CIO Gerard Insall predicts major cost savings by shifting away from an IBM operating system. The move is part of a larger IT modernization program geared toward cutting costs and increasing agility at the car rental and sharing company.
A report in “The Inquirer” states that China has previously denounced Windows 8 as a spyware tool and would therefore be developing its own distribution called “NeoKylin”, based on Ubuntu.
Our Partner Lounge at the SF event features Tableau, Red Hat, DataStax, MongoDB, SaltStack, Fastly and Bitnami. Bitnami announced its Launchpad for Google Cloud Platform featuring almost 100 cloud images, enabling our users to deploy common open source applications and development environments on our infrastructure in one-click. Fastly announced a new offering called Cloud Accelerator, a collaboration with Google Cloud Platform that improves content delivery and performance at the edge.
A few months ago, I covered the news that Google had released Kubernetes under an open-source license, which is essentially a version of Borg, designed to harness computing power from data centers into a powerful virtual machine. It can make a difference for many cloud computing deployments, and optimizes usage of container technology. You can find the source code for Kubernetes on GitHub.
The latest exciting hardware we've been testing at Phoronix are two Xeon Haswell processors that are compatible with the MSI X99S SLI PLUS motherboard. Needless to say with being an Intel processor and especially a workstation-class product, the Xeon E5-1680 v3 and Xeon E5-2687W v3 are running great with Linux.
Intel users should see a major improvement with their hardware after a group of developers from LunarG found out that there was a bottleneck in the DRM driver.
Over the past year I've been reading a lot of opinions on the new init technology, systemd. Some people think systemd is wonderful, the bee's knees. Others claim that systemd is broken by design. Some see systemd as a unifying force, a way to unite the majority of the Linux distributions. Others see systemd as a growing blob that is slowly becoming an overly large portion of the operating system. One thing that has surprised me a little is just how much people care about systemd, whether their opinion of the technology is good or bad. People in favour faithfully (and sometimes falsely) make wonderful claims about what systemd is and what it can supposedly do. Opponents claim systemd will divide the Linux community and drive many technical users to other operating systems. There is a lot of hype and surprisingly few people presenting facts.
After a quiet year Tomahawk, the Swiss Army knife of music players, is back with a brand new release to sing about.
Version 0.8 of the open-source and cross-platform app adds support for more online services, refreshes its appearance, and doubles down on making sure its innovative social features work flawlessly.
Flow ‘N Play is a new video player written in Qt which features a pretty slick and simple interface which provides only the basic features for playing movies.
Exaile has been a bit quiet in the past two years with maybe only one or two stable releases, but nevertheless, it’s one of the full-featured music players for GNOME which are on par with applications like Rhythmbox or Banshee in terms of features. However, over the past two months a new stable release, 3.4, has been put out under the slogan “We’re not dead yet”, as well as an incremental 3.4.1 release, which shipped on November 1. To be honest, Exaile has so many features that I could go on writing a lot more than an article to cover them all, so let’s have a look at some of the most notable ones.
QEMU 2.2 is under development to further advance Linux virtualization/emulation capabilities. QEMU 2.2-rc0 is now available as the first test release.
It was three years ago when Adobe has started to create its free open source text editor dubbed as Brackets. Since then, the company has been very busy adding new features to the text editor, aiming to help Brackets gain a world class status. The latest release, its 45th to be exact, is described as a big milestone for the Brackets project and the company's way of announcing to the world that Brackets is ready.
Desura, the digital distribution platform that's similar in nature to Valve's Steam client and is popular with indie game studios, has been sold off by Linden Labs.
It's been a bumpy ride for 7 Days To Die as we have extensively covered here, but the developers finally decided to update Linux users waiting on it.
I still don't see what's so hard for developers to be open with communication (Developers could take notes from Aspyr Media on their recent blog posts), but that aside if they do actually release 7 Days To Die on Linux as promised then the issues we had with them will have gone.
I'm happy to announce our games Sales Page has been revamped to be much more useful for you with new filters and sorting options! It may look mostly the same, but it's had a lot of changes behind the scenes.
Steam launched into beta for Linux on the 6th November 2012 and it's been one hell of a ride for Linux gamers since. This was the first time they let in a group of outsider gamers to test out the client.
Previously they put up a sign-up page where you could note your interest to test it and they were overwhelmed by the amount of people wanting to try it. In the first week they had more than 60,000 people sign up for the first Linux beta of Steam.
War Thunder is one of the best World War 2 games on PC - a period flight and tank sim specialising in combat of the ground-to-air-and-back-again variety. It’s seen ginormous success on Windows, where you could find five million War Thunder players a year after its launch in open beta.
I just want to inform you (those who are still running KDE 4) that we released a new version of your favorite network applet. This new release brings to you many bug fixes and should make your life easier. We really recommend to update to the new version as we, not intentionally, introduced some new issues in the previous version. Together with the new release of plasma-nm we also released our libnm-qt library which is also needed if you want to have fixes from plasma-nm properly working.
Aaron Seigo is a seasoned open source developer who leads the Plasma team at KDE. He also tried to bring a Linux-based tablet to the market through his Vivaldi project. He recently joined Kolab Systems, and we talked to him as well as Kolab CEO Georg Greve to understand what Kolab does and how Aaron, a KDE developer, will help the company.
KDE's Sebastian Kügler has written a lengthy blog post about some of the items that developers will hopefully accomplish in 2015 for Plasma 5.
Our instant messaging application KDE Telepathy 0.9.0 has been released. Packages are avaialble for Kubuntu 14.10 and our development version Vivid.
Qt4 has been deprecated since Qt5's first release on December 19th 2012, that means almost two years ago!
I was glad to be invited to FSONCS 2014 in Gothenburg, Sweden. Remember that this is also the place for next year’s GUADEC! This year’s FSCONS was attended by around 150 people or so. I guess it was a bit less. That might not sound like a lot, but it’s a very cool event with many interesting people and talks.
