EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

09.19.18

Links 19/9/2018: Chromebooks Get More DEBs, LLVM 7.0.0 Released

Posted in News Roundup at 12:53 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • It’s time to pay the maintainers

    Earlier this year, Tidelift conducted a survey of over 1,200 professional software developers and open source maintainers. We found that 83% of professional software development teams would be willing to pay for better maintenance, security, and licensing assurances around the open source projects they use. Meanwhile, the same survey found that the majority of open source maintainers receive no external funding for their work, and thus struggle to find the time to maintain their open source projects.

  • Desktop

    • Chrome OS 69 Finally Brings Linux Apps to Some Chromebooks, Night Light Feature

      Chrome OS 69 is the first release of the Linux-based operating system that enables support for running Linux apps on Chromebooks. However, the Linux app support is still in development and it’s presented to users in a beta form, available only on select devices due to hardware restrains. A complete list with the Chromebooks supporting Linux apps is available here.

      “While we would like to be able to bring this work to all Chromebooks, the required kernel and hardware features limit where we can deploy this,” says Google in the blog announcement. “A lot of features we use had to be backported, and the further back we go, the more difficult & risky it is to do so. We don’t want to compromise system stability and security here.”

    • Chromebooks Are Getting Better Parental Controls

      Better parental controls are coming to Chromebooks, with the ability to set screen time limits and manage apps.

      We’ve shown you how manage your child’s Android phone with Google Family Link. The feature allowed parents to set up an account for a child under 13, giving parents control over how their kids can use the phone.

    • Linux Apps Are Now Available in Chrome OS Stable, But What Does That Mean?

      Chrome OS 69 just hit the stable channel and is currently rolling out to devices. This brings a handful of new features and changes, including Google’s Material theme, Night Light, an improved file manager, and most importantly: support for Linux apps.

      Linux Apps for Chromebooks?

      At Google I/O earlier this year, Google announced that it was going to bring support for Linux applications to Chrome OS, starting first with the Pixelbook. While Linux support has been available on the developer and beta channels for a while now, users who choose to stick with the stable channel (a wise choice for the most part) may now get their chance to check this out.

  • Kernel Space

    • ​Linus Torvalds is doing a good and brave thing

      Linus Torvalds is known for his “salty” language and take-no-prisoners approach to Linux developers. If you get things wrong, he’s not afraid to let you know — in no uncertain terms — that you’re an idiot. It gets results, but it also drives away many talented developers and leads to a development culture where harsh attacks are tolerated and even approved of by some.

      But Torvalds realized he was hurting both the development process and his fellow programmers. So, he announced he’s stepping away from the Linux developer community to change his personal behavior. Torvalds also approved a new “Code of Conduct” for Linux kernel developers. No one would have expected to see either of these changes.

    • Linux Patches Surface For Supporting The Creative Sound BlasterX AE-5

      Last year Creative Labs introduced the Sound BlasterX AE-5 PCI Express gaming sound card while finally there are some patches pending for supporting this high-end sound card in Linux.

      Connor McAdams who most recently got the Creative Recon3D support into good shape on Linux has now been working on getting the Sound BlasterX AE-5 working well on Linux.

    • Linux Has a Code of Conduct and Not Everyone is Happy With it

      The code of conduct was signed off by Linus Torvalds and Greg Kroah-Hartman (kind of second-in-command after Torvalds). Dan Williams of Intel and Chris Mason from Facebook were some of the other signees.

      If I have read through the timeline correctly, half an hour after signing this code of conduct, Torvalds sent a mail apologizing for his past behavior. He also announced taking a temporary break to improve upon his behavior.

    • Linux Foundation

      • Blockchain Training Takes Off

        Meanwhile, job postings related to blockchain and Hyperledger are taking off, and knowledge in these areas is translating into opportunity. Careers website Glassdoor lists thousands of job posts related to blockchain.

    • Graphics Stack

      • AMD Picasso Support Comes To The RadeonSI OpenGL Driver

        Last week AMD sent out initial support for yet-to-be-released “Picasso” APUs with the Linux AMDGPU kernel graphics driver. Today on the user-space side the support was merged for the OpenGL RadeonSI Gallium3D driver.

        Picasso details are still fairly light but they are expected to be similar to Raven Ridge and for the AM4 processor socket as well as an edition for notebooks. On the same day as publishing the Picasso AMDGPU kernel patches, AMD also went ahead and published the Linux patches for the “Raven 2″ APUs too.

      • The GeForce RTX 2080 Ti Arrives For Linux Benchmarking

        It looks like NVIDIA has their launch-day Linux support in order for the GeForce RTX 2080 “Turing” graphics cards slated to ship later this week as arriving today at Phoronix was the RTX 2080 Ti.

        The GeForce RTX 2080 Ti is NVIDIA’s new flagship desktop GPU with the Turing GPU architecture, 4352 CUDA cores, a 1635MHz boost clock speed rating for this Founder’s Edition model, 11GB of GDDR6 video memory yielding a 616 GB/s memory bandwidth rating, and designed to suit real-time ray-tracing workloads with their RTX technology. Pricing on the RTX 2080 Ti Founder’s Edition is $1,199 USD. Last week NVIDIA published more details on the Turing architecture for those interested as well as on the new mesh shader capability.

      • NVIDIA Vulkan Beta Adds New KHR_driver_properties & KHR_shader_atomic_int64

        Not to be confused with the new NVIDIA Linux/Windows drivers that should be out today for RTX 2070/2080 “Turing” support and also initial RTX ray-tracing support, there is also out a new Vulkan beta driver this morning.

        The NVIDIA 396.54.06 driver is this new Vulkan beta and as implied by the version number is still on the current stable branch and not in the Turing era. But this driver release is quite exciting as it does bring support for two new extensions… These extensions are very fresh and not yet in the official Vulkan specification: VK_KHR_driver_properties and VK_KHR_shader_atomic_int64.

      • GeForce RTX 2080 Ti Linux Benchmarks Coming Today, NVIDIA Driver Bringing Vulkan RTX

        NVIDIA’s review/performance embargo has now lifted on the GeForce RTX 2080 series ahead of the cards shipping tomorrow. I should have out initial Linux benchmarks later today, assuming Linux driver availability.

        As wrote about yesterday, just yesterday I ended up receiving the GeForce RTX 2080 Ti for Linux benchmarking. But, unfortunately, no Linux driver yet… But I am told it will be posted publicly soon with the Windows driver. Assuming that happens within the hours ahead, I’ll still have initial RTX 2080 Ti benchmarks on Ubuntu Linux out by today’s end — thanks to the Phoronix Test Suite and recently wrapping up other NVIDIA/AMD GPU comparison tests on the current drivers.

      • Intel’s New Iris Gallium3D Driver Picks Up Experimental Icelake Bits, GL Features

        One of the talks we are most interested in at XDC2018 is on the Intel “Iris” Gallium3D driver we discovered last month was in development.

        We stumbled across the Iris Gallium3D driver that’s been in development for months as a potential replacement to their “i965″ classic Mesa driver. But they haven’t really detailed their intentions in full, but we should learn more next week. This is particularly exciting the prospects of an official Intel Gallium3D driver as the company is also expected to introduce their discrete GPUs beginning in 2020 and this new driver could be part of that plan.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • New KDE.ru website

        Today, on September 18th, 2018, the Russian-speaking KDE community launches its updated website on KDE.ru.

        The new website serves as the main page for the Russian-speaking community. It provides localized information about the community, product download links and the list of social network pages we maintain. It is also meant to help new members get involved in KDE’s projects, particularly in our translation and promotion efforts.

        The website was created by me and Alexander Potashev on top of Jonah Brüchert‘s work for plasma-mobile.org. It uses Jekyll and is now hosted on official KDE servers. It replaces the old forum that has significantly lost its users in the past years.

      • Everything old is new again

        Just because KDE4-era software has been deprecated by the KDE-FreeBSD team in the official ports-repository, doesn’t mean we don’t care for it while we still need to. KDE4 was released on January 11th, 2008 — I still have the T-shirt — which was a very different C++ world than what we now live in. Much of the code pre-dates the availability of C++11 — certainly the availability of compilers with C++11 support. The language has changed a great deal in those ten years since the original release.

        The platforms we run KDE code on have, too — FreeBSD 12 is a long way from the FreeBSD 6 or 7 that were current at release (although at the time, I was more into OpenSolaris). In particular, since then the FreeBSD world has switched over to Clang, and FreeBSD current is experimenting with Clang 7. So we’re seeing KDE4-era code being built, and running, on FreeBSD 12 with Clang 7. That’s a platform with a very different idea of what constitutes correct code, than what the code was originally written for. (Not quite as big a difference as Helio’s KDE1 efforts, though)

      • Let’s take this bug, for example…

        Krita’s 2018 fund raiser is all about fixing bugs! And we’re fixing bugs already. So, let’s take a non-technical look at a bug Dmitry fixed yesterday. This is the bug: “key sequence ctrl+w ambiguous with photoshop compatible bindings set” And this is the fix.

      • Andrew Crouthamel: How I Got Involved in KDE

        Since this blog is starting after the beginning of my contributions to KDE, the first few regular posts will be explaining my prior contributions, before moving into the present.

      • Akademy 2018

        I had the awesome opportunity to attend Akademy in Vienna this year. First off, a big thank you to the organising team for pulling off this years Akademy without a hitch.

        This Akademy was a bit more special, since it was decided to switch up the format, which in my opinion worked quite well. There were training’s that ran alongside the talk’s and BoF’s, which I think was a great idea. I signed up to the Public Speaking Training and the Non Violent Communication training, which I think were run exceptionally. I hope that these training sessions are run again next Akademy because I found them exceptionally valuable.

    • GNOME Desktop/GTK

      • GNOME.Asia 2018

        GNOME.Asia 2018 was co-hosted with COSCUP and openSUSE Asia this year in Taipei, Taiwan. It was a good success and I enjoyed it a lot. Besides, meeting old friends and making new ones are always great.

      • NetworkManager Merges An Initrd Generator For Early Boot Handling

        Days following the NetworkManager 1.14 release, feature activity on the next release is progressing and the newest addition is nm-initrd-generator.

        The NetworkManager Initrd Generator is used to generate an early-boot NetworkManager configuration. This new utility scans the command line for supported options and from there generates a network configuration and the necessary configuration files to handle an early instance of NetworkManager that runs from the initial ramdisk during the system’s early boot stage.

  • Distributions

    • The History of Various Linux Distros

      Linux has been around for almost 30 years. Yes, it’s that old, and it did make history. If you are interested in the history of some of the major Linux distros, here it is in a nutshell – the history of various Linux distros, like Ubuntu, Fedora, REHL, Linux Mint, Slackware, etc. The reasons for their creation and their philosophy will be briefly discussed.

    • PCLinuxOS/Mageia/Mandriva Family

      • Mageia at fête de l’humanité 2018

        The booths were in a different place from previous years, and we had a lot more visitors. We gave out all the flyers we brought by Saturday evening – there was only one left for Sunday – so we gave out Mageia stickers instead. We did not sell any T-shirts, but we sold two USB sticks.

        Many people asked for general information; I spoke so much that I lost my voice! We had strong interest, coming from people already using a Linux distribution as well as from people wishing to turn to free software.

    • Red Hat Family

      • BU Spark! teams up with Red Hat, hosts software design workshop

        Students traveled across Boston to its Fort Point neighborhood to attend a BU Spark! workshop about interaction design Friday. There they delved into interaction design and explored how to develop user-friendly software.

        BU Spark! and Red Hat Inc. hosted the Interaction Design Bootcamp jointly at Red Hat’s Boston office. BU students and Spark! Interaction design fellows attended.

        Red Hat is a software company that specializes in information technology and has a research relationship with Boston University that includes educational elements. The programs taught by Red Hat focus on user experience design, one of Red Hat’s specializations, according to their website.

      • Open source can spark innovative business transformation in government, Red Hat leaders say

        The federal government, largely hamstrung by legacy systems, is in need of a major digital transformation. Open source technology can be the spark that sets off that revolution, leaders from open-source software company Red Hat said Tuesday.

        “The types of technologies that you choose matter,” said Mike Walker, global director of Open Innovation Labs at Red Hat. “It will influence the way your business operates and open new doors to new business process, and ultimately allow you to become a software company that can achieve some of those innovations and reductions in cost and time.”

      • Kubernetes Ingress vs OpenShift Route

        Although pods and services have their own IP addresses on Kubernetes, these IP addresses are only reachable within the Kubernetes cluster and not accessible to the outside clients. The Ingress object in Kubernetes, although still in beta, is designed to signal the Kubernetes platform that a certain service needs to be accessible to the outside world and it contains the configuration needed such as an externally-reachable URL, SSL, and more.

        Creating an ingress object should not have any effects on its own and requires an ingress controller on the Kubernetes platform in order to fulfill the configurations defined by the ingress object.

        Here at Red Hat, we saw the need for enabling external access to services before the introduction of ingress objects in Kubernetes, and created a concept called Route for the same purpose (with additional capabilities such as splitting traffic between multiple backends, sticky sessions, etc). Red Hat is one of the top contributors to the Kubernetes community and contributed the design principles behind Routes to the community which heavily influenced the Ingress design.

      • VirtualBox DRM/KMS Driver Proceeding With Atomic Mode-Setting Support

        The “vboxvideo” DRM/KMS driver for use by VirtualBox guest virtual machines that has been part of the mainline Linux kernel the past several cycles will soon see atomic mode-setting support.

        Hans de Goede of Red Hat, who has been stewarding this driver into the Linux kernel after Oracle has failed to do so, is tackling the atomic mode-setting as his latest advancement to this driver important for a VirtualBox desktop VM experience. Published today were initial patches preparing the move to atomic mode-setting but not yet the full migration to this modern display API that offers numerous benefits.

      • Troubleshooting FDB table wrapping in Open vSwitch

        When most people deploy an Open vSwitch configuration for virtual networking using the NORMAL rule, that is, using L2 learning, they do not think about configuring the size of the Forwarding DataBase (FDB).

      • Finance

      • Fedora

        • Test Day: Fedora Silverblue

          Fedora Silverblue is a new variant of Fedora Workstation with rpm-ostree at its core to provide fully atomic upgrades. Furthermore, Fedora Silverblue is immutable and upgrades as a whole, providing easy rollbacks from updates if something goes wrong. Fedora Silverblue is great for developers using Fedora with good support for container-focused workflows.

          Additionally, Fedora Silverblue delivers desktop applications as Flatpaks. This provides better isolation/sandboxing of applications, and streamlines updating applications — Flatpaks can be safely updated without reboot.

        • Understand Fedora memory usage with top

          Have you used the top utility in a terminal to see memory usage on your Fedora system? If so, you might be surprised to see some of the numbers there. It might look like a lot more memory is consumed than your system has available. This article will explain a little more about memory usage, and how to read these numbers.

          [...]

          Your system has another facility it uses to store information, which is swap. Typically this is an area of slower storage (like a hard disk). If the physical memory on the system fills up as needs increase, the OS looks for portions of memory that haven’t been needed in a while. It writes them out to the swap area, where they sit until needed later.

          Therefore, prolonged, high swap usage usually means a system is suffering from too little memory for its demands. Sometimes an errant application may be at fault. Or, if you see this often on your system, consider upgrading your machine’s memory, or restricting what you run.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Flavours and Variants

            • What’s New in Ubuntu Budgie 18.04 LTS

              Ubuntu Budgie 18.04 LTS is the latest release of Ubuntu budgie. As part of Ubuntu 18.04 flavor this release ships with latest Budgie desktop 10.4 as default desktop environment. Powered by Linux 4.15 kernel and shipping with the same internals as Ubuntu 18.04 LTS (Bionic Beaver), the Ubuntu Budgie 18.04 LTS official flavor will be supported for 3 years, until April 2021.

              Prominent new features include support for adding OpenVNC connections through the NetworkManager applet, better font handling for Chinese and Korean languages, improved keyboard shortcuts, color emoji support for GNOME Characters and other GNOME apps, as well as window-shuffler capability.

              Ubuntu Budgie 18.04 LTS also ships with a new exciting GTK+ theme by default called Pocillo, support for dynamic workspaces, as well as a “minimal installation” option in the graphical installer that lets users install Ubuntu Budgie with only the Chromium web browser and a handful of basic system utilities.

            • Endless OS May Be the Best Linux Version for New Computer Users

              Linux appeals to a certain kind of computer user: if you like computers enough to read about or tinker with them in your free time, then there’s a good chance you’ll find something to like about Linux. Otherwise, you will probably consider it too much work to bother.

              Endless Computer’s Endless OS aims to provide a complete desktop experience that’s versatile enough to serve families. Is this the ideal way to introduce newcomers to Linux?

  • Devices/Embedded

Free Software/Open Source

  • Google AI Tool Can Distinguish Between Different Types of Lung Cancer
  • Artificial intelligence can determine lung cancer type
  • Scientists dig up cancer’s secrets buried in ‘gene deserts’
  • CloudBees Announces Availability of Support for Jenkins Open Source

    This marks the first-ever, support-only offering for Jenkins users.

  • New CloudBees Suite Addresses DevOps Gaps in Software Delivery

    CloudBees is bringing a set of products into a new CloudBees Suite that it said will help companies of all sizes streamline the software development process. The new software is set to be announced Sept. 18 at the company’s DevOps World / Jenkins World conference in San Francisco. Jenkins is the open-source version of CloudBees, which is a commercial offering.

    A central piece of the CloudBees Suite is the CloudBees Core for unified governance of continuous delivery operations and processes used in DevOps. Software pipelines can also use Core to run software pipelines more efficiently in a self-managed way in the cloud or on-premises.

  • First results of the ROSIN project: Robotics Open-Source Software for Industry

    Open-Source Software for robots is a de-facto standard in academia, and its advantages can benefit industrial applications as well. The worldwide ROS-Industrial initiative has been using ROS, the Robot Operating System, to this end.

    In order to consolidate Europe’s expertise in advanced manufacturing, the H2020 project ROSIN supports EU’s strong role within ROS-Industrial. It will achieve this goal through three main actions on ROS: ensuring industrial-grade software quality; promoting new business-relevant applications through so-called Focused Technical Projects (FTPs); supporting educational activities for students and industry professionals on the one side conducting ROS-I trainings as well as and MOOCs and on the other hand by supporting education at third parties via Education Projects (EPs).

  • Baidu To Launch World’s First Intelligent Vehicle Infrastructure Cooperative Systems Open Source Solution By End Of 2018

    Baidu Inc. has announced it will launch the Apollo Intelligent Vehicle Infrastructure Cooperative Systems (IVICS) open-source solution by the end of 2018, leveraging its capabilities in autonomous driving to bring together intelligent vehicles and infrastructure to form a “human-vehicle-roadway” interplay – an important step toward developing future intelligent transportation.

  • Versity Open Sources Next Generation Archiving Filesystem

    The ScoutFS project was started in 2016 to address the rapidly growing demand for larger POSIX namespaces and faster metadata processing. The design goal for ScoutFS includes the ability to store up to one trillion files in a single namespace by efficiently distributing metadata handling across a scale out cluster of commodity compute nodes.

  • IBM launches tool aimed at detecting AI bias

    The Fairness 360 Kit will also scan for signs of bias and recommend adjustments.

    There is increasing concern that algorithms used by both tech giants and other firms are not always fair in their decision-making.

  • IBM launches tools to detect AI fairness, bias and open sources some code

    IBM said it will launch cloud software designed to manage artificial intelligence deployments, detect bias in models and mitigate its impact and monitor decision across multiple frameworks.

    The move by IBM highlights how AI management is becoming more of an issue as companies deploy machine learning and various models to make decisions. Executives are likely to have trouble understanding models and the data science under the hood.

  • IBM Debuts Tools to Help Prevent Bias In Artificial Intelligence
  • IBM launches software to detect racist and sexist AI
  • IBM launches cloud tool to detect AI bias and explain automated decisions
  • IBM announces cloud service to help businesses detect and mitigate AI bias
  • Top 5 Open Source Data Integration Tools

    Businesses seeking to improve their data integration know that today’s data integration software perform complex tasks. They enable applications to access data associated with other applications, and also to migrate data from one platform to another, transforming it as necessary. Given this sophistication, selecting the best data integration tool is far from easy.

    Adding to the complexity of the selection process: early data integration tools focused on ETL – extract, transform, and load processes. However, most of today’s data integration products have much more advanced capabilities and can generally connect both on-premises and cloud-based data. Many also integrate with other data management products, such as business intelligence (BI), analytics, master data management (MDM), data governance and data quality solutions.

    To help sort through the complex options, the list below highlights five of the best open source data integration tools, based on vendor profile and completeness of their data integration tool set.

  • The Future of Open Source

    Linux and the open source business model are far different today than many of the early developers might have hoped. Neither can claim a rags-to-riches story. Rather, their growth cycles have been a series of hit-or-miss milestones.

    The Linux desktop has yet to find a home on the majority of consumer and enterprise computers. However, Linux-powered technology has long ruled the Internet and conquered the cloud and Internet of Things deployments. Both Linux and free open source licensing have dominated in other ways.

    Microsoft Windows 10 has experienced similar deployment struggles as proprietary developers have searched for better solutions to support consumers and enterprise users.

  • Web Browsers

    • Microsoft Windows U-turn removes warning about installing Chrome, Firefox [Ed: Microsoft showed us its true colours though]

      The feature raised some hackles and brought back memories of Microsoft’s strong-arm tactics promoting its old Internet Explorer browser in the first browser wars two decades ago. But Microsoft isn’t alone in such tactics: Google promotes its Chrome browser as faster and safer to people who visit its own websites with other browsers.

      Microsoft didn’t immediately respond to a request for comment about the change of direction.

    • Chrome

    • Mozilla

      • AutoFill your passwords with Firefox Lockbox in iOS

        Today Firefox Lockbox 1.3 gives you the ability to automatically fill your username and password into apps and websites. This is available to anyone running the latest iOS 12 operating system.

