Simple. Linux and FOSS have a wide cast of Coopers and Shelbys making high performance versions of mass-produced distros, building on the foundation of one of the “big three” Linux distros to make fire-breathing, pixel-burning distros; distros that are the digital equivalent of vehicles that are more than just for taking the kids to soccer practice or zipping over to the grocery store.
In fact, many of the less-than-mainstream distros out there — most of the nearly 300 Linux and BSD distros, as a matter of fact — are more than just a developer “scratching an itch.” In many cases, it’s a matter of chopping and channeling, boring out the engine, adding high performance parts, aerodynamic devices like spoilers and air dams, and even painting a flame or two on the side.
A group of Finnish developers are convinced that Solu, a revolutionary, beautiful and minimalist computer, will change the way you think about computing.
Three months have passed since Microsoft launched its new OS, the Windows 10, which will be the last edition of Windows. This means that, from now on, the developers will release only updates and will continue to improve this platform. But what did Windows 10 bring new? Of course, many features. But are they… new, or inspired from other OS? Let’s see what Microsoft stole from Linux.
We’ve been in this bid’ness for ten years now. The business of giving Linux-powered computers to kids who cannot afford this technology, or any technology for that matter. And so far so good. There have been some lessons learned along the way. Some of those lessons small but valuable. Some of those lessons so painful that we had no choice but to change the way we do things. And never doubt…there were uh, spirited discussions about this change. Yeah, we’ll stick to “spirited”. I’ve been to football matches in Great Britain and Germany that couldn’t come close to such levels of “spirit.” So which thing could bring about this measure of “spirited” discussion?
Here we have "GALPon minino" another Linux distribution that is based on Debian and designed for computers older than 10 years or more. The distro comes with LXDE Desktop Environment and a set of applications that fulfills the day-to-day needs of the users without slowing down the machine.
For me Linux is about choice, control, and learning something new. I think that's one reason it's not as "easy" for some people. Some prefer a mouse with just one button because there's less to confuse. Personally, I'd rather have a 20-button mouse for more flexibility and spend two hours making it work my way. And yes, I run Gnome 3 because I like it, not because I have to.
Our friends at System76 today announced the release of their first Skylake system. This first computer using Intel's latest-generation processors is a desktop that's part of the Wild Dog Pro family.
The new System76 Wild Dog Pro features a Skylake CPU with options for a Core i5 or i7, Intel HD Graphics 530 or NVIDIA graphics up through a GeForce GTX 980, up to 64GB of DDR4 memory, and SSD options.
Linux-based operating systems are wonderful for many reasons, such as being lightweight and secure. One of my favorite aspects, however, is the open and customizable nature. Ubuntu, for example, is one of the best operating systems, but if you do not like the default Unity environment, you can simply choose another -- not so with Windows or OS X.
System76 just revealed the new Ubuntu 15.10-powered Wild Dog Pro desktop with the 6th Generation Intel Core 'Skylake' processor is available in their stores.
Two open source groups building separate software-defined networking (SDN) controllers are now part of the Linux Foundation, increasing the likelihood of cross-project collaboration.
This week, the Open Networking Lab (ON.Lab) placed its Open Networking Operating System (ONOS) project under the foundation. ONOS developers are building a carrier-grade SDN open source controller.
With so many projects, though, it seems that eventually there will have to be some consolidation among the projects ... or at least an overall standard that everyone can agree on. Last week, ON.Lab's ONOS project was added to the ever-growing list of Linux Foundation projects. It joins several other open source networking projects that are Linux Foundation projects, including the OpenDaylight Project, OPNFV and IO Visor.
Now a Linux Foundation project, the Open Network Operating System project is likely to attract more attention.
On the CloudRouter Project's blog, Thomas Vachuska, ONOS's chief architect, indicated that since ON.Lab launched the open source software-defined networking project in December 2014, several collaborators and contributors have joined. The number is growing, he noted. It will probably do so more rapidly now that ONOS is a Linux Foundation project.
Things continue to be calm, and in fact have gotten progressively calmer. All of which makes me really happy, although my suspicious nature looks for things to blame. Are people just on their best behavior because the Kernel Summit is imminent, and everybody is putting their best foot forward?
Or maybe this just ended up being one of those rare painless releases when nothing bad happens.
That would be lovely.
HyperOS is a nifty solution for those who want to run their own containerized environment on desktops or laptops for development purpose. HyperOS supports Linux, Mac, and soon Windows and is intended to be used primarily as a end-user CLI tool on workstations. We reached out to Max Ogden who leads the development team.
Sharp, who had been maintainer of the USB 3.0 tree, came to prominence two years ago when she attacked Linux creator Linus Torvalds, who is also head of the kernel project, for his verbal attacks on other developers who erred in their coding. It turned out that she had planned this to perfection.
The whole episode bears some re-examining, especially in light of the fact that since the 2013 exchange between Sharp and Torvalds, the latter has not spoken a word against anyone. The Linux Foundation, his employer, took note of the exchange by putting some curbs on him in the form of what it called a code of conflict which was merged into the kernel itself.
The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux and collaborative development, today announced the immediate release of episode 2 in its World Without Linux digital video series.
Chipmaker Intel has set its minions the task of creating a high-performance software rasteriser for the Linux Mesa 3D Graphics Library.
Mesa currently uses swrast, LLVMpipe, and Softpipe drivers as software rasterisers that run OpenGL on the CPU rather than any dedicated GPU. But apparently Intel’s minions have been developing a new, high-performance software rasteriser.
Intel employees Tim Rowley and Bruce Cherniak have published a very intriguing announcement on the Mesa 3D Graphics Library development mailing list, informing us about their new software project developed within a small team at Intel.
And on time following the new three month release cycle! The previous release, ownCloud Server 8.1, was all about stability, performance and security. Now, more work has been put in the user experience. That shows in the new sidebar, the new gallery app and refreshed style but for system admins, there's a large number of new control points as well.
ownCloud, Inc., the maker of the open source file sync and share (EFSS) software with the same name, today announced its new hybrid cloud enterprise file sync & share model.
The new model allows customers to choose their cloud storage services and still have control over it and manage the control plane, including encryption keys, on-premise. The new model is part of ownCloud 8.2, the latest version of the company’s flagship EFSS solution.
The first update to the Rblpapi package since the initial CRAN upload in August is now available.
This past weekend, the developers of the open-source Git distributed version control system published details about the second maintenance release in the Git 2.6 series.
Opera Software, through Aneta Reluga, has announced yet another update of the Opera 34 developer channel for all supported platforms, including GNU/Linux, Mac OS X, and Microsoft Windows.
Last month I wrote a review of Q4OS which is a lightweight Linux distribution which closely resembles older versions of Windows.
I received an email advising me to check out XPQ4.
In essence XPQ4 provides a theme changer for Q4OS similar to the one used by Zorin.
With XPQ4 you can change the look and feel so that your Linux distribution emulates Windows 2000, Windows XP, Windows 7 or Windows 8.1.
This guide shows you how to get XPQ4, how to install it and adds a little bit extra to really make Q4OS look and behave like Windows XP.
According to several reports on Gaming on Linux, Valve has been removing icons for “Linux compatible” games that don’t work 100-hundred percent perfectly with its Steam OS. Linux users who want to download those games cannot download these games even if they don’t use Steam OS, according to the report. This move follows a move Valve made in May of this year when it replaced the familiar “Tux” Linux mascot icon and replaced it with Steam OS icons. Those Linux users who have already purchased games that are “Linux compatible” can still install and play those games despite them being removed…
Divinity: Original Sin Enhanced Edition has been enormously popular since it hit PC and Mac last year and deservedly so – it’s a fantastic game. Now Larian Studios have announced when PlayStation 4, Xbox One and Linux gamers will be able to get their Source Hunting on – October 27th. Although it hasn’t been confirmed, this is also when we PC and Mac gamers are likely to get the free update containing the Enhanced Edition‘s content and upgrades.
As previously reported, it’s a classic top-down RPG in the same vein as Baldur’s Gate and similar titles, only with the ability to ruin your friends’ good time by acting as Dungeon Master.
The PC, Mac, and Linux title contains a real-time Dungeon Master mode, which like the table-top version of D&D, allows the DM to guide players through customizable adventures. Rather than focusing on typical of 4v1 games, the DM mode “encourages DMs to engage and empower their players” but they can be rather brutal if it suits them.
INK was released for Linux in August; two weeks after the Windows release. It took us a while to realize it was out though, so we first didn't cover it, and then forgot about it until now.
KDE developer David Rosca has published an interesting article on his blog to inform us all about the work he has done on the upcoming and highly anticipated KDE Plasma 5.5 desktop environment.
Last week we got quite some criticism about the quality of KDE Plasma 5 on the Internet. This came rather surprising for us and is at least in my opinion highly undeserved. So far what we saw is that Plasma has a high quality – probably better than previous iterations of what was known as the KDE Desktop Environment – and got lots of praise for the state it is in. So how come that there is such a discrepancy between what we see and what our users see?
KDE – one of most functional desktop environment ever. It’s open source and free for use. 19 years ago, 14 october 1996 german programmer Matthias Ettrich has started a development of this beautiful environment. KDE provides the shell and many applications for everyday using. Today KDE uses the hundred thousand peoples over the world on Unix and Windows operating system. 19 years – serious age for software projects. Time to return and see how it begin.
Now that GNOME 3.18 has been introduced and it already has a first point release, and many of us GNU/Linux users are starting to upgrade our old GNOME 3.16 desktop environments to the new and improved version, the time has come to learn some information about the next major release, GNOME 3.20.
