Imagine having the equivalent of four 1920×1080 monitors in a 2×2 grid, on your desk, with absolutely no seam between them. This article describes my journey towards that goal…
Imagine having the equivalent of four 1920×1080 monitors in a 2×2 grid, on your desk, with absolutely no seam between them. This article describes my journey towards that goal…
College campuses have been experimenting with the idea of using unmanned drones since early 2012. On a more larger level, drone usage has been a point of conversation since aerial warfare came to the forefront over 100 years ago. The first targeted attack from an unmanned aerial vehicle took place Feb. 4, 2002, in an attempt to kill someone the US thought was Osama Bin Laden.
A group of people who have lost loved ones to US drone strikes in Yemen yesterday (3 April) launched a national organisation, which will support affected communities and highlight the civilian impact of the “targeted killing” programme.
Rep. Adam Schiff of California, a top Democrat on the House Intelligence Committee, and Republican Rep. Walter Jones of North Carolina, a frequent critic of “war on terrorism” policies, introduced the “Targeted Lethal Force Transparency Act.” The goal? Find out who is dying in drone strikes.
Fein noted that during the Watergate years of the 1970s, the Justice Department stood up to Richard Nixon; no such backbone exists today, Fein said. He despaired that there is no moral outrage when U.S. predator drones kill civilians, or when the government collects massive amounts of data on American citizens.
Munter recounted one incident in which two dozen Pakistani soldiers were killed by a U.S. drone strike in retaliation to a group of Afghan and American forces being fired upon by Pakistani border guards in November 2011. The clash, he said, strained ties between the two nations and marred the reputation of drone strikes. – See more at: http://dailytrojan.com/2014/04/02/former-us-ambassador-to-pakistan-speaks-on-past/#sthash.shc9jTHM.dpuf
Even if we’re not at technically at war with a nation, we’re almost always still involved. We’re still creating enemies by involving ourselves wherever we see fit — sending weapons to the Syrian opposition (linked to Al Qaeda and known to kill members of the Christian minority in cold blood), flying drones over Pakistan to kill civilians, and even now drawing lines in the sand to combat Russian influence in the Ukraine. It all leads to a senseless sacrifice of lives and worsening of diplomatic relations.
A bipartisan group of senators has quietly begun discussing a push to repeal or rewrite the broad law granting the president sweeping powers to wage war against individuals and groups across the globe.
Democratic Sen. Tim Kaine told BuzzFeed that several lawmakers have held informal conversations on possible changes to the 9/11-era rules of war on terrorism, known as the Authorization for the Use of Military Force.
PANDA is People Against the National Defense Authorization Act
House Republicans are quietly working to insert immigration legislation into the text of the Department of Defense authorization bill that would allow so-called DREAMers to obtain permanent legal residency by joining the military, Breitbart News has learned.
CIA Torture and Deception/Lies
A still-classified Senate Intelligence Committee report contains damning information on both the extent of US torture methods and the lies of top CIA officials about these programs, according to information in a Washington Post article on Monday.
Senate aides and government officials continue to leak details from a classified report on the CIA’s Bush administration torture program, giving us a fuller picture of who was tortured, how it happened, and what limited information the government learned.
The Defense Department isn’t properly keeping track of senior officials who leave the government to take jobs with defense contractors, the DOD Inspector General reported Tuesday.
The Obama administration is violating the Convention Against Torture by delaying declassification of the report and by refusing to bring those responsible to account
Mike Morell said Wednesday that the U.S. intelligence committee knew al-Qaeda was involved in the Benghazi terror attack from the start, but said it wasn’t publicized because the sources through which they knew that were classified.
The Central Intelligence Agency (CIA) is planning to overthrow Venezuela’s government by using student organizations throughout a wide variety of educational institutions in the country, according to an ex-CIA collaborator Raúl Capote.
Deception Over Expansion
If American media seem filled these days with bellicose, jingoistic, uniform perspectives on a new Cold War, that’s probably because so many news outlets can’t seem to help themselves when it comes to framing new events in the tired terms of the last generation’s ingrained propaganda. At a time that needs fresh contemplation, even people like Amy Goodman on Democracy NOW are talking about recent events in and around Ukraine as having “sparked the worst East-West crisis since the end of the Cold War” or words to more extreme effect.
As Western and Russian rulers rattle sabres, Simon Basketter says we must take on a system that drives the world to war
Ukraine just happened to be a conveniently available ideal to put Americans entrenched status and Western European odyssey into spotlight but with a revamped force of achieving the strategic goals and to enhance the Russian lost vision of invincible Empire. So far, nobody could dare to disturb the progressive dream turned into attainable reality in weeks and days to foresee Crimea annexed into the Russian Federation and Ukraine being put under watchful guidance and controlled maneuverability of the Russian foreign policy objectives.
On March 2, Secretary of State John Kerry described Russia’s action in Crimea as “an incredible act of aggression … You just don’t, in the 21st century, behave in 19th century fashion by invading another country on completely trumped up pretext,” he said. And on March 17, President Barack Obama declared, “Ukraine’s sovereignty and territorial integrity must be respected, and international law must be upheld.”
Messrs. Kerry and Obama must be joking!
The U.S. invaded Iraq and Afghanistan “on completely trumped up pretexts.” (If you still believe George Bush had legitimate reasons to attack Iraq, please read the transcript of his press conference of Aug. 21, 2006. There, he confessed that both his “reasons” were bogus.)