      • Streaming RNNs in TensorFlow

        The Machine Learning team at Mozilla Research continues to work on an automatic speech recognition engine as part of Project DeepSpeech, which aims to make speech technologies and trained models openly available to developers. We’re hard at work improving performance and ease-of-use for our open source speech-to-text engine. The upcoming 0.2 release will include a much-requested feature: the ability to do speech recognition live, as the audio is being recorded. This blog post describes how we changed the STT engine’s architecture to allow for this, achieving real-time transcription performance. Soon, you’ll be able to transcribe audio at least as fast as it’s coming in.

      • Mozilla Launches Firefox Reality Web Browser For Virtual Reality Headsets

        Mozilla is ready to take web browsing experience to the next level with its virtual reality web browser called Firefox Reality. It has been built exclusively to work with standalone VR and AR headsets.

        You can actually use Firefox Reality inside a virtual reality headset to search and browse websites just with your VR hand controller. This web browser makes use of voice search for searching while you step into an immersive computer-generated world.

      • Explore the immersive web with Firefox Reality. Now available for Viveport, Oculus, and Daydream

        Earlier this year, we shared that we are building a completely new browser called Firefox Reality. The mixed reality team at Mozilla set out to build a web browser that has been designed from the ground up to work on stand-alone virtual and augmented reality (or mixed reality) headsets. Today, we are pleased to announce that the first release of Firefox Reality is available in the Viveport, Oculus, and Daydream app stores.

        At a time when people are questioning the impact of technology on their lives and looking for leadership from independent organizations like Mozilla, Firefox Reality brings to the 3D web and immersive content experiences the level of ease of use, choice, control and privacy they’ve come to expect from Firefox.

        But for us, the ability to enjoy the 2D web is just table stakes for a VR browser. We built Firefox Reality to move seamlessly between the 2D web and the immersive web.

      • These Months In Servo 113

        In the past 1.5 months, we merged 439 PRs in the Servo organization’s repositories.

      • Things Gateway – Rules Rule

        A smart home is a lot more than just lights, switches and thermostats that you can control remotely from your phone. To truly make a Smart Home, the devices must be reactive and work together. This is generally done with a Rule System: a set of maxims that automate actions based on conditions. It is automation that makes a home smart.

        There are a couple options for a rule system with the Things Gateway from Mozilla. First, there is a rule system built into the Web GUI, accessed via the Rules option in the drop down menu. Second, there is the Web Things API that allows programs external to the Things Gateway to automate the devices that make up a smart home. Most people will gravitate to the former built-in system, as it is the most accessible to those without predilection to writing software. This blog post is going to focus on the this rules system native to the Things Gateway.

      • Lessons from Carpenter – Mozilla panel discussion at ICDPPC

        The US Supreme Court recently released a landmark ruling in Carpenter vs. United States, which held that law enforcement authorities must secure a warrant in order to access citizens’ cell-site location data. At the upcoming 40th Conference of Data Protection and Privacy Commissioners, we’re hosting a panel discussion to unpack what Carpenter means in a globalised world.

      • The future of online advertising – Mozilla panel discussion at ICDPPC

        At the upcoming 40th International Conference of Data Protection and Privacy Commissioners, we’re convening a timely high-level panel discussion on the future of advertising in an open and sustainable internet ecosystem.

  • CMS

  • Pseudo-Open Source (Openwashing)

  • BSD

    • LLVM 7.0.0 released

      The release contains the work on trunk up to SVN revision 338536 plus work on the release branch. It is the result of the community’s work over the past six months, including: function multiversioning in Clang with the ‘target’ attribute for ELF-based x86/x86_64 targets, improved PCH support in clang-cl, preliminary DWARF v5 support, basic support for OpenMP 4.5 offloading to NVPTX, OpenCL C++ support, MSan, X-Ray and libFuzzer support for FreeBSD, early UBSan, X-Ray and libFuzzer support for OpenBSD, UBSan checks for implicit conversions, many long-tail compatibility issues fixed in lld which is now production ready for ELF, COFF and MinGW, new tools llvm-exegesis, llvm-mca and diagtool. And as usual, many optimizations, improved diagnostics, and bug fixes.

    • LLVM 7.0 Released: Better CPU Support, AMDGPU Vega 20; Clang 7.0 Gets FMV & OpenCL C++

      As anticipated, LLVM release manager Hans Wennborg announced the official availability today of LLVM 7.0 compiler stack as well as associated sub-projects including the Clang 7.0 C/C++ compiler front-end, Compiler-RT, libc++, libunwind, LLDB, and others.

      There is a lot of LLVM improvements ranging from CPU improvements for many different architectures, Vega 20 support among many other AMDGPU back-end improvements, the new machine code analyzer utility, and more. The notable Clang C/C++ compiler has picked up support for function multi-versioning (FMV), initial OpenCL C++ support, and many other additions. See my LLVM 7.0 / Clang 7.0 feature overview for more details on the changes with this six-month open-source compiler stack update.

  • FSF/FSFE/GNU/SFLC

    • What’s happening this International Day Against DRM?

      We couldn’t be more excited about what’s happening today on the Web and around the world. Organizations, nonprofits, and companies have stepped up to take action, sharing their work to make the world DRM-free.

    • Digital Handcuffs

      This report examines issues arising from Digital Rights Management (DRM) technologies and the legislation protecting these technologies. The report looks at how the use of DRM can impact on users’ security, privacy and right of access, while also exploring how DRM stifles innovation and competition. Furthermore, the report looks into the phenomena of obsolescence and vendor lock-in facilitated by DRM.

    • Hill-Climbing Our Way to Defeating DRM

      Computer science has long grappled with the problem of unknowable terrain: how do you route a packet from A to E when B, C, and D are nodes that keep coming up and going down as they get flooded by traffic from other sources? How do you shard a database when uncontrollable third parties are shoving records into it all the time? What’s the best way to sort some data when spammers are always coming up with new tactics for re-sorting it in ways that suit them, but not you or your users?

      One way to address the problem is the very useful notion of “hill-climbing.” Hill-climbing is modeled on a metaphor of a many-legged insect, like an ant. The ant has forward-facing eyes and can’t look up to scout the terrain and spot the high ground, but it can still ascend towards a peak by checking to see which foot is highest and taking a step in that direction. Once it’s situated in that new place, it can repeat the process, climbing stepwise toward the highest peak that is available to it (of course, that might not be the highest peak on the terrain, so sometimes we ask our metaphorical ant to descend and try a different direction, to see if it gets somewhere higher).

    • No Netflix on my Smart TV

      When I went to the Conrad store in Altona, I saw that new Sony Smart TVs come with a Netflix button on the remote.
      Since I oppose DRM, I would never buy such a thing. I would only buy a Smart TV that Respects My Freedom, but such a thing does not exist.

    • W3C sells out the Web with EME – 1 year later

      Digital Restrictions Management exists all over the world in all sorts of technologies. In addition to media files, like music and film, we can find DRM on the Web and enshrined in Web standards. As a Web standard, its use is recommended by the World Wide Web Consortium (W3C), making it not only easier, but expected for all media files on the Web to be locked down with DRM.

      It’s been a year since the the W3C voted to bring Encrypted Media Extensions (EME) into Web standards. They claimed to want to “lead the Web to its full potential,” but in a secret vote, members of the W3C, with the blessing of Web creator Tim Berners-Lee, agreed to put “the copyright industry in control” of media access. The enshrinement of EME as an official recommendation is not how we envision the “full potential” of the Web at the Free Software Foundation (FSF).

      EME is an approach to DRM specifically for the Web. EME encrypts media files, requiring a license/key exchange managed by (almost always) proprietary software controlled by rights holders. While EME proponents claimed they were doing away with proprietary plugins like Adobe Flash, all they did was drive the proprietary software down even deeper. Instead of plugins, users now have to install proprietary Content Decryption Modules specific to various companies — including Adobe.

    • What is the relationship between FSF and FSFE?

      Ever since I started blogging about my role in FSFE as Fellowship representative, I’ve been receiving communications and queries from various people, both in public and in private, about the relationship between FSF and FSFE. I’ve written this post to try and document my own experiences of the issue, maybe some people will find this helpful. These comments have also been shared on the LibrePlanet mailing list for discussion (subscribe here)

      Being the elected Fellowship representative means I am both a member of FSFE e.V. and also possess a mandate to look out for the interests of the community of volunteers and donors (they are not members of FSFE e.V). In both capacities, I feel uncomfortable about the current situation due to the confusion it creates in the community and the risk that volunteers or donors may be confused.

      The FSF has a well known name associated with a distinctive philosophy. Whether people agree with that philosophy or not, they usually know what FSF believes in. That is the power of a brand.

      When people see the name FSFE, they often believe it is a subsidiary or group working within the FSF. The way that brands work, people associate the philosophy with the name, just as somebody buying a Ferrari in Berlin expects it to do the same things that a Ferrari does in Boston.

      To give an example, when I refer to “our president” in any conversation, people not knowledgeable about the politics believe I am referring to RMS. More specifically, if I say to somebody “would you like me to see if our president can speak at your event?”, some people think it is a reference to RMS. In fact, FSFE was set up as a completely independent organization with distinct membership and management and therefore a different president. When I try to explain this to people, they sometimes lose interest and the conversation can go cold very quickly.

  • Licensing/Legal

  • Openness/Sharing/Collaboration

    • Open Hardware/Modding

      • Epic Clock Clocks The Unix Epoch

        Admit it: when you first heard of the concept of the Unix Epoch, you sat down with a calculator to see when exactly 2³¹-1 seconds would be from midnight UTC on January 1, 1970. Personally, I did that math right around the time my company hired contractors to put “Y2K Suspect” stickers on every piece of equipment that looked like it might have a computer in it, so the fact that the big day would come sometime in 2038 was both comforting and terrifying.

        [Forklift] is similarly entranced by the idea of the Unix Epoch and built a clock to display it, at least for the next 20 years or so. Accommodating the eventual maximum value of 2,147,483,647, plus the more practical ISO-8601 format, required a few more digits than the usual clock – sixteen to be exact. The blue seven-segment displays make an impression in the sleek wooden case, about which there is sadly no detail in the build log. But the internals are well documented, and include a GPS module and an RTC. The clock parses the NMEA time string from the satellites and syncs the RTC. There’s a brief video below of the clock in action.

  • Programming/Development

    • 3 top Python libraries for data science

      Python’s many attractions—such as efficiency, code readability, and speed—have made it the go-to programming language for data science enthusiasts. Python is usually the preferred choice for data scientists and machine learning experts who want to escalate the functionalities of their applications. (For example, Andrey Bulezyuk used the Python programming language to create an amazing machine learning application.)

      Because of its extensive usage, Python has a huge number of libraries that make it easier for data scientists to complete complicated tasks without many coding hassles. Here are the top 3 Python libraries for data science; check them out if you want to kickstart your career in the field.

    • This Week in Rust 252

      Hello and welcome to another issue of This Week in Rust! Rust is a systems language pursuing the trifecta: safety, concurrency, and speed. This is a weekly summary of its progress and community. Want something mentioned?

  • Standards/Consortia

    • PortableCL 1.2 Still Coming While POCL 1.3 Will Further Improve Open-Source OpenCL

      It’s been a number of months since last having any major news to report on POCL, the “PortableCL” project providing a portable OpenCL/compute implementation that can run on CPUs, select GPUs, and other accelerators.

      POCL 1.1 from March remains the current stable release while POCL 1.2 has been in the release candidate stage. The POCL 1.2 release candidates began last month with a few highlights like LLVM 7.0 support, device-side printf support, and HWLOC 2.0 library support.

Leftovers

  • Hardware

    • Ampere eMAG for Hyperscale Cloud Computing Now Available, LLVM 7.0.0 Released, AsparaDB RDS for MariaDB TX Announced, New Xbash Malware Discovered and Kong 1.0 Launched

      Ampere, in partnership with Lenovo, announced availability of the Ampere eMAG for hyperscale cloud computing. The first-generation Armv8-A 64-bit processors provide “high-performance compute, high memory capacity, and rich I/O to address cloud workloads including big data, web tier and in-memory databases”. Pricing is 32 cores at up to 3.3GHz Turbo for $850 or 16 cores at up to 3.3GHz Turbo for $550.

    • Ampere eMAG Processors Delivering 32 ARMv8-A Cores At Up To 3.3GHz
    • Why the Future of Data Storage is (Still) Magnetic Tape

      It should come as no surprise that recent advances in big-data analytics and artificial intelligence have created strong incentives for enterprises to amass information about every measurable aspect of their businesses. And financial regulations now require organizations to keep records for much longer periods than they had to in the past. So companies and institutions of all stripes are holding onto more and more.

      Studies show [PDF] that the amount of data being recorded is increasing at 30 to 40 percent per year. At the same time, the capacity of modern hard drives, which are used to store most of this, is increasing at less than half that rate. Fortunately, much of this information doesn’t need to be accessed instantly. And for such things, magnetic tape is the perfect solution.

  • Health/Nutrition

    • How We Compared Clinical Trial and Cancer Incidence Data

      An in-depth look at newly approved cancer drugs, who participates in their clinical trials and who is affected by those cancers.

      [...]

      In 2012, as part of the FDA Safety and Innovation Act, Congress asked the FDA to report clinical trial participation by demographic subgroup. In 2013, the agency found minorities were often underrepresented, noting that, for many of the drugs under consideration, “there were too few African American or Black patients in the trials to enable meaningful subset analysis.”

      For every new drug approved starting in 2015, the FDA published a “Drug Trials Snapshot,” which includes the demographic breakdown for the clinical trial participants by sex, race, and age subgroups. ProPublica has compiled this data for all FDA-approved drugs from January 2015 to mid-August 2018 into a single dataset. Download this dataset at ProPublica’s Data Store.

      Snapshots included clinical trials run in the United States and internationally, but did not begin until 2017 to report what percentage of trials were conducted in the U.S. Though Asians appear to be well-represented in most trials, many of these trials were likely based outside of the United States. Analysis of 2017 data shows that, for drugs with at least 70 percent of trials conducted within the U.S., Asians make up only 1.7 percent of participants. Furthermore, the “Asian” category does not say if participants are of East Asian, South Asian, Southeast Asian, or Pacific Islander descent.

      Reports did not include a Hispanic ethnicity category until 2017, and do not distinguish between white and non-white Hispanics, or between Hispanics of European or Latin American descent.

    • A Cancer Patient’s Guide to Clinical Trials

      Clinical trials are a crucial step in getting new treatments to market. Before a drug can be approved by the U.S. Food and Drug Administration and released widely, manufacturers are required to carry out studies in humans to document that it is effective and to discover any side effects.

      Fewer than 5 percent of adult cancer patients enroll in clinical trials. ProPublica has found that the vast majority of participants in these studies are white, even when minorities have a similar or higher risk of getting the cancer that the drug treats.

      Most trials are run at academic medical centers and conducted by researchers there. Patients outside those centers often aren’t aware that clinical trials are an option, or they may wonder what joining a study entails. For patients who might consider a clinical trial, here are answers to some common questions.

    • Denied ‘life-extending opportunities’: Black patients are being left out of clinical trials amid wave of new cancer therapies

      It’s a promising new drug for multiple myeloma, one of the most savage blood cancers. Called Ninlaro, it can be taken as a pill, sparing patients painful injections or cumbersome IV treatments. In a video sponsored by the manufacturer, Takeda Pharmaceutical Co., one patient even hailed Ninlaro as “my savior.”

      The Food and Drug Administration approved it in 2015 after patients in a clinical trial gained an average of six months without their cancer spreading. That trial, though, had a major shortcoming: its racial composition. One out of five people diagnosed with multiple myeloma in the U.S. is black, and African-Americans are more than twice as likely as white Americans to be diagnosed with the cancer.

      Yet of the 722 participants in the trial, only 13 — or 1.8 percent — were black.

      The scarcity of black patients in Ninlaro’s testing left unanswered the vital question of whether the drug would work equally well for them. “Meaningful differences may exist” in how multiple myeloma affects black patients, what symptoms they experience, and how they respond to medications, FDA scientists wrote in a 2017 journal article.

  • Security

    • Linux and Open Source FAQs: Common Myths and Misconceptions Addressed

      LinuxSecurity debunks some common myths and misconceptions regarding open source and Linux by answering a few Linux-related frequently asked questions.

      Open source and Linux are becoming increasingly well-known and well-respected because of the myriad benefits they offer. Seventy-eight percent of businesses of all sizes across all industries are now choosing open source software over alternative proprietary solutions according to ZDNet (https://zd.net/2GCrTrk). Facebook, Twitter and Google are are among the many companies currently using, sponsoring and contributing to open source projects. Although Linux and open source are widely recognized for the advantages they provide, there are still many myths and misconceptions that surround these terms. Here are some answers to frequently asked questions about Linux and open source:

      Question: What are the advantages of the open source development model? How can using and contributing to open source software benefit my business?

      Answer: Open source offers an array of inherent advantages which include increased security, superior product quality, lower costs and greater freedom and flexibility compared to other models. It also is accompanied by strong community values and high standards, which encourage the highest levels of creativity and innovation in engineering.

    • Security updates for Tuesday
    • Reproducible Builds: Weekly report #177
    • Microsoft: Like the Borg, we want to absorb all the world’s biz computers [Ed: Microsoft wants to spy on and control every single thing. It (kick)started PRISM, so it was never serious about real security.]

      The technology allows Redmond to scan and monitor enrolled devices, and push out security patches, operating system upgrades, and software updates to the kit as necessary. It will also use machine-learning code and analytics to, in its own words, “manage the global MMD device population.”

    • Unit 42 Researchers Discover Xbash – Malware Which Destroys Linux and Windows Based Databases [Ed: See below; so basically it targets already-screwed systems...]

      Xbash mainly spreads by targeting any unpatched vulnerabilities and weak password

    • Windows, Linux Servers Beware: New Malware Encrypts Files Even After Ransom Is Paid

      Ransomware skyrocketed from obscurity to infamy in no time flat. Headline-grabbing campaigns like WannaCry, Petya and NotPetya preceded a substantial increase in the number of small attacks using similar techniques to extort unwary internet users. Now, researchers at Palo Alto Networks have revealed new malware that carries on NotPetya’s legacy while combining various types of threats into a single package.

      The researchers, dubbed Unit 42, named this new malware Xbash. It’s said to combines a bot net, ransomware and cryptocurrency mining software in a single worm and targets servers running Linux or Windows. The researchers blame an entity called the Iron Group for Xbash’s creation, which has been linked to other ransomware attacks. The malware is thought to have first seen use in May 2018.

    • Xbash Malware Deletes Databases on Linux, Mines for Coins on Windows
    • CCTV Cameras Are Susceptible To Hacks; Hackers Can Modify Video Footage

      A vulnerability has been discovered in video surveillance camera software that could allow hackers to view, delete or modify video footage.

      A research paper published by Tenable, a security firm, has revealed a vulnerability named Peekaboo in the video surveillance systems of NUUO. By exploiting the software flaw, hackers can acquire the admin privileges and can monitor, tamper and disable the footage.

    • Tenable Research Discovers “Peekaboo” Zero-Day Vulnerability in Global Video Surveillance Software

      Tenable®, Inc., the Cyber Exposure company, today announced that its research team has discovered a zero-day vulnerability which would allow cybercriminals to view and tamper with video surveillance recordings via a remote code execution vulnerability in NUUO software — one of the leading global video surveillance solution providers. The vulnerability, dubbed Peekaboo by Tenable Research, would allow cybercriminals to remotely view video surveillance feeds and tamper with recordings using administrator privileges. For example, they could replace the live feed with a static image of the surveilled area, allowing criminals to enter the premises undetected by the cameras.

    • 5 ways DevSecOps changes security

      There’s been an ongoing kerfuffle over whether we need to expand DevOps to explicitly bring in security. After all, the thinking goes, DevOps has always been something of a shorthand for a broad set of new practices, using new tools (often open source) and built on more collaborative cultures. Why not DevBizOps for better aligning with business needs? Or DevChatOps to emphasize better and faster communications?

      However, as John Willis wrote earlier this year on his coming around to the DevSecOps terminology, “Hopefully, someday we will have a world where we no longer have to use the word DevSecOps and security will be an inherent part of all service delivery discussions. Until that day, and at this point, my general conclusion is that it’s just three new characters. More importantly, the name really differentiates the problem statement in a world where we as an industry are not doing a great job on information security.”

    • Freexian’s report about Debian Long Term Support, August 2018
    • Linux 3.16~4.18.8 Affected By Another Potential Local Privilege Escalation Bug
    • Encryption bill endorsed by govt party room

      Barely one week of parliamentary sitting days after the date for comment ended, the Federal Government’s party room has endorsed the contentious encryption bill and it could be introduced into the House of Representatives as early as Thursday.

    • The IT Security Mistakes that Led to the Equifax Breach

      The Equifax data breach that exposed the sensitive personal information of more than 145 million consumers was one of the worst data breaches of recent years, both for the amount of information exposed and the ease with which hackers moved about the company’s systems.

      The breach was publicly disclosed on Sept. 7, 2017, and details on the breach slowly trickled out for months afterwards. Now a year later, the U.S. Government Accountability Office (GAO) has released a 40-page report outlining what happened. The retrospective look at the breach provides insights into how the breach occurred and what types of controls and technologies might have helped prevent it.

  • Transparency/Investigative Reporting

    • Congressional Research Service Reports Now Officially Publicly Available

      For many, many years we’ve been writing about the ridiculousness of the Congressional Research Service’s reports being kept secret. If you don’t know, CRS is a sort of in-house think tank for Congress, that does, careful, thoughtful, non-partisan research on a variety of topics (sometimes tasked by members of Congress, sometimes of its own volition). The reports are usually quite thorough and free of political nonsense. Since the reports are created by the federal government, they are technically in the public domain, but many in Congress (including many who work at CRS itself) have long resisted requests to make those works public. Instead, we were left with relying on members of Congress themselves to occasionally (and selectively) share reports with the public, rather than giving everyone access to the reports.

      Every year or so, there were efforts made to make all of that research available to the public, and it kept getting rejected. Two years ago, two members of Congress agreed to share all of the reports they had access to with a private site put together by some activists and think tanks, creating EveryCRSReport.com, which was a useful step forward. At the very least, we’ve now had two years to show that, when these reports are made public, the world does not collapse (many people within CRS feared that making the reports public would lead to more political pressure).