I greatly enjoyed my time with Linux Lite 2.6. The distribution does a lot of things well, is easy to set up and use and the project offers us a lot of beginner friendly documentation. Linux Lite provides a great balance of speed, user friendliness, features and stability.
I like that Linux Lite manages to live up to its name by using few resources while still looking nice, the distribution manages to provide a stable base while shipping with up to date desktop applications and it offers good hardware support too. It is especially nice to see a distribution provide a control panel similar to the OpenMandriva Control Centre. This is one of the features I have most wanted to see adopted by distributions outside of the OpenMandriva family and it's nice to see Linux Lite take the lead on this one.
Lite ships with a good deal of functionality, providing users with most of the desktop software they are likely to need without, I'm happy to report, bogging down the application menu with a lot of extras, I feel a good balance was struck with regards to the default applications. Plus, I like that Lite offers us multimedia support out of the box.
Mostly, what I appreciated about Linux Lite was the distribution's sense of polish. I don't mean visually, though I did enjoy Lite's default look, I mean polish in the sense that the little details were addressed. Most distributions will have some small bugs or quirks or little annoyances. Perhaps too many notification messages or an application that won't launch or the software manager will not always run properly because PackageKit refuses to relinquish its lock on the package database. Linux Lite, by contrast, offered a smooth, pleasant experience. The one bug I ran into was with the system installer locking up when I attempted to use Btrfs as my root file system. Otherwise, I had a completely trouble-free experience with Lite. The documentation was helpful, the system was responsive, no applications crashed, there were no annoying notifications and the package manager worked as expected. I came away from my trial with Lite sharing the opinion that Linux Lite deserves more credit than it gets.
Developer Edward Snyder recently released the second alpha version of Liquid Lemur Linux 2.0. It offers a hybrid desktop experience that combines the Window Maker window manager with elements of the Xfce desktop.
Softpedia has been informed earlier today, October 18, by Zbigniew Konojacki, the creator and lead developer of the 4MLinux project, about the immediate availability for download and testing of the Beta release of his 4MParted 14.0 distrolette.
Arne Exton has had the great pleasure of informing Softpedia about the immediate availability for download of the LXQt and KDE editions of his ExTiX 15.4 GNU/Linux distribution.
Another week has passed for the Solus team, and they've made just a small number of updates. It looks like things are calming down, and we might start to get anxious once more about a possible stable launch.
Dustin Falgout from the Antergos GNU/Linux distribution, previously known as Cinnarch, has had the great pleasure of announcing the immediate availability for download of an updated ISO installation media.
On October 20, Steven Shiau was proud to announce the release of a new stable build of his famous Clonezilla Live disk and partition cloning and imaging solution based on Debian GNU/Linux.
The developers of Manjaro 15.09 (Bellatrix) have issued yet another update for the operating system, and they say that it's one of the biggest ones made available so far. One look at the changelog makes it clear why that is the case.
Arch Linux has a reputation for being unstable and hard to use. The distribution is bleeding edge, so its public perception is understandable. It is because of this fact that we’ve decided to compile a list of the top five ways to improve the stability of Arch.
Open-source isn’t just a computer concept, Jim Whitehurst, CEO of Raleigh software giant Red Hat (NYSE: RHT), told coders in downtown Raleigh on Monday.
Code crunchers, innovators and other self-described “techies” had taken a break from their computer screens to crowd into the main ballroom of the Raleigh Convention Center for the return of the All Things Open Conference, which included a keynote by Whitehurst.
We’ve also learned that Red Hat Incorporated will report its next earnings on December 17, 2015. The earnings report after that one will be on March 23, 2016, and the report for the fiscal year will be made available on March 23, 2016.
Shares of Red Hat, Inc. (NYSE:RHT) rose by 1.49% in the past week and 9.23% for the last 4 weeks. In the past week, the shares have outperformed the S&P 500 by 0.58% and the outperformance increases to 5.2% for the last 4 weeks.
As part of its presence at the ongoing GITEX Technology Week, Red Hat is demonstrating its open hybrid cloud technologies for bare metal, virtualisation, private cloud and public cloud deployments.
According to the company, a key focus for them this year is the Internet of Things (IoT), a trend that is gaining momentum as evidenced by a recent Red Hat survey, which found that 70 percent of organisations intend to embrace this in the next five years. The company will also address the growing Bring-Your-Own-Device (BYOD) trend in the region by highlighting its recently launched Red Hat Mobile Application Platform.
Alessio Fattorini has had the great pleasure of informing Softpedia about the release and immediate availability for download of the CentOS-based NethServer 6.7 server-oriented GNU/Linux operating system.
IT and the role of the CIO have evolved significantly in the past few years as digital technology has emerged as a key competitive advantage. The Enterprisers Project caught up with Lee Congdon, CIO of Red Hat, to find out how the need to move faster has given rise to new best practices for today's CIO.
Ansible, Chef, Juju, and Puppet: If you know those names, you're working in cloud development/operations (DevOps). These are the programs that make it possible to deploy and manage dozens to thousands of virtual machines on clouds without ripping your hair out. Until recently, these were relatively small, independent companies. Now with Linux giant and would-be cloud power Red Hat buying Ansible for $150-million, things are changing.
French animation studio uses Red Hat for agile and cost-effective storage, removes technology limits to creative collaboration
Karanbir Singh and Johnny Hughes announced earlier today, October 20, on one of their Twitter accounts, that there's been about 12 years since they first started working on the CentOS GNU/Linux operating system.
Because they spend most of their days looking at them, most sysadmins and developers are pretty choosy when it comes to choosing a monospaced type face for use in there terminal emulator or text editor. Here are five great monospace fonts that can be easily installed from the official Fedora repositories to make your text editor or terminal emulator look and function just that little bit nicer.
Adrian Raulete has informed Softpedia about the release of the first Beta build of his upcoming Rescatux 0.40 Live CD, which can be used for performing system administration tasks on both GNU/Linux and Windows PCs.
tomorrow our fellow VUA Alberto Zuin will be presenting Devuan at the OpenNebula conference 2015 in Barcelona...
Canonical has started seeding the RC (Release Candidate) ISO images of the anticipated Ubuntu 15.10 (Wily Werewolf) operating system to testers worldwide to hunt down the last remaining bugs for the October 22 release.
First malicious app entered the ubuntu touch app store If you're using Ubuntu Touch then this is for you. Recently the first malicious app has entered into the Ubuntu touch store by bypassing the security measurements. The app does some malicious activities and changes the default flash screen without any permission. Fortunately, the app called "test" has been quickly removed from the store after being noticed.
Canonical has issued a security advisory to all fifteen people who installed a particular Ubuntu Phone app.
While its reach might be trivial, the bug itself was serious: someone worked out how to bypass checks that are supposed to protect the Ubuntu Phone operating system's single-click app installation process.
Canonical has announced that the latest OTA-7 update for Ubuntu Touch has been released, and users should start receiving the notifications. It's a phase system, and not everyone will be prompted at once to upgrade.
Ubuntu 15.10, aptly code-named Wily Werewolf, will officially debut this week from Canonical, bringing with it a surprising number of new features. Here's what to expect in the newest version of the popular Linux-based open source operating system.
Ubuntu 15.10 is set to be released on Thursday, but those dependent upon the AMD Catalyst proprietary graphics driver for Linux gaming or the like might want to hold off on upgrading... While there is the latest Catalyst driver packaged and it's been patched to work against the Wily Werewolf's default Linux 4.2 kernel, it doesn't seem to work reliably.
Ubuntu community member Kevin Feyder has shared with us an update to the Ubuntu UI Toolkit, an open-source project designed from the ground up to help Ubuntu application developers and designers build and design apps for Ubuntu phones.
After announcing at the end of August 2015 that the next major release of the uNav GPS navigation app for Ubuntu Phones would be amazing, Marcos Costales has had the pleasure of announcing the immediate availability of uNav 0.30.
While thwarted by some open-source Radeon DRM issues, here are some Radeon R9 290 "Hawaii" graphics card benchmarks between Ubuntu 15.04 vs. 15.10 for those curious.
In still working through a larger comparison and also now running into the lack of working AMD Catalyst support on Ubuntu 15.10, tonight to share are just some Radeon R9 290 "Hawaii" GPU numbers under Ubuntu 15.04 and Ubuntu 15.10 out-of-the-box.
Just 11 short years ago, Mark Shuttleworth was announcing the release of Ubuntu 4.10 "The Warty Warthog." It changes the way people were using Linux distribution, and it's still to this day a force in the open source world.
Canonical, the lead commercial sponsor behind the open-source Ubuntu Linux distribution, is set to debut its latest release on Oct. 22. Ubuntu 15.10, also referred to as the Wily Werewolf, follows the Ubuntu 15.04 Vivid Vervet release that debuted April 23. Ubuntu 15.10 includes an updated Firefox 41 Web browser, LibreOffice 5 office suite and other desktop tools. The desktop itself has been further refined for stability and performance to help improve the user experience. One of the only user-visible changes on the desktop is the use of Gnome overlay scroll bars, which provide a more streamlined approach to window scrolling in Ubuntu 15.10. On the server side, Ubuntu 15.10 now includes the new OpenStack Liberty cloud release that debuted last week. The LXD container hypervisor also gets a boost in the new Ubuntu 15.10 release, providing users with the ability to scale container deployments securely. Sitting underneath server and desktop editions of Ubuntu 15.10 is the Linux 4.2 kernel that Linus Torvalds unveiled on Aug. 30. Here's a look at key features in the Ubuntu 15.10 Linux distribution release.
