Let’s just get this out of the way: this isn’t the year of Linux on the desktop. That year will probably never arrive. But Linux has gotten just about everywhere else, and the Linux community can take a bow for making that happen. Android, based on the Linux kernel, is so prevalent on mobile devices that it makes the longstanding desktop quest seem irrelevant. But beyond Android there are a number of places where you can find Linux that are truly odd and intriguing, and by “places” we mean both strange devices and weird geographical locations. This slideshow will show you that it’s always the year of Linux pretty much everywhere.
Google has many side initiatives, and one of them is the Cultural Institute that digitizes works of art from museums and archives around the world and puts them online.
Today, their Art Project released an app for Chrome OS that updates the wallpaper of your device to a different piece of art from their collection every day. Expect “masterpieces ranging from Van Gogh and Monet, all the way to contemporary works from street artists around the world,” according to Chrome evangelist François Beaufort in announcement post. If today’s piece doesn’t jive with your artistic taste, you can skip to the next wallpaper in the app.
Chromebooks have been red hot sellers on Amazon for some time now. But if you're someone who has had a boring desktop on your Chromebook, you can now spice it up with Google's new Wallpaper Art app. The app will refresh artwork every day and features many different wallpapers from noted artists from the past and present.
CoreOS, the company behind the popular lightweight Linux distribution for data center deployments with the same name, has recently made a big bet on containers. Today, the company is launching Clair, an open-source tool for monitoring the security of containers — and it’s also integrating Clair into its paid Quay container registry service as a beta feature (with support for Quay Enterprise coming at a later date).
Most users don't know if there are vulnerable components inside of containers; Clair will help solve part of that challenge. Containers offer users a new more optimized way to run virtualized applications at scale, but what about security? Any user can pull down a container application from an image repository without knowing if the application is safe. A new open-source project from CoreOS called Clair is aiming to solve part of the challenge by providing a security system that scans containers' images for known vulnerabilities.
CoreOS's new open-source project Clair, monitors containers security. Since it's so easy for security holes to hide in containers this is no small matter.
On the final semester of my MSc program at Columbia SEAS, I was lucky enough to be able to attend a seminar course taught by Alfio Gliozzo entitled Q&A with IBM Watson. A significant part of the course is dedicated to learning how to leverage the services and resources available on the Watson Developer Cloud. This post describes the course project my team developed, the PaperTrail application.
While I was initially attracted to the notion of sharing some of these thoughts in an audio format, I have decided to focus instead more on writing. This was partially informed by my back of the napkin research, but also in thinking about how we best present thoughts.
Every two weeks Bad Voltage delivers an amusing take on technology, Open Source, politics, music, and anything else we think is interesting, as well as interviews and reviews.
THE LINUX FOUNDATION has launched its latest initiative to bring the tech sector closer together. This time, its sights are set on supercomputing or high-performance computing (HPC) if you're not into the whole brevity thing.
The project will provide a new open source framework to meet HPC's unique application demands and parallel runtime requirements, the organization said.
The framework will provide upstream project components, tools and interconnections to enable the software stack. The HPC components will contribute to a full-featured reference software stack for developers, system administrators and users.
With the Linux 4.3 Git tree at around 20.6 million lines of code, documentation, and utilities, I was curious to see whether the Linux 4.4 merge window was heavy enough to bump it over 21 million lines...
With the Linux 4.4 merge window ending this weekend, I ran GitStats on the latest mainline Linux Git code-base as of Saturday afternoon. It reports 20,851.092 lines at the moment made up of 560,344 commits from 14,557 authors. The 20.85 million lines is distributed amongst 52,184 files.
With the Linux 4.4 kernel the Lenovo Yoga 3 laptop owners out there will finally have support for using their ESC key.
Darren Hart sent in the x86 platform driver updates for Linux 4.4 already but he ended up sending in a second pull request as we near the end of the 4.4 merge window. This second platform-drivers-x86 update has "support for the unfortunately rather unique ESC key on the Ideapad Yoga 3" plus fixes and DMI list additions.
If all goes according to plan, the Linux 4.4 kernel merge window will end today with the release of the 4.4-rc1 kernel. As all of the major subsystem updates have already landed for Linux 4.4, here's my usual look at the highlights for this kernel cycle.