  • Environment/Energy/Wildlife/Nature

    • Congress Passes Measure to Protect Board that Monitors Nuclear Safety

      The Energy Department had taken steps to curtail the reach and authority of the Defense Nuclear Facilities Safety Board. New Mexico’s senators are fighting back.

      [...]

      The Energy Department has said the May order is simply intended to clarify roles and responsibilities and to decrease costs, and is a necessary update to a manual relied on to guide the relationship between the department and the safety board since 2001. Officials said these actions were taken as part as President Donald Trump’s 2017 executive order to trim regulations.

      But while the for-profit contractors that run the Energy Department’s nuclear sites were consulted on the changes, the board said they were given no formal input on them. Board members also have said the order would inhibit their ability to do key parts of their job, potentially violating the statute under which the board was created.

      The board said it had no comment on the move by Congress to stall the changes.

      In a joint statement, Heinrich and Udall said the provisions they had added to the appropriations bill demonstrated “that Congress shares the widespread concerns about DOE’s information sharing order,” adding that, in their view, the order should be halted.

      “We will continue to work to make sure that the DNFSB has the resources, support, and independence necessary to carry out the complex and extremely serious work that the board does,” they said.

  • Finance

    • US business groups lay out priorities to ensure their support for NAFTA

      Leaders of three of the nation’s most powerful business groups detailed six priorities they say need to be fulfilled to earn their support for an update of the North American Free Trade Agreement (NAFTA) to get through Congress.

    • Apple repays €14B in “illegal aid” to Ireland, so EU drops court case

      European Commissioner for Competition Margrethe Vestager said Tuesday that the European Commission will finally close its legal investigation into Apple’s failure to pay back taxes to Ireland after the company paid €14 billion.

    • Apple pays over the €14.3bn due to Ireland – but the minister again denies that it’s owed

      APPLE HAS NOW paid the €14.3 billion in back taxes and interest that was due to Ireland following the landmark EU ruling in 2016.

      The EU Commission ruled in 2016 that Ireland gave multinational tech giant Apple illegal state aid worth up to €13 billion over a decade.

      The Department of Finance is appealing the decision because it denies that there was any sweetheart deal in place.

      Despite the appeal, Ireland is obliged to collect the funds and hold them in escrow until the appeal process is concluded.

    • Why Brexit is both exciting and not exciting at all

      Brexit is exciting to a follower of politics: every day it seems there is something new, and one can often swing from thinking there will be a deal or no deal, or even from thinking there will be Brexit or no Brexit.

      Brexit is a news event well suited to social media and rolling news.

      But from a “law and policy” perspective, following the ball rather than the political players, there is less excitement, more a sense of inevitability.

  • AstroTurf/Lobbying/Politics

    • ‘The Rule Is Designed to Deter People From Reporting’

      Headlines can do a lot of work. Take the August 29 New York Times news story, for example, headed “New US Sexual Misconduct Rules Bolster Rights of Accused and Protect Colleges.” Readers are tipped, you might say, that previous to proposed rules by Education Secretary Betsy DeVos, those accused of rape, sexual assault or harassment on college campuses had weak or inadequate rights, and that colleges faced some sort of danger or vulnerability, presumably to being unfairly portrayed as places where such acts occur.

      What’s missing between the prevalent presentation of new rules on sexual assault in schools as a common-sense move towards fairness, and the fact that no sexual assault survivors’ representatives were on the guestlist when Betsy DeVos announced the new rules? Maybe what’s in between is real life?

      We’re joined now by Alyssa Peterson; she’s policy and advocacy coordinator with the group Know Your IX, a survivor- and youth-led project that aims to empower students to end sexual and dating violence in their schools. She joins us now by phone from Connecticut.

    • Donald Trump Is Actively Obstructing Justice

      Nixon faced impeachment for “interfering or endeavoring to interfere with the conduct of investigations.” That is what Trump is now doing.

    • Michael Moore: ‘We may not get to 2020′

      Michael Moore warns that the country might not survive as a democracy by 2020 if Democrats don’t make big gains in the midterm elections.

  • Censorship/Free Speech

    • How Regulating Platforms’ Content Moderation Means Regulating Speech – Even Yours.

      You have a Facebook page, on which you’ve posted some sort of status update. Maybe an update from your vacation. Maybe a political idea. Maybe a picture of your kids. And someone comes along and adds a really awful comment on your post. Maybe they insult you. Maybe they insult your politics. Maybe they insult your kids.

      Would you want to be legally obligated to keep their ugly comments on your post? Of course not. You’d probably be keen to delete them, and why shouldn’t you be able to?

      Meanwhile, what if it was the other way around: what if someone had actually posted a great comment, maybe with travel tips, support for your political views, or compliments on how cute your kids are. Would you ever want to be legally obligated to delete these comments? Of course not. If you like these comments, why shouldn’t you be able to keep sharing them with readers?

    • Some Schools Need a Lesson on Students’ Free Speech Rights

      An alarming number of schools improperly discipline students for their speech — especially students of color.

      School is back in session, and that means school administrators may be back to surveilling students on social media and unjustly disciplining them for what they say on it.

      We’ve seen both of these troubling trends before. And in today’s era of inspiring student activism, they may become all the more prevalent. Moreover, experience shows that discipline for student expression is not always applied evenhandedly, and can be invoked to silence youth of color and other marginalized students.

      Fortunately, the First Amendment protects student speech. While public schools can regulate student speech that substantially disrupts the functioning of the school, as the Supreme Court held in the landmark 1969 case Tinker v. Des Moines, students do not lose their First Amendment rights simply by virtue of walking into school. Nor do they give up their right to speak out outside of school simply by virtue of being a student. To the contrary, outside of school, students enjoy essentially the same rights to protest and speak out as anyone else.

      In the last five years, more than 100 public school districts and universities have hired companies to monitor the social media of their students. At least one district asked a surveillance company for alerts on any post mentioning “protest” or “walkout.” Another surveillance company offered to help public schools monitor “behavioral information” about specific individuals, including keeping tabs on their conversations with others.

  • Privacy/Surveillance

  • Civil Rights/Policing

    • State Legislator Says 11-Year-Old Tased By Cop Deserved It And Her Parents Probably Suck

      This is even worse than the police union’s take on the incident, which referred to the completely expected backlash as “kneejerk.” But, hey, I guess deciding to tase an 11-year-old in the back — one who reportedly was all of 4’11” and 90 pounds — couldn’t possibly be portrayed as a kneejerk reaction by a law enforcement officer. When force isn’t truly needed, we can be sure some cops will deploy it anyway.

      But Rep. John Becker’s take is the hottest take of all. Anyone tased by a cop — even an 11-year-old — is a person who brought that crackling, barbed punishment down on themselves. There’s no reason to question the wisdom or necessity of the Taser deployment. Rather, we should question ourselves. And perhaps society. But mostly ourselves.

      [...]

      “If I were to do the research…” Would this be research beyond the television watching that’s given Becker such keen insight into officer-involved shootings? Who knows? Becker’s certainly not going to do the research. He’s just going to stick by his electro-guns and blame victims of cop violence for being raised badly or otherwise being harmed by the disintegration of the nuclear family unit — the 2.5 children born to married heterosexuals who have managed to weather an escalating divorce rate, porn, video games, movies, television, the internet, social media, Satanism, multiple pagan-based holidays, postal rate hikes, alternate sexual orientations, public school indoctrination, Daylight Savings Time, mandatory vaccinations, HAARP projects (known and unknown), President Obama, Brown v. Board of Education, morning-after pills, weird Twitter, the removal of prayer from schools, the Simpsons, artistic expression in general, and whatever else has reduced the American way of life to a hideous nightmare where punk kids manage to live their whole lives without being deservedly tased by blameless, saintly police officers.

      Becker is an idiot, but let’s pretend the research he didn’t do actually says what he thinks it will say. Even if a majority of kids tased/killed by cops are raised by single and/or inattentive parents, that doesn’t justify force deployments that far exceed the danger presented by the developing situation. This 11-year-old was tased in the back by an officer who was taller, weighed more, and had the ability to summon any number of additional officers if it appeared this preteen was going to, I don’t know, grow a foot, add 100 pounds of weight, and produce an arsenal of weapons before the officer got the mild shoplifting situation under control.

    • ACLU accuses Facebook of allowing employers to exclude women from seeing jobs ads

      “Sex segregated job advertising has historically been used to shut women out of well-paying jobs and economic opportunities,” Galen Sherwin, an attorney with the ACLU Women’s Rights Project, said in a statement. “We can’t let gender-based ad targeting online give new life to a form of discrimination that should have been eradicated long ago.”

    • Facebook Accused Of Allowing Gender Discriminating Job Ads

      A group of female Facebook users has filed a gender discrimination complaint against Facebook and nine other companies for allowing gender biased job ads on the platform.

      The ACLU along with law firm Outten & Golden LLP and the Communications Workers of America have filed a class action suit filed on behalf of three female workers with the US Equal Employment Opportunity Commission.

    • Facebook Is Letting Job Advertisers Target Only Men

      Hundreds of thousands of Americans drive for Uber. And the company is looking for many more. It runs ads on Facebook that say, for example: “Driving toward something? Make extra money when it works for you and get there faster.” Another touts: “Earn $1,100 in Nashville for your first 200 Trips. Limited time guarantee! Terms apply.”

      There’s just one catch: Many of those ads are not visible to women.

      A ProPublica review of Facebook ads found that many purchased by Drive with Uber, the company’s recruiting arm, targeted only men in more than a dozen cities across the U.S. Our survey of 91 Uber ads found just one targeting only women; three did not target a specific sex.

      They were all gathered as a part of our Facebook Political Ad Collector project, in which readers sign up to send us the ads they see in their News Feeds.

      [...]

      Targeting by sex is just one way Facebook and other tech companies let advertisers focus on certain users — and exclude others. Based on rich data provided by users and deduced from their web activity, that powerful targeting is key to Facebook’s massive popularity with advertisers and it accounts for much of its revenue. It lets advertisers spend only on those they want to reach.

    • In Guatemala, a Tireless Search for Parents Separated From Their Children

      Working with the ACLU, human rights defenders look for missing parents in villages and remote regions of the country.

      When Lesly Tayes, a Guatemala City-based tax lawyer, first saw images of children locked in cages inside immigration detention facilities near the southern U.S. border, she was stunned. “It made me very upset and sad,” she said. “Later I learned that Guatemala had the highest number of separated families and I felt even worse. I wanted to help.” Within weeks, she’d have her chance.

      Earlier this summer, the ACLU sued the Trump administration over its policy of separating parents from their children if they crossed the border between points of entry. A federal court issued a preliminary injunction in late June against this policy, ordering that the separated families be reunified within 30 days. But it quickly became clear that the administration didn’t have a plan to meet that deadline, particularly for the more than 400 cases in which the parent had already been deported back to their country of origin. In one court filing, lawyers for the Justice Department suggested that the ACLU should take on the responsibility of finding those missing parents.

      Because the government wasn’t willing to carry out the search itself, the ACLU, along with a small group of other organizations, has set out to do just that.

      One of those organizations is Justice in Motion, a Brooklyn-based non-profit founded to provide legal support for migrant workers. Tayes is a member of Justice in Motion’s “defender network,” a loosely affiliated group of lawyers and activists in Guatemala and Honduras formed in 2008 to gather evidence of migrant worker abuses. After the court ruling in June, the ACLU and Justice in Motion asked Tayes and her colleagues to take on the daunting task of tracking down a large number of the missing parents in the two countries.

  • Internet Policy/Net Neutrality

    • Google Fiber’s ‘Failure’ Succeeded In Shining A Light On Pathetic Broadband Competition

      We’ve mentioned several times how Google Fiber’s promise to revolutionize the broadband sector never really materialized. There’s a long list of reasons for that, from incumbent ISPs suing to stop Google’s access to utility poles, to Alphabet executives suddenly getting bored with the high cost and slow pace of deploying fiber and battling entrenched monopolies.

      As it stands, Google Fiber’s expansions are largely on pause as company executives figure out how much money they’re willing to spend, what the wireless future looks like, and whether Alphabet really wants to participate. That said, while Google Fiber’s actual footprint pales in comparison to the hype, the service was a success in that it generated a quality, nationwide conversation about the sorry state of U.S. broadband competition, and spurred some otherwise apathetic incumbent ISPs to actually up their game, as countless cities nationwide decried the terrible state of existing service.

  • Intellectual Monopolies

    • Gilead’s Truvada SPC revoked by English High Court

      The English High Court has ruled that Gilead’s SPC for an antiretroviral product does not comply with Article 3(a)

      Gilead’s supplementary protection (SPC) certificate for antiretroviral product Truvada has been revoked by the English High Court today.

    • Analysis: Move To Contain Global Challenge By Ascending China At Play In Escalating Trade War Between Washington And Beijing

      In the last three decades, political leaders in both Beijing and Washington have periodically miscalculated over the trade portfolio but eventually, tensions were ironed-out and two-way trade flows advanced. Many nervous executives and political leaders around the world hope that cooler heads prevail, again.

      When the Chinese leadership cracked down demonstrators on Tiananmen Square in June 1989, Washington put Beijing’s bid to re-join the General Agreement on Tariffs and Trade (GATT) – succeeded by the World Trade Organization (WTO) in 1995 – on ice until early 1991 before they picked up again.

      Similarly, when the administration of President Bill Clinton in May 1994 de-linked the renewal of China’s Most-Favoured-Nation (MFN) status from its human rights record Beijing misread the move and tried to bluff its way into joining the WTO by putting an end of 1994 ultimatum. However, China’s chief trade negotiator, Long Yongtu, was sent back to his capital empty-handed. But during the heated exchanges in Geneva, top western diplomats recall, he put them on notice that when China one day became number one in world trade it would write the rules “in this house.”

    • Trademarks

      • BMW Opposes Marvel’s Trademark of Ghost-Spider

        Ghost-Spider is the new name for Spider-Gwen, the parallel dimension version of Gwen Stacy who, in that world, goes by the name of Spider-Woman. Lots of names for one person. The latest may raise the eyebrows of a certain car manufacturer. But why?

      • For Some Reason, BMW Is Asking For More Time To Oppose The Latest Gwen Stacey Character Trademark

        If you feel like you’re about to get a silly trademark story, your spidey-sense is working. We’ll keep this short and sweet, but this whole thing centers around Gwen Stacy, otherwise known as Spider-Woman. But because this is Marvel we’re talking about, there is also something of an alternate universe version of Gwen Stacy, in which she went by the name Spider-Gwen, but has more recently had that character rebooted as Ghost-Spider.

        [...]

        Two different brands under two different makes of car does not customer confusion make. If that really is the story here, it would be much better if the folks at BMW didn’t waste everyone’s time, because that’s the kind of opposition that will get tossed immediately.

        Meanwhile, maybe the folks at Marvel can dream up a few more alternate realities, including one where trademark law wasn’t so completely busted.

    • Copyrights

      • Compromise Music Modernization Act Will Bring Old Sound Recordings into The Public Domain, Tiptoe Towards Orphan Works Solution

        Earlier this year we wrote about the significant concerns we had with the CLASSICS Act, that sought to create a brand new performance right for pre-1972 sound recordings, requiring various internet platforms to pay for that additional right to stream such music. As we’ve discussed for years, pre-1972 sound recordings are kind of a mess in the copyright world. That’s because they weren’t covered by federal copyright law — but rather a mess of state laws (some statutes, some common law). Historically, none of that included a performance right, but some courts have recently interpreted one to exist (while others have said it doesn’t). On top of that, some of those state laws mean that certain works will remain covered by copyright for many decades after they would have gone into the public domain under federal copyright law.

        Many people have advocated for “full federalization” of those pre-1972 works, taking them away from those state copyright laws, and putting them on an even playing field with all other copyright-covered works. There is an argument against this, which is that doing so also creates brand new rights for works that are decades old, which clearly goes against the purpose and intent of copyright law (incentivizing the creation of new works for the public), but given what a mess having two (very different) systems entailed, it seemed like full federalization was the most sensible way forward.

      • Evolving concepts of work and sustainability of copyright: the curious case of curated fireworks displays
      • Music Group Celebrates Millions of ‘Pointless’ Piracy Takedown Notices

        The Association of Independent Music has teamed up with anti-piracy outfit MUSO to help its members remove infringing links from the Internet. The early results are promising, with five million takedown requests in a few months. However, on close inspection, it appears that they’re all excited about nothing.

        [...]

        Not only are most of the reported links missing from Google’s search results, they don’t always link to anything infringing on the pirate sites either.

09.18.18

Links 18/9/2018: Qt 5.12 Alpha , MAAS 2.5.0 Beta, PostgreSQL CoC

Posted in News Roundup at 1:33 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • NYU applies open source Google AI to diagnose lung cancer

    If recent research is any indication, artificial intelligence (AI) has a bright future in medicine. Nvidia developed an AI system that can generate synthetic scans of brain cancer. Google subsidiary DeepMind has demonstrated a machine learning algorithm that can recommend treatment for more than 50 eye diseases with 94 percent accuracy. And in newly published research, New York University (NYU) showed how AI might aid in lung cancer diagnosis.

    A paper today published in the journal Nature Medicine (“Classification and mutation prediction from non-small cell lung cancer histopathology images using deep learning”) describes how a team of NYU researchers retrained Google’s Inception v3, an open source convolutional neural network architected for object identification, to detect certain forms of lung cancers with 97 percent accuracy.

  • Google AI Tool Identifies a Tumor’s Mutations From an Image
  • Announcing Heritage: An Open Source, Public Blockchain Project

    Heritage is a project of A​3​ by Airbus, the advanced projects outpost of Airbus in Silicon Valley. Airbus Foundation is the first strategic partner within Airbus to utilize blockchain technology developed by Heritage.

    Heritage is a decentralized application for the Airbus Foundation to hold charity fundraising campaigns internal to Airbus. Through open sourcing Heritage, Airbus Foundation will help charities onboard cryptocurrency and smart contracts, opening them to a new class of donor. Heritage hopes to set a standard non-profits can replicate to continue to grow the ecosystem while aiding an underserved market.

  • Versity announces next generation open source archiving filesystem

    Versity Software has announced that it has released ScoutFS under GPLv2. “ScoutFS is the first GPL archiving file system ever released, creating an inherently safer and more user friendly option for storing archival data where accessibility over very large time scales, and the removal of vendor specific risk is a key consideration.”

  • Web Browsers

    • Chrome

    • Mozilla

      • Fedora Firefox – GCC/CLANG dilemma

        After reading Mike’s blog post about official Mozilla Firefox switch to LLVM Clang, I was wondering if we should also use that setup for official Fedora Firefox binaries.

        The numbers look strong but as Honza Hubicka mentioned, Mozilla uses pretty ancient GCC6 to create binaries and it’s not very fair to compare it with up-to date LLVM Clang 6.

        Also if I’m reading the mozilla bug correctly the PGO/LTO is not yet enabled for Linux, only plain optimized builds are used for now…which means the transition at Mozilla is not so far than I expected.

      • September 2018 CA Communication

        Mozilla has sent a CA Communication to inform Certification Authorities (CAs) who have root certificates included in Mozilla’s program about current events relevant to their membership in our program and to remind them of upcoming deadlines. This CA Communication has been emailed to the Primary Point of Contact (POC) and an email alias for each CA in Mozilla’s program, and they have been asked to respond to the following 7 action items:

      • Emily Dunham: CFP tricks 1

        Some strategies I’ve recommended in the past for dealing with this include looking at the conference’s marketing materials to imagine who they would interest, and examining the abstracts of past years’ talks.

      • Thunderbird 60 with title bar hidden

        Many users like hidden system titlebar as Firefox feature although it’s not finished yet. But we’re very close and I hope to have Firefox 64 in shape that the title bar can be disabled by default at least on Gnome and matches Firefox outfit at Windows and Mac.

        Thunderbird 60 was finally released for Fedora and comes with a basic version of the feature as it was introduced at Firefox 60 ESR. There’s a simple checkbox at “Customize” page at Firefox but Thunderbird is missing an easy switch.

  • Databases

  • Pseudo-Open Source (Openwashing)

  • Funding

  • BSD

    • OpenBSD/NetBSD on FreeBSD using grub2-bhyve

      When I was writing a blog post about the process title, I needed a couple of virtual machines with OpenBSD, NetBSD, and Ubuntu. Before that day I mainly used FreeBSD and Windows with bhyve. I spent some time trying to set up an OpenBSD using bhyve and UEFI as described here. I had numerous problems trying to use it, and this was the day I discovered the grub2-bhyve tool, and I love it!

      The grub2-bhyve allows you to load a kernel using GRUB bootloader. GRUB supports most of the operating systems with a standard configuration, so exactly the same method can be used to install NetBSD or Ubuntu. [...]

    • OpenZFS Developer Summit 2018

      The sixth annual OpenZFS Developer Summit took place September 10th and 11th in San Francisco, California with an expanded focus on non-technical topics like community development and cross-project coordination. It also marked the “light at the end of the tunnel” status of several long-term OpenZFS features, notably dRAID, the distributed spare technology originally developed by Intel. [...]

  • FSF/FSFE/GNU/SFLC

    • Washington State Electronic Notary Public endorsements

      [...] This all seemed to me to be something that GnuPG is designed to do and does
      quite well. So I sent an email on Friday night to the sender of the letter
      requesting specific issues that my provider did not comply with. This
      morning I received a call from the DoL, and was able to successfully argue
      for GnuPG’s qualification as an electronic records notary public technology
      provider for the State of Washington.

      In short, GnuPG can now be used to perform notarial acts
      <http://app.leg.wa.gov/RCW/default.aspx?cite=42.45.140> in the State of
      Washington!

  • Openness/Sharing/Collaboration

    • Hindawi Limited Launches Open-Source Peer Review System Built on the PubSweet Framework

      Hindawi Limited is pleased to announce the launch of a new peer review platform built using the Collaborative Knowledge Foundation’s (Coko) open source PubSweet framework.