Canonical is ready to release a new version of Ubuntu, 15.10, and it's doing some final testing. The new version should arrive in just a couple of days.
Canonical's converge goal has been a lofty one right from the start, but the company didn't fully explain what they really wanted with it. Their goals for convergence changed over the years, and only now they point out exactly what's this convergence all about.
Ubuntu 15.10 will ship with support for the Steam Controller after the developers have fixed a couple of problems that prevented this particular device to work.
Yesterday I posted some performance results of a Radeon R9 290 tested on Ubuntu 15.04 and Ubuntu 15.10 out-of-the-box. In this article are some numbers when upgrading the Ubuntu 15.10 installation to use the non-standard Linux 4.3 Git kernel as well as Mesa 11.1-devel Git that's built against LLVM 3.8 SVN for the newest open-source AMD Linux experience.
Canonical announced earlier today, October 20, that they've released updated kernel packages for the Ubuntu 12.04 LTS (Precise Pangolin) operating system, patching two security vulnerabilities.
After announcing the general availability of a new kernel version of its Ubuntu 12.04 LTS (Precise Pangolin) operating system, Canonical published details about an important security patch for the kernel packages of Ubuntu 15.04 and Ubuntu 14.04 LTS.
In the last hours of October 20, Canonical's à Âukasz Zemczak sent in his daily report to inform us all about the things that happened in the Ubuntu Touch world since the release of the OTA-7 software update on October 19, 2015.
Ubuntu community member Kevin Feyder recently shared an update regarding Ubuntu UI Toolkit, an open-source project designed from the ground up to facilitate Ubuntu application developers so they can best design and build apps for Ubuntu powered phones. The toolkit also has Suru Icon Template in it that allows users to create consistent icons for their Ubuntu phone apps.
“If anyone is interested in building or designing for the Ubuntu phone. I just updated my vector ui toolkit. You can find it at: https://github.com/halfsail/Ubuntu-UI-Toolkit ,” said Kevin Feyder in a Google+ post.
There are also the Ubuntu Ui Patterns, a set of Scalable Vector Graphics (SVG) images that help application developers create mockup layouts for the Ubuntu Phone, and Device Stickersheet, a collection of Ubuntu devices that help mocking the UI.
11 years ago the first version of Ubuntu was released: Ubuntu 4.10 Warty Warthog. Later this week Canonical will release Ubuntu 15.10 Wily Werewolf.
Canonical has started sending out Release Candidate ISO images of Ubuntu’s next iteration, the Wily Werewolf (version 15.10) to testers worldwide so they can find out the bugs and report back prior to the official October 22nd release date of the OS.
Ubuntu 15.10 is currently in the Final Freeze stage of development, which means that the OS will not get any new features and updates, except for fixes for critical security vulnerabilities and major bugs that might be discovered during the testing period of the Release Candidate images.
Ubuntu Phone, the open source mobile OS from Canonical, has suffered its first security vulnerability in the form of an attack that gave hackers root access to Ubuntu-based smartphones.
EVERY time I install a new version of Ubuntu, I go through the same routine of installing extra programs that give me the convenience and extra functionality I need on my home computer. I’ve not been terribly organized about it, however, and often end up doing a number of online searches each time to recall what it was I did to get those applications and utilities onto my machine.
Bodhi, an operating system based on Linux that uses a new desktop environment named Moksha, has just received a more unusual update for those users who want more from the operating system.
A busy day in Linux today begins with Jeff Hoogland who released a software bundle for Bodhi Linux with all your favorite applications. Pavlo Rudyi compiled a retrospective of KDE's nineteen years as Martin Gräßlin addressed last week's stability complaints. MakeTechEasier has five ways to make Arch Linux more stable and Canonical is in the hot seat for allowing malware to infiltrate its repositories. Elsewhere, as openSUSE Leap is being prepared for release wiki contributers can get a Leap cap and Neil Rickert has a recent new report.
Sam Aaron is a live coder who considers programming a performance. He created Sonic Pi, an open source live coding synthesizer that lets people use code to compose and perform in classical and contemporary styles ranging from canons to dubstep. By day, Aaron works as a research associate at the University of Cambridge. By night, he codes music for people to dance to.
The latest edition of the pint-sized computer is awesome. It’s faster, bolder, and comes with a souped-up CPU and double the RAM. Simply put, it’s a significantly more capable machine. But you probably already knew that.
The iterative nature of hardware releases means that each new arrival is inevitably faster and more powerful than what preceded it, but often without any meaningful difference. But the Raspberry Pi 2 is radically different. It can do a whole lot more than what preceded it.
CompuLab unveiled a COM based on TI’s new Cortex-A15 based Sitara AM57x SoC, with options for onboard wireless, up to 32GB flash, and -40 to 85€°C operation.
When it ships in December, CompuLab’s “CL-SOM-AM57x” computer-on-module will closely follow the BeagleBoard-X15 as one of the first embedded boards to integrate TI’s newly announced Sitara AM57x system-on-chip. Aimed at industrial automation and control IoT applications, the Linux-supported CL-SOM-AM57x COM is available with an optional “SB-SOM-AM57x” carrier board. The COM and carrier board are also available pre-integrated, as the “SBC-AM57x” sandwich-style single board computer (see farther below).
Aaeon launched a Kickstarter campaign to fund a Raspberry Pi form-factor “Up” SBC, that runs Linux and Android on a quad-core, 1.84GHz, Intel Atom x5 SoC.
Embedded board maker Aaeon Europe, a subsidiary of Asus, went to Kickstarter to launch “Up” SBC with the same 85.6 x 56.5mm footprint, port layout, and expansion interface as the Raspberry Pi 2 Model B. Instead of a 900MHz Broadcom ARM SoC, however, the Up board features an x86-based Intel Atom x5-Z8300 system-on-chip from the 14nm Cherry Trail generation clocked to 1.33GHz or 1.84GHz.
Matt Williams has shared with us a proof-of-concept project, which has been in the works for some time now and aims to help developers combine the power of the Juju orchestration tool with the innovative Ubuntu Snappy Core operating system.
The tiny 50 x 28mm “Inforce 6401 Micro SOM” module runs Android 4.4 or Ubuntu on a Snapdragon 600 SoC, and offers built-in WiFi-ac, BT 4.0, and GPS/GLONASS.
Inforce Computing’s “Inforce 6401” computer-on-module has the same 50 x 28mm footprint and many of the same features as its higher-end Inforce 6501 COM, which runs on a quad-core 2.7GHz Qualcomm Snapdragon 805. The 6401 model instead adopts the Snapdragon 600 (formerly S4 Pro) SoC, which has enjoyed wide adoption in embedded circles.
First unveiled back in 2014 in its first edition, the latest version of the DragonBox Pyra Linux handheld gaming console is now available to pre-order price at €290 or roughly $330.
Unfortunately the final price of the Linux handheld will be more than the pre-order deposit pricing but as yet has not been revealed by the systems developers.
Verizon's pocket-friendly LG Lancet has moved from the Windows Phone 8.1 operating system to Android 5.1.1 Lollipop, a transition that is very rare in the smartphone industry.
The Verizon-exclusive LG Lancet made its way to the shelves in mid-May this year. The operating system of the LG handset may have moved but the specs of the smartphone remains the same.
Smartphones may have killed off the common MP3 player, but the product still survives as a high-end device for audiophiles. The latest company to introduce this sort of FLAC-ready music player is Japanese firm Pioneer, which is offering the stylish XDP-100R.
The high-resolution device was first unveiled at IFA this year, and comes with an angular, machined aluminum body that's similar to products from Astell & Kern (albeit with the volume knob on the left, not the right). The XDP is also likely to draw comparisons with Sony's $1,119 Walkman ZX2, although with a reported price tag of $700, it's a lot easier on your wallet. A company spokesman described the XDP as built "for those who feel smartphones aren’t offering satisfying sound quality," reports The Wall Street Journal.
We've already seen leaked specs, and even an awkward demo from BlackBerry's boss John Chen, but the Priv handset is finally available to pre-order.
It is the first BlackBerry handset to run on Android software and features a dual-curved 5.4-inch touchscreen with a hidden keyboard that slides from the bottom of the device.
Pre-orders are available exclusively from UK retailer Carphone Warehouse and prices for a SIM-free device start at €£580 with an estimated delivery date of 6 November.
Brand new Google Android phones shipping with the Marshmallow software will have to be encrypted before the out-of-box setup procedure is complete.
Shortly after the announcement of iOS 8 in 2014, Google made headlines by saying that it would make full-device encryption mandatory for new Android devices running version 5.0. It then made more headlines several months later when we discovered that the company backed down, "strongly recommending" that Android device makers enable encryption but stopping short of actually requiring it.
Now Google has published an updated version of the Android Compatibility Definition Document (PDF) for Android 6.0, and it looks like mandatory encryption is back with a couple of exceptions. New devices that come with Marshmallow and have AES crypto performance above 50MiB-per-second need to support encryption of the private user data partition (/data) and the public data partition (/sdcard).
You can be sure there are plenty more unique Android devices that will hit the market in the future. These four particular handsets should at least give you an idea of what the platform is capable of achieving or reaching.
Xiaomi, on Monday, unveiled the Mi TV 3, a 60-inch TV with 4K display at a price point of RMB 4,999 ($780). Much like the Mi TV 2 and previous generation television sets from the company, the Mi TV 3 has been launched in the company's home market China.