Con Kolivas has released the BFS scheduler v0.465 with support for the Linux 4.3 kernel.
It's been a while since last having anything to report on BFS while this week he released a new version that seems primarily just about adding Linux 4.3 kernel compatibility. This is significant as he didn't end up releasing a BFS update for Linux 4.2.
After months of continually trying out different methods of cheap yet effective cooling for the 60+ systems running daily Linux benchmarks, I'm finally happy with now having been one week of the room maintaining an ambient temperature of 68~72F (20~22C).
Just one week after Mesa Git received Nouveau NVC0 compute support, the NV50 Gallium3D driver for pre-Fermi GPUs has also received basic compute support.
Yesterday AMD finally posted power management support for the AMDGPU DRM kernel driver when it comes to supported discrete graphics cards like Tonga and Fiji. I've been testing these PowerPlay Linux patches since yesterday to great success. In this article are results from a Radeon R9 285 and Radeon R9 Fury when testing these kernel patches along with the latest Mesa 11.1-devel Git drivers.
These AMDGPU PowerPlay patches are working out well so far in my tests. See the two aforementioned articles for more details on this AMDGPU power management code that lands more than 45000 lines of new code into this Direct Rendering Manager driver for the latest AMD graphics processors. It's just a pity that the code is too late for making it into the Linux 4.4 kernel merge window and thus won't be mainlined for a few months until the Linux 4.5 kernel. Up to now, the newer AMD graphics cards on the open-source AMD Linux driver have been limited to whatever (low) frequencies the core and memory clocks are initialized to at boot time. With PowerPlay, they can finally (and dynamically) ramp up when to their rated specifications.
As you may know, Mailnag is an open-source email notification daemon available for both GNOME 3 and Unity, which checks the POP3 and IMAP email servers.
QEMU 2.5 is underway as an important piece of the open-source Linux virtualization stack. Some of the highlights for QEMU 2.5 include the Xen support code now supporting pass-through of Intel integrated GPUs, VirtIO-GPU now supports the 3D mode, Vhost-user now supports live migration, support for multi-queue in Vhost-user, support for network filters, TCG has improved system emulation performance for targets with software TLBs, record/replay support for TCG, and a variety of other changes including many x86 and ARM specific additions. An in-progress listing of all the QEMU 2.5 changes can be found via this QEMU Wiki page.
Kodi, a media player and entertainment hub that carried the XBMC name, has been upgraded and moves closer to the final version of the 16.0 branch.
As you may know, Rexloader is an open-source download manager, developed in C++ and Qt. Among others, it has support for downloading files via ftp or torrent, it allows the users to manage the download of multiple files and has support for setting the maximum download speed.
FFmpeg, a complete solution to record, convert and stream audio and video, has been upgraded to version 2.8.2 and is now ready for download and testing.
As you may know, Komodo Edit is an IDE for coding in various web languages: Python, PHP, Ruby, Perl, HTML, CSS and JavaScript.
Wine (Wine is not an emulator) 1.7.55 is now out, and it comes with quite a few major fixes that are sure to draw some serious attention.
Football fans rejoice! We have a day one release of Football Manager 2016 for Linux & SteamOS. It's a very popular game series, and great to see another on Linux.
Not one I'm going to pick up personally, as I much prefer the FIFA-type games than being a manager myself.
Sublevel Zero is a great looking and well received first-person roguelike six-degree-of-freedom shooter (wow, what a mouthful!).
Football Manager 2016, the latest installment of the most complex football simulator developed by Sports Interactive and published by Sega, has been released today for Windows, Mac OS X, and Linux.
Legends of Eisenwald an adventure game with tactical battles, RPG and strategy elements that was funded on Kickstarter. They wanted to do a Linux release, but they didn't hit the goal to do it right away, and now due to finances it's on hold.
Valve this week rolled out the hardware phase of its road map from bedrooms and basements to living rooms and lounge areas with its long-awaited video game controller, PC link box and Steam boxes.
Ars Technica today published a benchmark story that's of note to SteamOS developers -- using the same PC with a dual-boot setup, the site found that the same games performed worse, across the board, under Linux than they do under Windows 10. Framerates across a variety of games, including Valve-developed titles like Team Fortress 2 and Dota 2, suffered.