      This is the first complete open-source peer review system to come out of the Coko community, a group of like-minded organizations, including eLife, the European Bioinformatics Institute, and the University of California Press, keen on working collaboratively towards the advancement of openness in scholarly communications software.

    • Open Access/Content

      • Surprise: Bill Introduced To Finally Make PACER Free To All

        This would be… amazing. We’ve spent years highlighting the massive problems with PACER, the federal court system that charges insane amounts for basically everything you do, just to access public records, and which functions very much like it was designed around 1995. There are a few court cases arguing that PACER fees are illegal and a recent ruling in one of those cases agreed. As we noted at the time, that was hardly the final word on the matter. A bill like the ones Collins introduced would be an amazing leap forward in giving public access to court documents.

      • Collins introduces bill to increase transparency and access to federal court documents

        Rep. Doug Collins (R-Ga.) today introduced a bill to reform both parts of the federal courts’ electronic records system.

        “Americans deserve a justice system that is transparent and accessible. I introduced the Electronic Court Records Reform Act to modernize the judicial records systems and remove fee-for-access barriers that technology has rendered unnecessary,” said Collins.

        “As an attorney and the son of a law enforcement officer, I understand how crucial it is that this legislation ensures access to a freer, fairer and more accountable judiciary.”

    • Open Hardware/Modding

      • Learn To Code Games With The DevBoy Modular Open Source System

        Developer Nicolai Shlapunov has created a new modular open source system specifically created for learning how to program and develop games. The DevBoy has this week launched via Kickstarter with the aim of raising $100,000 over the next 30 days to make the jump into production. Watch the demonstration video below to learn more about the modular hardware kit can help you learn to dove games and allows you to configure different gaming systems depending on your needs. “Ever wanted to build your own game console? Robot remote control? May be an oscilloscope? DevBoy is what you need!”

      • RISC-V microconference accepted for Linux Plumbers Conference

        The open nature of the RISC-V ecosystem has allowed contributions from both academia and industry to lead to an unprecedented number of new hardware design proposals in a very short time span. Linux support is the key to enabling these new hardware options.

      • A $1, Linux-Capable, Hand-Solderable Processor

        Over on the EEVblog, someone noticed an interesting chip that’s been apparently flying under our radar for a while. This is an ARM processor capable of running Linux. It’s hand-solderable in a TQFP package, has a built-in Mali GPU, support for a touch panel, and has support for 512MB of DDR3. If you do it right, this will get you into the territory of a BeagleBone or a Raspberry Pi Zero, on a board that’s whatever form factor you can imagine. Here’s the best part: you can get this part for $1 USD in large-ish quantities. A cursory glance at the usual online retailers tells me you can get this part in quantity one for under $3. This is interesting, to say the least.

      • Open Source Paramotor Using Quadcopter Tech

        But not always. The OpenPPG project aims to create a low-cost paramotor with electronics and motors intended for heavyweight multicopters. It provides thrust comparable to gas paramotors for 20 to 40 minutes of flight time, all while being cheaper and easier to maintain. The whole project is open source, so if you don’t want to buy one of their kits or assembled versions, you’re free to use and remix the design into a personal aircraft of your own creation.

        It’s still going to cost for a few thousand USD to get a complete paraglider going, but at least you won’t need to pay hangar fees. Thanks to the design which utilizes carbon fiber plates and some clever hinges, the whole thing folds up into a easier to transport and store shape than traditional paramotors with one large propeller. Plus it doesn’t hurt that it looks a lot cooler.

  • Programming/Development

    • TNS Context: The CNCF Open Source Survey and the Ballerina Programming Language

      Today on The New Stack Context podcast, we talk with Chris Aniszczyk, co-founder of the TODO Group and Chief Technology Officer of the Cloud Native Computing Foundation (CNCF) about the results of our recent open source program management survey. We also talk about WS02‘s new cloud native programming language, Ballerina.

      Joining Context host TNS editorial director Libby Clark for this episode is TNS founder Alex Williams and TNS managing editor Joab Jackson.

    • The D Language Front-End Is Trying Now To Get Into GCC 9

      Going on for a while now have been D language front-end patches for GCC to allow this programming language to be supported by the GNU Compiler Collection. It’s been a long battle getting to this state but it looks like it soon might be mainlined.

      Last June was the approval by the GCC Steering Committee to allow D support in GCC. While the committee approved of its addition, the D language front-end didn’t end up getting merged in time for the GCC 8 stable release that took place earlier this year.

Leftovers

  • Science

    • Being nice to your employees pays off: Research

      Researchers surveyed nearly 1,000 members of the Taiwanese military and almost 200 adults working full-time in the US, and looked at the subordinate performance that resulted from three different leadership styles.

      They found that authoritarianism-dominant leaders — who assert absolute authority and control, focused mostly on completing tasks at all costs with little consideration of the well-being of subordinates — almost always had negative results on job performance.

      On the other hand, benevolence-dominant leadership — where primary concern is the personal or familial well-being of subordinates — almost always had a positive impact on job performance.

  • Health/Nutrition

    • What The U.S. Could Do If So Much Money Wasn’t Wasted On Health Care

      The United States spends 7.2 percent points more of our gross domestic product (GDP) on health care than several industrialized countries. That is $1.3 trillion the country effectively wastes on health care without getting better health outcomes.

      This is such a large amount of money it is almost impossible to wrap one’s head around. But it’s important to highlight just what could be done with that much money.

    • Negotiated Deal Stands For UN Tuberculosis Declaration

      The final text of the declaration can be found here [pdf], and the letter from the President of the UN General Assembly marking the end of the “silence period,” during which member states have an opportunity to break consensus, can be found here [pdf].

      “In accordance with paragraph 6 of General Assembly resolution 72/268, the political declaration shall be approved by the high-level meeting on the fight against tuberculosis on 26 September 2018 and subsequently adopted by the General Assembly,” the letter states.

      The final version of the text could be stronger on intellectual property flexibilities that promote access to medicines, but it is important that a deal has been reached, and there is room for improvement, according to civil society groups.

  • Security

    • Quantum Computing and Cryptography

      Quantum computing is a new way of computing — one that could allow humankind to perform computations that are simply impossible using today’s computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would break the RSA cryptosystem for any key length.

      This is why cryptographers are hard at work designing and analyzing “quantum-resistant” public-key algorithms. Currently, quantum computing is too nascent for cryptographers to be sure of what is secure and what isn’t. But even assuming aliens have developed the technology to its full potential, quantum computing doesn’t spell the end of the world for cryptography. Symmetric cryptography is easy to make quantum-resistant, and we’re working on quantum-resistant public-key algorithms. If public-key cryptography ends up being a temporary anomaly based on our mathematical knowledge and computational ability, we’ll still survive. And if some inconceivable alien technology can break all of cryptography, we still can have secrecy based on information theory — albeit with significant loss of capability.

      At its core, cryptography relies on the mathematical quirk that some things are easier to do than to undo. Just as it’s easier to smash a plate than to glue all the pieces back together, it’s much easier to multiply two prime numbers together to obtain one large number than it is to factor that large number back into two prime numbers. Asymmetries of this kind — one-way functions and trap-door one-way functions — underlie all of cryptography.

    • This New CSS Attack Restarts iPhones & Freezes Macs
    • Time to Rebuild Alpine Linux Docker Containers After Package Manager Patch
    • GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg
    • Software Patch Claimed To Allow Aadhaar’s Security To Be Bypassed, Calling Into Question Biometric Database’s Integrity

      As the Huffington Post article explains, creating a patch that is able to circumvent the main security features in this way was possible thanks to design choices made early on in the project. The unprecedented scale of the Aadhaar enrollment process — so far around 1.2 billion people have been given an Aadhaar number and added to the database — meant that a large number of private agencies and village-level computer kiosks were used for registration. Since connectivity was often poor, the main software was installed on local computers, rather than being run in the cloud. The patch can be used by anyone with local access to the computer system, and simply involves replacing a folder of Java libraries with versions lacking the security checks.

      The Unique Identification Authority of India (UIDAI), the government body responsible for the Aadhaar project, has responded to the Huffington Post article, but in a rather odd way: as a Donald Trump-like stream of tweets. The Huffington Post points out: “[the UIDAI] has simply stated that its systems are completely secure without any supporting evidence.”

    • New CAS BACnet Wireshark Report Tool Helps User to Quickly Locate Intermittent Issues
    • Hackers For Good, Working To Gather Stakeholders To Find Answers To Cyberspace Challenges

      For a number of people, the word hacker means bad news. However, if some hackers have malevolent intentions, there are also hackers for good, and their skills were put to the challenge last week as they tried to save a fictitious city fallen into the hands of a group of cyber terrorists. The challenge was part of a two-day event organised by a young Geneva-based non-governmental organisation seeking to raise awareness about digital trust and bring accountability to cyberspace.

  • Transparency/Investigative Reporting

  • Environment/Energy/Wildlife/Nature

  • Finance

    • I worked in an Amazon warehouse. Bernie Sanders is right to target them

      Sanders has also been highlighting some of the 19th-century working practices used by Amazon to control and discipline its workforce inside of its fulfilment centres. Sanders’ bill – the Stop Bad Employers by Zeroing Out Subsidies Act, or the ‘Stop Bezos Act’ – would tax employers like Amazon when their employees require federal benefits.

      [...]

      Yet what I found while working for Amazon shocked me. I had done warehouse work previously when I was younger, along with a range of other poorly paid, manual jobs. In other words, my shock at the way workers were treated by Amazon was not a product of some wet-behind-the-ears naivety: I fully expected warehouse work to be tough. Yet what I witnessed at Amazon went far beyond that. This was a workplace environment in which decency, respect and dignity were absent.

  • AstroTurf/Lobbying/Politics

    • US power couple purchase Time Magazine for $190 million

      Time Magazine is being sold by Meredith Corp to Marc Benioff, a co-founder of Salesforce, and his wife.

      The Wall Street Journal reported that the iconic news magazine is being sold for USD 190 million to Benioff, one of four co-founders of Salesforce, a cloud computing pioneer.

    • Morning Edition’s Think Tank Sources Lean to the Right

      When it comes to seeking “expert” opinions on events for its reports, NPR often looks to a trusted roster of think-tank sources. In a study of NPR’s Morning Edition from February to July 2018, FAIR found that sources from left-of-center think tanks were underrepresented, with right-leaning think tank sources appearing almost twice as often.

      Out of 129 episodes aired Monday through Friday over the course of six months, researchers and fellows representing think tanks were quoted 144 times. Centrist think tanks were most commonly heard on Morning Edition, with 63 interview (44 percent of citations). Fifty-one (35 percent) of the show’s interviews were with conservative or center-right groups, while 28 (19 percent) involved progressive or center-left groups.

      Representatives from two think tanks—the pro-seafood Lobster Institute and the Rich Earth Institute, which promotes turning urine into fertilizer—could not be placed on the political spectrum.

    • The Election DataBot: Now Even Easier

      We launched the Election DataBot in 2016 with the idea that it would help reporters, researchers and concerned citizens more easily find and tell some of the thousand stories in every political campaign. Now we’re making it even easier.

      Just as before, the DataBot is a continuously updating feed of campaign data, including campaign finance filings, changes in race ratings and deleted tweets. You can watch the data come in in real time or sign up to be notified by email when there’s new data about races you care about.

      DataBot’s new homepage dashboard of campaign activity now includes easy-to-understand summaries so that users can quickly see where races are heating up. We’ve added a nationwide map that shows you where a variety of campaign activity is occurring every week.

      For example, the map shows that both leading candidates in Iowa’s 1st District saw spikes in Google searches in the week ending on Sept. 16 (we track data from Monday to Sunday). The Cook Political Report, which rates House and Senate races, changed its rating of that race from “Tossup” to “Lean Democratic” on Sept. 6.

  • Censorship/Free Speech

    • Google’s Chinese Search Engine Will Censor Results, Provide Gov’t-Approved Pollution Data

      Google’s Chinese search engine also contains a blacklist of terms like “human rights,” “student protest,” and “Nobel Prize,” showing the government has a deep interest in using the custom-built search engine to deter and punish dissent. None of this is surprising, other than Google’s willingness to participate in government censorship. Google does pretty much the same thing with Android phones here in the US, where everything in the ecosystem is tied to the originating phone. There are ways to prevent that, but most phone users won’t take those steps. In China, however, the phones are also registered with the government, removing the third-party hop needed to tie internet activity to a person.

      Even Google’s seeming embrace of censorship and dissent deterrence may not be as surprising as it should be, as any number of social media platforms have made considerable concessions to authoritarian governments in recent years, rather than face losing market share in these countries.

      [...]

      Companies make bad decisions when faced with doing the right thing or doing the most profitable thing. Google premised its existence on not being evil. Pulling out of China lived up to that ideal. This does not. Concessions will always be made, but if these leaked documents are accurate, what Google is doing in China is far more than making small compromises to provide Chinese citizens with platforms not entirely controlled by their government. For all intents and purposes, Dragonfly is the government’s toy, built on tech underpinnings and expertise Google has apparently offered willingly.

    • Google’s search engine for China censors results for ‘democracy,’ ‘human rights,’ or ‘free speech’

      Early in August, a report from The Intercept claimed that Google was working to make a China-friendly version of its search engine that would censor results to make the government happy. A number of Google engineers quit the company after learning about this particularly egregious breach of Google’s “don’t be evil” policy, and now yet another report from The Intercept reveals exactly what Google was willing to censor.

      [...]

      More than anything, the report — which is well worth reading in full — shows the extent that even the biggest tech companies will go to in order to capture a share in a major emerging market. It’s easy to argue that if Google doesn’t acquiesce, a local firm will just do so anyway, but clearly Google’s own employees think it’s worth keeping the moral high ground.

  • Privacy/Surveillance

    • Revealed: The Justice Dept’s secret rules for targeting journalists with FISA court orders

      Today, we are revealing—for the first time—the Justice Department’s rules for targeting journalists with secret FISA court orders. The documents were obtained as part of a Freedom of Information Act lawsuit brought by Freedom of the Press Foundation and Knight First Amendment Institute at Columbia University.

      While civil liberties advocates have long suspected secret FISA court orders may be used (and abused) to conduct surveillance on journalists, the government—to our knowledge—has never acknowledged they have ever even contemplated doing so before the release of these documents today.

      The FISA court rules below are entirely separate from—and much less stringent—than the rules for obtaining subpoenas, court orders, and warrants against journalists as laid out in the Justice Department’s “media guidelines,” which former Attorney General Eric Holder strengthened in 2015 after several scandals involving surveillance of journalists during the Obama era.

      When using the legal authorities named in the “media guidelines,” the Justice Department (DOJ) must go through a fairly stringent multi-part test (e.g. certifying that the information is critical to an investigation, that it can’t be obtained by other means, and that the DOJ exhausted all other avenues before doing so) before targeting a journalist with surveillance. They must also get approval from the Attorney General.

    • Federal Court Says NSA PRISM Surveillance Good And Legal Because The Gov’t Said It Was Good And Legal

      Three years after its inception, a prosecution involving possibly unlawful FISA-authorized surveillance, hints of parallel construction, and a very rare DOJ notification of Section 702 evidence has reached a (temporary) dead end. The defendants challenged the evidence on multiple grounds — many of which weren’t possible before the Snowden leaks exposed the breadth and depth of the NSA’s domestic surveillance.

      The federal judge presiding over the case — which involved material support for terrorism charges — has declared there’s nothing wrong with anything the NSA or FISA Court did, so long as the surveillance was authorized and possibly had something to do with national security. (via FourthAmendment.com)

      First, the defendants — all accused of providing material support to Al Qaeda (remember them?) — asserted the constitutionality of the NSA’s upstream collections should be revisited in light of the Snowden leaks. The court [PDF] says these more-recent exposures are no reason to upset the precedential apple cart.

    • Congress Is Poised to Give Trump Administration Powerful New Spying Powers

      Congress is once again using “national security” as magic words to increase the government’s surveillance powers in dangerous and unaccountable ways.

      The Trump administration wants more spying power — and Congress appears poised to give it to them.

      Touting national security to justify spying powers that jeopardize our constitutional rights is a strategy that we have seen before. It happened with the Patriot Act after 9/11, and members of Congress and government officials are now employing similar arguments again. This time it involves a drone bill that some in Congress are pressing to be sneakily inserted into a larger piece of legislation that could be considered this month.

      According to news reports, members of Congress are lobbying to add the Preventing Emerging Threats Act of 2018 to the Federal Aviation Agency Reauthorization Act. Proponents of the bill claim that it will make our country safer. But, in reality, the drone legislation will give new surveillance powers to the Trump administration to spy on journalists, activists, and other Americans without a warrant.

      According to bill sponsors, the bill’s intent is to arm the “Department of Homeland Security and the Justice Department with the ability to act quickly and effectively when a drone poses a risk to large-scale events and government facilities.” This goal may be admirable, but the bill does not achieve it.

      Instead, the bill empowers these agencies to warrantlessly spy on Americans without complying with existing US laws — including the Wiretap Act, Stored Communications Act, and the Computer Fraud and Abuse Act. Generally, these laws require the government to get a warrant if they want to wiretap or access other types of stored communications.

      The drone bill, however, exempts DHS and DOJ from these restrictions anytime it deems a drone a “threat” to certain covered areas. The bill defined covered areas so broadly — including areas where there may be emergency responses or federal investigations— that it will inevitably sweep in areas where media organizations have a legitimate interest in reporting.

  • Civil Rights/Policing

    • ‘This Is an Unprecedented Level of Secrecy and Non-Transparency’

      Media are certainly reporting the confirmation hearings of Supreme Court nominee Brett Kavanaugh. But there’s a case to be made that stories that just get views from various folks about what it would be like with Kavanaugh on the court, but sidestep serious questions about the process that would put him there, are doing less covering than covering up.

      Media get things wrong all the time, but among the deepest damage they do is invisibilizing possibilities, making it seem that things they don’t consider can’t happen. It’s a sort of implicit passivity that permeates corporate reporting, of which the air of “oh well, what’s next” fatalism wafting off of much coverage of Kavanaugh is just one example.

    • California Law Could be a Big Step Forward for Police Transparency
    • A Full Investigation Is Needed Into the Sexual Assault Allegations Against Brett Kavanaugh

      Both Kavanaugh and his accuser, Christine Blasey Ford, should testify under oath before the Senate Judiciary Committee.

      Over the weekend, details of serious charges of sexual assault alleged to have been committed by Judge Brett Kavanaugh became public, as did the name of the woman raising these allegations. In a letter to Sen. Diane Feinstein and in an interview with The Washington Post, Dr. Christine Blasey Ford described an incident in high school when she says Kavanaugh sexually assaulted her at a party.

      Judge Kavanaugh has denied the allegations. “I have never done anything like what the accuser describes — to her or to anyone,” he said in a statement on Monday.

      These allegations, like all allegations of sexual misconduct, deserve to be taken seriously.

      Initially, Dr. Ford did not want her story to become public. She was afraid that doing so would “upend her life.” This is the reality women face, within a culture that too often vilifies people who come forward. Already, she has reportedly received threatening emails and is the subject of vicious online trolls, cruel tweets, and mocking Instagram posts, including one by Donald Trump Jr. But according to her lawyer, Debra Katz, “She’s willing to do whatever it takes to get her story forth.”

      It is critical that the confirmation hearings be delayed so that a thorough and transparent investigation can be conducted, including a hearing at which both Ford and Kavanaugh have an opportunity to testify under oath. The Senate cannot move forward with this lifetime appointment to the highest court in the land without considering the results of a fair, non-partisan, and complete process. If Judge Kavanaugh is confirmed, he could sit on the Supreme Court for the next 40 years. This confirmation process is the only process he will ever go through. Now is the time for the allegations to be investigated and testimony to be heard.

    • Blood-Spatter Expert in Joe Bryan Case Says “My Conclusions Were Wrong”

      A hearing to determine whether Joe Bryan should be granted a new trial came to a dramatic conclusion on Monday with a surprise, eleventh-hour admission from the expert witness whose testimony had proved critical in convicting the former high school principal of the 1985 murder of his wife, Mickey.

      “My conclusions were wrong,” retired police Detective Robert Thorman wrote in an affidavit introduced by the defense of the bloodstain-pattern analysis he performed. “Some of the techniques and methodology were incorrect. Therefore, some of my testimony was not correct.”

      Bloodstain-pattern analysis is a forensic discipline whose practitioners regard the drops, spatters and trails of blood at a crime scene as clues, which can sometimes be used to reverse-engineer the crime itself. Thorman had only 40 hours of training in the discipline when he was called in to work on the Bryan case. His testimony about a blood-speckled flashlight that Mickey’s brother found in the trunk of Bryan’s car four days after the murder made the state’s tenuous theory of the crime seem plausible.

      At Bryan’s trial in 1986 and then again at his 1989 retrial, Thorman testified that tiny flecks of blood on the flashlight could only be “back spatter” — a pattern that indicated a close-range shooting. What connection the flashlight had to the crime, if any, was never clear; in 1985, a crime lab chemist found that the blood on it was type O, which corresponded not only to Mickey but to nearly half the population. But Thorman effectively tied the flashlight to the crime scene, going so far as to say that the killer had likely held the flashlight in one hand while firing a pistol with the other.

      Bryan had been attending a principals’ convention in Austin, 120 miles from where the murder occurred in Clifton, Texas, in the days surrounding the murder. He has always maintained that he was in Austin, asleep in his hotel room, at the time of the crime.

    • How Facebook Is Giving Sex Discrimination in Employment Ads a New Life

      We’re taking on Facebook and 10 companies for using the social platform to direct job ads toward men, excluding others.

      In 1967, the newly formed National Organization for Women staged a weeklong protest of The New York Times and other newspapers. Their demonstration targeted the long-standing practice of printing classified listings in two separate columns: “Help wanted: Male” and “Help wanted: Female,” which of course resulted in the exclusion of women from high-paying jobs and industries. As a result of NOW’s advocacy campaign, the Equal Employment Opportunity Commission, the federal agency charged with enforcing Title VII of the 1964 Civil Rights Act prohibiting race and sex discrimination in employment, finally made clear — over the strong objection of newspapers — that limiting job postings to one sex was unlawful. Sex-segregated classified ads subsequently became a thing of the past.