While Compiz 1.0 might never be reached given its diminishing usage these days and bleak outlook with Unity 8 being designed around Mir, Compiz 0.9.12 was released today with some minor new developments.
4MLinux Media Edition, a special distribution with a wide set of multimedia tools and software, has advanced to version 10.1 and is now ready for download and testing.
Kano is a computer and coding kit that is suitable for all ages. Well, to be truthful, Kano's step-by-step instructions in the included booklets and its simplified Linux-based operating system target kids aged 6 to 14.
Pisi Linux KDE 1.1, an open source solution based on the Pardus Linux distribution, is now available for download and it comes with a lot of new features and changes.
The first beta of the OpenELEC 5.0 multimedia focused Linux distribution is now available for testing. OpenELEC 5.0 is to be aligned with the upcoming Kodi 14 that's the re-branded XBMC.
CPLANE NETWORKS, the leader in high-performance Software-Defined Networking (SDN), today announced that Dynamic Virtual Networks (DVN) V1.1 has achieved certification for Red Hat Enterprise Linux OpenStack Platform. DVN transforms static physical networks into virtualized resource pools that can be allocated on demand, significantly reducing the time and cost to deploy cloud applications.
Previously, Fedora was first and foremost a desktop distribution that also contained server elements. If all went well, the new features introduced in Fedora would eventually appear in Red Hat Enterprise Linux (RHEL). This go-around, there are three Fedora spins: one for the cloud, one for the server, and one for the workstation.
For reasons I can’t recall I have my encrypted /home *not* on a logical volume so growing it into the free space on the new disk basically just involved booting from a live USB stick, unlocking the LUKS volume, using gdisk to delete the existing partition and creating a new, larger one starting at the same offset, e2fsck, and resize2fs. If you’re going to do this yourself, you should of course back up your data first.
No, no, we won't have Beta Council, we're going to have final release from beginning (although implementation details has to be sorted out). It was just a coincidence - Fedora 21 Beta was released the same day as Council elections nomination period opened. Two announcements that had to go out yesterday.
Sometimes you can talk a subject to death and it won't matter. So, it helps greatly for people who have no Linux experience to get a visualization of what Fedora is all about.
The Fedora Project has released the first Beta for Fedora 21, taking this distribution a lot closer to the final version, which should land in a little over a month.
With the Jessie freeze approaching, I took care of packaging some new upstream releases that I wanted to get in. I started with zim 0.62, I had skipped 0.61 due to some annoying regressions. Since I had two bugs to forward, I took the opportunity to reach out to the upstream author to see if he had some important fixes to get into Jessie. This resulted in me pushing another update with 3 commits cherry picked from the upstream VCS. I also sponsored a wheezy-backports of the new version.
Ubuntu 14.10 (Utopic Unicorn) has been available for a couple of weeks and the reception has been positive for the most part, but there is one small piece of interesting information that didn't get revealed. It looks like the Ubuntu devs don't need to build specific images for Apple hardware...
Sometimes it seems that Canonical, Ubuntu's parent company, can't win for losing. Often accused of trying to force other open-source groups to follow their lead by keeping projects internal until they feel it's ready to be shared with others, when Ubuntu announced its intention to build LXD, a hypervisor for containers, at the OpenStack Summit, the company was immediately accused of announcing vaporware (!); of shoving LXD down other programmers' throats; and of trying to replace Docker.
Further, there have been millions of downloads of the new Kylin GNU/Linux based on Ubuntu so growth will likely accelerate.
The new Click packages that are already used on the Ubunu Touch platform by Canonical are also coming to the desktop and they might be able to change the Linux packaging paradigm.
When news broke a few days ago about development of an Ubuntu Linux-based x86 tablet called the UT One, it seemed like Canonical was not part of the endeavor. But that's wrong, according to information from the man behind the project, who contacted The VAR Guy this week with more details on the open source mobile device.
As you may know, Ubuntu 14.10 came out with about as much fanfare as growing grass. If you're unsure why this happened, it's simple -- Ubuntu is in a state of holding because of Unity 8/Mir. Until that happens, Ubuntu version upgrades will be about bug fixes and not much more. It makes sense... why dump a bunch of time/effort into an interface that's about to undergo a radical shit?
The Linux distros have all kinds of system notification mechanisms. Some are better than others, but for the most part they function the way they should. On the other hand, some developers, like the ones from the elementary OS team, go a little bit further and they are able to provide a much better experience for the end users.
Each distro is, in fact, a separate Linux based operating system. Usually, a distro is designed to meet specific needs of a particular set of users. RHEL, SUSE and CentOS are designed primarily for use by businesses on servers. Mint, Ubuntu, Mageia and the like are designed for those who need productivity on the desktop and who would rather the operating system just take care of itself — probably the biggest set of users of desktop Linux. The class of distro that includes Slackware and Gentoo are for those who need to customize their systems to exactly fit their needs.
The internet of things (IoT) offers endless possibilities for smart devices and their applications. So it’s no wonder that the IoT is as equally tempting to hackers, as it is to developers, keen to showcase their latest developments.
A lack of security issues doesn’t mean you’re OK – you’re probably just not being targeted yet.
This paper is designed to help anyone who is developing an internet-enabled Linux device for personal or business use. It highlights the main areas to consider and provides a practical checklist for developing applications for Embedded Linux.
Fancy building your very own portable Raspberry Pi gaming console? If you do then you might be interested in a new Kickstarter project called eNcade which has been created by Nicolas Wicker at Nzen Mods.
The eNcade takes the form of a portable Raspberry Pi gaming tablet that has been designed to focus on retro gaming online with anyone anywhere. Check out the video after the jump to learn more about this unique Raspberry Pi project and how you can be one of the first to own an eNcade system.
After Google's Android started shipping in the last quarter of 2008 it took a good 2 years for the Linux kernel based OS to become market leader in the 1st quarter of 2011. Since then Android has seen the largest growth by far and reached a market share of 77.83% in the last quarter of 2013.