Ukraine is a perfect example of how the US uses the worst elements of a society to do their dirty work in other countries and how the US/NATO has a problem finding honest quislings. Since the US favors the nazi coup in Ukraine they talk about sovereignty and the right to self-determination of the Crimean people is made into some outrageous business for which Russia is demonized. John McCain, the chief chicken hawk and key “moral support” figure for the US’ insurrectionists and nazis in Ukraine, urged dissidents in Russia to rise and through that the effect of Ukrainian “freedom” would spread into Russia. McCain and the rest are engaged in subversive incitement, and once again their complete lack of intelligence and knowledge has left them looking like fools to the world. Professor Edward Herman spoke to the Voice of Russia regarding these issues and more.
United States intelligence officials have been scouring the personal communications of innocent Americans, the nation’s top spy chief now acknowledges, using a procedure that’s allegedly lawful and constitutionally sound.
The United States has not responded to repeated requests for information on the NSA’s surveillance activities, Germany’s government said Wednesday.
In a reply to a written question from the opposition in the Federal Parliament, the government said both the Ministry of Interior and former Justice Minister Sabine Leutheusser-Schnarrenberger had sent letters to U.S. officials without recieving any reply.
Representatives Mike Rogers and Dutch Ruppersberger, the leaders of the House Intelligence Committee, introduced HR 4291, the FISA Transparency and Modernization Act (.pdf), to end the collection of all Americans’ calling records using Section 215 of the Patriot Act. Both have vehemently defended the program since June, and it’s reassuring to see two of the strongest proponents of NSA’s actions agreeing with privacy advocates’ (and the larger public’s) demands to end the program. The bill only needs 17 lines to stop the calling records program, but it weighs in at more than 40 pages. Why? Because the “reform” bill tries to create an entirely new government “authority” to collect other electronic data.
Yahoo PR and encryption
Results of a study, carried out by Chinese telecom giant NTT Communications, were released yesterday and revealed the effect that last year’s NSA revelations have had on the way corporate decision makers view cloud technology.
“Connectivity,” Facebook CEO Mark Zuckerberg said in a CNN interview last year, “is a human right.”
If it surprises you that one of the kings of the corporate Internet would repeat a slogan used by Internet activists to mobilize against companies like his, examine the context. Zuckerberg made his remark to support and explain a new set of Facebook strategies that will, if successful, put the world’s Internet connectivity under his company’s control.
Pulitzer Prize-winning investigative journalist Julia Angwin joins us to discuss her new book, “Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance.” Currently at ProPublica and previously with The Wall Street Journal, Angwin details her complex and fraught path toward increasing her own online privacy. According to Angwin, the private data collected by East Germany’s Soviet-era Stasi secret police could pale in comparison to the information revealed today by an individual’s Facebook profile or Google search.
Microsoft’s big investment in cloud computing—a large part of its reinvention strategy—could be derailed by concerns about U.S. government snooping and an emerging price war among the big players.
…Obama sounds faintly like that guy who ran to replace George W. Bush.
But it turns out Obama was not against indulging the whims of a stubborn ruler if that ruler happens to be him. Upon arriving in the White House, he left the Bush-Cheney surveillance programs largely alone. Why? “He has more information than he did then,” one former aide confided to The New York Times. “And he trusts himself to use these powers more than he did the Bush administration.”
The fact that Obama trusted himself with these powers is ample reason the rest of us shouldn’t. But we already had sufficient cause for suspicion. Our Constitution does not show an abundance of trust in elected officials. It rests on the belief that those in power need to be curbed and checked at every turn.
Reuven M. Lerner starts us out this month, this time with information on how to leverage geolocation information in your Web application. Whether you want to give your Web visitors a local weather forecast or just want to present them with location-appropriate options from your Web applications, geolocation is a powerful tool. Since the Internet is global, it’s important to know where users are located. Reuven shows how to integrate geolocation awareness into your Web applications. Dave Taylor follows with the next in his series on Zombie Dice. It may feel like you’re just making a cool game, but it’s really just a ruse to help you learn something. (Well, it’s a cool game too, but you really are learning!)
At a cloud event today, Google announced it was cutting its cloud-services prices by huge margins — up to 85 percent in some cases. But that’s not all the good news.
Google also announced general availability of Red Hat Enterprise Linux and Linux SUSE on the Google Cloud Platform
Softaculous Ltd., the developer of AMPPS Installer that simplifies Application deployment on various Desktop and Servers, today announced the launch of AMPPS 2.3 for Linux distros. Ampps Linux will work with most of the desktop / GUI distros of linux like Fedora, CentOS, Redhat, Ubuntu, etc.
At the Women in Tech Networking event at South by Southwest Interactive last week, Rackspace Hosting launched its new training program, Linux for Ladies, aimed at helping women get top jobs in the IT industry.
Midokura, a global company focused on network virtualization, today announced its partnership with Cumulus Networks, the company bringing the power of Linux to networking. The companies plan to offer a joint technology solution that will enable customers to manage workloads on virtual and non-virtualized infrastructure with a technology preview by May 2014 and a GA offering by Q3 2014. This partnership further extends the new networking open ecosystem where businesses can have the flexibility to choose between various industry standard networking hardware, network operating systems and applications.
Cumulus Networks has announced that IXLeeds has chosen the Cumulus Linux operating system for the company’s upgraded Internet Exchange Point. IXLeeds is a not-for-profit Internet Exchange Point (IXP) based in Leeds, UK. A bid process that included Extreme Networks and Juniper Networks preceded the deployment of Cumulus.
That said, Jessup stressed that there is still a core networking track that is still at the foundation of Interop. Software Defined Networking (SDN) is once again a popular track for discussion as networking professional seek to learn how to benefit from the new networking paradigm.
The first wave of SDNs broke data centers free from single-vendor “blobs,” concede the architects of MidoNet, but they left a new problem in their wake.
In a Cumulus Networks-sponsored webcast SDN panel on March 21, Najam Ahmad, Facebook’s director of technical operations, explained why the social networking website has embraced the open SDN model.