      Or so we thought.

      Today, five decades later, sex-segregated job listings are roaring back to life. Enabled by social media platforms like Facebook, advertisers are increasingly using users’ personal data to direct their ads — including for jobs — to individual users based on characteristics such as sex, race, and age, thus excluding users outside of the selected groups from learning about these opportunities.

      We can’t let this archaic form of discrimination continue to take hold. That’s why on Tuesday, the ACLU, along with the Communications Workers of America and the employment law firm Outten & Golden LLP, filed charges with the Equal Employment Opportunity Commission against Facebook and 10 companies that targeted ads for jobs in male-dominated fields to younger male Facebook users only, excluding all women and non-binary individuals, as well as older male users. The case is brought on behalf of three job seekers and the Communications Workers of America on behalf of a proposed class of millions of job applicants. It alleges that these job advertising practices violate federal civil rights laws prohibiting sex and age discrimination in employment.

    • Court: Trump’s ‘Get ‘Em Out’ Order Directed At Campaign Rally Protesters Is Protected Speech

      The Sixth Circuit Appeals Court has taken a look at some of President Trump’s campaign trail trash talk and decided urging fans to remove protesters wasn’t incitement, even if the phrasing was a bit graceless. (h/t Elizabeth Joh)

      The plaintiffs — Kashiya Nwanguma, Molly Shah, and Henry Brosseau — attended a Trump campaign rally for the express purpose of protesting it. There’s nothing wrong with that. It’s the sort of thing that happens all the time, even if Trump tends to draw more detractors than most. During his speech, Trump had his critics ejected, telling attendees to “get ‘em out of here.”

      The plaintiffs, having been unceremoniously ejected (with some extra jostling from Trump supporters), sued, claiming Trump’s “get ‘em out of here” directly caused them harm and violated the state of Kentucky’s riot incitement law.

      The Appeals Court disagrees [PDF] with this assessment, using the plaintiffs’ own statements to undo their assertions. But it’s not happy with the lower court’s decision to apply a less strict standard to Trump’s wording to give the plaintiffs a better shot at hitting the mark with their state claims (“incitement to riot”). Applying the plausibility standard — that Trump’s “get ‘em out of here” could have conceivably incited a riot — makes no sense if the lower court wasn’t willing to apply that same standard to words Trump said directly after that.

    • Beyond Prisons — Episode 28: Prison Strike 2018

      Recorded in the midst of the strike on August 30, co-hosts Brian Sonenstein and Kim Wilson have a conversation with Ware about the strike’s progress, as well as the challenges of organizing and why the press is woefully unprepared to report on the action.

  • Internet Policy/Net Neutrality

    • Ajit Pai Whines About California’s Net Neutrality Effort, Calls It ‘Radical,’ ‘Illegal’

      Much like the giant ISPs he’s clearly beholden to, Ajit Pai isn’t particularly happy about California’s efforts to pass meaningful net neutrality rules. The state’s shiny new law recently passed the state assembly and senate, and is awaiting the signature of California Governor Jerry Brown. ISPs recently met with Brown in a last-minute bid to get him to veto the bill (a very real possibility) despite widespread, majority public support.

      Pai last week took some time to whine about California’s bill at the Maine Heritage Policy Center, a “free market” think tank supported by (shockingly) major ISPs.

    • Ajit Pai: California net neutrality law is “illegal”

      During the Obama years, when Pai was a mere FCC commissioner, he argued that states had the right to overrule federal telcoms rules. But he was arguing in favor of states’ rights to overrule federal regulations that said states couldn’t stop cities from building municipal internet services that competed with the telcos that Pai formerly served in an executive capacity.

    • Ajit Pai calls California’s net neutrality rules “illegal”

      California’s attempt to enforce net neutrality rules is “illegal” and “poses a risk to the rest of the country,” Federal Communications Commission Chairman Ajit Pai said in a speech on Friday.

      Pai’s remarks drew an immediate rebuke from California Senator Scott Wiener (D-San Francisco), who authored the net neutrality bill that passed California’s legislature and now awaits the signature of Governor Jerry Brown.

  • Intellectual Monopolies

    • Economic Analysis of Intellectual Property Notice and Disclosure

      Notice of intellectual property content, ownership, boundaries, scope of rights (and limitations), enforcement institutions, and remedial consequences plays a central role in resource planning and other economic and social functions. This chapter examines the function, design, and economic effects of intellectual property notice and disclosure rules and institutions. Based on this analysis, the chapter offers a comprehensive set of policy, institutional, and litigation reforms.

    • India: Patents Excluded

      Later, in 2012, Mr. Patel (Bharat Bhogilal Patel) filed a complaint against LG Electronics and multiple other importers for infringement. A circular was released by the govt. in 2009, which helped in the implementation of the IPR Rules, 2007. This circular addressed the issue of a Customs Officer not having the pre-requisite knowledge on Patents, Geographical Indication Infringements and design compared to Trademark and Copyrights. In order to deal with the infringements of the former kind, they should have been pronounced as offences by the court of law making the application by the Customs Officer simpler.

      In order to deal with this, vide notification no. 56/2018, the Central Government introduced amendments to the IPR Enforcement Rules, 2007 and introduced the Intellectual Property Rights (Imported Goods) Amendment Rules, 2018.

    • Germany: Abdichtsystem, Federal Court of Justice of Germany, X ZR 120/15, 16 May 2017

      This case concerns the question of whether, and under what conditions, a supplier of infringing products who is located abroad can be held liable for infringement of the German patent for acts committed abroad. The FCJ held that the supplier may be liable if he was aware or should have been aware of the fact that the products he was supplying would eventually also reach the German market through his customers. Where the supplier does not market the products directly to Germany, there is no general obligation to monitor the activities of his customers.

    • Trademarks

      • Cai v. Diamond Hong, Inc. (Fed. Cir. 2018)

        Zheng Cai DBA Tai Chi Green Tea Inc. appealed an opinion of the U.S. Patent and Trademark Office Trademark Trial and Appeal Board (TTAB) cancelling registration of his mark “WU DANG TAI CHI GREEN TEA” due to a likelihood of confusion with Diamond Hong, Inc.’s registered mark, “TAI CHI,” pursuant to 15 U.S.C. § 1052(d) (2012).

        The Federal Circuit affirmed the decision, and despite the two marks (shown below) looking substantially different in appearance at first glance, other factors weighed in favor of the cancellation.

    • Copyrights

      • Traditional Knowledge and the Commons: The Open Movement, Listening, and Learning

        CC licenses and public domain tools help individuals, organisations, and public institutions better disseminate digital resources and data, breaking down the typical barriers associated with traditional “all rights reserved” copyright. At the same time, CC licenses can’t do everything for everyone. First, the licenses operate in the sphere of copyright and similar rights. They do not attempt to license, say, personality rights, trademark, or patent rights. Also, the CC community recognizes that voluntary licensing schemes will never be a comprehensive solution for access to and reuse of knowledge and creativity around the world. This is one reason why CC works on international copyright reform issues, including the protection and expansion of user rights.

        Another dimension of openness that could be better understood from the perspective of the “open” community is the sharing of cultural works related to indigenous communities. This has been talked about with terms such as “traditional knowledge”. Traditional knowledge consists of a wide range of skills, cultural works, and practices that have been sustained and developed over generations by indigenous communities around the world. These communities hold entitlement over this knowledge as well as responsibility for the preservation of their knowledge, but haven’t always had the autonomy to decide what can be done with their knowledge. International and national instruments have attempted to codify the value of traditional knowledge and rights of indigenous peoples, but the place of such knowledge within conventional intellectual property structures remains deeply contested and uncertain.

        These issues and more were brought up at the 2018 Creative Commons Global Summit as well, and has since started an important conversation within the CC community. I’m an attorney and doctoral candidate at UC-Berkeley Law, and over the summer I worked as a research fellow for Creative Commons to conduct an investigation into the current issues regarding traditional knowledge and its intersection with the open movement. A draft of the paper is complete, and we welcome your thoughts and suggestions to it.

      • Thanks To ISP Bahnhof, We Know Just How Crazy Copyright Trolling In Sweeden Is Getting

        For some time, Swedish ISP Bahnhof has been sounding the alarm over copyright trolling practices in its home country. While cynics will note that Bahnhof has absolutely made its refusal to hand over customer data a central part of its marketing messaging, the ISP has also made a point to publicly track copyright trolling court cases, threat letters, and pretty much everything else related to copyright trolling in Sweden. And, frankly, it’s due pretty much solely to Bahnhof’s tracking efforts that we now know just how insanely worse copyright trolling in Sweden has gotten in just the last year or so.

      • Apple Didn’t Delete That Guys iTunes Movies, But What Happened Still Shows The Insanity Of Copyright

        Last week we, like many others, wrote about the story of Anders G da Silva, who had complained on Twitter about how Apple had disappeared three movies he had purchased, and its customer service seemed to do little more than offer him some rental credits. There was lots of discussion about the ridiculousness — and potential deceptive practices — of offering a “buy” button if you couldn’t actually back up the “purchase” promise.

        Some more details are coming out about the situation with da Silva, and some are arguing that everyone got the original story wrong and it was incorrect to blame Apple here. However, looking over the details, what actually happened may be slightly different, but it’s still totally messed up. Apple didn’t just stop offering the films. What happened was that da Silva moved from Australia to Canada, and apparently then wished to redownload the movies he had purchased. It was that region change that evidently caused the problem. Because copyright holders get ridiculously overprotective of regional licenses, Apple can only offer some content in some regions — and it warns you that if you move you may not be able to re-download films that you “purchased” in another region (even though it promises you can hang onto anything you’ve already downloaded).

        [...]

        But, alas, we’re left with yet another example of the insanity driven by excessive copyright, in which copyright holders get so overly focused on the notion of “control” that they feel the need to control absolutely everything — including making sure that no wayward Canadians might (GASP!) purchase and download a movie meant for Australians. It’s this overwhelming, obsessive desire to “control” each and every use that messes with so many people’s lives — including da Silva’s — and makes sure that the public has almost no respect at all for copyright. Give up a little control, and let the edge cases go, and maybe people wouldn’t be so quick to condemn copyright for removing their own rights so frequently.

Today’s European Patent Office (EPO) Works for Large, Foreign Pharmaceutical Companies in Pursuit of Patents on Nature, Life, and Essential/Basic Drugs

Posted in America, Europe, Patents at 5:58 am by Dr. Roy Schestowitz

A butterfly

Summary: The never-ending insanity which is patents on DNA/genome/genetics and all sorts of basic things that are put together like a recipe in a restaurant; patents are no longer covering actual machinery that accomplishes unique tasks in complicated ways, typically assembled from scratch by humans; some supposed ‘inventions’ are merely born into existence by the natural splitting of organisms or conception (e.g. pregnancy)

THE EPO used to be so much better than the USPTO. I personally used to like the EPO and was proud to say we had the best patent office in the world. It was strict, it was pedantic, and it assured limits on patent scope. That is no longer the case, however, as many EPO insiders can attest to as well. They too complain about the collapse in patent quality that we've just revisited.

“…billionaire drug lords are using patents to profit from the very disease which they themselves created (drug addiction).”Looking across the Atlantic, it’s not hard to see patent scope going (or already gone) insane. Some of the things being patented are outright laughable (we’ll deal with these in a separate post later on) and they would be funny/amusing if they didn’t cause so much agony/pain for legitimate, practicing companies. In the area of patents on natural things, how about this new “settlement”? Bausch Health blackmailed a rival until the rival gave up. They try to drive competitors out of business using patents alone. Is this good for the so-called ‘free market’? What would be the impact on people in need of medicine?

In other news that gained traction lately, billionaire drug lords are using patents to profit from the very disease which they themselves created (drug addiction). It is not even remotely ethical. These people should be in prison, but they are billionaires who are well connected. We mentioned this yesterday and it’s good to see that the public now scrutinises the USPTO over it.

Speaking of evil patents, how about the EPO’s decision to uphold a notorious patent last week? For those who haven’t been keeping abreast of it, read “António Campinos Needs to Listen to Doctors Without Borders (MSF) et al to Salvage What’s Left of Public Consent for the EPO” (published a few days ago).

Life Sciences Intellectual Property Review (LSIPR), a propaganda site of the patents-on-life lobby, wrote about the subject yesterday. It started as follows:

The European Patent Office (EPO) has upheld a patent covering Gilead’s hepatitis C medicine sofosbuvir, despite opposition from humanitarian organisation Médecins Sans Frontières (MSF).

Speaking to LSIPR, the EPO confirmed that it has “maintained in an amended form” European patent number 2,604,620 on Thursday, September 13.

The decision was announced following oral proceedings in Munich, Germany. The EPO advised that it will publish the full decision here once the Opposition Division has written its ruling.

We certainly hope that these people at the Opposition Division understand their impact on many lives, especially poor people. It’s a dark day for the EPO. It’s even darker for a lot of people with darker skin.

“Putting aside DuPont’s historic role in genocide, we’re rather concerned to see the trend of patenting organisms, genetics and so on.”Now, looking at the US, the Federal Circuit dealt with a Patent Trial and Appeal Board (PTAB) inter partes review (IPR) and patent maximalists responded as follows yesterday: “The new DuPont v. Synvina decision is important for its specific application obviousness of claim ranges. It also creates some amount of tension with prior cases — particularly Dynamic Drinkware and Magnum Oil – regarding burden shifting within Inter Partes Review proceedings. [...] On appeal, the Federal Circuit holds here that the traditional obviousness burden-shifting associated with ranges applies to IPR proceedings. To be clear, the patentee never has the burden of proving non-obviousness. But, once a prima facie case of obviousness is established, the claims will be cancelled unless the patentee provides evidence to support its position.”

Putting aside DuPont’s historic role in genocide, we’re rather concerned to see the trend of patenting organisms, genetics and so on. This should not be happening. Earlier this month Wired published this article titled “Crispr’s Epic Patent Fight Changed the Course of Biology” and as we noted earlier this year the EPO’s Opposition Division fought back against it. Making life “owned” using patents sure “Changed the Course of Biology”… for the worse. From the article, which names the role of the Federal Circuit:

After three bitter years and tens of millions of dollars in legal fees, the epic battle over who owns one of the most common methods for editing the DNA in any living thing is finally drawing to a close. On Monday, the US Court of Appeals for the Federal Circuit issued a decisive ruling on the rights to Crispr-Cas9 gene editing—awarding crucial intellectual property spoils to scientists at the Broad Institute of Cambridge, Massachusetts.

The fight for Crispr-Cas9—which divided the research community and triggered an uncomfortable discussion about science for personal profit versus public good—has dramatically shaped how biology research turns into real-world products. But its long-term legacy is not what happened in the courtroom, but what took place in the labs: A wealth of innovation that is now threatening to make Cas9 obsolete.

So they’ll be evergreening their patent portfolio if they get their way. The concept that all of life should be patented isn’t so controversial among patent law firms. Kevin Noonan, for example, constantly promotes this agenda and yesterday he wrote about another case of the Federal Circuit with an important outcome:

The varying appellate fortunes of patentees regarding the question of obviousness is illustrated nicely in the Federal Circuit decision in Orexo AB v. Actavis Elizabeth LLC handed down earlier this month. The statute, 35 U.S.C. § 103, was intended to tether the question of obviousness to the prior art (and untether it from judicial whim regarding “inventiveness” or “invention” as found in several Supreme Court decisions stating with Hotchkiss (and, to patent law’s detriment, resurrected under § 101 by Justice Breyer and in other recent decisions from the Court). Nevertheless, there cannot help to be a subjective aspect to the issue of obviousness, which is illustrated by this decision when placed in contrast, for example, with other recent obviousness determinations by the Federal Circuit (see, for example, “Acorda Therapeutics, Inc. v. Roxane Laboratories, Inc.”).

[...]

The opinion illustrates the District Court’s error in accepting as evidence supporting obviousness testimony that, if selected, citric acid as a carrier particle would have been expected to work, citing In re Gordon, 733 F.2d 900, 902 (Fed. Cir. 1984) (“The mere fact that the prior art could be so modified would not have made the modification obvious unless the prior art suggested the desirability of the modification.”). A similar error arose regarding the District Court’s dismissal of Orexo’s argument regarding preserving the 4:1 ratio of buprenorphine to naloxone, the panel stating the error to be the District Court’s finding that “there is nothing in the prior art which would have discouraged a person of ordinary skill from following the path set out in the various references” instead of recognizing that “no reference or combination of references proposes the path of the ’330 Patent.” Put more succinctly the opinion states “[t]he question is not whether the various references separately taught components of the ’330 Patent formulation, but whether the prior art suggested the selection and combination achieved by the ’330 inventors.”

Finally, the opinion turns to the objective indicia, which “guide the analysis of obviousness,” citing Leo Pharm. Prods., Ltd. v. Rea, 726 F.3d 1346, 1357–58 (Fed. Cir. 2013). Without expressly stating it, the Court here finds clear error in the District Court’s discounting these factors, for example, stating that a 66% increase in buprenorphine bioavailability was “more than a trivial ‘degree.’”

Well, it is our view that any patent on life should be regarded as obvious and fail the obviousness test, as well as prior art test. Life is, after all, not an invention but something that always existed or evolved on its own (an act of nature). When laws are drawn up by lobbyists of law firms and pushed by politicians bribed by big pharmaceutical firms, however, laws make no sense. It’s like companies are basically buying laws. Those laws are designed for nothing except boosting their profits and eliminating competition, including competition in the form of disruptive (to their cash cows) research.

The EPO Has Quit Pretending That It Cares About Patent Quality, All It Cares About is Quantity of Lawsuits

Posted in Europe, Patents at 4:50 am by Dr. Roy Schestowitz

Dark clouds over every legitimate (practicing) company in Europe

Dark clouds

Summary: A new interview with Roberta Romano-Götsch, as well as the EPO’s promotion of software patents alongside CIPA (Team UPC), is an indication that the EPO has ceased caring about quality and hardly even pretends to care anymore

TODAY’S EPO is nothing like your father’s and grandfather’s EPO. It has become a lot more like the USPTO (one decade ago, predating much-needed reforms in the US).

“They conflate application pendency with patent quality and staff (as in patent examiners) isn’t happy about this lie.”The EPO’s Roberta Romano-Götsch, who will attend an event in Chicago in which the EPO (per its own words) will promote software patents under the guise of “automobiles” innovation, has done an interview with Gene Quinn (Watchtroll). The second part was published yesterday. It’s an event they organise with IPO, the pressure group of the litigation ‘industry’ (which also lobbies quite ferociously for software patents). EPO promoted this and “stay classy, EPO” was my response to them. “Associating with patent zealots who attack judges just like Battistelli did…”

Regular readers of ours are probably familiar with the tone and the agenda of Watchtroll. From the interview:

We then move on to discuss what the term “quality” means to the EPO, and then pivot into discussing the EPO’s upcoming Automotive and Mobility Seminar, which will take place in Chicago from September 26-27, 2018.

As usual, we prefer not to quote much — or anything at all — from Watchtroll because the site uses misleading terms like “efficient infringers” and insults those who stand for science. The interview reinforces the perception that what EPO means by “quality” is how fast it grants a patent! That’s it. Even if wrongly. They conflate application pendency with patent quality and staff (as in patent examiners) isn’t happy about this lie. Not even stakeholders are happy because what good are patents that would be rendered invalid if brought into a courtroom? The patent microcosm doesn’t care so much because it profits by the number of applications and any visit to the court is very “big money”, irrespective of the outcome of cases (frivolous or not).

We are very concerned that António Campinos is nothing but an extension of Team UPC because his first step as President, on his second day in Office, was UPC boosting. Campinos competed for the job with an actual judge (one who values justice and sports decades of experience, including at the ICC), but Battistelli intervened and stacked the deck as he always does. So now we have another ‘flavour’ of Battistelli — a quieter and more subtle one. “President @EPOorg António Campinos gives a master class to the new civil servant graduates of the #SPTO on IP future challenges,” the EPO quoted another account as saying yesterday. At least we now know how Campinos uses his time. So I asked them: “Did he teach them how to illegally sack workers like he does at the EPO?”

“Campinos competed for the job with an actual judge (one who values justice and sports decades of experience, including at the ICC), but Battistelli intervened and stacked the deck as he always does.”I cited this recent example of what he did at the EU-IPO although there are more recent examples from the EPO.

In another EPO tweet there was yet more of the usual advocacy of software patents — something that the EPO does 2-4 times per day (weekdays). This one explicitly names “computer-implemented inventions” (CII means exactly the same as software patents) and speaks of some “free-of-charge” brainwash from CIPA. To quote: “What’s the EPO’s approach to computer-implemented inventions? Daniel Closa, one of our senior experts, will explain at this free-of-charge seminar in London” (where such patents aren’t allowed “as such”).

The EPO’s liaison with CIPA is a subject we recently covered. The EPO typically associates with IPO, CIPA and Watchtroll these days. In other words, it’s all about the litigation ‘industry’.

“The EPO typically associates with IPO, CIPA and Watchtroll these days. In other words, it’s all about the litigation ‘industry’.”Speaking of this litigation ‘industry’, Managing IP is a site which targets it. It is a pro-UPC publisher (that organised lobbying events for UPC, sometimes directly connected to the EPO). Some media companies are lobbyists and think tanks disguised as “news” and Managing IP is a living reminder of this. Yesterday it published “CIPA urges UK government to stay in EUIPO after Brexit” and then tweeted “CIPA has sent a letter to the UK prime minister asking the government to negotiate continued participation in the EU trade marks and designs system after #Brexit” (Managing IP is being a megaphone of CIPA, as usual).

Even though this has nothing to do with the UPC (which is dead anyway) Team UPC tried to interject things. Thomas Adam wrote on Twitter: “CIPA trying to set an example for continued UPC participation of UK after Brexit?!”

“It’s like the main aim is to ‘generate’ more business for litigators rather than serve the public or acknowledge real innovation.”No, the article doesn’t even mention the UPC. Also published yesterday was this article from Rachel Havard (AA Thornton & Co) titled “Brexit: Considerations for European Union Trade Marks and Registered Community Designs” (UPC not mentioned here either).