For years, game support on Linux has seriously lagged behind Windows, to the point that the OS was basically a non-option for anyone who wanted to game on a PC. In recent years, that’s begun to change, thanks to increased support for the OS via Valve and SteamOS. From the beginning, Valve claimed that it was possible to boost OpenGL performance over D3D in Windows, and it’s recently put a hefty push behind Vulkan, the Mantle-based API that’s a successor to OpenGL.
KDE announced the monthly release of the KDE Frameworks project, a set of add-on libraries for the Qt5 GUI (Graphical User Interface) toolkit, which is now at version 5.16.0.
A new widget called KNewPasswordWidget has been added to the KWidgetsAddons framework, starting from 5.16. I decided to create this widget because sometimes you cannot just use KNewPasswordDialog to ask the users for a new password. This is the case when you need to add further options to the same dialog. This widget is meant to be easily embedded in such a custom password dialog, without having to code it from scratch.
As some of you might know, I started the application Cantor in KDEedu a couple of years ago, since I didn’t want to rely on comercial computer algebra systems during my studies, and because all the free alternatives seemed to lack a decent graphical interface. Since then Cantor has grown to support all kinds of different mathematical languages due to numerous contributors from all over the world.
Once all this new code has settled down I’m going to be re-emailing a lot of the vendors who were unwilling to write vendor-specific code in fwupd. I’m trying to make the barrier to automatic updates on Linux as low as possible.
Netrunner Rolling 2015.11 has been updated with packages from KDE Plasma and KDE Applications. The desktop is at Plasma 5.4.2 together with KDE Applications 15.08.2 and many more applications and libraries updated to their latest versions.
Clemens Toennies informs us today about the immediate availability of the new Netrunner Rolling 2015.11 computer operating system, build around the latest KDE technologies.
4MLinux 15.0 is ready for testing. Create your documents with LibreOffice 5.0.3.2 and share them using DropBox 3.10.11, surf the Internet with Firefox 42.0 and Chrome 46.0.2490.80, stay in touch with your friends via Skype 4.3.0.37 and Thunderbird 38.3.0, enjoy your music collection with Audacious 3.6.2 and aTunes 3.1.2, watch your favorite videos with MPlayer SVN-r37544 and VLC 2.2.1, play games with Xorg 1.17.2/Mesa 11.0.2 support enabled. You can also setup the 4MLinux LAMP Server (Linux 4.1.10, Apache 2.4.17, MariaDB 10.1.8, and PHP 5.6.14). Perl 5.22.0 and Python 2.7.10 are also available.
Ringo de Kroon, the maintainer of the Manjaro Linux MATE and Cinnamon editions, has had the great pleasure of announcing the immediate availability for download and testing of the first Preview release of the Manjaro Linux Cinnamon 15.12 distribution.
GeckoLinux is a Linux spin based on the openSUSE distribution, with a focus on polish and out-of-the-box usability on the desktop. Unlike its parent distribution, GeckoLinux is available as a live DVD that can be tested before installing. It has a number of unique features compared to its parent distribution.
There is Porteus and SLAX, but no real Slackware live. Perhaps that's about to change. Should Linux users live in fear of viruses and malware as Windows users do? Mel Khanlichi answered today. SteamOS was found to be lagging behind Windows performance for gaming and Josh Fruhlinger found 10 odds places for Linux. All this and more in today's Linux news.
Yet another 200+ lines of updates in the ChangeLog.txt of slackware-current. It’s obvious that Pat has been watching the LinuxQuestions threads closely. And we are again very bleeding edge, with the Gnu Compiler Collection 5.2.0!
As of November 10, 2015, Red Hat (RHT) has generated returns of 31.8% for the trailing 12 months (or TTM) and 5.7% in the trailing one-month period. The company’s share price has fallen by 0.06% in the trailing five-day period.
Red Hat, Inc. (NYSE:RHT): 17 Analyst have given the stock of Red Hat, Inc. (NYSE:RHT) a near short term price target of $85.06. The standard deviation reading, which is a measure by which the stock price is expected to swing away from the mean estimate, is at $5.09. The higher price target estimate is at $92 while the lower price estimates are fixed at $72.
The regcfp conference software project provides registration, payment, and talk submission features for community conferences. The project is available in Github. It was originally designed for GUADEC, the GNOME users and developers conference. Now a set of new features allow it to serve other conferences, too.