Ahmad said that when it comes to the reasons SDN makes sense for Facebook, it boils down to two key things: scale and agility. He noted that there is a lot of traffic going between machines today that runs over network infrastructure. In order to scale the network to meet the needs for increasing machine-to-machine traffic, the traditional hierarchy-based network structure isn’t a good fit.
The Linux Foundation’s OpenDaylight Project conducted a third-party survey that found 95 percent of networking pros want open-source software-defined networking technologies.
Forgetting to Change Default Password or Apply Patches
Security boffins at ESET, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing as well as other agencies, have found a cybercriminal campaign that has taken control of over 25,000 Unix servers worldwide.
Dubbed “Operation Windigo” it has resulted in infected servers sending out millions of spam emails which are designed to hijack servers, infect the computers that visit them, and steal information.
Systemd has been working on network support for this leading open-source init system. As part of this, systemd developers have now achieved support for obtaining a network connection in less than one millisecond… With that said, systemd developers are working towards having DHCP client and server capabilities built into the init system for having a super-fast booting OS and quicker network connections when resuming the system.
When systemd sees “debug” as part of the kernel command-line, it will spit out so much informaiton about the system that it fails to boot… The init system just collapses the system with too much information being sent to the dmesg when seeing the debug option as part of the kernel command-line parameter. Within the systemd bug report it was suggested for systemd not to look for a simple “debug” string to go into its debug mode but perhaps something like “systemd.debug” or other namespaced alternatives. The debug kernel command-line parameter has been used by upstream Linux kernel developers for many years. However, upstream systemd developers don’t agree about changing their debug code detection. Kay Sievers of Red Hat wrote, “Generic terms are generic, not the first user owns them.”
SUSE has released kGraft to the public, the technology it developed to deliver live runtime patching of the Linux kernel.
Kgraft, which allows live patching of the Linux kernel without downtime, is available under the GPLv3 license
The highlights covered by Daniel for “neat” i915 DRM 3.15 changes include per-process address space support (currently limited to Ivy Bridge and Haswell but Bay Trail and Broadwell support is coming), fine-grained display power domain handling, runtime power management infrastructure work, support for inheriting the firmware frame-buffer as another step in Fastboot support, a lot of Broadwell patches, improved support for frame-buffer compression, 5.4GHz DIsplayPort support, generic DisplayPort aux helpers, and large cursor support to benefit HiDPI displays. For Intel’s 4K display support, they now support 5.4GHz DisplayPort but they don’t yet support multi-stream support (MST) as most 4K DisplayPort screens expose themselves as two displays to the driver.
There’s many bug and performance fixes that landed while some corruption fixes and other patches will land later in the 3.15 merge window. The Btrfs code was also changed to avoid using its own async threads in favor of regular kernel work-queues, in hopes of using more generic code, but it might affect the file-system’s performance.
Hopefully the Linux kernel LTO support will finish up in the Linux 3.15 kernel otherwise Linux 3.16 so we can move onward with some benchmarks of an LTO-optimized Linux kernel to see the performance wins at the cost of greater compile times and memory usage during the compilation process. It’s worth noting that with the upcoming GCC 4.9 are also some significant link-time optimization enhancements.
With the Linux 3.14 kernel that was released over the night, Intel UMS support was deprecated. Intel hasn’t maintained their user-space mode-setting support on Linux in about a half-decade with pushing everything these days through kernel-based mode-setting. The Radeon and Nouveau drivers have also become completely dependent upon kernel mode-setting too, with user-space mode-setting these days mostly being left to really old X.Org drivers without a DRM/KMS module. Modern Linux distributions are also beginning to drop support for these old GPUs.
After adding an extra release candidate to solidify the final result — to the tune of a week’s delay — Linux creator Linus Torvalds on Sunday unleashed version 3.14 of the Linux kernel.
Linus Torvalds, the creator of Linux, formally released the Linux 3.14 kernel March 30. The new 3.14 Linux kernel follows the Linux 3.13 kernel that was released in January. Given that the new kernel carries the release number 3.14, which is a number that is also well-known as the mathematical Pi constant, there was early speculation that Torvalds might name the new kernel Pi. It’s something that Torvalds shot down early on in the Linux 3.14 development process.
Latest Linux kernel has baked-in support for more cutting-edge ARM and MIPS processors, adds hardware support for Xen paravirtualuzation
While no official announcement has come down yet, the Linux 3.14 kernel will most likely be released in the hours ahead.
Kernel Level Misc.
Jovi Zhangwei, the lead KTAP developer, has posted the 28 patches implementing KTAP on the Linux kernel mailing list and is looking for code review in hopes it will be accepted into the mainline Linux kernel. KTAP is a script-based dynamic tracing tool that has a powerful scripting language, a register-based interpreter, is considered lightweight, and supports multiple architectures. The currently supported architectures for KTAP include x86/x86_64, ARM, PowerPC, and MIPS.
Linux kernel block maintainer, Btrfs lead developer and new Facebook employee Chris Mason revealed the news at the Linux Foundation Collaboration Summit in Napa Valley on Thursday, Phoronix reported. Mason said that Facebook will trial Btrfs in its “web tier” servers, explaining that’s the easiest tier to recover if necessary, though we imagine Facebook might ask the NSA for its backup copy in the event of disaster.
This small but important change would support a cgroup to swap to a particular file as setup by a new control file. This change is to allow the limiting of cgroups to a given swap file without being able to thrash the entire system’s swap file. With this set of three patches, individual cgroups can be limited in their swap capacity.