The bottom line is that today’s EPO, more so with António Campinos in charge, is little more than an extension in cahoots with the litigation pipeline. It’s like the main aim is to ‘generate’ more business for litigators rather than serve the public or acknowledge real innovation. In our previous post we showed how a European Patent had been used by a notorious bully in Germany (the bully is from the US). No wonder examiners, who are basically scientists, are royally pissed off.

Qualcomm’s Escalating Patent Wars Have Already Caused Massive Buybacks (Loss of Reserves) and Loss of Massive Clients

Posted in Apple, Courtroom, Patents at 3:57 am by Dr. Roy Schestowitz

Yesterday: Qualcomm’s Patent Aggression Threatens Rationality of Patent Scope in Europe and Elsewhere

Qualcomm loses Apple’s business and drops NXP deal. What’s next?
Reference: Qualcomm loses Apple’s business and drops NXP deal. What’s next?

Summary: Qualcomm’s multi-continental patent battles are an effort to ‘shock and awe’ everyone into its protection racket; but the unintended effect seems to be a move further and further away from ‘Qualcomm territories’

ARMED with patents, including software patents from the EPO and USPTO, Qualcomm embarked on a misguided crusade which was bound to drive away clients and reduce interest in its patent pool. A few hours ago it was noted that “Apple Moves Away From Qualcomm” (even further than before) and according to Florian Müller, who followed the respective cases closely, there’s a new lawsuit in Germany, based on a European Patent:

With a view to a Qualcomm v. Apple patent infringement trial in Munich on Thursday I contacted the Munich I Regional Court to check on the time. As for the biggest issue in that case, may I refer you to my recent post on how thin air can “practice” claim limitations unless the name of the game is the claim.

On the same occasion, I inquired about any Qualcomm v. Apple first hearings that might come up in the near term. Unlike other German courts, the Munich court holds a first hearing, not as formally focused on claim construction as a U.S. Markman hearing, prior to patent trials. A spokeswoman for the court kindly informed me that a first hearing in two parallel cases, targeting different Apple entities, has been scheduled for March 28, 2019.

The patent-in-suit in both cases is EP1988602 on a “mobile terminal with a monopole[-]like antenna.”

Knowing the usual Munich timelines, it appears that the new complaints have only been filed recently. I guess just before the main summer vacation season here, or at least not long before.

“These sorts of multi-continental patent battles aren’t particularly new, but they serve to highlight the sort of thing that the EPO in Germany probably looks to facilitate, even if that would mean a lot more patent trolls, attacks on generics and so on.”In a later post Müller wrote that ITC “staff raises public-interest concerns over ban of Intel-powered iPhones sought by Qualcomm” and “staff says none of the 3 remaining patents-in-suit (from Qualcomm’s 2nd ITC complaint against Apple) is infringed. Apple [is] on [a] winning track.”

“CCIA raised these concerns in our public interest filings,” Josh from the CCIA said, so “I’m glad the ITC staff sees the same issues with exclusion in this case. (Not to mention infringement.)”

Quoting Müller, who was busy writing more than usual yesterday:

This morning, opening statements were delivered at the start of the evidentiary hearing in the investigation of Qualcomm’s second ITC complaint (request for U.S. import ban). The complaint was filed last December. An earlier complaint by Qualcomm against Apple is at a more advanced procedural stage: a final initial determination (a preliminary ruling by an Administrative Law Judge, which is however subject to Commission review) was originally due last Friday, but after the ALJ originally in charge retired, Chief ALJ Bullock took over and extended the deadline by two weeks. In that earlier case, the Office of Unfair Import Investigations (OUII, commonly referred to as “the ITC staff”) recommended an infringement finding with respect to one patent. Staff recommendations are not binding on ALJs, and even ALJs don’t make the final decision: the Commission itself does. But what the staff says is often adopted.

We have been critical of ALJs who ignored rulings from the Patent Trial and Appeal Board (PTAB). The Federal Circuit later dealt with the inter partes review (IPR) in question. The matter of fact is, Qualcomm is trying to increase pressure and improve its chances of “winning” by filing actions in several courts and in several continents — not so unusual a trick. Apple did that the Samsung and Huawei too is trying it against Samsung right now. But as Müller pointed out, the judge in the US is well aware that Chinese patent law is different and in some sense harsher than American law. Müller compares this to the case of Microsoft v Motorola — one which we covered at the time. To quote:

With respect to China, let’s face one thing: every U.S. judge knows that the rule of law, just like democracy, works differently in China. Huawei’s lawyers portray the Chinese proceedings at 100% fair and comprehensive. Samsung’s counsel obviously didn’t suggest that the proceedings were unfair, nor did Judge Orrick say so in his order. The Federal Circuit will be diplomatic, too. But that doesn’t mean that the appellate judges won’t have their private and unspoken opinion anyway.

The strategic issue here is the one I mentioned in the headline: coerced FRAND rate-setting arbitration. In order to distinguish Huawei v. Samsung from Microsoft v. Motorola (with Samsung being the new Microsoft and Huawei being the new Motorola), Huawei points out that Microsoft said it would accept a court-determined FRAND rate without insisting on adjucation of all the defenses that Samsung is pursuing (though Judge Robart actually did hold some Motorola patents invalid anyway). But beyond differences between Huawei and Microsoft regarding the preconditions for rate-settings (which I simply attribute to the fact that the standards at issue in Microsoft v. Motorola were not nearly as critical to Microsoft’s business as the ones in Huawei v. Samsung are to Samsung’s core business, thus Microsoft was prepared to pay for invalid and non-infringed patents and exclusively concerned about injunctive relief), Huawei must deny that it is an unwilling licensor (not in the sense of unwillingness to extend a license, but to do so on FRAND terms) engaging in hold-up and instead argue that Samsung is an unwilling licensee engaging in hold-out.

These sorts of multi-continental (or cross-continental) patent battles aren’t particularly new, but they serve to highlight the sort of thing that the EPO in Germany probably looks to facilitate, even if that would mean a lot more patent trolls, attacks on generics and so on.

09.17.18

Links 17/9/2018: Torvalds Takes a Break, SQLite 3.25.0 Released

Posted in News Roundup at 2:24 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Apache SpamAssassin 3.4.2 released

    On behalf of the Apache SpamAssassin Project Management Committee, I am
    very pleased to announce the release of Apache SpamAssassin v3.4.2.
    This release contains security bug fixes. A security announcement will
    follow within the next 24 hours.

    Apache SpamAssassin can be downloaded from
    https://spamassassin.apache.org/downloads.cgi and via cpan
    (Mail::SpamAssassin).

    Our project website is https://spamassassin.apache.org/

    Our DOAP is available at https://spamassassin.apache.org/doap.rdf

  • Valve Prepares Open-Source Moondust Repository

    Back in June, Valve announced “Moondust” as a new VR technical demo to showcase their hardware efforts (primarily with the Knuckles EV2 VR controllers) and consists of some mini games. It looks like this tech demo might be soon open-sourced.

    If you missed Valve’s original announcement of Moondust, you can find it on SteamCommunity.com granted this tech demo is primarily aimed at VR-enabling game developers.

  • Zinc Launches UK’s First Open Source Blockchain-Based Hiring Software

    London: Zinc, a UK based start-up, today launches its blockchain based hiring software, which promises to eliminate many of the inefficiencies associated with recruitment within the technology sector. Available to the public from today, Zinc has been successfully tested in beta with customers including GoCardless and Booking.com.

  • Lumina Networks Expands Engineering Management to Drive Product Innovation and Open Source Leadership

    Open source networking leader Lumina Networks today announced the addition of three industry leaders to their engineering team. Avinash Parwaney joins Lumina’s executive team as VP of Engineering. Parwaney is formerly from Cisco where he was Senior Director of Engineering. Prem Sankar Gopannan has joined Lumina as Director of Engineering and Iyappa Swaminathan has joined as Director of Technical Product Management.

    “I am pleased to welcome Avinash to lead the Lumina engineering team. He brings a wealth of real-world experience in large scale service provider networking,” said Andrew Coward, CEO of Lumina Networks. “Avinash will help Lumina accelerate our open source-based networking platforms and applications from proof of concept trials into production deployment. The addition of Prem and Iyappa to the team will further strengthen our ability to help lead the open source networking community, driving innovation and productization.”

  • Databases

  • Pseudo-Open Source (Openwashing)

    • Initial Flatpak support arrives for Windows Subsystem for Linux
    • Aussie banks dragged into the ‘open source’ era via GitHub

      The open banking Data Standards Body, which is being run by the CSIRO’s Data61 unit, is using the online service to manage feedback and comments for the technical standards that will govern the movement of data in the new economy. All decision proposals and final decisions for the open banking standards will be published on GitHub.

    • eBay Replatforming to Kubernetes, Envoy and Kafka: Intending to Open Source Hardware and Software

      eBay have discussed how they are conducting a replatforming initiative across their entire technology stack, which includes building and releasing as open source both the new hardware and software created. Open source is “fueling the transformation” of eBay’s infrastructure, and they intend to use cloud native technologies like Kubernetes, Envoy, MongoDB, Docker and Apache Kafka.

      As part of a three-year effort to replatform and modernise their backend infrastructure, eBay has recently announced that they are building their own custom-designed servers “built by eBay, for eBay”. The plan also includes making eBay’s servers available to the public via open source in the fourth quarter of this year. Although many large scale technical organisations and cloud vendors custom build their own hardware, including Google, AWS and Azure, they do not typically release this as open source. eBay have stated that they “are using servers and hardware that we designed, reducing our dependence on third parties”.

    • EU antitrust ruling on Microsoft buy of GitHub due by October 19
  • BSD

    • [llvm-dev] [7.0.0 Release] The final tag is in

      The final version of 7.0.0 has been tagged from the branch at r342370. It is identical to rc3 modulo release notes and docs changes.

    • LLVM 7.0 Is Ready For Release

      The LLVM/Clang 7.0 release had been running a bit behind schedule and warranted a third release candidate, but this week LLVM 7.0.0 is now ready to ship.

      Release manager Hans Wennborg announced minutes ago on the mailing list that the 7.0.0 release has been tagged in their source tree. This ends up being the same as last week’s 7.0-RC3 except for release notes and documentation updates.

    • LLVM Developers Still Discussing SPIR-V Support Within Clang

      One of the features that didn’t materialize for LLVM / Clang 7.0 is the SPIR-V support within the compiler toolchain.

      While there has been a SPIR-V / LLVM translator out-of-tree and various developers at different vendors have been discussing for months the prospects of adding SPIR-V intermediate representation support to LLVM/Clang, it has yet to materialize.

      The latest developer discussion is to have a roundtable talk on the SPIR-V integration at the 2018 LLVM Developers’ Meeting. This year the LLVM Developers’ Meeting is happening at the San Jose Convention Center from 17 to 18 October.

  • Public Services/Government

    • Bulgaria prepares to build its own central code repository

      In November, Bulgaria’s state eGovernment agency SEGA (Държавната агенция „Електронно управление“ ДАЕУ) will award a contract for building the country’s open source code repository. SEGA began studying submitted proposals this Tuesday. The repository, to be based on Git, will be hosting source all software newly developed by or for Bulgaria’s public services.

      [...]

      Published under the European Union Public Licence (EUPL) the Data-Gov-BG provides custom code for Bulgaria’s open data portal, including documentation about access and reuse of public sector information. The portal uses CKAN – open source software for data repositories.

  • Programming/Development

    • An “obsessive,” “anti-imperialist” Turing Complete computer language with only one command

      Daniel writes, “An obsessive programmer, frustrated with not only the inefficiencies of mainstream OSes like Windows, but what he sees as their ‘imperialistic oppression,’ built an entire operating system using a subleq architecture. Subleq is a OISC, a language with only a single command. It lacks the most basic features of programming languages, and yet is Turing Complete.

    • PHP 7.3-RC1 Released, Benchmarks Looking Good For This Next PHP7 Update

      Released this week was the first RC milestone for the PHP 7.3 feature update due out before year’s end. This weekend I ran some fresh PHP benchmarks looking at its performance.

      The PHP 7.3 release candidate is made up of many fixes ranging from memory corruption and segmentation faults to undefined symbols and other problems. The list of changes can be found via the NEWS entry.

Leftovers

  • How traveling abroad with kids showed me how to fix U.S. transit

    Ridership is down on nearly every major public transit system in the country. The argument is that agencies have failed to invest in basic upgrades which would have improved service and frequency. But on the other hand, these agencies can’t be effective when governments continue to prioritize cars—both financially and physically.

    Sweden, for example, subsidizes infrastructure improvements meant to eliminate the need for cars as part of a nationwide strategy to eliminate traffic deaths. The U.S. subsidizes widening highways.

    But what most Americans don’t know is that, in most cases, riding public transit is the best way to get public transit back on track. Especially if it helps get a car off the road during rush hour.

  • Fortnite helped cause 5% of UK divorces this year

    The company did not specify how Fortnite contributed to the separations, though its highly addictive, time-consuming nature is a sure contender. Addiction to drugs, alcohol, and gambling are often cited as reasons for relationships ending, and as digital technology increasingly takes over our lives, many argue that social media is as addicting as drugs.

  • Fortnite Battle Royal Game Cited As Cause For Divorce

    I seriously feel games are going to take over this world real soon. Earlier, it was Fortnite coaching where parents paid up to $20 for their kids to get better in the game, now this!

    According to a recent report by U.K divorce resource site Divorce Online, over 200 couples have filed divorce citing Fortnite game addiction as the root of their split.

  • Is fortnite becoming a relationship wrecker?

    Fortnite is all over the news right now as one of the most addictive digital games ever played.

    It’s not only teenagers that are being affected by its drug like qualities.

  • Pornhub traffic took a beating during iPhone XS and Apple Watch reveals

    The iPhone reveal saw Pornhub traffic drop a staggering 11.3 per cent on Apple devices and 4.4 per cent on Android. The Apple Watch Series 4 was also briefly popular (down 9.9 per cent and 3.7 per cent) before talk moved onto the health benefits, at which point viewers were inspired to have a brief 20-minute workout back on Pornhub.

  • Science

  • Security

    • Cryptocurrency mining attacks using leaked NSA hacking tools are still highly active a year later

      Yet, more than a year since Microsoft released patches that slammed the backdoor shut, almost a million computers and networks are still unpatched and vulnerable to attack.

    • Leaked NSA exploits are still used to infect at least 919K servers with cryptojacking malware [Ed: Microsoft gave the NSA back doors. It was inevitable that crackers who do not work for the US government would get in too.]

      Although Microsoft indicated that they have closed the backdoor used by this ransomware, more computers globally are not fully secured to prevent the infection by the malware. Interestingly, the hackers have shifted their game from asking for ransom and are now infecting new computers with cryptojacking malware.

    • Cybersecurity Is Only 1 Part of Election Security

      The DEF CON 2018 Voting Machine Hacking Village aimed to raise awareness in voting security through a full day of speakers and panel discussions along with a challenge for attendees to hack more than 30 pieces of voting equipment. A partnership with rOOtz Asylum offered youths between 8 and 16 years old an opportunity to hack replicas of the websites of secretaries of state to demonstrate that even hackers with limited years of experience can easily compromise critical systems. The goal was to break as many voting machine pieces as possible in order to draw attention to the vulnerabilities that will be present in the upcoming 2018 elections.

      The focus on election equipment, however, ignores the greater danger caused by hacking into the diverse collection of sensitive information that flows through political campaigns and the electoral process, and using that to influence and sow distrust among voters. While changing a vote or voting results can be traced back to a particular stakeholder, changing people’s understanding of facts is far more insidious.

    • Open Source Security Podcast: Episode 114 – Review of “Click Here to Kill Everybody”

      Josh and Kurt review Bruce Schneier’s new book Click Here to Kill Everybody. It’s a book everyone could benefit from reading. It does a nice job explaining many existing security problems in a simple manner.

    • Security updates for Monday
    • PAM HaveIBeenPwned module
    • Remote code exec found in Alpine Linux

      Users of Alpine Linux are advised to update their installations – especially those used for Docker production environments – after a researcher found a remotely exploitable bug in the distribution’s package manager.

      Alpine Linux is popular with Docker users due to its small size and package repository.

      Crowdfunded bug bounty program BountyGraph co-founder Max Justicz managed to exploit Alpine .apk package files to create arbitrary files which could be turned into code execution.

    • What is Wireshark? What this essential troubleshooting tool does and how to use it

      Wireshark is the world’s leading network traffic analyzer, and an essential tool for any security professional or systems administrator. This free software lets you analyze network traffic in real time, and is often the best tool for troubleshooting issues on your network.

      Common problems that Wireshark can help troubleshoot include dropped packets, latency issues, and malicious activity on your network. It lets you put your network traffic under a microscope, and provides tools to filter and drill down into that traffic, zooming in on the root cause of the problem. Administrators use it to identify faulty network appliances that are dropping packets, latency issues caused by machines routing traffic halfway around the world, and data exfiltration or even hacking attempts against your organization.

      [...]

      While Wireshark supports more than two thousand network protocols, many of them esoteric, uncommon, or old, the modern security professional will find analyzing IP packets to be of most immediate usefulness. The majority of the packets on your network are likely to be TCP, UDP, and ICMP.

      Given the large volume of traffic that crosses a typical business network, Wireshark’s tools to help you filter that traffic are what make it especially useful. Capture filters will collect only the types of traffic you’re interested in, and display filters will help you zoom in on the traffic you want to inspect. The network protocol analyzer provides search tools, including regular expressions and colored highlighting, to make it easy to find what you’re looking for.

  • Defence/Aggression

    • Drone assassins are cheap, deadly and available in your local store

      Aug. 5, 2018. In the heart of Venezuela’s capital, Caracas, Nicolás Maduro was delivering of a rousing speech. He stood high on a podium, speaking to a parade of military troops. The event was broadcast live on national TV. An hour in, the Venezuelan president flinched. His eyes widened. An unexpected object flew by.

      It was a drone, carrying explosives along the city’s historic Bolívar Avenue. Allegedly, this was an assassination attempt using a remote-controlled unmanned aerial vehicle — the kind of drone you can buy from any electronics store — fitted with explosives.

      Jai Galliott, a nonresident fellow of the Modern War Institute calls the event in Caracas a “modern form of assassination.”

    • CIA drone program expands across Africa

      The US Central Intelligence Agency’s drone program in Africa is expanding, the New York Times said on September 10.

      Just south of the Libyan border, a covert military base in Dirkou, Niger has been deploying fleets of drones on surveillance missions for several months, a Defense Department spokeswoman, Major Sheryll Klinkel told the NYT.

    • The US expand their drone base in Djibouti in spite of rising local ‘anti-American sentiment’.

      The United States have built another large hangar to house unmanned aircraft at Camp Chabelley in Djibouti, despite Defense Secretary James Mattis announcing in August that he would wind down special operations on the African continent a year after four US troops were killed in Niger.

    • U.S. Spies Rush to Protect Defectors After Skripal Poisoning

      When a suspected hit man for Russian intelligence arrived in Florida about four years ago, F.B.I. surveillance teams were alarmed.

      The man approached the home of one of the C.I.A.’s most important informants, a fellow Russian, who had been secretly resettled along the sunny coast. The suspected hit man also traveled to another city where one of the informant’s relatives lived, raising even more concerns that the Kremlin had authorized revenge on American soil.

      At F.B.I. headquarters, some agents voiced concern that President Vladimir V. Putin of Russia, himself a former intelligence officer known to reserve scorn for defectors from their ranks, had sent an assassin to kill one he viewed as a turncoat. Others said he would not be so brazen as to kill a former Russian spy on American soil.

  • Finance

    • Time Magazine Acquired by the Benioffs, Founders of Salesforce.com

      Salesforce.com Inc. founder Marc Benioff and his wife Lynne agreed to acquire Time magazine from Meredith Corp. for $190 million in cash, joining Jeff Bezos among tech billionaires buying venerable print publications.

      The move thrusts the brash 53-year-old entrepreneur, who helped lead the shift of software to an on-demand model, into a new role: media baron.

  • AstroTurf/Lobbying/Politics

    • Former CIA officer blasts Devin Nunes for ‘enabling our indecent president’

      Rep. Devin Nunes’ (R-CA) campaign to retain his House seat took another blow Thursday, when former CIA officer Evan McMullin endorsed Democrat Andrew Janz — and slammed Nunes in the process.

      McMullin, who is also a former House Republican staffer, wrote on Twitter that “Andrew Janz is an honorable man who has made a career of upholding the law.”

      He added that Janz will “do a much better job” for the district than Nunes, whom McMullin said “ignores the district, while promoting himself and enabling our indecent president.”

    • From assassinations to CIA mind control: new show investigates how artists tackle conspiracy theories

      “When you don’t have all the information, you’re left to fill in the blanks, and so people come up with these crazy theories,” says Doug Eklund, the co-curator of possibly the first ever exhibition to tackle art and conspiracy theories. “The way that I look at the subject of conspiracy is, it’s about aspects of history that are hidden,” Eklund says. “I think of it as almost a political occult.”

      Everything Is Connected: Art and Conspiracy at the Met Breuer includes around 70 works by 30 artists, made between 1969 and 2016 (up to, but not including, the last presidential election), looking at covert power and the ways governments and citizens interact.

    • Retired admiral resigned from Pentagon advisory committee after writing open letter to Trump

      Retired Adm. William McRaven, former head of Special Operations Command, resigned from the Pentagon’s Defense Innovation Board last month after asking President Trump to revoke his security clearance.

      Defense News first reported McRaven’s exit Thursday and the Pentagon confirmed to CNN that he resigned four days after publishing his op-ed.

      In his editorial for The Washington Post, McRaven tore into the president for revoking the security clearance of former CIA Director John Brennan, calling Brennan “one of the finest public servants I have ever known.”

    • Reports: Bill McRaven resigns from Pentagon board after op-ed criticizing Trump

      Bill McRaven, former chancellor of the University of Texas System and a current UT-Austin professor, resigned on Aug. 20 from the Pentagon’s technology advisory board, multiple news outlets reported Thursday.