Apple Pay has gotten an amazing amount of press lately, and its drawn the attention of consumers to the benefits of NFC based payments. This has resulted in Google Wallet being used more than it had been previously. Ars Technica reports on the effects that Apple Pay may be having on Google Wallet.
NFC-based mobile payments have had a boost in recent months, possibly thanks to the launch of Apple Pay, which was announced in September. Now, a person with knowledge of the matter tells Ars that Google Wallet, which launched back in 2011 and saw tepid success in the ensuing three years, has had considerable growth in the last couple of months. According to our source, weekly transactions have increased by 50 percent, and in the recent couple of months, new users have nearly doubled compared to the previous month.
In today's interconnected world many apps created by celebrities are usually looked down upon. And yes, many of them are really, really bad. However, some of them do stand out. Some of them are actually worth trying. So, in today's article we're listing some of the best applications created by celebrities:
Qualcomm is the mobile industry’s equivalent of a god: omnipotent and omnipresent, yet invisible to the naked eye. The company that was founded on the premise of building "Quality Communications" can now be found inside every major smartphone in the US. Even the fiercely independent Apple, which designs its own mobile processors, has no choice but to use Qualcomm’s LTE modems. The same is true of Samsung, whose Exynos chip is replaced by a Qualcomm Snapdragon for the US and other markets. But Qualcomm’s influence spreads much wider and deeper still.
One of the key moments in the rise of GNU/Linux was when software companies producing their own variant of Unix realised that it made no sense for them all to work on something that was no longer providing any competitive advantage - it was simply part of the digital plumbing that had to be provided in some form. That meant they could usefully collaborate on a common platform, and differentiate themselves in other ways - higher up the software stack, or through services, for example.
None of this would be possible without the benefits of Free and Open Source software. Start with the platform: Ruby-on-Rails is “a good way to get an MVP (minimum viable product) up fairly quickly, and start engaging with the customer,” Ian Moss told LU&D. Moss is founder of travel start-up 196 Destinations and, along with Capital Relations owner Coral Grainger, collates the long- running Manchester StartUpDigest newsletter.
Siemens is offering an open source implementation of the Multicore Association's Multicore Task Management Application Program Interface (MTAPI) specification.
Lately, it seems that the only news we hear is what other multinational company has been hacked and how many records were accessed. We have always been security conscience, but it does appear that hackers and malware have been making us even more so lately. Unfortunately, this is neither something new, nor something that is likely to go away.
sBack in the 1990s, the technology world seemed alive with companies that had chosen to monetise an open-source project and get behind it. However, for Intel Capital vice president and managing director of services, open source, and machine to machine Lisa Lambert, the startup landscape today is quite barren, despite the number of open-source projects being higher than ever.
Facebook's latest open-source code contribution to the public is Proxygen, a C++ HTTP framework with HTTP/SPDY server capabilities that it's been using internally in place of Apache and Nginx servers.
Globally, 4 billion people have yet to access the Web. To invite these next billions of users online, access must be affordable. The tumbling price of smartphones, such as the Firefox OS handsets, is a clear step in this direction.
Mozilla, the mission-based organization dedicated to promoting openness, innovation and opportunity on the Web, is pleased to announce that Firefox OS will soon expand to Africa. The Firefox OS ecosystem has gained support from three new key partners in the region: Airtel, MTN South Africa and Tigo, operated by Millicom, are the first carriers working with Mozilla to soon bring first Firefox OS smartphones to Africa.
Firefox for mobile, codenamed Fennec, is the build of the Mozilla Firefox web browser for devices such as Android smartphones and tablet computers. Fennec is available in multiple languages, and just a few months ago, was launched in the Hindi language along with others like: Assamese, Bengali (India), Gujarati, Kannada, Maithili, Malayalam, Marathi, Oriya, Punjabi, Tamil, and Telugu.
Securing the cloud isn't just about protecting the network layer from external attacks; it's also about being able to detect fraudulent activities running on the cloud. At the OpenStack Summit here, a group of researchers presented their findings on how to use the OpenStack Ceilometer project—used primarily for billing and metering of cloud usage—to detect fraud.
Open source storage met open source big data this week in a deal between MapR and MongoDB, which announced a partnership to certify the latter's NoSQL database platform to MapR's Apache Hadoop distribution.
For our first magazine interview, we got some cheap flights and headed out to Kaufbeuren, an attractive Swabian city an hour’s train ride from Munich. This is where we met Florian Effenberger, Executive Director at The Document Foundation (he was chairman at the time of this interview), and Alexander Werner from the Foundation’s membership committee. This is the non-profit organisation at the heart of LibreOffice, the famous fork of OpenOffice.org now dominant in every Linux distribution. We were able to ask Florian about the split, about arguments over a new name and what wheat beer he’d recommend as a souvenir for our journey home.
Sharing is one of free software's key principles. People who contribute to the advancement of free software, and to society, are committed to sharing their ideas in order to create something we can all benefit from. Often, they don't ask for anything in return. That's why each year, the Free Software Foundation recognizes one deserving individual and one project with the Free Software Awards. Who do you think should receive the 17th annual awards?
GnuPG, also known as GPG, allows to encrypt and sign data...
Code Sourcery developers are seeking permission to land their OpenACC C/C++ front-end support inside the mainline GCC code-base.
For the past year the developers at Code Sourcery / Mentor Graphics have been working on OpenACC 2.0 with GPU support for GCC. The GPU support is focused on NVIDIA hardware and includes a controversial NVIDIA "NVPTX" back-end for GCC that still requires NVIDIA's closed-source Linux driver for handling this compute support. The NVPTX back-end is ready for mainline GCC and now so is the OpenACC 2.0 front-end support, or it appears.
Cisco has joined the Open Compute Project, a Facebook-driven effort to develop open source servers and switches, 16 months after criticizing it. At that time, Cisco CEO John Chambers said OCP has “weaknesses” that Cisco can exploit.
This past March, hundreds of protestors stormed Taiwan’s parliament, the Legislative Yuan, in opposition to a pending trade deal with China. Dubbed the Sunflower Movement protests, students occupied the legislature for 17 days to demand line-by-line review of what was perceived to be a cloaked attack on Taiwan’s independence from an ever-growing China. During the protests, organizers brought in food for the occupiers, mobilized 100,000 person strong rallies, and kept the public at-large informed. This impressive act of online and in-person organizing was co-lead by an online community called g0v.
Smaller than a credit card, BITalino is a low-cost hardware and open source software toolkit, aligned with the DIY (do-it-yourself) movement. It enables anyone to create quirky and serious projects alike for wearable health tracking devices. The base kit includes sensors to measure your muscles, heart, nervous system, motion, and ambient light—and it includes a microcontroller, Bluetooth, power management module, and all the accessories needed to start working.
Yes, it’s true – the Internet Archive, stalwart home of the Wayback Machine, now has a special section for the video games of yesteryear, in the Internet Arcade. There are 902 titles available, according to the site, running on a specialized Java emulator known as JSMAME. While not all of them are working quite right yet, there’s already an impressive selection available for you to play right in your browser window. Here are some of the highlights.
The violence drew much of its initial strength from the revelation that the CIA had used a fake Hepatitis vaccination campaign in March and April 2011 in its hunt for Osama bin Laden. The operation was widely blamed among Pakistani public health workers for fueling the violence and decreasing trust in vaccinators. As Zulfiqar A. Bhutta, a vaccine specialist at Aga Khan University in Karachi, told the New York Times in July 2012: "There could hardly have been a more stupid venture, and there was bound to be a backlash, especially for polio."
Although it has a timely theme and good performances from an estimable cast, much of the media would prefer that you ignore “Kill the Messenger.”
Amnesty International has accused Israel of committing war crimes during its campaign in Gaza.
A report released by the group on Wednesday says Israel displayed “callous indifference” launching attacks on family homes in the densely populated coastal strip and in some cases its conduct amounted to war crimes. It adds that war crimes were also committed by Palestinian militants.
U.S. officials are still figuring out which moderate groups—among the insurgents who’ve been fighting the regime of Syrian President Bashar al-Assad—it wants to bring into the battle against Islamic State. Saudi Arabia has offered to host a training camp for as many as 5,000 Syrian fighters, but the Pentagon hasn’t worked out how to transport them. Turkey has also agreed to let the U.S. train rebels on its soil. Fielding a force of two or three Syrian brigades could take two years and cost $1 billion to $2 billion annually, according to Kenneth Pollack, a former CIA Persian Gulf analyst who is at the Brookings Institution.
As a result, Brzezinski appeared to have taken the 1977 CIA memo quite seriously and so transformed Afghanistan into a perpetual battlefield in order to safeguard America's hold over the Persian Gulf (the main transport route for oil). The US concern for the free flow of oil led to its support for the Mujahedeen who became the Taliban. And so the West's quest for hydrocarbon advantage condemned the country to a state of unending civil war.
Since June 2004, the United States has conducted over 400 drone airstrikes in Pakistan, with 350 of them during the Obama administration, according to a Bureau of Investigative Journalism (TBIJ) report released this October.
The Republicans took control of the Senate in Tuesday’s elections, but much more important than which party took control is the nature of the incoming Senators from the new ruling party.
NATO is a US-led killing machine. Operating globally. Prioritizing war. Deploring peace.
Fawzi al Odah, 37, was held for nearly 13 years at Guantanamo, starting off in the crude outdoor prison of barbed wire and chain-linked fences called Camp X-Ray. He was never charged with a crime.
The son of a blacksmith, Mahmoud Ahmadinejad was born on October 28, 1956, in Garmsar, near Tehran, and holds a PhD in traffic and transport from Tehran’s University of Science and Technology, where he was a lecturer. He was not well-known when he was appointed mayor of Tehran in 2003. During his tenure, he reduced social freedoms and curtailed many of the reforms introduced by more moderate figures who ran the city before him.
Cockburn further notes that, after lying to fabricate the pretext for aggression, the Western governments and media outlets have fallen mysteriously silent on Libya as the country has spiraled into oblivion. The West thus again all but insists we notice that humanitarian crises play no role in drawing their attention, and that they only trumpet – or invent – human rights violations to cover Western aggression, which is carried out, Cockburn notes, “always in the interests of the country intervening.”
The West immediately lost its feigned concern over the “human rights” violations it exaggerated or simply made up regarding Libya because they were never of concern to begin with, and the West made things much worse: the illegal US-led attack instantly killed or led to the deaths of up to hundreds of thousands.
Phil Schmitt spent two tours of duty in Vietnam loading 750-pound bombs into Air Force planes in bases at hellholes such as Da Nang and Phu Cat.
Most of the planes came back to be reloaded. The bombs, of course, didn’t.
“I loaded thousands and thousands of tons of bombs,” the 67-year-old Modesto resident said. “They went somewhere.”
But it wasn’t until the brass reassigned him to debrief the pilots after their bombing runs that he saw the real effects.
“Now I’m looking at films of the bombs exploding,” Schmitt said. “Villages being hit. Seeing bodies on the ground. Children. The quality of those films was very good.”
Collateral damage, long before anyone coined the term. Like so many others, he kept what he saw to himself, returning stateside when his hitch ended in 1970.
“Later, it comes into play,” Schmitt said. “I turned to both heavy drinking and burying myself in my work. I didn’t socialize. I was isolated. I didn’t have many friends. I didn’t relate well with people outside of the military.”
The Republican victory in the 2014 midterms is less than 24 hours old. But already, the hawkish wing of the GOP is planning an ambitious battle plan to revamp American foreign policy: everything from arming Ukraine’s military to reviewing the ISIS war to investigating the U.S. intelligence community’s role in warming relations with Iran.
[...]
You could call it the neoconservatives’ revenge or the year of the hawks. But it has produced an interesting moment in Washington, where even the dovish side of the Republican Party now acknowledges the midterms were a win for their party’s American exceptionalists.
Pepsi, IKEA, AIG, Coach, Deutsche Bank, Abbott Laboratories and nearly 340 other companies have secured secret deals from Luxembourg that allowed many of them to slash their global tax bills.
In the year 1930, John Maynard Keynes predicted that, by century’s end, technology would have advanced sufficiently that countries like Great Britain or the United States would have achieved a 15-hour work week. There’s every reason to believe he was right. In technological terms, we are quite capable of this. And yet it didn’t happen. Instead, technology has been marshaled, if anything, to figure out ways to make us all work more. In order to achieve this, jobs have had to be created that are, effectively, pointless. Huge swathes of people, in Europe and North America in particular, spend their entire working lives performing tasks they secretly believe do not really need to be performed. The moral and spiritual damage that comes from this situation is profound. It is a scar across our collective soul. Yet virtually no one talks about it.
Governor Brown spoke last week lobbying for Proposition 1 at Stanford University on October 23rd, at a conference organized by the Stanford Wood’s Institute, whose co-director is Stanford Hoover Institute member Barton Thompson. The Stanford Hoover Institute and Bechtel (the multi-billion dollar construction company), through the funding of studies taught at Stanford, appear to be promoting the DTP and its probable use as a source of water for fracking in the possible 15 Billion barrel Monterey Shale Formation spread across central and southern California.
One thing that I’ve learned from my four-plus decades in journalism is that many people only like reporting that reinforces what they already believe. Facts that go off in a different direction can make them angry – and they are usually not hesitant to express their anger.
For instance, in the 1980s, when I was covering the Nicaraguan Contra rebels for the Associated Press, many readers of AP copy, including some of my editors, shared Ronald Reagan’s enthusiasm for these “freedom fighters” whom Reagan likened to America’s Founding Fathers.
Amazon’s CEO now owns the paper of record in the nation’s capital
Almost 20 percent of world population is effected by Internet Censorship. In countries like North Korea less than 5% of total population have internet access and even that is heavily monitored and restricted. Internet censorship isn’t limited to oppressive regimes. For example, it is common practice for educational institutions all over the world to implement filtering of content deemed objectionable.
Tor, after all, doesn’t just let users hide their identities from the sites they visit, anonymously buying drugs on the Silk Road or uploading leaked documents to news sites through the leak platform SecureDrop. It’s also designed to circumvent censorship and surveillance that occurs much closer to the user’s own connection, such as in repressive regimes like Iran or China. And since Facebook uses SSL encryption, no surveillance system watching either Facebook’s connection or the user’s local traffic should be able to match up a user’s identity with their Facebook activity.
Linux Australia, the umbrella group for Linux user groups in the country, has imposed a censorship regime on its mailing list, with regulations that run to nearly 1000 words to govern them.
The stated aim of the new policy, which took effect on October 22, "is to foster open dialogue and discussion on relevant forums, while providing a safe space free from undesired behaviours such as personal attack and 'flaming'," according to a post by the LA secretary Kathy Reid.
In sharp contrast to the avowed open nature of the group, the policy was never put up for discussion on the LA general mailing list. The policy was developed by the office-bearers and announced as being in effect.
Web giants such as Twitter, Facebook and WhatsApp have become "command-and-control networks... for terrorists and criminals", GCHQ's new head has said.
Our question this fortnight is: If the head of GCHQ is upset, does this mean we’re winning back our privacy? Is this a genuine plea for us to give up our digital rights, or is it just crocodile tears from someone who can still trace every click we make and message we send?
If Hillary Clinton has a position on the government's domestic spying, she's doing a good job of hiding it.
More than a year after Edward Snowden's leaks, the former secretary of State has yet to offer a meaningful assessment of the National Security Agency's mass-surveillance programs. She's had plenty of chances, but in interviews, speeches, and even her new book, Clinton has repeatedly ducked the issue with vagaries and clichés.
The possible 2016 candidate rarely discusses NSA spying unprompted. And when she does, her remarks are often couched in opaque platitudes about the need to balance privacy and national security concerns.
Earlier this year, we noted that absolutely-running-for-President-while-pretending-to-think-about-it Hillary Clinton gave a stupid and vague non-answer answer to her position on government surveillance. It was the perfect politician's answer, refusing to really take a position that could be held against her at some point in the future. Except, on important issues, refusing to answer sometimes isn't an answer, and this is a perfect case of that. The leading contenders for the Republican nomination appear to have all made statements one way or the other, while Hillary has done everything possible not to take a position on the matter.
The ACLU's Jameel Jaffer alerts us to a district court ruling in NY that effectively says that by merely agreeing to AOL's terms of service, you've waived your 4th Amendment rights. The case is the United States v. Frank DiTomasso, where DiTomasso is accused of producing child porn -- with most of the evidence used against him coming from AOL. DiTomasso argues that it was obtained via an unconstitutional search in violation of the 4th Amendment, but judge Shira Scheindlin rejects that, by basically saying that AOL's terms of service make you effectively waive any 4th Amendment right you might have in any such information.
It will help you avoid traffic jams as you travel from work to that hot new spot you've been dying to try out, tell you on the way about the bar's half-price coupons and let you check your home video monitors while knocking back a few to see if your cat is clawing the couch again.
But it also might alert your insurer if your car is weaving when you head home and report your frequent drinking to your boss.
"It" is the Internet of Things, which promises to transform daily life, making it easier to work, travel, shop and stay healthy. Thanks to billions of connected devices - from smart toothbrushes and thermostats to commercial drones and robotic companions for the elderly - it also will end up gathering vast amounts of data that could provide insights about our sexual habits, religious beliefs, political leanings and other highly personal aspects of our lives. That creates a potentially enormous threat to our privacy - even within the sanctuary of our homes.
The looming Republican takeover of the Senate could boost the efforts of civil libertarians and tech companies hoping to rein the National Security Agency this year.
With confirmation that American spies are working in New Zealand, by a former head of the US National Security Agency last night, there is confirmation that they are based here, says New Zealand First.
"This proves whistle-blower Edward Snowden right again," says New Zealand First Leader Rt Hon Winston Peters. "Mr Snowden said, while he was in New Zealand, that there were NSA facilities here, and I confirmed that I knew the location of one base.
The ACLU's FOIA lawsuit over documents related to the NSA's activities under Executive Order 12333 has knocked a few more pages out the agency's tightly-closed fist, most of which are related to its signals intelligence programs. Included in the released documents is an 89-page Inspector General's report on the investigation of accusations made back in 2009 by David Murfee Faulk, who alleged that NSA linguists were listening in on the phone calls of military personnel, journalists and aid workers and sharing those containing "pillow talk" with other analysts.
[...]
Well, we have that report but we can't actually read most of it. There's hardly anything left but the IG clearing the NSA of the specific misconduct alleged by two NSA linguists. The IG memo lists other non-compliance issues like the dissemination of raw US persons SIGINT, as well as violations of reporting procedures and retention guidelines, but the specifics of the IG's findings remain hidden. I would imagine a legal challenge to the massive redactions in the Inspector General's report will be forthcoming. There's more self-interest than security apparent in the NSA's very selective exposures, making this exculpatory information highly conspicuous in its inclusion.
The National Security Agency (NSA) is only holding back a teeny, tiny number of code secrets, with director Admiral Mike Rogers promising the world the spook collective shares 'most' of the vulnerabilities it finds.
The agency head made the remarks on his second visit to Silicon Valley since his appointment in April this year.
Admiral Rogers told students delegates that US President Barack Obama asked the agency that it should share more of its vulnerabilities with the public.
There are times that I wonder if former NSA General Counsel Stewart Baker is just trolling with his various comments, because they're so frequently out of touch with reality, even though he's clearly an intelligent guy. His latest is to join in with the misguided attacks on Apple and Google making mobile encryption the default on iOS and Android devices, with an especially bizarre argument: protecting the privacy of your users is bad for business. Oh really?
On Tuesday at Web Summit in Dublin, former NSA General Counsel Stewart Baker said that expanded encryption efforts by tech companies like Apple and Google do more to harm U.S. intelligence than they do to defend against wrongful and excessive surveillance worldwide.
ââ¬â¹The former top lawyer to the NSA told an audience in Ireland this week that mobile phone maker Blackberry can blame a major drop in sales during the last few years on its offering of a secure product that can’t be cracked.
More interesting, though, is the possibility of emerging bipartisan coalitions on sentencing and prison reform and on reform of the National Security Agency. Both are issues that have support from liberal Democrats and libertarian Republicans. Neither is so hot-button that the radio talk show/blogger wind machine on the right would go ballistic at the prospect of bills being signed by the president. There are senators on both sides of the aisle — from Al Franken and Ron Wyden to Rand Paul and Mike Lee — who could work together on both these issues.
Brazilian President Dilma Rousseff doesn’t approve of the U.S. National Security Agency’s surveillance techniques. She’s making that much clear by overseeing the construction of a $185 million overseas fiber-optic cable which will stretch across the Atlantic Ocean from Fortaleza, Brazil to Lisbon, Portugal.
Facebook revealed some startling numbers for those who are in favor of Internet freedom, and privacy on the Internet. At least when the prying eyes are the government or government agencies. The company revealed that requests for user data of Facebook users increased by 25% and global requests to restrict content rose by 20%.
The Government has been forced to release secret policies which show that GCHQ and MI5 have for years advised staff that they may “target the communications of lawyers,” and use legally privileged material “just like any other item of intelligence.”
The disclosure comes in response to a case brought in the Investigatory Powers Tribunal (IPT) by the al Saadi and Belhadj families, who were subjected to rendition and torture in a joint CIA-MI6 operation. Both families – assisted by legal charity Reprieve and solicitors Leigh Day – have brought litigation about the kidnappings. The families allege that, by intercepting their privileged communications with Reprieve and Leigh Day, the Government has infringed their right to a fair trial.
Legal privilege is a central principle of British law, which protects confidential communication between a lawyer and their client. If the Government is able to access such communications, it hands itself an unfair advantage in court.
Cindy Cohn, the Electronic Frontier Foundation's legal director at the forefront of trying to dismantle the National Security Agency's domestic spying apparatus long before Edward Snowden became a household name, has been named the digital rights group's executive director.
Cohn's elevation, effective in April, is part of a major management overhaul to the San Francisco-based group whose budget has blossomed from $1 million annually in 1999 to about $9 million this year, the group announced Wednesday. Cohn, who has been litigating the constitutionality of the NSA's electronic eavesdropping since 2006, succeeds Shari Steele, the EFF's top executive the past 14 years.
It is not terrorists who threaten that future of the internet, but our intelligence and security services
GCHQ infiltrates all the communications in and out of the British Isles by tapping transatlantic cables. We discovered last week it has warrantless access to NSA databases, which include the data of UK citizens. GCHQ has done all this in the face of clear parliamentary opposition and in breach of the European Convention on Human Rights.
Secure communication is something we all crave online, particularly after Edward Snowden's NSA revelations increased public interest in privacy and security. With dozens of messaging tools to choose from, many claiming to be ultra-secure, it can be difficult to know which one to choose and which one to trust. Electronic Frontier Foundation (EFF) has published its Secure Messaging Scorecard which rates a number of apps and services according to the level of security they offer.
Researchers warn that web sites and apps communicating via WebRTC may have broader access to computer microphones and cameras than users realise.
You already know that gobs of data about you are strewn across the Internet. The scary part is when they put it all together
US film director, screenwriter and producer Oliver Stone told RIA Novosti he had met with former NSA contractor Edward Snowden in Russia to discuss a new film about the whistleblower.
"I've met him [Snowden]," the film director said in an interview, when asked about the meeting to discuss Stone's scenario for a new film about Snowden.
The legacies of Edward Snowden, Julian Assange, and Chelsea Manning will be enshrined in bronze by a sculptor who is offering a fourth empty chair alongside the trio to anyone who has the courage to side with them, stand up and change things.
