Since first running into TrackingPoint at CES 2013, we’ve kept tabs on the Austin-based company and its Linux-powered rifles, which it collectively calls "Precision Guided Firearms," or PGFs. We got to spend a few hours on the range with TrackingPoint’s first round of near-production bolt-action weapons last March, when my photojournalist buddy Steven Michael nailed a target at 1,008 yards—about 0.91 kilometers—on his first try, in spite of never having fired a rifle before.
But big, heavy, bolt-action rifles were only the beginning, with the underlying idea being that the company would scale its weapons both up and also down in size. And, last month, we day tripped back out to the Best of the West range just outside of Austin in Liberty Hill to lay hands on TrackingPoint’s newest set of PGFs, the TP AR 556 and TP AR 762. Unlike the big XS-series long rifles we fired last time, these newest PGFs are semiautomatic carbines—the type of weapon that the media usually (and incorrectly) refers to as "assault rifles."
Chromebooks have proven to be wildly popular in schools. More than a million Chromebooks were sold to schools this spring alone.
We're now around the half-way point of the Linux 3.17 merge window with at least another week expected before the 3.17-rc1 release depending upon Linus Torvalds' travel around LinuxCon and the Kernel Summit in Chicago. While we're only half-way through the merge window, there's already enough new functionality to warrant a summary article for those that haven't been keeping up with all the Linux 3.17 coverage.
Being merged into the mainline kernel code-base for Linux 3.17 was the big DRM feature pull that included enhancements to the Intel and AMD Radeon graphics drivers (among the other smaller DRM/KMS drivers), but missing from action was the open-source NVIDIA driver. The Nouveau driver changes were delayed by some last-minute bug-hunting but now a separate pull request was issued to land the Nouveau driver updates for Linux 3.17.
A terminal emulator is computer software which emulates a dumb video terminal within some other display architecture.
A terminal emulator allows the user to access a console and all its applications such as command line interfaces (CLI) and text user interface software. Even with modern desktop environments, it remains the case that accessing the command-line interface lets users perform tasks that would be very difficult, or too repetitive to undertake from a graphical environment. Using the command-line is often the quickest and most convenient way to perform many tasks.
Develop a good working knowledge of Linux using both the graphical interface and command line, covering the major Linux distribution families.
A new development version of Wine, 1.7.24, has been announced by Alexandre Julliard and it features support for a couple of new features.
StuntRally, a free racing game that features over 150 tracks and lots of cars, has just reached version 2.4 and and it bring numerous updates and new features.
With Linux comes choice. Along with that choice, comes debate. Which desktop is the best? Which offers the most user-friendly experience? The questions are not only never-ending, but date back over a decade where the “war” between KDE, GNOME, and every other desktop was given voice. I would, contend, however, that there is a desktop for every kind of user to be found within the Linux landscape. To that end, I want to take some of the most popular desktops and match them to end users.
Iikka Eklund of Digia has announced that Qt 5.4 is under its feature freeze state after several months of development.
The Qt 5.4 feature freeze is coming as planned. Qt developers hope to do an alpha release next week (14 August), a beta release on 4 September, release candidate on 2 October, and the final release on 23 October. Of course, with Qt releases the schedule is subject to change pending any last minute bugs, etc, as with all Qt5 updates thus far the official releases have ended up slipping by about one month.
A Qt fan asked developers this weekend about what features might be candidates for a release that breaks from Qt5 and goes to Qt6 or even then to Qt7.
After 5 months we are releasing a new version of plasma-nm for KDE 4.x containing a lot of bugfixes, minor design improvements and internal changes (see my previous blog post). This is probably last major release since we are now focused to KF5/Plasma 5 version, but we will be still backporting all fixes and you can expect at least one more bugfix release in future.
You can get a tarball from usual location, compile it from git or wait for an update in your distribution.