      His resignation came four days after The Washington Post published an opinion piece he wrote that criticized President Donald Trump’s decision to revoke the security clearance of former CIA director John Brennan.

      “Through your actions, you have embarrassed us in the eyes of our children, humiliated us on the world stage and, worst of all, divided us as a nation,” McRaven wrote. “If you think for a moment that your McCarthy-era tactics will suppress the voices of criticism, you are sadly mistaken.”

    • Curbing politicization, returning now to espionage

      Former CIA Director John Brennan recently lost his top secret security clearance, a move that will negatively impact his ability to make money in the lucrative world of U.S. government contracting.

      Mr. Brennan complained bitterly that his First Amendment free speech rights were violated by the action — a ridiculous argument since Mr. Brennan remains a paid commentator and speaks his mind freely on NBC and MSNBC national news networks seemingly at will. In fact, the lack of a clearance will enhance Mr. Brennan’s ability to speak out on issues he thinks are important.

      Not being read in to current intelligence means Mr. Brennan needs to worry less about mixing classified information with his on-air remarks or tweets and thus lowers the risk of breaking the law.

    • Enough Gossip. Where are the Trump Whistleblowers?

      I served 24 years in such a system, joining the State Department under Ronald Reagan and leaving during the Obama era. That splay of political ideologies had plenty of things in it to disagree with or even believe dangerous. Same for people in the military and the intelligence agencies, who, for example, were sent to train Afghan mujaheddin under one president and then kill them under another, more significant than wonky disagreement over a trade deal. An amoral president, in Anonymous’ words? How about one who set Americans to torturing prisoners to death?

      In the run-up to the invasion of Iraq in 2003, some inside government were privy to information about the non-presence of weapons of mass destruction, and understood the president was exaggerating the case for war if not lying about it. Three senior officials resigned from the State Department and left a clear marker in the history books the policy was wrong. Another State Department official, a former Marine, resigned in protest over the war in Afghanistan. He stated in the New York Times (a signed letter, not an anonymous Op-Ed) “[I] tried and failed to reconcile my conscience with my ability to represent the current administration. I have confidence that our democratic process is ultimately self-correcting, and hope that in a small way I can contribute from outside.” More than a decade earlier, four State Department officials quit over the Bosnian conflict, also via public letters of resignation.

  • Censorship/Free Speech

    • Bozell Warns Rep. Jordan: Social Media Perpetrating ‘Greatest Worldwide Censorship’ in ‘History of Man’ [Ed: Social Control Media was always about policing speech online; it is wrong to allege, however, that the censorship there only muzzles so-called 'Conservatives' as it's far broader than this.]

      In a conversation with Rep. Jim Jordan (R-Ohio) on Facebook Live on Wednesday, Media Research Center (MRC) President Brent Bozell declared the recent censorship of conservatives “the greatest worldwide censorship” of free speech in “the history of man.”

      “In recent months, there has been a debate that has now exploded on the national scene dealing with the subject of censorship and the power of a handful of tech companies,” Bozell said. “When you consider that Twitter and Facebook have over a billion of an audience – NBC News has four million, Twitter and Facebook have a billion – it’s worldwide.”

    • Illinois Prisons ban Pulitzer Prize-Winning Book on Attica
    • Pulitzer Prize-Winning Book Censored In Illinois Prisons

      Attorneys filed a lawsuit Thursday on behalf of historian Heather Thompson, whose Pulitzer Prize-winning book Blood in the Water: The Attica Prison Uprising of 1971 and Its Legacy was censored by Illinois prison officials.

      Attorneys from Uptown People’s Law Center and Sidley Austin filed the lawsuit. It alleges that this censorship is “arbitrarily applied,” as the book was sent to three different prisons and censored only at Pontiac and Logan Correctional Centers. It argues this censorship is a violation of Thompson’s First Amendment right to communicate with incarcerated people, as such communication should only be restricted when there is a legitimate penological interest. The lawsuit also claims that Thompson’s Fourteenth Amendment right to due process was violated because she did not receive notice of this restriction, and as such was not provided an opportunity to challenge it.

    • Lawsuit Challenges Censorship of Book on Attica Prison Uprising

      Two Illinois prisons have censored Blood in the Water, the Pulitzer Prize-winning book by historian Heather Ann Thompson about the 1971 Attica prison uprising. Today, the Chicago-based Uptown People’s Law Center where I work is filing a lawsuit to challenge this unconstitutional and unethical censorship.

      Communication with prisoners is vital to ensure they know what is occurring on the outside — as well as to ensure that those on the outside know what is happening inside prisons. If injustices inside prisons are not brought to light, they won’t be corrected.

      By their very nature, prisons isolate those they lock up. It is difficult for the press, let alone the general public, to learn what is going on inside prisons, and it is equally hard for people in prison to learn what is happening beyond the prison walls. This was most recently made apparent by the difficulty reporters had covering the recent nationwide prison strike, timed by prisoners to commemorate the 1971 uprising by prisoners at Attica prison, which lasted from September 9 to 13.

    • Don’t Miss: ‘Banned Together: A Censorship Cabaret’

      The Dramatists Legal Defense Fund (DLDF) in partnership with PEN America will present the third annual Banned Together: A Censorship Cabaret in 13 cities as a part of Banned Books Week (September 23-29), the annual celebration of the freedom to read.

    • Literature and the prison system: art for change and justice

      “The Section of Disapproved Books” grapples with prison system censorship through collaborative processes

    • Lisa Loomis & Justin Silverman: High School Censorship
    • Did BHS break the law by censoring student newspaper?

      The student newspaper at Burlington High School, the BHS Register, broke a story Monday about school guidance director Mario Macias being charged with unprofessional conduct by the Agency of Education.

      But Tuesday, school administrators censored the article, according to paper staff.

      “The BHS Register is like very, very accessible to the students. So I think it, like, shouldn’t be taken down. It makes sense that they would report it and the students would hear about it first,” said McKenna Weston, a BHS student.

    • Student journalists slam censorship, call for administration to respect the law

      Burlington School Board members heard from livid student journalists, former employees and parents on Thursday, who took the district to task for keeping a director of guidance on staff after the Agency of Education filed misconduct charges with the state’s licensing board.

      Three student editors of the high school’s paper, the Register, which on Monday night broke the story regarding the Agency’s charges against Mario Macias, were first to speak during the public comment portion of the meeting.

    • VT school to adopt new policy after accused of censorship
    • School to Adopt New Policy After Accused of Censorship

      A Vermont school district says it will adopt a new policy in line with a state law aimed at protecting student journalists after students accused the Burlington High School of censoring a recent school newspaper article.

      Last week the principal asked the students to take down a story they broke on the student newspaper website about a school employee facing unprofessional conduct charges.

      They took the story down on Tuesday and later vowed to fight the school’s action based on the new law. The principal said Thursday that the students could repost the story since the story had appeared in other media.

    • Eminem’s Most Ruthless Lines on Machine Gun Kelly Diss “Killshot”

      The devil is back, my God! Nothing fully charges the battery in Slim Shady’s back quite like a good ol’-fashioned street fight. Eminem courts more smoke than a firefighter. He likes his beef red, rare, and bloody, and anyone who dares get in the kitchen with him better not bring too many napkins. Machine Gun Kelly did just that last week, when he dropped “Rap Devil,” a song and accompanying video made in response to a shot Em fired at MGK on his new album.

      MGK ran right in with a fully loaded clip and a song that was honestly better than anyone who hasn’t paid money for an MGK show expected it to be. But Eminem isn’t Drake—there was never any question of whether he’d respond. It was just a matter of when, and how viciously, on a scale from “The Warning” to one of those Benzino drone strikes.

    • Calls for protest in Kuwait as banned book list reveals extent of censorship

      Kuwaiti liberals are calling for demonstrations on Saturday against what they describe as staggering levels of book censorship which has blocked an estimated 4,400 titles from reaching the state’s bookshops and libraries during the past five years.

      #Banned_In_Kuwait and #Don’t_Decide_For_Me have trended on Twitter as authors and followers of literature protested against the authorities’ decision to ban works including One Hundred Years of Solitude by Gabriel García Marquez as well as books by Palestinian Mourid AlBarghouti and Egypt’s Radwa Ashour.

    • ‘FREADom’ banned book distribution celebrates free speech

      As part of its 23rd annual celebration of reading, free speech, and artistic expression, the Greater Pittsburgh Chapter of the ACLU of Pennsylvania will distribute banned and challenged books around the city Sept. 23-29.

      The ACLU has teamed with Carnegie Library of Pittsburgh and the Book Fairies for “F READ om,” a series of free events in honor of national Banned Books Week.

      “Self-expression is an essential part of the human condition and an essential part of the American experiment. We as Americans honor freedom of speech and encourage it in the broadest possible terms. It serves our political, artistic, religious souls. Any attempt by government to curtail speech is a denial of human dignity,” Marshall Dayan, ACLU Greater Pittsburgh Chapter president, says in a release.

    • Banned Book Read-Out: CCBC event focuses on right to read
    • Casting a spell on censorship
    • China Makes Significant Censorship Decision on Hip-Hop Culture

      While Justin Bieber might be a worldwide sensation, there’s at least one country where he is no longer welcome: the People’s Republic of China, whose government recently released a shocking set of standards regarding what media is morally fit for public consumption. As part of an overreaching crackdown on “low taste content,” the country has recently banned most references to hip-hop culture as well as musicians, celebrities, actors, and other performers with tattoos, or whose lifestyle is considered to be out of line with the ruling party’s standards of morality.

      According to Gao Changli, the publicity department director at the State Administration of Press, Publication, Radio, Film and Television of the People’s Republic of China (SAPPRFT), there are four major”absolutes” (or rules) that outline the Chinese state-run media’s standards for decency as stated to The Independent: “Absolutely do not use actors whose heart and morality are not aligned with the party and whose morality is not noble. Absolutely do not use actors who are tasteless, vulgar and obscene. Absolutely do not use actors whose ideological level is low and have no class. Absolutely do not use actors with stains, scandals and problematic moral integrity.” Furthermore, in an interview, the Chinese state-run news media outlet Sina reported that the regulator now “specifically requires that programs should not feature actors with tattoos [or depict] hip hop culture, sub-culture and dispirited culture.”

    • Decline in violence coincides with unprecedented censorship: CPJ report

      The media in Pakistan is not showing an accurate picture of critical issues facing the country. The reason, according to a special report published by the Committee to Protect Journalists, is increasing instances of self censorship by journalists.

      The report, released earlier this week, also finds that the number of red lines that ought not to be crossed is higher than expected. These include not just the usual suspects: national security policies, civil-military ties, enforced disappearances, insurgency in Balochistan, Pashtun activism for basic rights and civil liberties and religious extremism, etc, but also issues with no apparent bearing on the high politics of state institutions. In this latter category, the CPJ report includes reporting on labour rights and peasants’ struggle for land ownership. It refers to the threats received by a Karachi-based journalist for covering labour-related malpractices of foreign brands. The journalist was told that reporting on labour rights is anti-state, the report says. Similarly, it documents the case of an Okara-based correspondent who was wrongly implicated in multiple terrorism cases for covering peasant protests in support of their claim over vast tracts of agrarian land held by the armed forces.

      While the report finds a drop in instances of violence against journalists, including murders, it correlates the finding to i) security agencies’ crackdown on terrorist outfits in western provinces and on militant wings of parties like the Muttahhida Qaumi Movement (MQM), and, ii) an unprecedented suppression of editorial autonomy across newspapers and private TV channels allegedly by elements within the security establishment.

    • ‘Impotent silence’, a Chinese priest and censorship of Catholic sites

      Vatican News sites, Ucan, AsiaNews.it all blocked. Yet the Chinese constitution defends religious freedom. The considerations of a priest, whose personal blog has been taken down.

    • Help release the FBI’s files on its wartime “Postal Censorship” program

      Back in August, MuckRock user Paul Galante requested the Federal Bureau of Investigation’s files on its wartime “Postal Censorship” program. This week, the Bureau responded, having located approximately 83,000 pages. Despite the fact that the files will be released electronically through the FBI’s supposedly cost-saving portal, the Bureau is insisting Galante pay $2,485 in duplication fees.

    • Student editors: BHS administration to restore article review policy

      The editors of the Burlington High School student newspaper say that Principal Noel Green is reinstating a student media policy which requires administrative review of stories they plan to publish.

      But the editors and press advocates say the policy, which was in place for the student newspaper before the passage of so-called “New Voices” legislation in 2017, violates the Vermont law.

      Green has not responded to a request for comment. Nor has Burlington Superintendent Yaw Obeng.

    • Our Opinion: Censorship in Burlington

      On Monday, four student journalists at The Register, the Burlington High School student newspaper, broke the news that the Vermont Agency of Education had filed six counts of unprofessional misconduct charges against BHS guidance director Mario Macias.

    • Chinese Star Fan Bingbing Has Disappeared

      The latest clue emerged Tuesday after a state-affiliated think tank and Beijing university ranked Fan dead last in their annual “Social Responsibility Report,” citing her “negative social impact.”

    • Has China’s most famous actress been disappeared by the Communist Party?

      Imagine if one day Jennifer Lawrence was walking the red carpet in Los Angeles and the next she vanished completely with no word about where she was.

      It might sound ludicrous, or terrifying, but it’s the reality in China, where one of the country’s most famous actresses has disappeared without a trace amid an uproar over tax evasion by celebrities.

      Fan Bingbing, one of China’s highest-paid and most bankable stars, has appeared in both Chinese and Western films, including the multimillion-dollar X-Men franchise.

    • Censorship? Chinese movie star disappears
    • Chinese Actress Fan Bingbing Has Gone Missing
    • Chinese actress vanished following tax evasion rumors
    • Actress vanishes amid China culture crackdown
    • Google queried by House members over reentering Chinese market, complying with censorship regime
    • Bipartisan House group presses Google over China censorship
    • Google Under Fire: Centralization, Censorship, Crypto Startup Complaint and Resignations
    • Google China Prototype Links Searches to Phone Numbers
    • Google’s prototype Chinese search engine connects users’ activity to their phone numbers, report claims
    • US Congress Grill Google On China Censorship Plans
    • Google employees quit over controversial China search engine project, report says
    • Senior Google Scientist Resigns Over “Forfeiture of Our Values” in China
    • Google Cloud’s new AI head comes with his own ties to the Pentagon’s Project Maven
    • Google Scientist Resigns Over Censored Search App for China
    • Frank Vernuccio, Substituting Censorship and Lies for Debate
    • Let’s Be Very Clear About What Breitbart’s Leaked Google Video Shows
    • The Real Google Censorship Scandal

      This week on the right-wing site Breitbart News, a video surfaced of one of Google’s weekly “T.G.I.F.” meetings, where employees and the leadership engage in heated debates over everything from healthier snack stations to the election of Donald Trump.

      Breitbart News described the 2016 video as a “smoking gun” because it showed Sergey Brin, the Google co-founder, telling everyone how he felt about the new leader of the free world.

      Spoiler: Not good.

      “Myself, as an immigrant, as a refugee, I certainly find this election deeply offensive, and I know many of you do, too,” he said in his flat, nasal voice. He was obviously rattled, as were the other top Google executives on stage with him. “I think it’s a very stressful time, and it conflicts with many of our values.”

    • Leaked Google video adds fuel to censorship fire

      Some of Google‘s top executives made critical remarks of President Donald Trump shortly after his election in 2016, according to a leaked video published by Breitbart.

      In the video, which was the company’s first all-hands staff meeting following Trump’s election, Google co-founder Sergey Brin said he found Trump’s victory “deeply offensive” and added that the election “conflicts with many of our values.”

      “There are two dominant reasons to be upset,” Brin says in the video. “One is because so many people apparently don’t share many of the values that we have. I guess we’ve known that for many months now… and secondly confronting the reality of an administration that’s now forming and, look, we have no idea what it’s going to do.”

      [...]

      In response to Breitbart leaking the video, a Google spokesperson said people were expressing personal views, and that nothing in the video suggested “any political bias ever influences the way we build or operate our products,” according to Bloomberg.

    • Google Denies Bias After Video Shows Sergey Brin ‘Upset’ Over Trump’s Election

      A right-wing news site published an internal video from 2016 showing top Alphabet Inc. executives expressing disappointment about the election of U.S. President Donald Trump, potentially giving conservative lawmakers and activists new fuel for their allegations that the internet-search giant is politically biased.

      Website Breitbart published a more than hour-long video of an all-hands meeting at Alphabet’s Google that happened soon after the election. Google co-founder Sergey Brin says “most people here are pretty upset,” and “myself as an immigrant and refugee I certainly find this election deeply offensive.”

    • On internet censorship, China can tell the US: told you so

      Maybe China’s authoritarian leaders were on to something after all.

      In 2011 and 2012, the Chinese government began imposing a series of tough new restrictions designed to rein in what was then the country’s most popular and freewheeling social media platform, Sina Weibo.

      It began with new rules making all weibo (microblogging) account users register with their real names and identity numbers, aiming to end one of microblogging’s most popular features – its anonymity. It made internet companies liable for content spread on its platforms. Individuals and groups were prohibited from using the internet to spread rumours, disrupt social stability, subvert state power or to organise or incite illegal gatherings. Scores of websites were shut, weibo accounts closed and microbloggers jailed.

    • Bebe Neuwirth, Noma Dumezweni, And More Join BANNED TOGETHER: A CENSORSHIP CABARET

      Banned Together is a celebration of songs and scenes from shows that have been censored or challenged on America’s stages, created to raise awareness around issues of censorship and free expression in the theater. The performances will feature selections from Cabaret, Chicago, Almost, Maine, Rent and Angels in America, among other notable works, with a libretto by John Weidman (Assassins, Pacific Overtures) and JT Rogers (Oslo, Blood and Gifts) directed by Ari Edelson (Building The Wall, 24 Hour Plays) Banned Together: A Censorship Cabaret will be performed in thirteen cities across the U.S. as a part of Banned Books Week (September 23rd-29th), the annual celebration of the freedom to read.

  • Privacy/Surveillance

    • Lenovo CEO: ‘We’re not a Chinese company’

      We took the opportunity to ask the global CEO of the company, Yang Yuanqing, affectionately known around the office as ‘YY’ a question that has been bugging us for a while.

      After ZTE was brought to its knees recently by accusations of privacy violations and with Huawei facing bans from supplying sensitive areas in the US, Lenovo, the other really big Chinese player in the space, has had a fraction of the flack from certain quarters.

      Why? They’re all Chinese companies, aren’t they?

    • Here come connected vehicles and urban analytics: what do they mean for privacy?

      As sensors on connected cars become more sophisticated, and the data they provide more fine-grained, so the usefulness of that information will increase, and with it applications in everyday life. For example, insurance companies are already offering reduced premiums for those willing to install so-called “black box” systems in their vehicles. These are essentially specialized versions of the connected vehicle tracking devices discussed above, and contain similarly personal data. The danger is that what are undoubtedly useful systems that can improve our cities and save us money could also become yet another way to undermine our privacy.

    • UK spy agency that violated human rights to launch startup accelerator in Manchester

      Britain’s spy agency GCHQ is found to have violated human rights just three days after announcing an open call for startups to join its accelerator in the Greater Manchester area in 2019.

    • Top Euro court: UK’s former snooping regime breached human rights

      The UK government breached human rights rules by failing to ensure proper oversight of its mass surveillance programmes, according to the European Court of Human Rights.

      In a judgment handed down today, the court said the safeguards within the government’s system for bulk interception of communication were not robust enough to provide guarantees against abuse.

      The court said this violated the right to privacy under the European convention – as did the way in which GCHQ obtained communications data from service providers.

    • UK guilty of human rights abuse, ECHR finds in groundbreaking surveillance case

      GCHQ, the British government’s intelligence and security organisation, has breached human rights in its mass surveillance programme, the European Court of Human Rights (ECHR) said in a landmark ruling on Thursday (13 September).

      The ECHR found that Article 8 of the European Convention on Human Rights, the respect for one’s private and family life, was violated as the UK did not take out the necessary measures to ensure that only individuals relevant to the government’s security operation were watched.

      The court also observed that of the data under surveillance, no safeguards were put in place to ensure the protection of confidential material that was obtained, breaching Article 10, freedom of expression. The judges found that the data retrieved by GCHQ’s surveillance program “could reveal a great deal about a person’s habit and contacts.”

    • Big Win: Britain’s GCHQ Spygrid Violates Right to Privacy, ECHR Rules

      A major court ruling on Thursday said that the UK had violated European law, serving as a victory to privacy advocates worldwide. The news comes days after five nations charged with global surveillance released a memo urging tech companies to use workarounds to internet encryption.

      The Strasbourg-based European Court of Human Rights (ECHR) ruled Thursday that Britain’s Cheltenham-based surveillance bureau, the Government Communications Headquarters (GCHQ), had violated personal privacy laws.

      The Big Brother Watch and Others v. the United Kingdom case concerned complaints lodged against GCHQ on the bulk interception of communications, intelligence sharing with foreign governments, and obtaining communications data from communications service providers, a press statement said.

    • “Bulk interception” by GCHQ (and NSA) violated human rights structure, European court docket suggestions

      The swimsuit change into brought by Gargantuan Brother Survey, Amnesty Worldwide, the American Civil Liberties Union, and a quantity of different civil liberties organizations from Europe and North The United States, as successfully because the Bureau of Investigative Journalism and others. “The resolution sends a transparent message that the same surveillance packages, equivalent to those performed by the NSA, are also incompatible with human rights,” claimed ACLU legal educated Patrick Toomey. “Governments in Europe and the United States alike have to seize steps to rein in mass spying and undertake prolonged-past due reforms that the truth is safeguard our privacy.”

    • UK mass surveillance violates right to privacy, rules European court
    • UK GCHQ violated human rights

      GCHQ’s methods in carrying out bulk interception of online communications violated privacy and failed to provide enough surveillance safeguards, the European court of human rights (ECHR) has ruled in a test case judgment.