At least, that’s the plan for Italian sculptor Davide Dormino, who is looking to build life-size bronze statues of the three individuals. In a new Kickstarter crowdfunding campaign that just recently went live, Dormino and project creator Vaughan Smith are asking for 100,000 pounds, or roughly $159,000, to construct these “monuments to courage.”
Minimum wage and paid sick day measures have been gaining momentum in the past year -- but keep an eye out for bills promoted by the American Legislative Exchange Council (ALEC) designed to crush that momentum and limit local control.
As you've probably heard, the Republicans decisively took control over Congress in the election on Tuesday, and are now strategizing on exactly what plan they'll choose to try not to mess things up too badly by the time the 2016 elections come around.
Da'von Shaw, a Bedford, Ohio high school student, brought apples and craisins to school for a "healthy eating" presentation he was giving to his speech class.
Arnold Abbott handed out four plates of food to homeless people in a South Florida park. Then police stopped the 90-year-old from serving up another bite.
“An officer said, ‘Drop that plate right now — like I had a weapon,'” Abbott said.
Abbott and two pastors in Fort Lauderdale, Florida, were charged for feeding the homeless in public on Sunday, the city’s first crackdowns under a new ordinance banning public food sharing, CNN affiliate WPLG reported.
Tuesday’s Republican takeover of the Senate effectively ruined any chance of Congressional oversight of the CIA. Senator Mark Udall, who earned a score of 100 percent from the American Civil Liberties Union (ACLU), lost his seat in Colorado. And Senator Richard Burr, with an ACLU score of 0 percent, is set to become Chairman of the Senate Select Committee on Intelligence (SSCI), the group tasked with holding the CIA and the NSA accountable.
Civil liberty advocates were upset on election night when Colorado Sen. Mark Udall lost to Republican Cory Gardner, but no one in the community was ready to announce changes to the NSA’s bulk-data collection program dead.
The outgoing Senator and champion of civil liberties has one last chance to read the truth about American atrocities out loud, for the world to see – before it’s too late
He wasn't vocal about promoting his work on civil liberties and intelligence. But over time, astute national security wonks learned to watch him.
His statements sometimes seemed abstract, but were often signposts pointing to something deeper. He wrote letters, he asked questions and he left hints on the public record signaling major intelligence community abuses. Many times, it was his clues that helped shake those stories loose.
Former CIA officer Will Hurd on Tuesday became perhaps the first person to jump from the cybersecurity industry to Congress.
An African-American Republican, Hurd edged out incumbent Pete Gallego (D) in Texas’ 23rd district, running mostly on his career as an undercover CIA operative, but also touting his current job as senior adviser at cybersecurity vendor FusionX.
A U.S. military medical board found he suffers Post-Traumatic Stress Disorder and depression. Two doctors recommended the video calls with family to help him cope with it. One testified at court that he had been subjected to “physical, psychological and sexual torture.”
Last Thursday, British judges ruled that victims of a joint MI6-CIA 'rendition' operation should have their day in court. When I reflect on that judgment, the first things I see in my mind's eye are two rooms.
One is white, stark, temporary, windowless. Fluorescent lights hang from its ceiling. The room is empty save for a woman, crying. She is chained to the wall and obviously pregnant. The woman in the white room comes from Morocco but has married a opponent of Col. Gaddafi, and for that reason is about to be plunged into terrors of which she knows nothing.
CIA agents will come to take her from this room - their room. They will tape her to a stretcher and fly her to Libya. They will manhandle and degrade her to an extent that she will wonder, at one point, whether she has lost her child. She won't, quite: but her baby, born shortly afterwards, will weigh just four pounds.
Everyone knows by now about U.S. backing for the mujahedeen in Afghanistan against the Soviet Union in the 1980s - Exhibit A for those shaking their heads at Washington’s foreign policy blunders in the Muslim world. Rather less widely known, at least until this book was written by former Wall Street Journal reporter Ian Johnson, was how that support had precedents at the start of the Cold War in post-World War II Europe, when U.S. and German intelligence jostled for influence over various Muslim groups as anti-communist instruments to undermine the USSR. With a cast including Nazis, the CIA, the German intelligence agency, the Muslim Brotherhood, and a host of flamboyant individual characters, the subject matter certainly makes for a spectacular title. But although Johnson’s deeply researched book often yields surprises, it is generally less sensational than its blurb might suggest. Nevertheless, it does provide lessons that remain valid about the perils of trying to co-opt hard-line Muslim groups to pursue broader Western policy goals.
Iranian leaders are quietly expressing fear about the Republican takeover of Congress Tuesday night, with many conveying concerns that Tehran has lost a key bloc of U.S. Democrats who wanted to roll back economic sanctions and hand Iran a favorable nuclear deal, according to an internal CIA analysis and Farsi language reports.
Fears about the Republican takeover of Congress have plagued Iranian leaders for weeks, according to the CIA analysis obtained by the Washington Free Beacon that outlines internal commotion in Iran over the shifting political tides in the United States.
Republicans have captured control of the U.S. Senate for the first time in eight years, picking up at least seven seats in the November 4 congressional elections.
The shift means that Republicans will control the three top Senate committees dealing with U.S. foreign policy and national security: foreign relations, armed services, and intelligence.
A court which usually sits in secret will tomorrow (6 November) consider whether the Government should be forced to release more information regarding its surveillance of legally privileged communications between lawyers and their clients.
If you read the blog of Carlos Miller, you’re probably aware of dozens of incidents in which police officers have illegally confiscated citizen cellphones and deleted incriminating videos, which is not only an act of destroying evidence of possible wrongdoing but is also the unlawful destruction of someone else’s property. They rarely, if ever, face any legal consequences. (These are, of course, local infractions, not federal. But still.)
[...]
Point is, when a federal law enforcement agency wants to charge you with something, it can probably find a way to do it. If you make it more difficult for it to do so by destroying evidence, intentionally or not, the agency will get you for that, too, or at least instead. Yet somehow when it comes to finding a way to charge federal officials and law enforcement officers who destroy evidence, those vague laws seem to get pretty specific, and broad laws seem to narrow. (Currently, Sarbanes-Oxley doesn’t apply to government agencies, though as noted, other laws do.)
Okay world, that ritualistic, vacuous exercise in futile optimism, known as an "election" in America, is over, and the idiots again have spoken.
But how could they not? After all, the entire concept of "democracy" in America's corrupt, two-party system is nothing more than a farcical illusion, and the extent of this corruption has only been magnified by the Koch brothers controlled majority on the United States Supreme Court, who, in recent rulings, gave billionaires and corporations unbridled power to buy politicians of their choice.
In previous Pravda.Ru articles, I have argued that history is nothing more than a pendulum incessantly swinging back and forth between overreaction and regret, and the recent elections in America have vividly confirmed this thesis.
As a constitutional scholar, he had promised to restore respect for the law to the presidency, and instead has made end runs around every law imaginable, refusing to prosecute the war criminals of the Bush/Cheney presidency, the CIA, and the military, refusing to prosecute the FBI for violating the Patriot Act, refusing to prosecute the bankers whose crimes brought the US and the global economy to a grinding halt and left the US crippled going on six years now.
When an event such as the shooting of Michael Brown in Ferguson, Missouri gets media attention, it gets that attention all over the world.
People from London to Sydney are given a media's perspective on what happens, and they are allowed to make their own judgments. But now the parents of Michael Brown have decided that the international media stage is not enough. They are taking their case to the United Nations.
Michael Brown's mother and father, Lesley McSpadden and Michael Brown, Sr., are using a website called FergusontoGeneva.org to raise funds to fly to Geneva and speak before the U.N.'s Committee Against Torture.
African American writer Allen B. West asks why this kind of move is even necessary and wonders what the Brown family hopes to accomplish. It is a question that resonates with the families of police officers who have watched their loved ones get gunned down by street criminals, but with no response from the American people.
The choice to speak before the U.N.'s Committee Against Torture is probably not a random decision. The United Nations has recently turned up the heat on President Obama to release the report on CIA torture, a document relating to the treatment of prisoners taken since the terrorist attacks of September 11, 2001.
The Västervik prison is as ugly as its surroundings are beautiful. Located a stone’s throw from the water in Gertrudsvik, a few hours drive south of Stockholm, its pale concrete walls rise high above the summer homes and wooden jetties dotting the coastline. Tall steel fences encircle the building, topped with heavy loops of razor-sharp barbed wire.
A couple of weeks ago, we wrote about the decision by German publishers to grant Google a "free license" to post snippets -- a humiliating climbdown from their earlier position that Google should pay for the privilege of sending them traffic.
It was bad enough when the Australian government announced that it was joining the growing club of countries that would be retaining huge swathes of its citizens' metadata. But now people are beginning to realize that once that store of metadata exists it not only can, but probably will, be used for many other purposes that have nothing to do with the avowed aim of fighting terrorism.
Worried that your metadata could be used to prosecute you in a piracy case? You should be: the Australian Federal Police Commissioner thinks that metadata could be very helpful to prosecute pirates. Updated with comments from Attorney General George Brandis.
Following his arrest in Thailand on Monday, local authorities are already preparing Fredrik Neij's deportation from the country. The Pirate Bay founder is currently en route to the Thai capital Bangkok where he will be met by Swedish police who will escort him back to Scandinavia. A 10 month prison sentence awaits.
Mr Carl Malamud, on behalf of Public.Resource.Org, along with 7 others including Mr Sam Pitroda, Dr Sushant Sinha, Prof Dhrubajyoti Sen, Prof T.I.Eldho, Mr Srinivas Kodali, Dr Vinton G. Cerf and myself, submitted the petition to the Ministry of Consumer Affairs, Food & Public Distribution petitioning for the free availability of Indian Standards to the public. Given that the Standards appear to be Edicts of the Government, and that tremendous public benefit that would accrue by such free availability of Standards, and along with the facts that BIS has already digitized all the Standards, and Public.Resource.Org has already put together the necessary online architecture and value-add to facilitate free distribution of these Standards, the petition asks that the ministry helps make these Standards available and accessible to the public, or in the alternative, to modify its current copyright policy so as to allow for this free availability and accessibility of these Standards.
Techdirt has been covering for some time Carl Malamud's project to open source the "operating system of society" by placing digital versions of US laws, codes and regulations on the site Public Resource. But of course, the logic of allowing the public to be able to read all the laws and regulations that govern them applies outside the US just as much. And so it's perhaps no surprise that Malamud has joined with other campaigners (including Vint Cerf) in petitioning the Indian government to allow that country's standards to be made freely available to the public in the same way.
The Electronic Frontier Foundation (EFF) filed six exemption requests with the U.S. Copyright Office today, part of the elaborate, every-three-year process to right the wrongs put in place by the Section 1201 of the Digital Millennium Copyright Act (DMCA). EFF's requests received crucial assistance from the Organization for Transformative Works, the NYU Technology Law & Policy Clinic, attorney Marcia Hofmann, and former EFF intern Kendra Albert.
As we've noted more than a few times, we live in an era where the products you think you own can be disabled, crippled or held hostage on a whim. That's been particularly apparent when it comes to video game consoles and software, with an increasing array of titles relying on server connectivity not only for multi-player content, but also for DRM authentication in order to play single player titles. The former was an issue earlier this year when Nintendo announced that the company would be killing online functionality for a wide variety of Wii and DS titles, some of which were only a year or two old. The latter was an issue with Blizzard's Diablo 3, EA's latest incarnation of SimCity, and a growing number of other games.
A new licensing scheme launched today could give wider access to at least 91 million culturally valuable creative works.
Orphan works, that huge collection of older creations which are out of circulation and have no obvious owners, are more rightly called "hostage works," since they remain uselessly locked away by rigid and outdated copyright laws. Even when the issue is recognized by society, lobbyists hold so much sway over the political process that legislation crafted to "solve" the orphan works problem is often worse than useless.