While most of the open-source driver efforts around accelerating 2D with OpenGL are centered on GLAMOR, a set of patches were published today that provide performance improvements to the XA Gallium3D state tracker that also accelerate 2D using 3D driver code.
Red Hat has announced a new collaboration with Google that will enable Red Hat customers to move eligible Red Hat Enterprise Linux subscriptions to Google Compute Engine using Red Hat Cloud Access. Google joined the Red Hat Certified Cloud Provider program in November 2013.
Google announced the public availability of the Google Compute Engine platform earlier this year. Compute Engine placed the company in direct competition with Amazon Web Services (AWS), and represented a strong step into the Infrastructure-as-a-Service space. Now, Google becomes only the second Red Hat Certified Cloud Provider to earn designation as a Red Hat Cloud Access-enabled partner.
“While we remain cautious around the maturing Unix-to-Linux migration cycle, the strength of the fiscal Q3 bounce back suggests that the combination of core Linux and JBoss (middleware), some contribution from RHEV (virtualization) and storage, and the halo effect of Red Hat’s aggressive move to become ‘Red Hat of OpenStack’ are sustaining mid-teens growth,” Turits wrote.
Red Hat reported its full-year fiscal 2014 earnings late Thursday, showing continued momentum for the Linux server operating system business leader. As Red Hat looks for future growth, the open-source OpenStack cloud platform is front and center.
Shares of Red Hat (RHT) today closed down $3.90, or almost 7%, at $52.23, after the company yesterday afternoon reported fiscal Q4 revenue and earnings per share that topped analysts’ expectations, but forecast this quarter, and the full year’s results below consensus.
Red Hat is out with a slew of news this week. As Susan covered earlier, the company reported better-than-expected quarterly results, aided by strong subscription growth for its Linux operating system, but also forecast full-year profit following below average analyst estimates. Along with that news, the company announced the Red Hat Enterprise Virtualization 3.4 Beta, which builds on the recent Red Hat Enterprise Virtualization 3.3 release, and aims to automate enterprise virtualization tasks while providing integration with OpenStack.
The new oVirt 3.4 release improves storage, high-availability and networking features.
The open-source oVirt virtualization project debuted its 3.4 release on March 27, providing users with new features to meet the expanding needs of workload virtualization.
Red Hat begins beta test of RHEV 3.4, an enhanced KVM virtual machine designed to continue simplifying and automating enterprise virtualization tasks while providing an on-ramp and a seamless integration with OpenStack.
Whitehurst is an avid advocate for open source software as a catalyst for business innovation.
“I am to technical people what a groupie is to a rock band,” he laughs. “In other words, what’s the point of being in a rock band if you don’t have people to appreciate the music?”
As an OpenDaylight project board member and the technical director of Software-Defined Networking (SDN) at Red Hat, Chris Wright knows what it takes to launch a successful open source, collaborative project. He’ll share some of what he’s learned through his experience with OpenDaylight in his keynote presentation at Collaboration Summit, March 26-28 in Napa. Here he gives us a preview of the talk and shares his predictions on which industries are primed for disruption through collaborative development.
If you’re a system administrator, what you really want is a stable operating system with long-term support, such as Red Hat Enterprise Linux (RHEL). If you’re a system programmer, what you really want is the latest and greatest program. What to do!
The next version of Red Hat’s Software Collections package includes Apache httpd and Nginx Web servers, Ruby 2.0, and NoSQL database MongoDB. They are all part of version 1.1 of Software Collections, a beta of which can now be downloaded, Red Hat said in a blog post Thursday.
One of Red Hat Enterprise Linux’s big selling points has been its consistency, in the operating system itself and the software packaged with it. Red Hat goes so far as to offer application certification — now with Docker support — to ensure the software running on top of RHEL behaves as expected.
Red Hat is out with its latest Sofware Collections package, arriving at version 1.1, and it is embracing Apache httpd and Nginx Web servers, Ruby 2.0, and NoSQL database MongoDB, among other previously unseen offerings. As Infoworld has noted: “One of Red Hat Enterprise Linux’s big selling points has been its consistency, in the operating system itself and the software packaged with it. Red Hat goes so far as to offer application certification — now with Docker support — to ensure the software running on top of RHEL behaves as expected. But what about developers who want to step outside the lines, so to speak, and run something a little more cutting-edge?”
Insiders have publicly bet against Red Hat’s platform-as-a-service, but I say it will stand by OpenShift without regret.
Matthew Garrett, a former Red Hat employee who has gained something of a public profile, suggested that Piston had got itself into Red Hat’s bad books by competing against it for a contract – and winning.
Containers aren’t quite virtual machines, but with recent advances in Linux, they can do many of the same jobs as a VM while using far less memory.
The other is an open source tool called Docker. Docker bundles applications into self-sufficient units called “containers.” These can be easily moved from server to server, and they include everything the application needs to run. Unlike a virtual machine — which recreates the entire operating system — Docker containers are can take advantage of the host server’s operating system and other software, even though the containers are separated from each other. Basically, it’s another way of improving the efficiency of your infrastructure.
“Containerization has emerged as an essential solution for sys-admins and developers, as it provides a flexible way to build, scale and deploy applications, and reduces the time and expense of cloud infrastructure,” said Al Hilwa, program director, application development software at IDC. “Docker is emerging as a standard for containerization, driving innovation among developers, sys-admins, and DevOps alike.”
Since we first wrote about Docker last August, the open source container project has advanced in numerous ways. Not only did the company behind it officially shed its original dotCloud name and put Docker at the forefront of its focus, but it also raised $15 million in funding and announced partnerships with the likes of Rackspace, OpenStack, Red Hat and Fedora.
Open source developer adds container certification for Enterprise Linux apps, aims to improve workload portability and ease maintenance burden.
Docker is nothing more than a handy container. But for a lot of use cases, it’s opening up amazing new possibilities for making development and deployment work together more closely than ever. It’s an open source project designed to make it easy to create lightweight, portable, self-sufficient containers of an application, allowing that containerized application to run just as easily on a massively scaled cloud as it does on a developer’s laptop. For projects like OpenStack, it’s a new way of deploying applications as an alternative to (or on top of) a virtual machine, while potentially using fewer system resources in the process.
Red Hat’s application certification program is nominally about ensuring that third-party applications and app platforms run reliably on Red Hat Enterprise Linux.
The newest candidate for certification, though, isn’t an application per se. Rather, it’s an application technology that stormed the Linux world and quickly became a major part of its landscape: containerization, which allows apps to be packaged to run almost anywhere with minimal muss or fuss.
“One of the most-requested features is private repos. Say you’re working on a project that you want to share with the world but is not yet ready for prime time. Now you can push your work-in-progress to a private repo on docker.io and invite only specific collaborators to pull from and push to it. When you’re ready, you can make your private repo public, and it’ll automatically be indexed and publicly searchable.”
I saw on the Fedora Xfce mailing list today that it looks like xfdashboardand xfce4-whiskermenu-plugin are coming to the Fedora Xfce spin’s ISO, if not as default choices at least as things you can add to your desktop after the fact.
Docker is a hot topic in the Linux world at the moment and I decided to try out the new trusted build process. Long story short, you put your Dockerfile along with any additional content into your GitHub repository, link your GitHub account with Docker, and then fire off a build. The Docker index labels it as “trusted” since it was build from source files in your repository.
It’s been a relatively quiet week. Snapshot support in virt-manager, automatic latest-code repos with dgroc, Fedora Plasma KDE-based product proposal, and Fedora Atomic Initiative.
We have very positive brand. When I go to a conference and talk about Fedora, obviously there are some complaints about specific things, but overall, people are happy with us. We have a very strong user and developer community — people are using Fedora in production in the real world, sometimes in amazing and crazy ways (for large-scale web hosting, as a platform for very high-stakes rapid stock trading, as the desktop for a not-small law firm, as the basis for the most popular CS course at Harvard…).
The Fedora Engineering and Steering committee convened today for talking about another round of Fedora 21 features. One week after approving a bunch of features for this Fedora Linux update due out in late 2014, there’s more features added to the list.
Last week there were a great number of interesting features approved for the Fedora 21 release due out in October~November. This week there isn’t quite as many items that were on the FESCo agenda, but there’s still some interesting work that hopes to make it into this next Fedora Linux release. The approved items at yesterday’s FESCo meeting were
Profiles would cover things like TLS/SSL and DTLS versioning, ciphersuite selection and ordering, certificate and key exchange parameters including minimum key length, acceptable elliptic curve (ECDH or ECDSA for example), signature hash functions, and TLS options like safe renegotiation.
Red Hat (RHT) has highlighted the transition from Unix platforms to open source Red Hat Enterprise Linux (RHEL) in awarding the 2014 Red Hat Certified Professional of the Year Award. The recognition goes this year to Jorge Juarez Acevedo of Banco Azteca, who oversaw the bank’s migration from Sun Solaris, HP UX and AIX servers to RHEL.
Red Hat did this because it believes there are three very different ways that 70 to 80 percent people tend to use Red Hat Linux distros. Businesses that want a lot of support and device and staff certification pay for Red Hat Enterprise Linux (RHEL). Fedora is for users, often developers who use the latest and greatest Linux and open-source software and want to be ahead of the curve. CentOS is for Linux experts who can handle their own support and want a stable platform.
With the latest Git development work for the Elementary tool-kit and library, applications can run directly from the DRM driver interface without any display server / compositor / window manager. Applications can be created to run in DRM and by setting the ELM_ENGINE=drm option the apps will run in a standalone mode without anything else underneath.
Current support work is being done to enable client-side applications (as opposed to making a Wayland compositor itself – that is a future plan). Currently EFL applications that use the lower-level Ecore-Evas and higher level Elementary API’s will work and display correctly in Wayland, handle input, resizing and moving. Client-side frames are already provided. Both Shared-memory buffers AND EGL/OpenGL-ES2 buffers are supported. The Shared-memory buffers are purely CPU-rendered, meaning that they will work with or without OpenGL hardware acceleration support. They are fast and usable. The OpenGL-ES2 display is fully accelerated with all primitives being rendered by OpenGL (Hardware acceleration) and already work fully due to a long history of supporting this under X11 and other embedded EGL/OpenGL-ES2 environments.
April 1, 2014. Today KDE makes available the first beta of Frameworks 5. This release is part of a series of releases leading up to the final version planned for June 2014 following the previous alpha last month. This release marks the freeze of source incompatible changes and the introduction of the Frameworks 5 Porting Aids.
And KDE knows what happens when you alienate a group of users since the moment when the anger of some people over KDE 4 lead to the first prominent fork of KDE software, the Trinity Desktop Environment.
Today KDE released updates for its Applications and Development Platform, the fourth in a series of monthly stabilization updates to the 4.12 series. This release also includes an updated Plasma Workspaces 4.11.8. Both releases contain only bugfixes and translation updates, providing a safe and pleasant update for everyone.
Part of the KDE PIM group is meeting over this weekend in Barcelona in the spacious BlueSystems offices, hacking on all sorts of things. Me and David Edmundson took the oportunity to do some super huge changes to our KPeople library that are needed and as the library is in its dawn, it’s better to do it sooner than later. These are all internal and boring changes, but one of the changes we’ve been working on here is really cool and worth mentioning.
The CD and DVD era is coming to an end and developers don’t really bother to innovate when it comes to applications that deal with this media. There are quite a few apps that are capable of writing to DVDs available for the Linux platform, and K3B is one of the best.
The fourth beta of digiKam Software Collection 4.0 is now available for photographers interested in testing out this popular KDE software component.
digiKam team is proud to announce the fourth beta release of digiKam Software Collection 4.0.0.
Qt3D is the Qt component that adds 3D support to Qt Quick for easily integrating 3D functionality. Qt3D has been in development for some time and was going to be an “essential” module to Qt 5.0 before being moved to just an add-on as part of Nokia’s Qt changes prior to selling it to Digia. Qt3D offers up a lot of potential for 3D user-interfaces and applications, but hasn’t seen too much work recently — the last time we got to mention it was when talking about OpenGL taking on a greater role within Qt in late 2012.
The KDE Project developers have just released the first Release Candidate of Applications and Platform 4.13, and it’s all about fixes and improvements.
“KDE has released the release candidate of the 4.13 versions of Applications and Development Platform. With API, dependency and feature freezes in place, the focus is now on fixing bugs and further polishing,” said the KDE developers.
“The Calligra team has released version 2.8.1, the first of the bugfix releases of the Calligra Suite, and Calligra Active in the 2.8 series. This release contains a few important bug fixes to 2.8.0 and we recommend everybody to update,” reads the official announcement.
Announcing her departure, Karen said: “Working as the GNOME Foundation Executive Director has been one of the highlights of my career.” She also spoke of the achievements during her time as Executive Director: “I’ve helped to recruit two new advisory board members… and we have run the last three years in the black. We’ve held some successful funding campaigns, particularly around privacy. We have a mind-blowingly fantastic Board of Directors, and the Engagement team is doing amazing work. The GNOME.Asia team is strong, and we’ve got an influx of people, more so than I’ve seen in some time.”
Zukitwo, a beautiful theme designed for GNOME 3.12 that makes use of the GTK2 engine Murrine and the GTK2 pixbuf engine, is now at version 2014.03.29.
The Zukitwo theme was updated shortly after the release of GNOME 3.12 and it’s probably the first theme to support the new version of GNOME. A lot of other themes will probably follow soon but, coincidentally, Zukitwo is also one of the best ones around.
Our dedication towards Wayland has pushed us to build a cleaner architecture overall. What used to be a proliferation of X-specific video and input drivers is mostly culminating in centralized, standardized code. For input, we have libinput, which we’re using from Weston, mutter, and Xorg as well. What used to be a collection of chipset-specific video plugins for doing accelerated rendering have now been replaced by glamor, a credible chipset-independent acceleration architecture. What used to be large monolithic components heavily tied to Xorg and the Xorg input and video architectures have now been split out into separate, easily-reusable libraries with separate, easily-maintainable codebases. New, experimental features can be prototyped faster than ever before.
One of the great things about Linux distributions is the customization. In contrast, an operating system like Windows 8 is rather limited. Sure, you can change some colors, wallpapers and sounds, but pretty much, it is what it is. What you see is what you get. That is probably fine for most people, however, Linux users are not most people.
Itching to get your hands on the latest goodies from Gnome? Look no further… If you’d like to see the project’s latest efforts, including getting the best look at the latest Gnome core apps (Music, Weather, Maps, Videos), Matthias Clasen has a special gift for you. He’s made a special live CD containing a complete Gnome 3.12 atop Fedora 20.
Review When the GNOME 3.x desktop arrived it was, frankly, unusable. It wasn’t so much the radical departure from past desktop environments, as the fact that essential things did not work properly or, more frustratingly, had been deemed unnecessary.
THE GNOME PROJECT has released Gnome 3.12, the latest version of the heavyweight Linux desktop environment, which adds support for better displays and faster startup times.
Earlier today GNOME 3.12 has been released, bringing major new features, several redesigned programs and three new applications: Logs, Sound Recorder and Polari.
The NSA and GCHQ hacked into the systems of three German satellite communication providers, according to the latest leaks from the files of Edward Snowden, fugitive ex-NSA sysadmin.
China’s Huawei Technologies Co Ltd “maintained calm” and operated “business as usual” after media reports saying the U.S. accessed servers at the telecom giant’s Shenzhen headquarters, acting Chief Executive Eric Xu said on Monday.
American cloud companies stand to lose billions of dollars in business because of Edward Snowden’s NSA revelations, and non-U.S. companies are already preparing to pick up the slack.
Snowden and Greenwald
Although the title of his talk was framed as a question, “Edward Snowden: Patriot or Villain?” — there really is no doubt that Ray McGovern, a former CIA analyst turned political activist, considers Snowden a patriot.
Staged ‘Leaks’ (Washington Post)
Reeling from the leak of classified data, NSA officials have anticipated future leaks by sometimes announcing them to the media preemptively, a minimization tactic according to one of the journalists still holding the intel agency’s documents.
A couple weeks ago, we learned from leaked documents that the NSA has the capability to record an entire country’s calls, texts, and email in real time. That’s a hell of a capability, and those documents revealed that it was being used in one country. Now, thanks to a retired NSA leader, we know which country that is: Iraq.
The entire article is a weak (and grossly transparent) attempt to recast General Keith Alexander’s legacy — and thus it seems that Inglis, Alexander and the NSA have no problem at all revealing the details of its capabilities in Iraq when the entire purpose in doing so is an attempt to show how good Alexander was for the NSA. Rest assured, however, had the same bit of information come out from one of the reporters with access to the Snowden documents, the NSA and all its defenders would be screaming as loud as possible about how the publication of such information would cost lives and create immense damage to American interests while aiding our enemies. Yet, apparently, it’s all fine and dandy to reveal such information… when it’s part of the effort to canonize the NSA retired leader.
The former head of the NSA, General Keith Alexander, has claimed numerous times that Edward Snowden’s leaks about the NSA’s vast spying programs on innocent American citizens and overseas allies has put the U.S. at serious risk.
One of the expected concessions to civil society is the promise to leave records at the telephone companies, so that the government would allegedly be able to obtain them only in an emergency situation. But in the cold light of the day, records will still be kept. So, what could the ‘metadata’ –information on personal phone calls, claimed to contain no names or content – reveal to the NSA or just to the people who have access to them?
A proposal that would require telecom companies to store phone records and make them easily accessible to the U.S. government may not be an insurmountable IT challenge, analysts say. But should that proposal become law, the way companies choose to implement the needed technology raises a number of questions about how that data will be transmitted and secured, and what steps telecoms will take to protect customer privacy.
A few plans are now on the table. There is the USA Freedom Act (Leahy-Sensenbrenner bill), the House Intelligence Committee Bill and the President’s own proposal. The latter has yet to find legislative form. President Obama’s proposal involves allowing phone companies to retain their databases of records in standardised, interoperable format. The focus on storage will shift from government agencies to telephony companies. The NSA would, in obtaining access, have to seek an order from the Foreign Intelligence Surveillance Court. In turn, the FISC would have to be satisfied that the records pertained to a person connected with a terrorist organisation.
Ron Wyden, the senator who is a leading voice in attempts to rein in the National Security Agency, has urged President Barack Obama to order an immediate halt to the bulk collection of domestic telephone metadata records.
Gen. Keith Alexander, the head of the US high-profile National Security Agency, stepped down from his post Friday, amid turmoil at the besieged spy agency.
Some other proposals to eliminate bulk data collection, but still offer the same sort of data on potential terrorists and their phone calls have now surfaced. One of the plans is offered by the House Permanent Select Committee on Intelligence (HPSCI) and backed by Obama. It would require a new authority to be created that would duplicate the core capability of the NSA program without having to collect bulk data.
Senate intelligence committee Chairman Dianne Feinstein said she supports requiring court approval for all searches of U.S. telephone records, setting the stage for a legislative fight over how to rein in the powers of the National Security Agency.
Response From Business
The good news for lawyers worried about maintaining their duty of confidentiality is that there are tools and safeguards to help them. In a session entitled “N.S.A.y What? Firm and Client Data Security & Encryption in the Age of Monitoring” held at ABA Techshow on Friday, Sensei Enterprises vice president John Simek and Oracle Corporation’s Chris Ries provided tips on gadgets and best practices for lawyers to use if they wish to avoid the NSA’s massive net.
A survey of 1,000 business leaders from around the world has found that many are questioning their reliance on “cloud computing” in favour of more secure forms of data storage as the whistleblower’s revelations continue to reverberate.
Toward Real NSA Reform
This month, the Utah State Records Committee ruled that the City of Bluffdale must release water records pertaining to the massive NSA data center located there.
Indeed, we have gone a long way down the road of violating American’s basic civil rights, as most recently revealed by whistleblower Edward Snowden who exposed the National Security Agency’s massive spy program, which Judge Richard J. Leon ruled Dec. 16, 2013, a violation of the Fourth Amendment to the U.S. Constitution and “almost-Orwellian.” This egregious violation of the privacy rights of American citizens has prompted Freedom Watch to file for class action certification in its epic lawsuit against the NSA, the first of its kind, in order to open it up to all the Americans whose constitutional rights have been defiled. The new class action suit expands the allegations of constitutional violations to include the NSA’s collection of Internet metadata, social media and its spying on overseas phone calls under its so-called PRISM program.
Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency’s ability to eavesdrop on some Internet communications, according to a team of academic researchers.
TO keep an eye on his child via his smartphone, Marc Gilbert installed Internet-connected video baby monitors in his home in Houston. One evening, Gilbert heard a stranger’s voice bellowing obscenities from the monitor. He disconnected the device after realizing that it had been hacked.
Bruce Schneier: “At SXSW earlier this month, CEO Eric Schmidt tried to reassure the audience by saying that he was ‘pretty sure that information within Google is now safe from any government’s prying eyes.’ A more accurate statement might be, ‘Your data is safe from governments, except for the ways we don’t know about and the ways we cannot tell you about. And, of course, we still have complete access to it all, and can sell it at will to whomever we want.’”
Technology that remotely makes a stolen smartphone useless could save American consumers up to US$2.6 billion per year if it is implemented widely and leads to a reduction in theft of phones, according to a new report.
CIA got DOJ to authorize “water dousing”
For years, the CIA has been feuding with the Senate Intelligence Committee over its report on Bush-era “enhanced interrogation techniques,” and now we know why. While the 6,300-page report remains classified, on Monday U.S. officials described its contents in detail to the Washington Post. The report concludes that the CIA routinely misled members of Congress and the public by suggesting detainees gave up key information due to the use of those brutal techniques, when they had actually talked before the interrogation. “The CIA described [its program] repeatedly both to the Department of Justice and eventually to Congress as getting unique, otherwise unobtainable intelligence that helped disrupt terrorist plots and save thousands of lives,” said one U.S. official. “Was that actually true? The answer is no.”
Sources have told the Associated Press (watch out for another round of phone record-snatching, guys!) that the Senate Intelligence Committee report at the center of a fight between the committee and the CIA confirms what many observers knew or suspected: Waterboarding and harsh interrogation techniques did not provide any useful information to catch Osama bin Laden. In every case where the CIA used torture and claimed it helped, there were other explanations as to where they got the information.