      But the Strasbourg court found that GCHQ’s regime for sharing sensitive digital intelligence with foreign governments was not illegal. It is the first major challenge to the legality of UK intelligence agencies intercepting private communications in bulk, following Edward Snowden’s whistleblowing revelations.

      The long awaited ruling is one of the most comprehensive assessments by the ECHR of the legality of the interception operations operated by UK intelligence agencies.

    • GCHQ Found To Be In Breach Of Privacy Rules

      “If these invasions of privacy go unchecked, we risk setting the path for a tomorrow that apes China, a country where the government is using cyber-surveillance to remove all privacy from an individual’s life.”

    • Man charged with fraudulently billing NSA for contract work
    • Orlando man accused of fraudulently billing NSA for at least $250,000

      A Florida man who worked for a National Security Agency contractor in Maryland has been charged with submitting fraudulent timesheets that billed the federal government at least $250,000 for work he didn’t perform.

      U.S. Attorney Robert Hur’s office on Thursday charged Todd Andrew Leasure with making false statements.

      A court filing says Leasure submitted false timesheets in which he claimed to have worked on a services contract more than 1,500 hours more than he actually did between 2014 and 2017.

    • Police: Florida Man Fraudulently Billed NSA For Contract Work

      A Florida man who worked for a National Security Agency contractor in Maryland has been charged with submitting fraudulent timesheets that billed the federal government at least $250,000 for work he didn’t perform.

      U.S. Attorney Robert Hur’s office on Thursday charged Todd Andrew Leasure with making false statements.

  • Civil Rights/Policing

    • Reader addresses issue of security clearance for former CIA officials
    • US Sanctions Against Venezuela Force Abby Martin’s “Empire Files” to Shut Down

      Recent sanctions imposed on Venezuela by the Trump administration have forced the Empire Files program, hosted by American investigative journalist Abby Martin, to shut down. The decision to officially announce the show’s end came after blocks on wire transfers originating in Venezuela and sent to the U.S. were recently imposed, thereby cutting off the show’s primary source of funding. Issues with funding caused by the U.S.’ Venezuela policy had, however, been a problem for some time, leading Martin and her staff to halt production in late May. While Martin and her team had hoped conditions would improve, the recent sanctions make that such a distant possibility that the decision to shut down the show was made on Wednesday.

    • Qualified Immunity Contradicts Congressional Intent. It’s Time To Kill It Off.

      The doctrine of qualified immunity was conjured up by the US Supreme Court in 1982 and victims of rights violations have been paying the price for more than three decades. The doctrine was created by the Court, not by Congress. This is an important distinction, especially since qualified immunity directly contradicts the liability Congress created as an avenue of redress for citizens.

      Congress specifically said anyone who uses governmental power to deprive others of rights can be sued.

      [...]

      The arguments for keeping the qualified immunity intact are weak. Holes have been poked in these by multiple lawyers and law profs, but the doctrine lives on, propped up by the parade of litigation that would certainly result if government employees were held directly responsible for their actions.

      One of the weakest of the arguments is that the removal of qualified immunity would result in long stream of impoverished cops. As this amicus brief submitted for a QI-centric Supreme Court case points out, government employees are rarely, if ever, held directly accountable for their actions. It’s almost always taxpayers paying other taxpayers for rights the government violated.

    • Is there a myth of free speech on social media?

      Apple, Facebook, Spotify and Youtube banded together this week in a decision to stop hosting audio and video content from Alex Jones, a controversial conspiracy theorist and founder of Infowars.

      Denounced by some as censorship and supported by others as a reasonable enforcement of company policies, the move has again raised questions about the control a small handful of social media companies have over what constitutes acceptable speech online.

  • Internet Policy/Net Neutrality

    • The Nation’s Second Biggest Cable Company Probably Won’t Get Kicked Out Of New York State After All

      Back in July, New York State took the historically-unprecedented step of voting to kick Charter Communications (aka Spectrum) out of New York State. Regulators say the company misled them about why the company repeatedly failed to adhere to merger conditions affixed to the company’s $86 billion acquisition of Time Warner Cable and Bright House Networks, going so far as to falsify (according to the NY PUC) the number of homes the company expanded service to. The state has also sued the company for failing to deliver advertised broadband speeds, for its shoddy service, and for its terrible customer support.

      But the threat to kick Charter out of the state appears largely to have been a negotiation tactic, as the two sides are now purportedly making progress and engaging in “productive dialogue” as they attempt to hash out their differences.

  • DRM

    • International Day Against DRM takes action for a Day Without DRM on September 18th

      DRM is the practice of imposing technological restrictions that control what users can do with digital media. DRM creates a damaged good: it prevents you from doing what would be possible without it. This concentrates control over production and distribution of media, giving DRM peddlers the power to carry out massive digital book-burnings and conduct large-scale surveillance over people’s media viewing habits.

      Organized by the Defective by Design team, IDAD has occurred annually since 2006. Each year, participants take action through protests, rallies, and the sharing of DRM-free media and materials. Participating nonprofits, activist groups, and companies from around the world include the Electronic Frontier Foundation, Open Rights Group, Public Knowledge, the Document Foundation, and others (for a complete list, see: https://dayagainstdrm.org). These groups will share the message by writing about why DRM is harmful, organizing events, and offering discounts on DRM-free media.

  • Intellectual Monopolies

    • Trademarks

      • Guest Professor: Arguing the Scandalous Clause

        The arguments against the scandalous clause are several. Trademark law, it is argued, should concern itself with consumer efficiencies and commercial goodwill—not the psychological protection of children or the majoritarian morality. Consumers choose whether they will view a mark; so by trademarking a scandalous image, no one is forcing anything on anyone. Besides, it’s inevitable that children will hear and see much worse in schools and on the internet. Furthermore, given the diverse moral views in society, a moral-based criterion seems very subjective to enforce. Trademark eligibility, it is argued, should not reflect the moral code of the PTO, a judge, or anyone else for that matter. It should reflect laissez-faire ideals: if there is demand, let the market supply it. So go the arguments.

        [...]

        As already stated, these reasons do not necessarily imply that Congress should have enacted the scandalous clause. Indeed, the clause may be criticized for various reasons. The clause certainly calls for subjectivity in its enforcement—as much subjectivity as enforcing the distinction between descriptive and suggestive marks; assessing the presence of secondary meaning; or determining that a mark has become generic. The clause certainly does not represent a laissez-faire approach—much like the regulation of public television and airwaves (restricting pornographic and vulgar content), or the very trademark system itself (creating an artificial monopoly). The clause certainly does not further source identification—just like the clauses that prevent registration of government flags or insignia, portrayals of deceased presidents, portrayals of living individuals, and surnames. The clause may even result in market inefficiency—although not as much inefficiency as results from trademark’s dilution rights. All these problems with the scandalous clause may be lamented and bemoaned, but they do not suggest that Congress has abused its discretion by abridging the freedom of speech. These problems are relevant to a much different discussion—a discussion about whether we—through Congress—should change this law. They do not inform the discussion about whether the Constitution gives courts power to reject our will.

    • Copyrights

      • South Africa: Copyright Amendment Bill Could Be Finished Next Month

        The committee is still deliberating on the public submissions received after it published specific clauses of the Copyright Amendment Bill for comment, committee secretary Andre Hermans told Intellectual Property Watch in a recent phone interview.

        “Our intention is to finalise in the month of October,” Hermans said.

        The Copyright Amendment Bill was tabled in Parliament in May 2017.

        The Portfolio Committee of Trade and Industry has met several times since last month, sifting through and debating the merits and practicalities of the submissions it has received. During this process, the committee again identified clauses of the Copyright Amendment Bill to be re-advertised and as a result, specific clauses dealing with the accreditation of collecting societies have been published for comment.

      • U.S. Wants Prison Sentence for Facebook User Who Pirated ‘Deadpool’

        The US Government is recommending a six-month prison sentence for a California man who uploaded a pirated version of the movie Deadpool to Facebook. In just a few days the copy was viewed 6,386,456 times. A strong sentence is needed to deter the defendant, other Facebook users, and the public at large, the US argues.

The Patent Trial and Appeal Board (PTAB) Helps Prevent Frivolous Software Patent Lawsuits

Posted in America, Patents at 3:44 am by Dr. Roy Schestowitz

…it is therefore opposed by those who profit (hundreds of dollars per hour) from these frivolous lawsuits

Coins

Summary: PTAB with its quality-improving inter partes reviews (IPRs) is enraging patent maximalists; but by looking to work around it or weaken it they will simply reduce the confidence associated with US patents

THE reputation of the USPTO will depend on its patents. A few days ago we learned, based on an article from Brittany Shoot (Fortune), that OxyContin “drugs lords” make billions getting you addicted to drugs (with the state’s approval) and then they want a patent monopoly on getting you off these drugs. This is outrageous, yet the USPTO sees no “scandalous” thing here; it only sees “scandals” in particular trademark applications because these might seem rude.

It also looks like another bogus software patent has just been wrongly granted by the Office. Aquiire published a press release about it. How about this other press release, this time from MKThink, which speaks of “technologies for analyzing business intelligence applied to physical assets, environmental factors, and cultural dimensions.” Not abstract? Talari Networks also pushed out a press release [1, 2] and this one is almost certainly about software patents. Last among this bunch we have a press release [1, 2] from a firm that’s suing over patents on “Virtual SIM (vSIM) technology,” i.e. probably software-implemented and thus invalid under Section 101 (35 U.S.C. § 101). To quote:

The holding company of Skyroam, Inc. (www.skyroam.com), SIMO Holdings Inc., has filed a lawsuit on June 15, 2018 against UCloudLink Network Technology Limited America, brand-named GlocalMe, in the United States District Court for the Southern District of New York. The lawsuit alleges that UCloudLink is violating SIMO’s intellectual property by selling its infringing WiFi hotspot devices. The lawsuit cites unauthorized use of patented technology, which is prohibited by law, and is intended to protect SIMO’s significant investment in Virtual SIM (vSIM) technology.

Why does the Office keep granting such patents? They breed pointless lawsuits that often end when the underlying patents get invalidated, eroding confidence in US patents as a whole.

Will the USPTO raise the patent bar? It doesn’t look like it. Iancu is making a mess of the Office and patent maximalists rally to get a patent maximalist in charge of PTAB. “Like other members of the PTAB, the Chief Judge is appointed by the Secretary of Commerce in consultation with the USPTO Director,” they note, recommending/urging patent maximalists that this site targets to apply for the job.

They’re being rather shallow; maybe they can get Rodney Gilstrap to apply for the job. Wouldn’t that be funny? No other judge has earned anywhere near the same level of notoriety. Even politicians have called him names. Rodney Gilstrap was named in this new article a few days ago. To quote: “An unprecedented hearing took place in Marshall’s federal court, Wednesday, as two Chief Judges — Barbara Lynn and Rodney Gilstrap — sat at the bench together, simultaneously…”

Judge Gilstrap again in the news; he’s a friend of patent trolls in his district and he justifies that by saying that it’s good for his town. Never mind justice itself.

Anyway, going back to PTAB, days ago we saw the exception rather than the norm when it comes to software patents; such patents typically perish at PTAB, but this time around PTAB permits software patents on “toolbars” and patent maximalists rejoice:

MyMail Ltd. beat a challenge to a patent related to computer toolbars at the Patent Trial and Appeal Board on Tuesday, a win that comes as MyMail seeks to overturn a court ruling that the patent is invalid under the U.S. Supreme Court’s Alice test.

The board said in a final inter partes review decision that it was not convinced the disputed patent claims were anticipated or obvious. The IPR was brought by Unified Patents Inc.

Watchtroll has also found the exception, taking stock of another rare decision 3 days ago:

On Monday, September 10th, the Patent Trial and Appeal Board (PTAB) issued a final decision in an inter partes review (IPR) proceeding petitioned by telecommunications conglomerate Comcast Corporation to challenge a patent held by electronic program guide developer Rovi Guides, a subsidiary of TiVo. The panel of administrative patent judges (APJs) in the case issued a mixed claim finding which nixed 20 of 24 challenged claims but upheld claims covering a buffering feature which Rovi is seeking to license with Comcast.

Watchtroll hasn’t changed its tune. It’s still lobbying against IPRs and looking for scandals/dissent. Basically anything that can lower patent quality. The same goes for Patent Docs, which yesterday advertised the webinar of the litigation ‘industry’ with bulletpoints like: “What guidance do Federal Circuit and PTAB decisions give patent counsel on the application of BRI?”

And in Chicago it advertised another webinar with bulletpoints like “Staying on Top of Recent Developments at the PTAB” and “PTAB Strategy in a Changing Environment: Claim Construction, Amendments and Section 112(6)…”

Also in Chicago: The Federal Circuit Bar Association (FCBA) — not quite what it sounds.

The Intellectual Property Law Association of Chicago (IPLAC) is among those involved in other events advertised yesterday (some are not quite related). And while we’re on the subject of Chicago, Brian Leiter from University of Chicago Law School took stock of most cited authors in this domain, showing that Mark Lemley is by far the most influential scholar in this area (this is why Mr. Gross keeps smearing him; Lemley is ‘problematic’ to all the anti-PTAB campaigning).

The bottom line is, the USPTO is still granting patents that oughtn’t be granted while its new Director seems to be trying to scuttle PTAB. This is a recipe for disaster and that can only further reduce the certainty associated with US patents.

Abstract Patents (Things One Can Do With Pen and Paper, Sometimes an Abacus) Are a Waste of Money as Courts Disregard Them

Posted in America, Courtroom, Patents at 2:28 am by Dr. Roy Schestowitz

An abacus

Summary: A quick roundup of patents and lawsuits at the heart of which there’s little or no substance; 35 U.S.C. § 101 renders these moot

THIS almost final post (for today) is also the longest. It covers new examples in which the patent system — notably the USPTO in this case — presents recklessness or disregards for patent quality, legal certainty and so on. What good are patents if their legitimacy isn’t being assured and whose underlying economics are misunderstood (or worse — ignored)? Mere ideas aren’t inventions. Thoughts aren’t inventions, either. Nature is not an invention and merely discovering things which always existed in nature can’t be considered an invention (at best a discovery). The patent systems oughtn’t be misused or endlessly stretched to cover just about every conceivable thing because that would hold science as well as free thought back. Those who care about patents should shun the patent maximalists and aim to restrict the scope of patents. The same goes for copyrights and trademarks.

We start our journey with this bizarre new article that uses the term “IP”, probably conflating trade secrets, copyrights and trademarks with patents. Proactive Investors UK speaks of “patent licensing,” but this case appears to concern something like copyrights (which they vaguely allude to as “IP”). GAN must be extremely misguided if it thinks that it can win a patent lawsuit over software in the US, so on the face of it it boils down to bad reporting or bad communication (misleading on purpose) from Irwin IP LLP. What does the following mean by “technology”? Code? Mere ideas? Secrets? It doesn’t say clearly. To quote:

GAN claims that some internet gambling operators have been using its technology without permission, and it is now seeking “commercial settlements” for these alleged infringements

[...]

But it appears others have been using the software without permission, and the company said the offending firms had been “substantially and progressively placed on notice” of GAN’s patents.

Chicago-based law firm Irwin IP LLP will now seek “commercial settlements” for any infringements, which, along with patent licensing, represent a “potentially high-margin incremental income stream for GAN”.

We’ll come back to Chicago in a moment. The next and final post will deal with it.

Here is another baffling new article. They speak of a new stationary bike, but they actually describe software, not a bike. In their own words:

Last May, in-studio cycling business Flywheel Sports announced plans for a new stationary bike called the FLY Anywhere that would allow users to stream both live and archived cycling classes into the comfort of their homes, all while tracking performance and letting users compete with other riders.

To the folks at Peloton, it sounded familiar. A little too familiar. So on Wednesday, the company filed a lawsuit against its cycling rival, alleging that Flywheel had willfully infringed on Peloton’s patents in the development of its new toy. But the story Peloton spins about how that infringement took place is the most stunning part of all.

They’re preparing for a patent fight. One thing we know for sure: the law firms will win. They will get richer. At both ends.

Also mind Christopher Wood’s new article, which is actually marketing by law firms. It resorts to intimidation and scare-mongering tactics like this:

Harris related a story of a company making a pitch for investment at a Rockies Venture Club event, with the entrepreneur including a patent number in their slide deck. An investor at the event looked up that number, only to discover that the patent didn’t exist.

So what? Unless they’ll looking to invest in a patent troll, it’s rather improbable that a startup can pick on a large rival in court. Such legal fights favour the wealthier party.

Speaking or legal action, a law firm closely connected to Microsoft (Shook, Hardy & Bacon LLP) took note of a lawsuit in which bogus software patents are being used to “assault” (their word) a rival:

In a recent development set against the backdrop of ever-increasing cloud competitor lawsuits, longtime provider of Unified Communications-as-a-Service (UCaaS) and cloud-based Voice over IP (VoIP) solutions RingCentral filed a patent infringement suit last month against competitor Dialpad in the U.S. District Court for the Northern District of California. In its 22-page Complaint filed on August 27, 2018, RingCentral alleges direct and indirect infringement of four of its patents granted between 2010 and 2017 by several of its competitor’s VoIP offerings, namely Dialpad Standard, Dialpad Pro, Dialpad Enterprise, Dialpad Free, UberConference Free, and UberConference Business. RingCentral has been on the receiving end of its fair share of patent infringement suits over the last several years, but this appears to be the first case in which RingCentral has gone on offense as a patent plaintiff.

[...]

While RingCentral appears to have dominated the UCaaS space for some time, Dialpad—a relatively young San Francisco-based company co-founded as Firespotter in 2011 by Craig Walker (creator of Yahoo! Voice and Google Voice) and adopting its current namesake in 2016—has also amassed its share of accolades during its young existence. Along with RingCentral, Dialpad boasts its appearance on Deloitte’s 2017 Technology Fast 500 list, and was also a recipient of TMC’s 2017 WebRTC Product of the Year Award. Additionally, in 2016, TMC Labs awarded Dialpad a winner of its IT Innovations Award for their advancements in VoIP solutions.

It seems pretty clear to us that these are abstract software patents — the sort of thing Microsoft accumulates and leverages in bulk to thereafter blackmail large firms. On the tax evasion aspects of this, Reuters weighed in last week when it wrote: “The GILTI provision, meant to discourage multinational corporations from avoiding U.S. taxes by holding intangible assets such as software patents abroad in low-tax countries, imposes an effective 10.5 percent tax rate on income from tax havens.”

We covered this scam many times before. It’s a side ‘perk’ of accumulating many bogus software patents.

Notable over the past week was actually the number of such patents being heralded to the world. This press release spoke of patents on “cloud computing, machine learning and IoT connectivity for HVAC optimization,” i.e. just buzzwords for software patents (bunk patents, worthless in US courts) . Here are some more patents on utter rubbish (technology giants like Google just striving to stockpile garbage for the numbers, presumably to cross-license without even assessing the patents individually).

Aaron Gin and Michael Krasniansky from McDonnell Boehnen Hulbert & Berghoff LLP wrote about bogus software patents that get ‘dressed up’ as “AI” (as almost any algorithm can be). We wrote a great deal about so-called ‘AI’ patents and here come more of these clueless pieces with “AI” in the headline. “Machine bias is difficult to identify and eliminate,” say patent maximalists. One cannot patent algorithms, however, or at least not enforce them in courts. Bunk patents cannot be made any less bunk by adding buzzwords like “AI” to them. Lawyers know this, but they still try to convince us otherwise. From the paywalled article:

Vincent Violago and Nikko Quevada discuss [...] They also discuss patents and directed to bias mitigation, as well as the reasons machine bias is difficult to identify and eliminate

Another site of patent maximalists then said (with “AI” in the headline) that “[t]he emergence of artificial intelligence has coincided with uncertainty of the patentability framework for protecting such innovations.”

So they know that these are bunk, but they go along with it anyway. There was no “emergence of artificial intelligence,” just reemergence of it as a buzzword about a year ago. It’s a marketing strategy, much like “cloud”. They give new labels to old things. The buzzword just means algorithms in this context; “AI” can be just about anything, e.g. algorithm, which does something “clever” (however one defines that). There’s a new paper [PDF] titled “Ethics of Using Artificial Intelligence to Augment Drafting Legal Documents,” but that’s inherently different because it’s about using algorithms to manage and author patents. Even patent lawyers often conflate or confuse these things.

Law firms ought to stop assuming that US courts will respect software/algorithm patents because they won’t. See their track record. How about this from Jessica Zimmer? It’s about Hedera Hashgraph:

Hedera Hashgraph began life as an algorithm. But over the years since 2015 it morphed into a leviathan, raising around $100M on a $6bn valuation from institutional and accredited investors. After launch, it will be almost entirely independent from founding parent Swirlds, which is now one of the members of the Hedera Council and will have the same voting rights as other members.

The algorithm is probably not patentable, but that does not prevent the company from moving ahead and beyond that. Companies which stop innovating and depend only on a pile of patents may end up like Blackberry, which is nowadays behaving like a patent troll. This is the kind of headlines it has earned so far this month and its patents aren’t even legitimate. “BlackBerry’s patent 8,745,149 is invalid, Patent Trial and Appeal Board says in opinions posted on its electronic docket,” as was covered at the time (end of last month). This is what happens when one tries to leverage software patents against large firms; they don’t fold as they can afford to fight back and win.

A Microsoft-connected news site (“Motley Fool”) is meanwhile mischaracterising this Microsoft-like patent trolling. Leo Sun wrote:

Over the past five years, BlackBerry (NYSE:BB) has phased out its smartphone business and expanded its enterprise software portfolio. That turnaround strategy was painful, but it resulted in shallower revenue declines and rising non-GAAP profits.

Another pillar of BlackBerry’s turnaround is its effort to monetize its portfolio of over 44,000 patents through royalties and licensing fees. Some companies willingly paid those fees, but many others didn’t.

That barely helped cover any of the lost revenue. The person behind this strategy is no longer at BlackBerry. The bottom line is, those who pursue software patents and assume these to be worthwhile in court will be rather disappointed. Unless of course they wish to become patent trolls, preying on those opting for a quick settlement without fighting back in court.

« Previous entries Next Page » Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts