solutions, once proven in India, has the potential to transform the world.”

        It remains to be seen how successful Jio’s in-house 5G solution can be, given various threats from the market.

        The area of telecom technology is notorious for disputes relating to intellectual property and patents.

    • Monopolies

      • Santen ends Neurim-style SPCs

        The wording of Article 3d of the SPC Regulation requires that the SPC application must rely on “the first authorisation to place the product on the market as a medicinal product”. This always suggested that a marketing authorisation granted for a new indication of a previously approved active ingredient could not be relied upon as the basis of an SPC for the patent directed to the new medical use.

        However, based on a purposive construction of the Regulation, the CJEU decision in Neurim in 2012 opened the door to just that possibility.

        Unusually, the CJEU has now reversed its own Neurim decision in the Santen decision C-673/18 issued on 9 July 2020. A later MA to a new indication cannot be used as the “first MA” supporting an SPC on a new medical use of the same active ingredient.

      • Fortress Wins First Round in Apple-Intel Antitrust-Patent Fight

        U.S. District Judge Edward Chen in San Francisco allows Apple and Intel to revise and refile antitrust complaint alleging that Softbank’s Fortress Investment Group is backing a network of small companies that drive up the cost of technological innovation by filing a myriad of meritless lawsuits to protect vast portfolios of “weak” patents.

      • Patents

        • Toyota loses bid to revive anti-fingerprinting patent

          The U.S. Court of Appeals for the Federal Circuit on Friday denied a bid by Toyota Motor Corp to revive a patent on technology for keeping fingerprint stains off of car windows.

          The court affirmed a ruling by the U.S. Patent and Trademark Office’s Patent Trial and Appeal Board that the Toyota patent was invalid on obviousness grounds.

        • A couple of thoughts on Sisvel v. Haie

          First, as Picht and Haber point out, the decision puts a great deal of emphasis on whether, at step two of the Huawei v. ZTE framework, the implementer has adequately expressed its willingness to conclude a license on FRAND terms--to the extent of actually disagreeing, at one point, with the lower court's analysis of the evidence (see decision para. 95). Presumably, then, in future cases much will depend on how well (or how poorly) the implementer can document its efforts to negotiate in good faith. See, e.g., para. 83 (stating, in the Arnold Ruess translation of the decision, that "the infringer . . . must clearly and unequivocally declare his willingness to conclude a licence agreement with the patent proprietor on reasonable and non-discriminatory terms and must also subsequently participate in the licence agreement negotiations in a target oriented manner").

          Second, although the court notes the difficulty, in the SEP/FRAND context, faced by implementers in discovering and clearing all relevant patents in advance of launching a product--and cites this as one reason for the competition-law defense to make it more difficult for patent owners to obtain injunctions than in other types of patent cases (see para. 74 of the decision)--the court doesn't see this difficulty as a reason for departing from the traditional German rule that allows courts to award damages based on the assumption that a defendant who launches a product without clearing the relevant patent rights first is, in general, negligent (see para. 109). The court therefore clears the way for owners of FRAND-committed SEPs to recover damages against infringers under any of the three methods available in Germany (lost profits, reasonable royalty, or defendant's profits), though it notes that if the defendant's competition-law counterclaim succeeds, the damages would be to some extent offset and the plaintiff would only recover the value of a FRAND royalty (paras. 110-12). I'm not sure this rule is economically sound, particularly in the FRAND context, where the nature of the commitment is such that the plaintiff should expect to recover only a FRAND royalty. I realize, of course, that if the reason the competition-law defense doesn't apply is that the implementer has been negotiating in bad faith, some remedy above the value of the FRAND royalty may be necessary for deterrence purposes (and enhanced damages, as such, are not an option in Germany); though one would think the injunction itself would have much the same function, as Dan Burk has pointed out (though maybe not in a case like Sisvel v. Haier, where the patent in suit expired before the appeals had all run their course). I also recall that one of the Supreme Court judges on the Sisvel panel, Dr. Meier-Beck, has previously written that in his view the damages awarded under any of the three methods should, in principle, converge (a point with which I disagree); see previous discussion here.

        • Major win for Eli Lilly pemetrexed patent in Germany

          Yesterday, the Federal Court of Justice heard the validity case for patent EP 1 313 508 (case ID: X ZR 150/18) regarding drug pemetrexed. Eli Lilly manufactures the folic acid analogue, which doctors use in palliative chemotherapy for certain advanced forms of lung cancer. The focus of yesterday’s hearing was if the combination of the chemotherapy drug with folic acid and vitamin B12 constituted an invention, or whether it was obvious to a person skilled in the art.

          The combination of folic acid and vitamin B12 reduces the side effects of chemotherapy in patients. However, the Federal Court of Justice has now ruled that the patent is valid. This decision stands in contrast to the decision of the lower court.

          This is a blow for plaintiff Hexal and co-litigant Fresenius. On the other hand, for Stada the dispute could continue before the infringement courts. The company also distributes the formulation pemetrexed L-arginine, meaning the courts could hear a discussion on equivalence. Disputes with manufacturers such as Hikma Pharma, Zentiva and Synthon, although not directly involved in yesterday’s proceedings, are similar.

        • Hoyng ROKH Monegier wins first instance infringement dispute for Q-Cells

          In June, the first instance decision at the Regional Court of Düsseldorf found that Jinko Solar, REC Group and Longi Solar Technologie infringe the German part of European patent EP 22 20 689 (case nos. 4a O 20/19, 4a O 21/19 and 4a O 32/19). Q-Cells owns the patent.

          The patent in question protects a solar cell with two surface-passivating dielectric layers on a silicon substrate. The layers are intended to reduce the efficiency losses of the solar cell, and to significantly increase the output of the solar cell.

          In the decision, the judges concluded that the three defendants have distributed solar modules containing specific solar cells, which use the technology covered in the EP 689 patent. Furthermore, the court found that the three parties distributed the solar modules without a prior licence agreement with Hanwha’s Q-Cells.

        • AI Patents and the Self-Assembling Machine

          Legal scholarship has begun to consider the implications of algorithmic pattern recognition systems, colloquially dubbed “artificial intelligence” or “AI,” for intellectual property law. This emerging literature includes several analyses that breathlessly proclaim the imminent overthrow of intellectual property systems as we now know them. Indeed, some commentators have prophesied the demise of patentable innovation under the influence of AI research and development tools.

          Although AI systems pose fundamental challenges to the many areas of law and legal institutions, careful consideration suggests that intellectual property generally, and the patent system particularly, encompasses sufficient flexibilities to address AI innovation. In many cases, previous accommodation of biotechnology within the patent system points the way similar accommodation of AI tools. However, the incorporation of AI innovation into patents reveals a significant gap in patent doctrine regarding issues of causation, which deserves resolution quite apart from the unnecessary furor over the intersection of AI and patent doctrine.

        • Federal Circuit Eliminates Pre-Suit Damages for Failure of Licensee to Mark

          A jury sided with the patentee Packet Intelligence–finding its three patents willfully infringed by NetScout and the claims not-invalid. The jury also awarded the patentee $5.75 million in a running royalty. US6665725; US6839751; US6954789. Judge Gilstrap topped the awarded with extra $2.8 million in enhanced damages and also denied a variety of post-verdict JMOL motions. On appeal, the Federal Circuit has affirmed most aspects of the decision, but has reversed the pre-suit portion of the damage award.

          [...]

          35 U.S.C. €§ 287(a) provides a limitation on damages in patent cases. If authorized patented articles are being sold or imported, they should be marked as patented (with the patent numbers). If not marked, then the statute bars any damages from before “the infringer was notified of the infringement.” The statute was amended as part of the AIA to allow for “virtual marking” that has now become common.

          Although Packet Intelligence doesn’t make any products itself, it has licensed its patents, and the marking requirement extends to authorized (i.e., licensed) products made under the patent.

        • Software Patents

          • Apple, Visa Escape Smartphone Payment Patent Infringement Claims

            Apple Inc. and Visa Inc. defeated patent infringement claims covering technology that lets smartphones be used to authenticate payments, after convincing a Delaware federal court on Tuesday that the relevant parts of the patents were invalid.

            Rejecting a magistrate judge’s recommendation, the U.S. District Court for the District of Delaware found the four patents covered the abstract idea of securely verifying a person’s identity, and didn’t include a patent-eligible inventive concept.

      • Trademarks

        • A distinction without a difference: what about non-EU languages? In particular: Chinese and Russian

          In our previous post, we discussed the issue of terms that are descriptive in English but still lead to likelihood of confusion on an EU level, given the General Court’s belief that ” …if the word is not part of the mother tongue of a territory such understanding cannot be presumed unless a sufficient knowledge by the public in that territory is a well-known fact“. Do the same principle apply also to other languages which are spoken in the EU, without being an “official” language of any Member State?

          The answer to this question is not always consistent, as two recent decisions show, one EUIPO Board of Appeal (BOA) decision regarding Chinese, the other a Court of Justice (CJEU) judgment concerning a Russian expression.

          [...]

          Now to the CJEU judgment of June 18, 2020 (C-142/19). This concerns the transliteration in Latin characters of a term that, in Russian language, would be descriptive. To advance the outcome, likelihood of confusion was found in the end, although the Fourth Board of Appeal saw this differently:

          Back in 2011, the EUIPO granted the EUTM n. 9171695 PLOMBIR for ‘Compotes, eggs, milk, and milk products’ in class 29 and ‘Ices, coffee, cocoa’ in class 30. PLOMBIR is the transliteration of “Пломбир”, apparently a Russian word for “ice cream”. In 2014, an invalidity action was brought, based on consumers in Germany and in other EU countries, such as the Baltic States, would understanding Russian and being able to perceive the descriptive character of PLOMBIR.

          The invalidity action was accepted by the EUIPO Cancellation Division, but the Fourth BOA reversed considering that it had not been proven that German consumers – or a sufficiently significant part thereof – understood Russian. Nothing was said about the Baltic States.

        • Around the IP Blogs

          The Kluwer Trademark Blog discussed whether descriptive terms in languages which do not hold official EU language status might still be deemed to give rise to a likelihood of confusion where there is nevertheless a significant population in at least one EU Member State which speaks that language - whether that is Russian in Germany or the Baltic States, or the growing Chinese-speaking community.

        • Headaches and Handbags: A Fragility Theory of Trademark Functionality

          A group of test subjects are randomly assigned one of two treatments for their frequent headaches: generic or brand-name ibuprofen. Subjects taking the branded ibuprofen, Nurofen€®, report markedly greater pain relief and fewer side effects than the generic group. The experiment is repeated with new subjects, but this time the Nurofen pills are swapped for Nurofenlabeled placebos. The result still holds. A sugar pill with a trademark can outperform genuine, but unbranded, pharmaceuticals. According to functionality doctrine, trademark protection cannot be granted for any feature that is essential to the product’s use or purpose, or affects the product’s cost or quality. But because of the placebo effect, even seemingly inert names and symbols are imbued with precisely this kind of power. In fact, a wide variety of real-world phenomena challenge the prevailing understanding of trademark functionality, from the social uses of high-fashion marks to the cost reductions enabled by certification marks. More fundamentally, a valuable trademark of any kind should act to reduce search costs for consumers and improve quality through the mechanism of reputation. And yet, rather than leading to invalidation, these well-documented functionalities are apparently tolerated by trademark law — sometimes merely ignored, but often celebrated explicitly. This article proposes a more unified theory of functionality: fragility. Some product features affect cost, quality, use, and purpose in ways that are non-fragile — the effects would persist even if every producer were to copy the same feature. But some features affect the product in ways that are fragile — the effects would be degraded or broken through unchecked copying. In reality, only non-fragile functionalities are actually prohibited, whereas fragile functionalities are permitted and even encouraged. In a manner surprisingly similar to patent or copyright law, trademark law appears to carefully distinguish between improvements that require its protection in order to manifest, and those that do not. This fragility theory is not only a descriptive improvement in terms of explaining real-world case outcomes and the doctrine’s full history, but also a conceptual improvement that can be applied to all types of trademarks without issue. A generic term, for example, exhibits non-fragile linguistic functionality. At the same time, recognizing this fragility pattern in trademark law calls attention to potentially adverse consequences in terms of distributive justice and market competition — consequences that trademark law itself may not be able to remedy.