We reported a month ago that an Android developer is trying to port the Ubuntu Touch mobile operating system on the Sony Xperia Z Ultra smartphone, which appear to have excited a considerable degree of the public attention.
Google’s services are not available in China, but that isn’t stopping it from making a significant investment in a company based on Chinese soil. The U.S. search giant is backing Mobvoi, a three-year-old company specializing in mobile voice technology.
The duo already have business ties. Mobvoi is the company that Google picked to bring Android Wear, its operating system for wearables, to China, so this deal takes things up to the next level.
Whether you’ve put in an order for a Nexus 6P or you’re patiently waiting for Android version 6.0 to reach your Galaxy S6, you’ll want to know what Marshmallow can do for you. It’s not a dramatic leap forward for Google’s mobile OS, but there are still a number of useful new features you’re going to want to know about.
In the 1960s and 70s, technically savvy enthusiasts sought to game telecommunications systems to make free calls, keeping telecom engineers on their toes.
That practice, known as phreaking, involved such luminaries as Steve Jobs, Steve Wozniak and John Draper, known as Cap'n Crunch, who used a whistle from a cereal box to meddle with AT&T's long-distance trunk lines.
These days, mobile operators have fully embraced the Internet and are increasingly moving voice calls over fast, packet-switched networks, known as Voice over LTE (Long Term Evolution). The advantage is higher-quality voice calls for subscribers and lower costs for operators.
HTC has promised to deliver Android updates to its newest flagship phone — if it's unlocked — within about two weeks of when Google's own Nexus phones receive the software. In a live stream this morning dedicated to the new One A9, HTC America president Jason Mackenzie confirmed the update cycle for the device, which is the first Android smartphone shipping with Android 6.0 Marshmallow.
"This One A9 unlocked edition will provide you with every Android software update within 15 days of when Google first pushes to their Nexus line," Mackenzie said. The unlocked edition goes on sale in November for $399.99. However, you'll be bogged down by a cellular carrier's update roadblocks if you buy the phone from AT&T, T-Mobile, Sprint, or Verizon in the US. HTC says carriers will announce pricing and availability soon.
Android 6.0 Marshmallow is the latest version of Google's popular mobile operating system (OS) and is slated to start rolling out soon to more devices from various OEMs. Virtually all owners of a modern Android smartphone are eagerly waiting for this update, as it will bring a slew of neat features and improvements to enhance the overall experience.
Google Maps' latest update for Android lets you search for gas stations, restaurants and other points of interest along your route without leaving navigation mode. Prior to this update, you would need to leave your turn-by-turn directions to search the map for a gas station, for example, and then jump back into navigation mode. Now, you can search along the way without losing your spot. Google Maps will also show you how long a stop will add to your trip while keeping you on your route.
This year, we see a gap widening between Nexus devices and every other Android phone. If you're buying an Android device and want the fastest updates, the longest update support time, the best security program, zero crapware, the best software design, a cohesive app ecosystem, and the latest features from Google, you need to buy a Nexus. Every other Android phone pales in comparison to the Nexus 5X and 6P.
Before buying a Nexus meant you had to deal with a bad camera or poor battery life, but the Nexus 5X and 6P are the first Android devices with built with few-to-no compromises. The one thing you could complain about is the lack of wireless charging, but we can deal with that. The camera on a Nexus is finally good. The 12.3 MP cameras can hang with phones that are nearly twice the price of the 5X.
But next year? Make your own phone, Google. You can do it. I feel like this is a massive competitive advantage for Apple. When you pick up one of the new iPhones, you can just tell that nobody had their grubby hands on any part of the device or OS design but Apple. It’s time to take the training wheels off for good, Google, and own the entire experience. After that, getting people to convert from other platforms will be a slam dunk.
After several days of using Marshmallow, you almost forget it's there: this feels more like Android 5.2 than 6.0. That's partly due to apps like Gmail and Google Maps getting updated separately, but partly due to the maturity of Android as a mobile OS. Perhaps from this point on, things like improved battery life, a smarter Google Now and a bunch of smaller tweaks will be big parts of each new edition of the software.
The reviews are out for Google's Nexus 6P and 5X, unveiled late last month, and they can be summed up in two words: Love them!
They're described as "the best Nexus devices ever produced" and "Google's answer to Apple's iPhones," but those tired phrases are rolled out with every new Nexus or flagship Android smartphone, so what else is new?
OnePlus, the Chinese smartphone company that made the widely successful OnePlus One phone in 2014, is getting ready to announce another new phone soon.
The company recently published a teaser for an announcement scheduled for Oct. 29 just days after an image of an unreleased phone had appeared in FCC filings from the company.
Now, we have an even better idea of what OnePlus' next phone will probably look like. A photo showing what is said to be the OnePlus X has been leaked on Chinese social network Weibo.
The best thing about Android is also the worst thing about Android. That is, the power that Android gives users to customize the platform and make it better also gives OEMs and carriers the power to make it worse. However, some new developments with Android 6.0 Marshmallow indicate that Google is taking more control over what manufacturers can and can’t do with Android — and that’s very good news for users.
If you compare it to the other "premium" phones like the iPhone 6S, Galaxy S6, or Note 5, you're going to end up finding yourself putting a different set of things on your decision scales than before. With the Note 5: is a slightly better camera and a stylus worth $240 more, or would you rather have a clean Android experience? And the iPhone 6S: is iOS's superior app ecosystem and 3D Touch worth $150 more,7 or do you live in Google's ecosystem and want Google Now on Tap?
I'm not going to answer those questions for you here, only point out the remarkable fact that with the 6P, these are the questions now. Call it the premium category, call it the big leagues, call it whatever you what: the Nexus 6P and Google are competing at a different level than they did before. The Nexus was always a good Android phone, sometimes a great one, but never the best one.
We’d bet most Hackaday readers won’t need the software, anyway. The robot clearly uses RC servos for the drive and the little arm at the front, so controlling it directly from the Arduino ought to be easy enough. If you don’t want to roll your own, Senegal-based Azibot is taking preorders for kits for $99. We were a little surprised you couldn’t kick in a little more when you ordered to subsidize other kits for schools in need.
After several years of trial and error, I finally have a complete RAW photography workflow in Linux that I am happy with.
The applications in this workflow aren’t just native to Linux, they are also free, open source software (FOSS). There is no need to dual boot, use WINE or a virtual machine. It’s a pure FOSS photography workflow running in Linux.
lockchain technology company Coinprism has released Openchain, an open source, distributed permissioned ledger that targets enterprise and financial institutions.
Some of the first few people to work on the Druid open-source data store are today launching a new startup, Imply, with $2 million in seed funding from Khosla Ventures.
Think of this as the next big-data startup to spin out, in the vein of Hadoop-oriented Hortonworks (former Yahoo), Kafka startup Confluent (former LinkedIn), and Drill startup Dremio (former MapR). In this case, Imply is spinning out of advertising analytics startup Metamarkets.
Apache HTTP Server, the open source web server that controls around half of the market, has become the latest platform to support HTTP/2, a major security- and efficiency-focused revision of the protocol computers use to download information from the web.
The AllSeen Alliance claims to have made open source Internet of Things (IoT) development more secure with the latest update to its AllJoyn IoT framework, Security 2.0. The new feature brings authentication, device authorization and encryption enhancements to the platform.
Open source practices have been revolutionizing the way we build software for a while now. Besides providing a wealth of low-cost and well-built components, open source software has been the catalyst behind some of the most exciting new technology developments of our time: cloud computing, software-defined networking, online software delivery and more. Open source practices are also beginning to impact hardware engineering via initiatives such as the maker movement, 3D printing and low-cost platforms such as Arduino and Raspberry Pi.
Much of Netflix’s success can be attributed to the open source environment that it has created for its products and services. Since Netflix began to realize the benefits of making its software available through open source, the company has released more than 50 projects for input on its Github page. And due to its open source preference, usage and success in code software development, Netflix has assisted in legitimizing open source as a powerful tool for many organizations.
Walmart Stores is entering into cloud computing ... kinda. Last week, Walmart announced it will open-source the cloud technology it has built up following its acquisition of OneOp about two years ago. (Walmart maintains a 2,000-person presence in Silicon Valley.) Walmart says it will upload the source code to GitHub by 2016.
For Walmart, this is all about putting a dent in the growth of its major rival Amazon.com. Amazon has been giving Walmart fits on the retail side for the last decade. Now Walmart is moving the battle to the cloud, with Walmart basically declaring that Amazon Web Services means cloud lock-in that enterprises can avoid if they use the open source Walmart technology instead.
There are serious cloud projects going on at Wal-Mart Stores, Inc. (NYSE:WMT)’s WalmartLabs, and the company has indicated its willingness to freely share whatever it is cooking in the cloud. Wal-Mart intends to open source the cloud management technology that its WalmartLabs team in Silicon Valley is developing. With Wal-Mart involved in cloud publishing, disruption of cloud can be seen reaching far.
There is a mystery of sorts about the reasons people have (or think they have) to contribute to a Free and Open Source Software project. It seems very few people can explain it and it continues to puzzle everyone in the industry, the press and the governments alike.
One of the items that came out of Linux plumbers for me was discussion on the future of the Ion memory manager for Android. While not as relevant to my day to day work anymore, I still have a lot of background knowledge and input to give. Linaro Connect happened a little over a month after plumbers and I was up there for the week, mostly for Ion and other ARM talks. (Non-technically, being at Linaro Connect also meant I could avoid the chaos in my apartment from an impending move. Yay for convenient excuses!)
The second day was opened by Leigh Honeywell and she was talking about how to secure an Open Future. An interesting case study, she said, was Heartbleed. Researchers found that vulnerability and went through the appropriate vulnerability disclosure channels, but the information leaked although there was an embargo in place. In fact, the bug proofed to be exploited for a couple of months already. Microsoft, her former employer, had about ten years of a head start in developing a secure development life-cycle. The trick is, she said, to have plans in place in case of security vulnerabilities. You throw half of your plan away, anyway, but it’s good to have that practice of knowing who to talk to and all. She gave a few recommendations of which she thinks will enable us to write secure code. Coders should review, learn, and speak up if they feel uncomfortable with a piece of code. Managers could take up on what she called “smells” when people tend to be fearful about their code. Of course, MicroSoft’s SDL also contains many good practices. Her minimal set of practices is to have a self-assessment in place to determine if something needs security review, have an up-front threat modelling that is kept up to date as things evolve, have a security checklist like Mozilla’s or OWASP’s, and have security analysis built into CI process.
This July, the OpenStack community celebrated five years of open cloud collaboration. It's now a global community of more than 500 organizations and 30,000 individual members across 166 countries. OpenStack has nearly four million lines of code and powers the clouds of some of world's largest brands, including AT&T, Disney, PayPal, and Walmart.
Interested in keeping track of what's happening in the open source cloud? Opensource.com is your source for news in OpenStack, the open source cloud infrastructure project, in this special Liberty-release edition of our weekly OpenStack news.
The latest iteration of OpenStack has even more features and functionality around software-defined networking and network functions virtualization, including new container networking capabilities.
It's been just over a year since Oracle first released an OpenStack version tailored for its namesake Linux distribution, and on Tuesday it followed up with a key update reworked specifically for today's containerized world.
Oracle OpenStack for Oracle Linux Release 2 is the first commercially available OpenStack implementation that's packaged entirely as Docker instances, Oracle said, meaning that enterprises don't need to install components individually.
Apcera’s platform is mostly written in Go language. We are strong proponents of open source and have open sourced some of our products and key components. One notable open source product from Apcera is NATS (http://www.nats.io), our high-performance, simple and scalable cloud native message bus that powers some of the largest cloud platforms in production today. Not only is the product completely open source, but we also open sourced the website and documentation itself. Another notable open source product from Apcera is Kurma (https://github.com/apcera/kurma/), a next generation execution environment for a containerized host. Kurma is built on the notion that everything is a container. It is an operating system that allows containers to be managed and orchestrated by other processes.
The UK Government is looking to shed its dependency on proprietary software and entered into a new commercial deal with an open source software company Collabora Productivity that adapts LibreOffice for the use in enterprise environments.
UK Government buyers have signed a new commercial deal for Open Source office applications on desktop, mobile, and cloud. The "Cloud Transition Agreement" between the Crown Commercial Service (CCS), an executive arm of the Cabinet Office, and British Open Source software firm Collabora Productivity, states the Government's commitment to Open Source and Open Document Format, and offers major cost savings for public sector bodies.
The Document Foundation, through Italo Vignoli, has had the great pleasure of announcing that the first bug hunting session for the upcoming LibreOffice 5.1 office suite will take place between October 30 and November 1, 2015.
We reported earlier that The Document Foundation non-profit organization announced the first bug hunting session for the upcoming LibreOffice 5.1 open-source office suite.
That both open source and education have core commitments to sharing knowledge freely and to impacting the world for good through collaboration. We also share a similar challenge of how to encourage many small and unique contributions to a very large-scale project. There is some fascinating work going on in India to create social infrastructure in and around schools that makes Drupal knowledge and community easier to build and sustain.
OpenBSD, the open source Unix-like operating system that today mostly lives in Linux's shadow, turns 20 this month. To mark the occasion, here's some historical background on one of the only major "open source" operating systems to have survived without embracing the GNU GPL license.
I’m a 30 years old programmer/sysadmin with wide range of interests from Moscow, Russia. I’m working in IT industry for about half of my life, and last few years I’m also a freelance teacher at Moscow State University of Information Technologies, Radiotechnics and Electronics (ex. Moscow State Institute of Radio Engineering, Electronics and Automation). I have a daughter (best one in the world, of course), which was born at October, 18 – you may call this a Fate. :)
No, that's not a typo; the videos for EuroBSDCon 2014 are finally online.
Since 2001, so for almost three quarters of its history by now. Originally, it was pure chance. A coworker who used to run various Linux distributions repeatedly got his boxes rooted. Instead of properly securing them, he proposed to try OpenBSD. I said i didn’t care much which system he used. At that time, i was used to working on many different Unix and Unix-like systems (DEC OSF/1, Ultix, HP-UX, AIX, SuSE Linux, Debian GNU/Linux …) and OpenBSD looked like just another Unix-like system, so why not.
Lots of changes debut in the new OpenBSD 5.8 release including some interesting security updates.
Consider the LLILC project. Rather than reinvent the wheel, Microsoft's new compiler for its CoreCLR .Net runtime leverages an existing cross-platform compiler framework: LLVM. Now six months into the project, its maintainers -- a foundation comprised largely but not exclusively of folks from Microsoft -- reports "great progress" with LLILC, but also "much still to do."
The Gnuspeech project has announced its first official release as a speech synthesis from text free software system.
France’s citizens are in favour of their public administrations’ use of free and open source software. France should also implement this type of software in education, according to the results of a public consultation on France’s Digital Republic bill (La République numérique). After twenty days of public debate and voting on proposals, the consultation ended on Sunday. La République numérique - the Digital Republic - drew 147,710 votes, received 8501 proposals and attracted 21,330 participants.
Spain’s Ministry of Education has made public a database model for school student records. By sharing the technical specifications for storing and querying the student records, the ministry is encouraging the interoperability of software solutions.
Governments should build or help build application programming interfaces (APIs) to their core eGovernment services, says Kimmo Mäkinen, development manager at Finland’s Ministry of Finance. “We must offer an open API’s for software developers, not just the end-user interface”, he said.
The Affordable College Textbook Act, a bill reintroduced by U.S. Sen. Dick Durbin (D-Illinois) on Oct. 8, would encourage universities to support pilot programs that create digital and print open-source textbooks. Universities participating in the programs would be required to create digital educational resources that would be printable and available free of charge, according to the act.
My name is Meghan Healey. I’m an undeclared freshman. Being on this exploratory track, most of my textbooks were relatively cheap, but they were still more expensive than they should be. If all textbooks were as “cheap” as my American Politics class, students would still have to pay at least $150 in order to have a proper education. This $150 could have been spent toward my tuition, my meal plan, or a plentiful amount of other academic expenses. Geology Textbook: $50. Environmental Science Packet: $30. Sustainability Book: $10. Freshman Seminar: $20. iClicker 2 for American Politics: $60. American Politics Textbook: $90 My total? $260. What should it be? Priceless.
For Dutch 3D printer manufacturer Ultimaker, being open sourced has been part of who the company was since the very beginning, and their early success can easily be traced directly back to their loyal community of users. Their first 3D printer, the Ultimaker Original, was already a great 3D printer and remains (despite being four years old) one of the most reliable 3D printers available today. And from the very beginning Ultimaker has encouraged their community to help them make the Original better, and they certainly have. In fact, many of the improvements created by the community for their personal Originals were implemented into their next 3D printer, the Ultimaker 2 and the resulting Ultimaker 2 family of 3D printers.
If your needs are average (which is the case for most people), I'd recommend Path::Tiny. This provides a well-balanced set of functions for dealing with file paths and contents.
Former Microsoft Corp. Chief Executive Officer Steve Ballmer has acquired a 4 percent stake in Twitter Inc., giving him a bigger holding than the social-media company’s new CEO, Jack Dorsey.
“Glad I bought 4% past few months,” the owner of the Los Angeles Clippers basketball team tweeted Friday. He praised Dorsey, who was appointed last week, for making the company “leaner, more focused.”
In a tweet sent on Thursday evening, Mr. Ballmer, the former chief executive of Microsoft, said he had acquired a 4 percent stake in Twitter, becoming one of the single-largest outside shareholders of the company. He also praised one of the company’s new products, Moments, which organizes tweets on specific topics.
Iceland’s Prime Minister Sigmundur Davið Gunnlaugsson has invited his colleagues from the Nordic countries, the Baltic states and the United Kingdom to discuss government modernisation. The Northern Future Forum is to take place in Reykjavík on 28 and 29 October and will focus on simpler, smarter and innovative public services.
If you've read our review of the new iMac, you already know that a majority of what's really new about Apple's latest all-in-one is its accessories. The destructive folks over at iFixit say that the 21.5-inch model has what "looks like" an LG ultra-HD display and a Texas Instruments chip, while the fan and HDD are the same -- the speakers are too. The logic board is where the surprises come in, and they might not make you too happy. Configure a machine without flash storage or a Fusion Drive? You won't be able to add one at a later date because those don't include an onboard connector to do so.
Apple delivered the 4K iMac many fans have been waiting for this week, but it’s not quite the all-in-one powerhouse some were expecting. Look past its beautiful design and you’ll find a lot of drawbacks you probably wouldn’t (and shouldn’t) expect to get with a $1,500 computer.
This summer, the Food and Drug Administration warned hospitals to stop using a line of drug pumps because of a cybersecurity risk: a vulnerability that could allow an attacker to remotely deliver a fatal dose to a patient. SAINT Corporation engineer Jeremy Richards, one of the researchers who discovered the vulnerability, called the drug pump the “the least secure IP enabled device I’ve ever touched in my life.”
There is a growing body of research that shows just how defenseless many critical medical devices are to cyberattack. Research over the last couple of years has revealed that hundreds of medical devices use hard-coded passwords. Other devices use default admin passwords, then warn hospitals in the documentation not to change them.
Far too often Congress proposes tech legislation that is either poorly researched or poorly drafted (or both). Fortunately, most of the bills don't advance. Unfortunately, this doesn’t seem to dissuade Congress from constantly writing these types of bills. The House Energy and Commerce Committee released such a bill last week. It's only a discussion draft and hasn't been introduced as a formal bill yet, but its provisions would not only effectively put the brakes on car security research, but also immunize auto manufactures from FTC privacy enforcement when (not if) they fail to secure our cars. It's a classic one-two punch from Congress: not understanding something and then deciding to draft a bill about it anyway.
It’s possible for entities with vast computing resources – such as the NSA and major national governments - to compromise commonly used Diffie-Hellman keys, and over time more groups will be able to afford cracking them as computing costs go down.
How do you defend yourself against the unknown? That is crux of the zero-day vulnerability: a software vulnerability that, by definition, is unknown by the user of the software and often its developer as well.
Everything about the zero-day market, from research and discovery through disclosure and active exploitation, is predicated upon this fear of the unknown—a fear that has been amplified and distorted by the media. Is the world really at threat of destabilisation due to lone-wolf hackers digging up vulnerabilities in popular software packages and selling them to whichever repressive government offers the most money? Or is it just a classic case of the media and megacorp lobbyists focusing on the sexy, scary, offensive side of things, and glossing over the less alluring aspects?
My recent post about how quickly newly commissioned Linux systems can be attacked and possibly compromised led to a bunch of e-mail queries about resources which explain how to lock down a variety of Linux distributions. Most such guides are distribution specific because, while the basic principles are always the same, there are significant differences between distributions and even versions of the same distribution that make writing a generic guide difficult at best.
The same reporters who received documents from former NSA worker Edward Snowden are now publishing information from a second governmental source.
It’s been just over two years since Edward Snowden leaked a massive trove of NSA documents, and more than five since Chelsea Manning gave WikiLeaks a megacache of military and diplomatic secrets. Now there appears to be a new source on that scale of classified leaks—this time with a focus on drones.
A former US drone operator says the US Ramstein airbase in Germany had a key role to play in US drone strikes. Brandon Bryant was answering questions from a parliamentary committee investigating the NSA.
A former U.S. Air Force drone sensor operator, who spoke to German media about Ramstein Air Base’s alleged role in the U.S. drone war, is one of two people being honored Friday with a biennial “whistleblower award” in Germany.
Brandon Bryant and French molecular biologist Gilles-Eric Seralini, whose research showed the popular herbicide Roundup to be toxic to animals, will each receive a prize of 3,000 euros from the Federation of German Scientists and the German Section of the International Association of Lawyers Against Nuclear Arms. The awards were to be presented at a ceremony Friday in Karlsruhe.
Forty-two years ago today, a series of events on the other side of the world culminated in the strategic and crippling use of oil as a political weapon. As a result, the United States entered into the most devastating economic recession to hit the nation since the Great Depression.
A massive political storm has been stirred in Pakistan over former defence minister Chaudhry Ahmed Mukhtar's revelations that the top authorities in the country knew about the presence of Osama bin Laden. Former Pakistan president Asif Ali Zardari and Prime Minister Nawaz Sharif are disturbed by the statements made by Chaudhry and the government has ordered an inquiry against him.
There’s a lot about Ted Cruz that should worry constitutionalists considering voting for the senator in the presidential election of 2016.
Recently, Infogram published brief but illuminating biographies of several of Cruz’s key foreign policy advisors. The information disclosed in these revelations could trouble many constitutionalists otherwise keen on the senator and who rely on him to restore the rule of law to the White House.
The head of an international medical charity whose hospital in northern Afghanistan was destroyed in a U.S. airstrike says the “extensive, quite precise destruction” of the bombing raid casts doubt on American military assertions that it was a mistake.
The Oct. 3 attack on the compound in Kunduz city, which killed at least 22 patients and hospital staff, should be investigated as a possible war crime, said Christopher Stokes, general director of Doctors Without Borders, which is also known by its French abbreviation MSF.
A bombshell White House memo has revealed for the first time details of the ‘deal in blood’ forged by Tony Blair and George Bush over the Iraq War.
The sensational leak shows that Blair had given an unqualified pledge to sign up to the conflict a year before the invasion started.
It flies in the face of the Prime Minister’s public claims at the time that he was seeking a diplomatic solution to the crisis.
He told voters: ‘We’re not proposing military action’ – in direct contrast to what the secret email now reveals.
When San Francisco’s Department of Emergency Management realized that the number of 911 calls coming in had been dramatically increasing since 2011 -- straining staff and city resources, and potentially creating dangerous delays for callers -- officials wanted to find out why.
New counter-extremism strategy will see people convicted of terrorism treated like sex offenders to protect young people
CNN aired the first Democratic presidential debate Tuesday featuring five candidates, including former secretary of state Hillary Rodham Clinton and Sen. Bernie Sanders (I-Vt.).
Not every candidate uttered facts that are easily fact checked, but following is a list of 13 suspicious or interesting claims. As is our practice, we do not award Pinocchios when we do a roundup of facts in debates.
Con artist Wayne Simmons created an elaborate life story. It is fake. He identified as a CIA outside paramilitary special operations officer. He wasn’t. He wrote a book claiming he worked in the CIA for 27 years. He didn’t.
Fox News took him at his word. So did the U.S. government. Simmons worked as a subcontractor for the government multiple times, and was even invited to train at an Army facility. He ended up receiving security clearance and served as an intelligence advisor to senior military personnel overseas. So much for background checks.
During Tuesday’s Democratic debate, Hillary Clinton tried to display a new and more progressive version of the Hillary who Americans have seen for years: as First Lady, U.S. Senator, 2008 presidential candidate and Secretary of State.
Lawrence Lessig, one of the country’s foremost tech legal scholars, announced Saturday that he would be making a key modification to his quixotic campaign for president.
If elected, the Harvard Law professor would plan to stay on as president—rather than resign immediately (as he had previously promised) after the passage of his as-yet-undrafted Citizen Equality Act. The bill would be designed to increase voting access, end partisan gerrymandering, and reform campaign finance, among other reforms.
Why the change?
We've written a few times about Larry Lessig's somewhat wacky campaign for President, which was premised on the idea that it was a "referendum" campaign, where his entire focus would be to push Congress into putting in place serious campaign finance reform and then resigning from the Presidency. As we noted, the whole thing was a bit of a gimmick. And apparently that gimmick hasn't been working too well. Earlier this month, Lessig noted that he was being shut out from the Democratic debates, despite being a Democrat running for President and polling roughly on par with a few of the other nobodies in the campaign. The problem is that the Democratic National Committee apparently chose to ignore the campaign and because it refused to officially "welcome" him to the campaign, pollsters aren't including him and thus he didn't have enough polling data to be invited to the debate.
The German intelligence service has spied on European and American embassies in ways that may have been beyond its mandate, German media ARD and Spiegel Online reported on Wednesday (14 October).
Germany’s intelligence service, already accused of spying on behalf of Washington, allegedly took the initiative of spying for several other allied countries, such as France and the United States, reveal German media on Thursday.
– Der Spiegel claims German secret service BND carried out digital surveillance targeting friendly nations, including France and US
BND embroiled in another scandal as Spiegel Online reported that Germany’s intelligence agency was spying on EU institutions, France and the US until late 2013, on its own and not on behalf of the NSA.
Spies at Germany's BND foreign intelligence service snooped on the communications of friendly states' embassies and government offices, including EU members and the USA, as recently as 2013, media reports claimed on Wednesday.
Germany's secret service, already under fire for having allegedly spied for Washington, had also spied for its own account on allies including France, German media claimed Thursday.
Much of Canadian data stays in Canada, German data in Germany. Data can't be carted over the borders into that skanky NSA-monitored data sieve called the USA.
As expected, the European Union court has thrown out an agreement, forged in 2000, that allows virtually uninhibited data sharing and transfer between the United States and EU countries and is the legal basis for National Security Agency’s on-line surveillance and data capture programs.
They are freelancers with no oversight or rules. They are only accountable to themselves and their employers. These freelancers thrive on their ability to remain hidden from the public eye. In reality, they could be your socially inept, angry neighbor down the street who is afraid of their own shadow in person. But give them a keyboard and they’ll take your job, your bank account and your freedom.
The first alarm came within a week. It meant an Ericsson AB employee had used a company computer to view images categorized by law enforcement as child sexual abuse.
“It was faster than we would have wanted,” says Nina Macpherson, Ericsson’s chief legal officer.
In a bid to ensure none of its 114,000 staff worldwide were using company equipment to view illegal content, in 2011 the Swedish mobile networks pioneer installed scanning software from Netclean Technologies AB. While many companies since then have adopted similar measures, few have been willing to discuss their experience publicly.
THE INTERACTIVE ADVERTISING BUREAU (IAB), which ought to know about these things, has said that online advertising has failed the consumer and needs a rethink.
The alarm has been sounded at a time when ad blocking is high on the news and public agendas. The sometimes controversial issue of ad blocking is a relevant topic at publishing houses large and small, and the IAB, the organisation created to concern itself with the medium and the message, is on the case.
"Through our pursuit of further automation and maximisation of margins during the industrial age of media technology, we built advertising technology to optimise publishers' yield of marketing budgets that had eroded after the last recession," the IAB said in a bold statement about its Lean Ads programme.
Last year, US president candidate in the Democratic Party Lawrence interviewed Edward Snowden. The one hour interview was published by Harvard Law School 2014-10-23 on Youtube, and the meeting took place 2014-10-20.
Facebook’s iPhone app is consuming large amounts of battery charge even when it is not open, users have complained.
Users say the app records long periods of background activity, even when settings such as background refresh are disabled.
One user, product developer Matt Galligan, wrote that the Facebook app was not “sleeping properly when I hit the home button” and that the “problem may not be an easy fix for Facebook and the way their app is built”.
Analysis of the Facebook app by iOS developer Jonathan Zdziarski indicated that Facebook’s location tracking of users could be at least partially to blame for the battery drain.
This week we found out that as many as 90 percent of people killed by US drones weren’t the intended targets, thanks to a ‘second Snowden’ who leaked a motherload of documents to The Intercept. The Democratic presidential candidates discussed Edward Snowden during the Democratic presidential debate, but only long-shot candidate Lincoln Chafee said he would welcome him home without any charges. French hackers showed they can remotely take control of Siri and Google Now by using radio waves from as far as 16 feet away. We took a look at the many ways cops could hack into your iPhone even without a backdoor. It’s not all bad news, though: Tech companies like Apple may have a new legal defense for resisting the government’s orders to unlock devices.
And that’s not all. Each Saturday we round up the news stories that we didn’t break or cover in depth at WIRED, but which deserve your attention nonetheless. As always, click on the headlines to read the full story in each link posted. And stay safe out there!
Facebook will now warn people if it has a strong suspicion an account is being targeted by a nation-state.
Chapman University has just come out with its second annual Survey of American Fears, and while you don't want to read too much into the rankings—the vast array of fear-producing stimuli means we're inevitably comparing apples and oranges, if not elephants and elevators—the answers are revealing.
[...]
What to make of that list? For one thing, the survey of 1,500 American adults (which was designed to reflect the population as a whole) confirms the truism that we have a strong distrust of government. Note that fear of corrupt public servants tops the list, with 58 percent of respondents saying they were either afraid or very afraid of this phenomenon.
[...]
Fear of a terrorist attack has apparently waned in the years since 9/11. Although high on the list (at number four), only 44.4 percent of respondents said they were afraid or very afraid of such an event.
German telecom companies will be obliged to keep telephone and Internet data for up to 10 weeks to help fight crime under a new law passed by parliament on Friday after a long political wrangle over possible infringements of individuals' rights.
Under the data retention law, companies will be required to keep data on the timing and duration of telephone calls, as well as online traffic through IP addresses. Location data from mobile phones may only be stored for four weeks.
Being Muslim can’t be the basis for law enforcement surveillance. That was the message from the Third Circuit on Tuesday when it told the plaintiffs in Hassan v. The City of New York that their lawsuit could go forward. The plaintiffs are suing over the New York Police Department’s suspicionless mass surveillance operation revealed by the Associated Press in 2011.
Online privacy is a really delicate topic, especially after various reports revealed how the NSA and other governments have been spying on users all over the internet. We use instant messaging every day and for most of us concerned about our privacy, an encrypted messaging systems are very much welcomed. LINE is one of the most popular messaging systems out there and, although not the first one, the Japanese company has just announced a new feature called Letter Sealing to further protect messages as they are being sent. If you are asking yourself, “Letter sealing? What?”, this is like the seal kings would put on medieval times to send their letters somewhere – a bold name to End-To-End encryption technique.
He took every step very carefully and made sure he covered his tracks. But on Aug. 3, 2008, Daniel Rigmaiden was arrested by the FBI near his apartment in northern California.
Democratic presidential candidate Bernie Sanders did not mince words at the first Democratic debate in Las Vegas, where he talked about Wall Street, NSA surveillance and climate change.
With data retention laws about to kick in, New Matilda speaks to its major parliamentary opponent about what it means for online freedoms and how to beat the system. Max Chalmers reports.
On October 5, Third Way and the R Street Institute sent a joint request to the respective leaders of the House and Senate intelligence committees. The letter asks the committees to declassify records of the legislative negotiations leading up to passage (and subsequent reauthorization) of the FISA Amendments Act (FAA) of 2008.
Both support the Email Privacy Act, which would require law enforcement to obtain a warrant before accessing private email accounts.
The bill has amassed over 300 co-sponsors, but hasn’t come close to getting a floor vote.
Chaffetz is also a co-sponsor of the GPS Act, which would force investigators to get a warrant when seeking electronic location data.
One thing we have become all too used to is that our reality can be manipulated to create the appearance of something else entirely. Invading another country is defensive, rigged elections are passed off as democracy in action, more guns (or more nuclear weapons) ensure the peace, trade and foreign investment increase jobs at home. Orwellian logic has become commonplace.
We recently told you about the NSA's recent (and very weird) love notes being spread online. But there's a new organization called Intelexit that's not feeling the love at all.
In fact, Intelexit's goal is to get intelligence workers - particularly those at the NSA - to quit their jobs. And, if they'd like to be whistleblowers like Edward Snowden, Intelexit will help with counseling, legal support and media planning.
This summer, two different events affected two different worlds. First, Milan-based Hacking Team — a small group of programmers who customize malware to gather intelligence — was itself hacked, and more than 400GB of its internal data was leaked. A few days later, a South Korean intelligence officer who had been implementing tracking software killed himself, and his suicide note allegedly referred to Hacking Team. As a result, many professionals in software development and espionage are pondering their future.
The second and more important thing is that Mr Lucas is an old-fashioned journalist who can be lumped into that group that is, not very flatteringly, called the Old Boys Club in the UK. Consequently he is friends with some CIA, NSA and GCHQ veterans, alludes to giving talks at such institutions, has blurbs for this book from a former US Secretary of Homeland Security and a former Director of GCHQ on the back. This obviously comes with all kinds of caveats particularly when the book is about subjects as political as cyber warfare and hacking. One of those caveats is his conspiracy theory, shared by many conservatives in the West, that Edward Snowden is a Russian spy which made him say, “If Snowden had approached me with these documents, I would have marched him down to Bow Street police station and asked them to arrest him”.
The nation's online communication watchdog is considering taking tough measures against Google which is suspected of leaking users' personal information to third parties.
"You are the data: You are the queries you ask, the addresses you provide, the emails you answer, the transactions you carry out, the conversations you have. There is an inexhaustible amount of data that we leave online, leaving us vulnerable to various threats," says Nikhil Pahwa of the internet watchdog Medianama.
Half a century before either Edward Snowden or Chelsea Manning was born, American military codebreakers and U.S. telecommunications companies collaborated on a secret electronic surveillance program that, as newly declassified documents reveal, they knew to be illegal. The program, approved at the highest levels of the U.S. government, targeted messages sent by foreign embassies in Washington, DC, in the years leading up to World War II, and was dramatically expanded after the war.
At Tuesday’s Democratic presidential debate, candidates offered differing views on what should happen to NSA whistleblower Edward Snowden for exposing illegal mass surveillance. "He stole very important information that has unfortunately fallen into a lot of the wrong hands," said front-runner Hillary Clinton. "So I don’t think he should be brought home without facing the music." The four other candidates expressed appreciation for Snowden’s leaks and said his exposure of wrongdoing should be taken into account. We get reaction from Norman Solomon, longtime activist and executive director of the Institute for Public Accuracy.
People who expose wrongdoing on national security and intelligence issues around the world are often given weak or no protection and are often subject to retaliation, creating a “chilling effect on people speaking out”, a United Nations report has found.
U.S. law gives the National Security Agency a green light to collect a staggering amount of personal data from phone and Internet users around the world, most of whom aren’t even remotely connected to terrorists. This week, however, a European court said the NSA’s shotgun approach to surveillance violated Europeans’ privacy rights. And because the European Court of Justice has no jurisdiction over the NSA, it took out its displeasure on the Internet.
The Obama administration has backed down in its bitter dispute with Silicon Valley over the encryption of data on iPhones and other digital devices, concluding that it is not possible to give US law enforcement and intelligence agencies access to that information without creating an opening that China, Russia, cybercriminals, and terrorists could also exploit.
I don't normally recommend Lawfare, seeing as it's generally filled with NSA apologia and has been known to host the complaints of FBI directors who apparently just don't have enough outlets for crypto-related spleen-venting. But Hoover Institute cyber-policy/security scholar Herb Lin makes a few good points about the administration's decision to brush that backdoor dirt off its shoulders.
NSA whistleblower Edward Snowden and Black Lives Matter activist DeRay Mckesson had a spirited discussion about their respective causes on Twitter Monday night, trading points on the relationship between police and state violence and surveillance.
“Privacy isn't about something to hide, it's about something to lose,” Edward Snowden told attendees at the “Why Privacy Matters: What Do We Lose When We Lose Our Privacy?” conference hosted by the Hannah Arendt Center for Politics and Humanities at Bard College.
Snowden, whose keynote delivered via satellite from Russia and was punctuated by applause, contended that the technology and apps being used today – even lunch cards on college campuses — especially those that use geolocation are creating “perfect records of private lives being aggregated and stored.”
The parliamentary Intelligence Oversight Commission asked the government on Wednesday for a comprehensive briefing on its findings pertaining to the mass surveillance operation in which the US National Security Agency and its German counterpart BND allegedly also spied on Slovenian citizens between 2005 and 2008.
Too little has been done to ensure that citizens' rights are protected following revelations of electronic mass surveillance, say civil liberties MEPs in a resolution passed on Tuesday. They urge the Commission to come up immediately with alternatives to Safe Harbour, following the ruling by the European Court of Justice. They are also concerned about the surveillance laws in several EU countries.
In a decision on October 6 that was as shocking as it was predictable, the Court of Justice of the European Union (CJEU) invalidated the U.S.-EU Safe Harbor for westward bound international transfers of personal data.
Between January 2012 and February 2013, the drone strikes in Northeastern Afghanistan killed 200 people, with only 35 of whom were intended targets. Nearly 90% of innocent lives were taken for the 10% of terrorists America wished to destroy.
We need to gain distance from the state, even as we make claims. And the claims we make should serve a dual purpose.
The world of politics is filled with people who many would consider to be out of touch with real life. All too often politicians are treated differently, and this has certainly been the case when it comes to NSA and GCHQ surveillance of phone and internet traffic. In the UK a court has ruled that a ban on intercepting politicians' communication is not valid.
Bald, bearded, with tattooed arms and a T-shirt – Brandon Bryant appears out of place among the people in suits of the German Bundestag. On Thursday he testified before the NSA Committee [of Inquiry] about his earlier work with the U.S. Air Force, including his day-long observations from the air and killing people with Hellfire missiles; the "manhunt," as he called it.
But it wasn't only Bryant's appearance that set him apart from the others in the hearing room. It was if reality were bursting forth into what is otherwise theoretical debate on surveillance and selectors, antennae signals and those who carry them. The 29-year-old Bryant was at the receiving end of all that government-collected data. He was the one to pull the trigger, making sure that missiles hit preselected targets identified through the use of secret service-collected surveillance.
A federal judge said Tuesday that she will dismiss Twitter's lawsuit against the National Security Agency because of the "new landscape" created by legislation that limits government surveillance - but asked Twitter to amend its claims anyway.
Penn professor Nadia Heninger, whom TechCrunch once dubbed “the Chuck Norris of the crypto world,” is one of 14 researchers behind a paper that’s making waves in the internet security community.
The report, which won the prize for best paper at the this week’s ACM Conference on Computer and Communications Security, suggests a solution to what the authors called a “technical mystery.” If the rumors of the National Security Agency’s mass decryption powers are true, how is the agency doing it? The answer has to do with a flaw in a method of secure communication, as well as the NSA’s multi-billion-dollar budget.
A National Security Agency memo that recently resurfaced a few years after it was first published contains a detailed analysis of what very possibly was the world's first keylogger—a 1970s bug that Soviet spies implanted in US diplomats' IBM Selectric typewriters to monitor classified letters and memos.
It was the morning of 9 March, 2005. Panayiotis Tsalikidis was heading to have coffee with his brother Costas in Kolonos, downtown Athens, before a meeting. As he entered the building, he heard his mother screaming: "Cut him down!"
He entered the apartment and saw his brother's body hanging in front of the bathroom door. "I immediately called my wife and asked her to bring a high-definition camera so I could take some pictures on the spot, because I didn't believe it was a suicide," says Panayiotis today.
When Keith Alexander arrived in Tampa in 1998 to take over as director of intelligence for U.S. Central Command, he spent the first six days walking around MacDill Air Force Base, checking out his new surroundings.
“Then on the seventh day — and this isn’t biblical — but on the seventh day, al-Qaida bombed the two embassies, and it all went down hill after that and I never saw the sun again while I was here.”
When Sony pictures was hacked last year, it brought cyber attacks to the forefront. This is an issue that is growing with time.
That’s why a cyber security conference at U-S-F is crucial in the fight against cyber attacks.
...NSA's legal chief while the agency experienced the Snowden leaks and subsequent government surveillance debate.
Despite the fact that most of the internet industry has recently come out against the ridiculous faux-cybersecurity bill CISA, the Senate today began the process of moving the bill forward with a debate. The arguments were pretty much what you'd expect. The supporters of the bill, such as Senators Dianne Feinstein and Richard Burr, went on and on about how the bill is "voluntary" and about various online hacks (none of which would have been stopped by CISA -- but apparently those details don't matter). Senator Ron Wyden responded by pointing to all the internet companies coming out against the bill, and saying (accurately) that they're doing so because they know the public no longer trusts many of those companies, and they don't want a bill that will almost certainly be used for further surveillance efforts.
As if “national security” weren’t enough, now Congress is trying to use “cybersecurity” as an excuse to chip away at our right to privacy—and it’s riding on the coattails of incidents like the Experian and OPM breaches. Once again for continuity, it bears repeating that the Cybersecurity Information Sharing Act (CISA) would not have stopped the recent high-profile security breaches.
“I’d shut down what exists right now [which] is that virtually every telephone call in this country ends up in a file at the NSA,” Sanders told CNN’s Anderson Cooper. “That is unacceptable to me.”
In a new book, David Talbot makes the case that the CIA head under Eisenhower and Kennedy may have been a psychopath.
The Government is facing a hypocrisy row over living wage targets after a group of Foreign Office cleaners claimed they were laid off for complaining about their pay packets.
Cleaners at the Foreign Office (FCO) have been put under disciplinary investigation after they sent a letter to Philip Hammond requesting to be paid the London Living Wage.
Barack Obama was, in 2008, the anti-torture candidate.
On March 8, 1971, eight anti-war activists burglarized an FBI office in Media, Pennsylvania. Documents stolen from the office exposed a secret counterintelligence program — COINTELPRO — which, among other things, gave federal agents the authority to conduct domestic surveillance on U.S. citizens, eerily similar to what Edward Snowden would reveal more than 40 years later. But unlike Snowden, the eight anti-war activists were never caught, and their identities remained a mystery for decades.
The wife of a Missouri native and CIA whistleblower serving time in federal prison for leaking classified information is asking President Obama to pardon her husband, Jeffrey Sterling.
In a press conference that included other CIA whistleblowers or their lawyers leveling allegations of a double standard involving former General David Petraeus and presidential candidate Hillary Clinton, St. Louis resident Holly Sterling said her husband was both the victim of an Obama administration "shrouded in mis-truth and secrecy," and the target of a prosecution based on race.
John Kiriakou is an American patriot who informed us of the criminal behavior of illegal and immoral US “cloak and dagger” operations that were bringing dishonor to our country. His reward was to be called a “traitor” by the idiot conservative Republicans and sentenced to prison by the corrupt US government.
The colleague of an ANU academic found dead in Turkey has called for a full investigation into her friend's death, saying she is "unconvinced" the cause was suicide.
The BBC is reporting that Jacky Sutton, 50, a former journalist from their newsroom, was found dead in a toilet in Istanbul's main airport on Saturday.
Asked directly about Ms Sutton's death, the United Kingdom's Foreign and Commonwealth Office confirmed that a British National had died in Istanbul.
SunTrust Banks in Atlanta is laying off about 100 IT workers as it moves work offshore. But this layoff is unusual for what it is asking of the soon-to-be displaced workers: The bank's severance agreement requires terminated employees to remain available for two years to provide help if needed, including in-person assistance, and to do so without compensation.
Many of the affected IT employees, who are now training their replacements, have years of experience and provide the highest levels of technical support. The proof of their ability may be in the severance requirement, which gives the bank a way to tap their expertise long after their departure.
All over the nation, police departments are deploying body cameras. But there's no guarantee the public will have any access to the footage. As Kimberly Kindy and Julie Tate of the Washington Post report, the ultimate goals of greater accountability and transparency are routinely being thwarted by law enforcement agencies.
Los Angeles County prosecutors said Monday they will not file charges against a Saudi prince arrested on suspicion of sexual assault at a compound on the edge of Beverly Hills, citing insufficient evidence.
Majed Abdulaziz Al-Saud, 29, was arrested last month after a female worker accused him of trying to force her to perform a sex act on him inside a Beverly Glen residence he was renting, police said. Police alleged there were multiple victims, and within days of Al-Saud’s arrest three women sued him in civil court.
Although prosecutors said there was not enough evidence for felony charges, the case was referred to the L.A. city attorney’s office, which could charge him with a misdemeanor. Officials in that office said they would have to review the case before making any decisions.
Today’s wireless networks are sophisticated and complex, but what our customers want is simple – to access their information and entertainment with a simple click. To make this happen, we’ll continue to take a responsible and thoughtful approach in how we manage our network resources. Whether we’re adding capacity to a cell site, upgrading our network to deliver even faster speeds, or implementing today’s QoS technique, our goal is simple - to provide a great network experience to our customers.
The MPAA has asked the U.S. Government for help in its efforts to reach private anti-piracy agreements with search engines, domain name registrars and hosting services. The Hollywood group believes that these three industries have shown "lagging progress" and should do more to deter online copyright infringement.
Google is expected to announce this week that some YouTube videos will only be available to subscribers.
It's no secret that YouTube is funding content development, putting some fairly serious money into projects involving its most popular talent.
But according to Re/code, some of this new content will be revealed at a YouTube event on Wednesday 21 October (US time), and it will only be available to paying YouTube subscribers.
We’ve discussed industrial protectionism and content vs container before. To wrap up the theme, I’d like to look at the more subtle points of lobbyist language, which are just as devious – if you copy them, you’re working against your own liberties.
The copyright industry doesn’t just choose positive phrases to describe their specific “innovations”. They also try to establish sayings, phrases, and other combinations of words to make them uttered so often they become colloquilalisms, and yet, have very strong values embedded into them. This is very subtle, but just as important to understanding proper usage of the copyright monopoly, industrial protectionism, and digital restriction measures. It may not be those words that win the mindset, but the words in between – small words like left, right, black, and white.