This screenshot shows the QML/JS KDevelop plugin working as usual, highlighting declarations and uses, finding types, and displaying nice tool-tips. The code-completion also works even if it is not visible on the screenshot. What is interesting is the look of KDevelop: do you see the flatter theme? The colors that are a bit different than usual? This difference is appearance comes from the fact that this is not the usual KDevelop, this is KDevelop 5, based on Qt5 and on the shiny new KDE Frameworks 5.
The Randa Meetings started yesterday and approx. 45 people incl. friends and family are already here. More are still to arrive.
Michael Tremer, a developer for the ipfire.org team, has announced that IPFire 2.13 Core 81, a new stable build of the popular Linux-based firewall distribution, bringing quite a few security fixes.
DEFT 8.2 is the latest release of DEFT 8. What has been fixed?
Slackel Fluxbox 1.0 Live, a distribution based on Slackware and Salix that uses the Salix tools and packages, has been released and is now available for download.
Clang is finally co installable on Debian. 3.4, 3.5 and the current trunk (snapshot) can be installed together.
So, just like gcc, the different version can be called with clang-3.4, clang-3.5 or clang-3.6.
The Linux Mint developers have decided to switch the Debian edition for the Linux distribution from the current snapshot cycle to a Debian Stable package base.
KeyCoin is today’s Random Coin of the Day for its extensive development, including a full on customized version of TailsOS, the Linux distribution where Tor protects all communication. The team also has trading tools and an encrypted messaging system in the works along with a few other amazing features.
Shutter, a feature-rich screenshot program that allows users to capture nearly anything on their screen without losing control, is now at version 0.92.
As you may know, Canonical is constantly updating Unity 8 and Mir, which are now used only on Ubuntu Touch, but starting with Ubuntu 14.10, a special Unity 8 and Mir flavor will be released.
“Freya inherits core components from Ubuntu 14.04.1 LTS such as the Linux kernel (version 3.13), hardware drivers, and graphics stack. This includes support for EFI stub-loading, which is a kernel feature that enables booting directly from (U)EFI, without the need for an additional bootloader such as GRUB. Ubiquity does not yet have support for this configuration, but one of our developers has created a guide for a GRUB-free install of Freya on modern Mac computers using rEFInd.”
The new Raspberry Pi B+ board is a great upgrade over the RPi B board. I give it an A-.
I few weeks ago I announced I was joining Linaro. I work there as Director of Core Development Group. I moved from Prague to Cambridge (the original), that is, from continental to oceanic climate. From dry, cold in winter and hot in summer to wet, soft in summer and above zero most of the winter. In theory an improvement, you might think. Well, depending on much it rains. I will tell you better in spring.
A few days ago The Mukt published and interview where I explained a little what is Linaro and what do I do as Core Development Director.
Android-x86 is an unofficial initiative to port Google's Android mobile operating system to run on devices powered by Intel and AMD x86 processors, rather than RISC-based ARM chips. The project began as a series of patches to the Android source code to enable Android to run on various netbooks and ultra-mobile PCs, particularly the ASUS Eee PC.
Taking a look back at the week in news across the Android world, this week’s Android Circuit highlights a number of stories, including the first impressions and images of the Moto 360 smartwatch, the Meta M1 breaks cover, more news on a potential antitrust investigation of Android in the EU, China’s dominance of the Chinese Android market, Samsung and Apple drop some patent cases, and the Tab 4 Nook has a launch date.
For now, the Gecko layout engine which is Firefox based on, has been made to work with Weston, the Wayland official reference compositor, but the keyboard input has been broken and the decorations are not displayed well, but the process is in its early stages.
Just about two weeks ago, I got a Flame and have decided to use it as my primary phone and put away my Nexus 5. I’m running Firefox OS Nightly on it and so far have not run into any bugs so critical that I have needed to go back to Android.
I have however found some bugs and have some thoughts on things that need improvement to make the Firefox OS experience even better.