      • Copyrights

        • The broadside ballad as newspaper: When the melody of “Greensleeves” met the latest public hanging in the City of London

          In an age where this Kat’s offspring are more likely to read a newspaper on line (just one of them still gets home delivery), it is easy to forget that the hawker was the last hooray of a tradition of news distribution that reached back four centuries. In its heyday in the 17th century, this form of proto-newspaper, known as the broadside (or broadsheet) ballad, mixed the textual with the artistic and musical, the better to reach the potential customer. So, let us pay IPKat homage to the broadside ballad, where the haunting melody of Greensleeves would meet the latest crime report in the City of London.

          The broadside ballad brought together two developments. First was the long-standing oral tradition of the ballad, which was passed on from generation to generation. These ballads usually dealt with stories reflecting their provenance, such as medieval knights and damsels, ghosts, spurned love, and popular folk heroes (think Robin Hood). They were intended to appeal to the populace, with music and song as the platform by which to transmit their contents.

          The traditional ballad was already well-established by the time that the invention of the printing press began to make available printed texts to the public. We tend to think about this transition to printed contents in terms of books, pamphlets, and the like. But it is likely that broadside ballads and similar published ilk, especially in that crucial time of transition, the 17th century, was the most ubiquitous form of printed material.

          The new world of printing technology had improved the distribution of ballads by enabling multiple copies of their contents to be made cheaply. Word of mouth could only take a ballad so far; with the ability to print a ballad in multiple copies, the potential scope for distribution increased significantly. And the most economical way to do so was by using the broadside technique. In its most basic form, this meant printing the ballad on a single sheet of newspaper, together with a woodcut illustration, usually of a stock variety (whether or not the illustration was related to the content of the ballad).

        • In copyright reform, Germany wants to avoid over-blocking, not rule out upload filters – Part 1

          The recently published discussion draft for implementation of Article 17 falls short of that promise – upload filters are part of the rationale of the German Ministry of Justice that penned the proposal. Nevertheless, the draft makes use of the considerable room for manoeuvre that Member States have in implementing the provision by including the most detailed proposals to date for somewhat limiting the negative impact of upload filters on freedom of expression and freedom of information, namely through rules designed to prevent the inadvertent blocking of legal uploads, also known as over-blocking. Still, more fundamental concerns over the imposition of upload filters expressed by the CJEU in its Netlog and Scarlet judgments, notably their impact on privacy and freedom to conduct a business, are not addressed by the German proposal. This two-part post will not recap the contents of Article 17, which have been extensively discussed elsewhere, but instead take a close look at the German implementation proposal. Part 1 of this post deals with the proposed rules on user rights and pre-flagging as a means to counteract filtering obligations. Part 2 covers the proposal of a new, automatically enforceable compensated exception designed to protect insignificant uses of third-party material, as well as taking a closer look at the efforts of the German proposal to make Article 17 more predictable for platform operators.

          The discussion draft (made available in English, indicating that the Justice Ministry is interested in engaging in the implementation debate in other Member States) proposes to implement Article 17 in an entirely new standalone law, the Copyright Service Provider Act, rather than incorporating the provisions into the existing German copyright act. This choice is partially made to improve readability, but also due to the uniqueness of the legal regime introduced by Article 17, which is a sui generis extension of the communication to the public right introduced by the 2001 InfoSoc Directive, according to the ministry. This is not the only point on which the German approach differs markedly from that of other Member State governments such as the Netherlands.

        • In copyright reform, Germany wants to avoid over-blocking, not rule out upload filters – Part 2

          The first part of this post provided an introduction to the German implementation proposal for Article 17 DSM Directive (the Copyright Service Provider Act), and a discussion of the proposed rules on user rights and pre-flagging. This Part 2 continues with an analysis of the newly proposed exceptions and limitations, the German efforts to achieve greater legal certainty for platform operators, and some concluding remarks.