Intelligence committee finds methods such as waterboarding did not produce any crucial evidence in hunt for al-Qaida leader, aides say
A report by the Senate Intelligence Committee concludes that the CIA misled the government and the public about aspects of its brutal interrogation program for years – concealing details about the severity of its methods, overstating the significance of plots and prisoners, and taking credit for critical pieces of intelligence that detainees had in fact surrendered before they were subjected to harsh techniques.
The CIA repeatedly misled the US government over the severity and effectiveness of its interrogation methods, the Washington Post reports.
A long-awaited US Senate report said that the CIA used secret “black sites” to interrogate prisoners using techniques not previously acknowledged.
These included dunking suspects in icy water and smashing a prisoner’s head against a wall.
The Defence Ministry refused on Monday to share details of CIA chief’s visit to Pakistan with the Senate Foreign Affairs Committee.
The committee had asked for details of the visit of CIA Director John Brennan to Pakistan in the last week of February for meetings with Army Chief Gen Raheel Sharif and ISI Director General Lt Gen Zaheerul Islam.
There are many other arenas where we could explore the tension between proclaimed individual values and the contradiction of policies which emanate from the White House. The one I wish to focus on is the use of drones – unmanned aerial vehicles – now becoming the go-to strategy for fighting “the war on terror”, even as that name has now fallen out of favor.
Drone missiles may have prompted outcry from international human rights groups and controversy in the media, but unmanned air vehicles could be on the verge of being upstaged by a new weapon on the block: Lethal Autonomous Robotics (LARs). This emerging breed of technology will be able to select a target, aim and fire with no intervention from human beings beyond programming and deployment. War could be about to get a lot cheaper, a lot less bloody… and a lot more frequent.
The drone assassination campaigns are one device by which state policy knowingly endangers security. The same is true of murderous special-forces operations. And of the invasion of Iraq, which sharply increased terror in the West, confirming the predictions of British and American intelligence.
Armed drones, more than any other weapons system, need international regulation because their very nature makes it easier to stealthily wage war. Since the use of drones can cancel out the need for boots on the ground, they can be used to target countries even when the attacker has not declared war on them. Pakistan, along with Yemen, has most suffered from this new kind of war that drones facilitate and so it is no surprise that we have consistently taken the lead at international forums to have the drone war declared illegal and the use of the weapon be strictly regulated by the UN.
What would you do if you witnessed someone killing innocent people? Would you be brave enough to do something to make them stop? We all hope we would be that brave. But if that “someone” is our government and the weapons are missiles and unmanned aerial drones, it seems that our answer is different.
The political and economic foundation of the United States is built on the corpses of legal lynching, or “lynch law”. Without the genocide and enslavement of Black and indigenous peoples, the US capitalist class could not have amassed its profits, wealth, or power. Following the passage of the 13th Amendment that supposedly ended Black chattel slavery at the close of the Civil War, the US capitalist class moved quickly to reorganize the capitalist economy so newly “freed” Blacks would remain enslaved. Convict-leasing, sharecropping, and legalized segregation ensured Black exploitation and white power. These brutal forms of exploitation were kept intact by white terrorism in the form of lynching.
People are angry over Albuquerque police’s involvement in 37 shootings, 23 of them fatal, since 2010. Critics say that is far too many for a department serving a city of about 555,000.
Robert H. Richards IV does not work. He doesn’t have to. The great-grandson of Irénée du Pont, the chemical magnate who provided much of the financial backing to a failed effort to defeat Franklin Delano Roosevelt during the 1930s, Richards lives off a trust fund in a 5,800 square foot mansion he bought for $1.8 million. When he is not staying in his mansion, he might be found in his beach home “in the exclusive North Shores neighborhood near Rehoboth Beach.”
After a demonstration in Madrid on Saturday night, seven photographers were assaulted, beaten and injured by police as they tried to cover an arrest.
Academy Award-winning documentary filmmaker Errol Morris joins us to talk about his new film, “The Unknown Known,” based on 33 hours of interviews with former Defense Secretary Donald Rumsfeld. The title refers to an infamous press briefing in 2002 when Rumsfeld faced questions from reporters about the lack of evidence of Iraqi weapons of mass destruction. “The Unknown Known” is Morris’ 10th documentary feature. He won a Best Documentary Oscar for his film “The Fog of War: Eleven Lessons from the Life of Robert S. McNamara.” His other films include “Standard Operating Procedure,” about alleged U.S. torture of terror suspects in Abu Ghraib prison, and “The Thin Blue Line,” about the wrongful conviction of Randall Adams for the murder of a Dallas policeman. The release of “The Unknown Known” comes in a month marking 11 years since the U.S. invaded Iraq, leaving an estimated half a million Iraqis dead, along with at least 4,400 American troops.
The Journal leaves out one other parallel with Vietnam: war crimes. The Pakistan army is responsible for disappearances, unlawful detention, extrajudicial killing, bombardment of villages, and mass displacement of Pakistan’s tribal peoples..
A Facebook meme argues that Americans are pretty two-faced when it comes to Russia’s recent annexation of Crimea.
The meme says, “22 Countries Invaded by the U.S. in 20 Years. Russia Does It and Everyone Loses Their Mind,” illustrating its point with a photograph of Heath Ledger’s Joker character from Batman movie The Dark Knight.
A reader asked us to check this claim, so we did. Fortunately, the post that accompanied the meme listed the nations that had been “invaded,” along with the years of the purported invasion.
Guess which country held its ‘first free election in decades’ and which held a ‘bogus’ and ‘illegal’ referendum under military occupation.
RSS Feed: subscribe to the RSS feed for regular updates
Site Wiki: You can improve this site by helping the extension of the site's content
Site Home: Background about the site and some key features in the front page
IRC Channels: Come and chat with us in real time