Two versions of LibreOffice were released in quick succession. You’ll find the latest iteration of the successful 4.2 series announced here, but slightly ahead of that 4.2.6 release, there was also the bump to a new development cycle. I was on a field trip to the US at the time of the 4.3.0 release announcement and was unable to devote time to updating the SlackBuild script and provide packages earlier than today.
For once, "our" is a totally appropriate modifier for discussing a spacecraft. ISEE-3 was originally a NASA spacecraft launched in the 1970s, but since then it's been the subject of the first-ever public crowdfunding campaign to provide it a budget when normal funding was fully allocated to other functional, amazing science projects. After the massive collaborative effort required to get it going again, it's also the first crowdsourced spacecraft. Despite being decades old, this craft is hip enough to make Zaphod Beeblebrox envious, as the buzzwords continue with running free software (GNU radio) and providing open-access data.
It’s been exactly ten years since the launch of OpenStreetMap, the largest crowd-sourced mapping project on the Internet. The project was founded by Steve Coast when he was still a student.
Wednesday is the day we've been waiting for when hopefully the lid will be lifted on OpenGL 5 by the Khronos Group.
Given Anthropogenic Climate Disruption (ACD) and our dwindling capacities for producing enough healthy food, a cutting-edge farming technique of a design engineer in Port Townsend, Washington, dramatically increasing produce yield, may well already be filling a critical void.
[...]
The corporate answer to the food crisis has been to introduce genetically modified organisms (GMOs) in an effort to expand crop sizes and yields. The outcomes and implications of this, however, continue to prove detrimental to both the environment and human health.
This year's Black Hat information security Relevant Products/Services conference in Las Vegas set an attendance record -- and brought attention to a host of severe security threats. Presentations ranged from how any USB device could be hacked and creating fake Web sites, to the discoveries that Russian hackers had amassed 1.2 billion logins and that 2 billion smartphones were vulnerable to hijacking.
It's possible to build a cloud botnet using free trials, but thanks to a new effort from security firm Bishop Fox, there is now a framework to limit the risk.
Smart traffic sensor systems that help regulate and automate the flow of traffic and lights contain security weaknesses that could be manipulated by hackers and result in traffic jams or even crashes, a researcher showed here today.
Several former US intelligence officers with a cumulative total of 260 years in various parts of US Intelligence recently wrote to President Barack Obama, expressing concern over ‘evidence adduced so far to blame Russia for the July 17 downing of Malaysian Airlines Flight 17’.
The United States expanded its Iraq air campaign over the weekend to beat back Islamist militants determined to kill members of a religious minority.
Fighter jets and drones struck ISIS fighters firing on ethnic Yazidis near the northern town of Sinjar, where extremists had driven tens of thousands fleeing into nearby mountains.
US forces launched a second wave of air strikes against Islamic extremists near Arbil in northern Iraq on Friday, destroying a militant convoy and killing a mortar team, the Pentagon said.
And since when has the U.S. advocated weapons non-proliferation? As the world's No. 1 weapons salesman, with one-third of its foreign aid budget often military aid, the U.S. has equipped dictators with weapons to slaughter thousands. If supplying weapons is evil, shouldn't it be consistently condemned? Consider school shootings. Does Obama blame the nation that supplied the guns?
The clashes deepened the sense of crisis surrounding Mr. Sharif’s government, whose power has already been undermined by a troubled relationship with the country’s military leadership. The prime minister now faces the prospect of a series of major streets protests led by Mr. Qadri and, more substantively, his rival in the opposition, Imran Khan.
The greatest mystery—or better said, mystification—to be overcome is the apparent contradiction between America’s proclaimed principles and the intensity of its covert operations practices. Philip Agee once called the CIA, “capitalism’s invisible army”. He recalled that one of his first tasks as a junior CIA officer had been to conduct background checks on Venezuelan applicants for jobs at the local subsidiary of a major US oil company.9 In fact, his conclusion after quitting the “Company” was that capitalism could never be maintained without an extensive military and secret police force to suppress opposition to it.