          A compensated exception to reconcile rightsholder and user interests

          Unsurprisingly, the German proposal implements the newly made mandatory exceptions for caricature, parody and pastiche (€§ 5 – the German “free use” exception, which had traditionally served a similar purpose in German copyright law – was recently declared incompatible with EU law by the CJEU in its Pelham ruling). However, the proposal fails to incorporate new exceptions for criticism and review in its copyright law, which are required by Article 17 alongside the concept of quotation.

          The most innovative element of the German proposal is the introduction of a new compensated copyright exception not explicitly included in the EU copyright acquis. The ministry proposes a new exception for “mechanically verifiable uses authorized by law” (€§ 6) that cover the non-commercial use of third-party material below a quantitative threshold – 20 seconds of video or audio material, 1000 characters of text, or individual images up to a file size of 250 kiloBytes. A central promise of Article 17’s supporters during the legislative process at EU level was that memes would not be banned from platforms. This proposed exception is clearly an attempt by the German government to protect this central part of online culture, which has become emblematic for the cultural and generational gap between supporters and opponents of Article 17, while reconciling the interests of users with the interest of creators in being remunerated for these uses. While it is questionable whether non-commercial de minimis uses cause any harm to rightsholders, the inclusion of a compensation requirement for the new exception, to be paid by platforms (€§ 7), is likely to increase the acceptance of this legislative innovation among a broad range of stakeholders.

        • XXL Mag Prevails in Copyright Fight Over Embedded Image About Tom Ford’s Cardi B Lipstick

          Back in September 2019, Tom Ford and Cardi B made headlines when the famed fashion designer revealed that he would name a shade of lipstick from his cosmetics collection after the rapper. Amid the frenzy of New York Fashion Week and a headline-making eruption in the then-ongoing feud between Cardi B and fellow rapper Nicki Minaj, Ford released the deep blue-hued “Cardi” lipstick, and it sold out within 24 hours. In a nod to the buzzy new lipstick, XXL published an article on its site detailing how Cardi B had “Partner[ed] with Tom Ford for [a] New Lipstick Shade.”

          At the bottom of the article – which documented “the latest shade in Tom Ford’s Lips & Boys collection,” and consumers’ general responses to Cardi’s name being included in the collection alongside the likes of Julianne (Moore), Cristiano (Ronaldo), Bella (Hadid), and Naomi (Campbell), among others – XXL embedded three images from Instagram. One of those images, a photo of Cardi B sitting front row at Tom Ford’s NYFW runway show, ended up landing the publication on the receiving end of a copyright infringement lawsuit, and as of last month, XXL has prevailed.

        • Against Progress: Interventions About Equality in Supreme Court Cases About Copyright Law

          This symposium essay is adapted from my forthcoming book Against Progress: Intellectual Property and Fundamental Values in the Internet Age (Stanford University Press 2021 forthcoming). The book’s primary argument is that, with the rise of digital technology and the ubiquity of the internet, intellectual property law is becoming a mainstream part of law and culture. This mainstreaming of IP has particular effects, one of which is the surfacing of on-going debates about “progress of science and the useful arts,” which is the constitutional purpose of intellectual property rights.

          In brief, Against Progress describes how in the 20th century intellectual property legal doctrine and scholarship focused on economic models of progress, which were framed in terms of wealth accumulation and market theories facilitating economic growth. The rise of digital technology that facilitates all sorts of copying at the turn of the century puts pressure on the anti-copying regulations defining intellectual property. Combine this technological development with the focus on economic rationales and incentive-based reasons for exclusive rights, and federal intellectual property rights expand to regulate more of the behavior that technology enables. The result is an increase in the amount of intellectual property itself: more copyrighted works, more patents and more trademarks.

          Despite expanding scope and the rise of “more” intellectual property, Against Progress explains how turn-of-the century intellectual property practice challenges the “progress as more” paradigm. Through various methodological interventions – close reading of cases, doctrinal analysis, and various qualitative empirical methods – Against Progress demonstrates how contemporary accounts of intellectual property are not primarily anchored by claims of “more” or in economic growth terms. Instead, creative and innovative practices (and disputes concerning them) revolve around adjacent values and principles central to our constitutional system such as equality, privacy, and community or general welfare.

          In this short essay, I provide only two examples of the shifting narratives at play in intellectual property disputes that are refocusing concerns from economic resource allocation to fundamental values that ground the rule of law in the United States. These examples are drawn from the chapter on equality, which traces themes of equal treatment and substantive equality doctrine through intellectual property cases at the United States Supreme Court. This essay concerns two controversial copyright cases, but the chapter discusses cases about patent, trademark, and copyright law.



Recent Techrights' Posts

Apology & Correction: Daniele Scasciafratte & Mozilla, OSCAL, Albania dating
Reprinted with permission from the Free Software Fellowship
Richard Stallman to Give Public Talk in Portugal on Wednesday
new addition to his page
Richard Stallman's Hair Has Grown Back and He Does Not Talk About Cancer
May he live a long and happy life
[Teaser] Freenode LTD: What Happened
Upcoming series based on insiders' account with evidence
Links 15/04/2024: Signs of Desperation at Microsoft and Tesla Employees Brace for Mass Layoffs (Update: Yes, Over 10% at Tesla Laid Off)
Links for the day
 
Links 16/04/2024: Levente "anthraxx" Polyák as Arch Linux 2024 Leader, openSUSE Leap Micro 6 Now Alpha, Facebook Blocking News
Links for the day
Where is the copyright notice and license for Debian GNU/Linux itself?
Reprinted with permission from Daniel Pocock
Halász Dávid & IBM Red Hat, OSCAL, Albania dating
Reprinted with permission from the Free Software Fellowship
Next Week Marks a Year Since Red Hat Mass Layoffs, Another Round Would be "Consistent With Other Layoffs at IBM."
"From anon: Global D&I team has been cut in half."
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, April 15, 2024
IRC logs for Monday, April 15, 2024
Links 15/04/2024: Navartis, AWS and Tesla Layoffs
Links for the day
Gemini Links 15/04/2024: YAML Issues and Gemtext Specification 0.24.0
Links for the day
New Video of Richard Stallman's Talk in Italy (Delivered a Week Ago)
a working copy of the video
Microsoft Windows Falling to New Lows in the United Kingdom and Worldwide
What's noteworthy here is that there's no sign at all of a Windows rebound
[Meme] Quantity of European Patents
they've rigged the system to make more money
Why do free software organizations eliminate community representatives?
Reprinted with permission from the Free Software Fellowship
Upcoming Themes and Articles in Techrights
we expect to have already caught up with most of the administrivia and hopefully we'll be back to the prior pace some time later this week
Matthias Kirschner & FSFE People Trafficking, coercion of volunteers
Reprinted with permission from the Free Software Fellowship
Gemini Links 15/04/2024: Profectus Alpha 0.4 and RPG of One Capsule Progress
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, April 14, 2024
IRC logs for Sunday, April 14, 2024
Oceania: GNU/Linux Measured at Lower Than the International Average (4% or 7% Including ChromeOS)
statCounter's data
Human Rights Tribunal of Ontario (HRTO) Does Not Wish to Become an Instrument of Cost-Free Harassment or 'Cheap Revenge', It Says "Justice is Not Free. Quite the Contrary. Justice is Expensive."
Long story short, there is no lawsuit, there is a just a hateful, lying idiot abusing "the system" (which this idiot rejects entirely)
Achieving Objectives
The 'suits' and their vocabulary can be overcome when their deceit is widely deciphered:
Mozilla Has Turned Firefox Into OSPS Consistent With "Attestation" Objectives
Open Source Proprietary Software
100 years of Hitler & psychological experiments on volunteers
Reprinted with permission from the Free Software Fellowship
Taliban, the Free and Open Source Software Community Team of Afghanistan
Reprinted with permission from the Free Software Fellowship
Links 14/04/2024: Software Needed for Work and Issues in Brazil
Links for the day
Gemini Links 14/04/2024: OFFLFIRSOCH and Gemtext Specification 0.24.0
Links for the day
Links 14/04/2024: Tesla and OpenAI (Microsoft) Layoffs Floated in the Media
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, April 13, 2024
IRC logs for Saturday, April 13, 2024