Indeed, numerous studies and books have shown that the American government, or CIA to be precise, has been behind some of the major coups in Africa as in the rest of the developing world. The CIA for example, is believed to be behind the overthrow of Ghana's Kwame Nkrumah as well as the assassination of DR Congo's Patrice Lumumba.
Dramatic increases in infant mortality, cancer and leukaemia in the Iraqi city of Fallujah, which was bombarded by US Marines in 2004, exceed those reported by survivors of the atomic bombs that were dropped on Hiroshima and Nagasaki in 1945, according to a new study.
He looks exactly the same. Navy blue suit, crisp white shirt and reddish tie. Lego-like cropped black hair, with a dash of white at the fringe. But these days, 3,000 miles away from the grand corridors of Whitehall through which he once strode, David Miliband navigates the cramped 12th floor of an office tower in midtown Manhattan.
After the Toledo Blade received months of criticism for reluctantly hosting National Rifle Association board member Ted Nugent at their food and music festival, the conservative commentator repaid the Ohio paper by declaring that "So as long as you know the Toledo Blade hates you, you're a good American."
Nugent has been a source of virulently racist, sexist, and homophobic commentary for years, but his January declaration that President Obama is a "subhuman mongrel" has triggered a wave of cancellations and protests of his concerts.
The social network isn’t impressed. Maybe it’s the shock of seeing your bubble butt popping out of skimpy bikini. Or maybe it’s just because you’re a porn star.
Here’s what I know:
The application that serves up the icanhazip services is not compromised The virtual machine on which the application resides is not compromised The application is returning valid data with no evidence of serving malware
We've been covering the extreme and misinformed attempts by the City of London Police to become Hollywood's personal police force online (despite only having jurisdiction for the one square mile known as the City of London). As we've noted, the City of London Police don't seem to understand internet technology at all, nor do they have any jurisdiction to pull down websites. Yet, despite the total lack of a court order, many clueless registrars see letterhead from a police department and assume everything must be legit, even though this completely violates ICANN policy for domain registrars. Much of this is done in "partnership" with legacy players from the industry, who the police seem to listen to without any skepticism at all. It would be like the NYPD giving control of banking fraud investigations to Goldman Sachs.
Phil Zimmermann, the creator of Pretty Good Privacy public-key encryption, has some experience when it comes to the politics of crypto. During the “crypto wars” of the 1990s, Zimmermann fought to convince the US government to stop classifying PGP as a “munition” and shut down the Clipper Chip program—an effort to create a government-mandated encryption processor that would have given the NSA a back door into all encrypted electronic communication. Now Zimmermann and the company he co-founded are working to convince telecommunications companies—mostly overseas—that it’s time to end their nearly century-long cozy relationship with governments.
American intelligence officials lack evidence that leaks from former National Security Agency contractor Edward Snowden are behind the Russian and Chinese governments’ heavy crackdowns on U.S. tech giants.
A former high-ranking American intelligence official told VentureBeat late Thursday that U.S. intelligence believes the Snowden leaks — regarding the infiltration of Microsoft, Yahoo, and others by the NSA — are behind the Russian and Chinese backlash. But, the source said, plenty of questions remained unanswered — and so far there’s no proof of a connection.
Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.
Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.
The leaked files contain more than 40 gigabytes of confidential technical material, including software code, internal memos, strategy reports, and user guides on how to use Gamma Group software suite called FinFisher. FinFisher enables customers to monitor secure Web traffic, Skype calls, webcams, and personal files. It is installed as malware on targets' computers and cell phones.
Internet Service Providers Association of India (ISPAI), on the other hand, believe the move could conflict with privacy of an individual. Also, there is no regulatory requirement for making phone number must for having an email address.
Australian Attorney General George Brandis seems to be working extra hard to demonstrate just how completely clueless he really is. On both copyright and surveillance, it's pretty clear that he doesn't even remotely understand the details, but is willing to go all in to support some misleading claims that someone told him. On the surveillance front, he recently claimed (incorrectly) that data retention rules are a must (and that whistleblowers should be thrown in prison).
I was thinking of this cavalier attitude towards the issues of confidentiality and privilege when I read that the National Security Agency or one of its cooperating partners had listened in on private attorney-client communications between a law firm and a foreign client.
Yesterday at DEF CON we had the chance to listen to Christopher Soghoian, Principal Technologist, American Civil Liberties Union talk about the state of the surveillance state and how we can help fight against it. Of course you might think that his talk would be about the use of spy proof technologies, but oddly enough very little of that was talked about except to make it clear that talk of spy-proof technology makes people in Washington nervous.
Since Edward Snowden helped reveal wide-scale government snooping programs, the conspiracy-oriented elements of the cyber-security community have become a little more emboldened.
Speaking the truth in times of universal deceit is a revolutionary act, so said George Orwell, author of "1984."
In a world where political hyperbole has become so prevalent that it has for the most part lost the ability to impact an audience, it's easy to routinely dismiss things like the commonly tossed-around Watergate comparisons that abound in political media. Indeed, it's practically newsroom SOP to affix a gate suffix to any scandal big enough to make the evening broadcast – Lewinsky-gate, Benghazi-Gate, Bridge-gate, etc.
Since 2008 the Senate Intelligence Committee has been investigating the interrogation procedures the CIA used on terrorist suspects. It produced a 6,000-page report plus a 700-page summary. In discussing the summary, Obama said, “We tortured some folks,” using a word — “torture” — the CIA abhors.
[...]
That’s ridiculous. People may argue over what’s torture and what’s not, but keeping facts secret to cover your backside — which is what’s going on here — is unacceptable.
Sen. Dianne Feinstein, California's senior senator and a longtime hawk on national defense, is leading an epic constitutional struggle against unlikely foes: the CIA and fellow Democrat President Obama. So far, she's winning.
Police should carry out a prompt, impartial, and thorough investigation into the death of an independent journalist in Russia’s North Caucasus, Human Rights Watch said today. Timur Kuashev, a freelance journalist and rights activist, was found dead in the outskirts of Nalchik, the capital of Kabardino-Balkaria, on August 1, 2014. His friends and colleagues told Human Rights Watch they strongly believe Kuashev’s death was a murder in retaliation for his activism.
What's that saying about a lawyer who represents himself? Yes, well, consider the case of lawyer Jeffrey Wilens, representing himself pro se, in a "trademark" lawsuit filed against Automattic, the company better known for WordPress, the content management system/hosting service that a large percentage of the internet now uses. Wilens appears to have someone who doesn't like him very much, who set up a bunch of websites using Wilens' name and the name of his legal practice, Lakeshore Law Center. Wilens is claiming that this is trademark infringement, based on a trademark on his name and the name of his law practice. Even if he were just going after whoever made the page, this would be a massive long shot. As we've covered for years, so-called "gripe sites" are not considered trademark infringement. There's no likelihood of confusion, they're almost never commercials, and shutting them down would often violate the First Amendment. But Wilens is pointing his legal guns not just at whoever made the site, but also at Automattic for allowing the site to be created and hosting it (he also sued Google, but recently dismissed the company from the case).
Three years ago, the UK government published the Hargreaves review of copyright laws in the digital age.
As we wrote yesterday, the infamous monkey selfie has returned to the news, thanks mostly to Wikimedia's new transparency report, which discusses the supposed copyright claim over the following monkey selfie...
This week, police took unprecedented action by shutting down proxies facilitating access to torrent sites blocked in the UK. With the surprise arrest of the sites' alleged operator leaving people scratching heads, TorrentFreak decided to find out what emboldened police to go after sites that neither carry nor link to any infringing content.
[...]
This week, however, PIPCU delivered a surprise. Instead of going after sites that host or link to infringing material, they targeted a series of sites that have never done so, arresting their alleged operator in the process.