I pretty much followed Robert Gadsdon’s instructions here, except I had to compile mkbootimg by hand from the CyanogenMod sources as it doesn’t seem to be available in Fedora.
Okay here is a useful tip to all Fedora lovers like me, there are addict to NVIDIA binary drivers, for there GNOME-Shell to run in a way that they can work with it. Don’t install Fedora 23 yet. When it was released on the 3th of November 2015 it was released with a release candidate of xserver 1.18. The Official announcement of a stable xserver first came Mon Nov 9 13:17:40 PST 2015. This is resulting in NO drivers yet from nVidia I just used an entire day to hack around to understand what was wrong, just to realize, there is no way to make it work with Fedora 23 without downgrading to Fedora 22 there is running xserver 1.17.99.902 . I do have to point out that today is the 13th of November and there is still no driver from nVidia.
We reported two months ago that the Parsix GNU/Linux 7.5 (Rinaldo) operating system will reach its end of life on November 14, 2015, urging all users of the distribution to move to the recently released Parsix GNU/Linux 8.0r0 (Mumble) OS.
The developers of the Debian-based Robolinux computer operating system powered by open source and free GNU/Linux technologies have had the great pleasure of announcing the release and immediate availability for download of the Robolinux 8.2 LXDE Edition (Raptor).
Canonical's open source OS, already runs on PCs, servers, phones and tablets. Now, a small company named Erle Robotics wants to bring Ubuntu to drones, too.
Erle Robotics is a start-up in Spain whose goal is to develop Linux-based "brains" for robots and drones. The company already offers products that run Snappy Core Ubuntu, the transactionally updated version of Ubuntu designed for embedded devices.
Unity 8 is being worked on for Ubuntu 16.04 LTS and a lot of progress has been made. One of the features that are expected to land, in more stable form, is platform convergence. Canonical is not the only company that's working towards this goal, but it's the only one that's doing it right.
I’ve just published the most recent Community Donations Report highlighting where donations made to the Ubuntu community have been used by members of that community to promote and improve Ubuntu. In this report I’ve included links to write-ups detailing how those funds were put to use.
Earlier today, November 14, Linux AIO's Željko Popivoda informs Softpedia about the immediate availability for download of the Linux AIO Ubuntu 15.10 Live ISO images, which include some of the most popular Ubuntu 15.10 (Wily Werewolf) releases.
Linux AIO is a project to package multiple flavours of a distribution in one ISO within a DVD size limit. Users can try each flavour live or install on their systems. In essence the difference lies mostly in the desktop environments. This is an invaluable source of distributions for distro hoppers. Note that there are issues, some of which are unresolved due to distro dependencies. However, for most of it, the stuff works.
Mikroprojekt’s Linux-based “Kondor AX” development board for IoT gateways and small basestations combines a Lattice ECP5 FPGA with an i.MX6 Solo SoC.
Mikroprojekt and Lattice Semiconductor jointly announced Mikroprojekt’s FPGA-enabled Kondor AX as a Linux-supported platform for use in a variety of communications and industrial applications at the network edge. It is principally designed to meet the growing market for small LTE basestation cells found in HetNets (heterogeneous networks), which often combine macro basestations, small cells, WiFi hotspots, and distributed antenna systems (DASs). Other applications are said to include industrial IoT gateways, microservers, millimeter wave backhaul applications, IP cameras, and HMI displays.
Qnap’s TAS-168 and dual-bay TAS-268 NAS devices run both Linux and Android on a dual-core ARM SoC, and offers private cloud and media player capabilities.
Qnap is positioning the single HDD-bay TAS-168 and dual-bay TAS-268 at the bottom of its Home NAS line below the faster, dual-bay TS-231 and the higher-end, dual-bay TS-251 launched in 2014. Like these systems, the new TAS devices are mini-towers and run Qnap’s Linux-based NAS OS. In addition, Qnap claims the devices are the first home network-attached storage devices that also run Android.
Now these first prototypes will be put on heavy testing before we run the board in production. We want to see if they will be able to run Linux yet or just Android.
A rather critical Exploit has been uncovered in Google's own 'Chrome for Android' app which allows malicious programs to be installed without user intervention.
When it comes to smartwatch sales, Apple Watch has well and truly embarrassed the entire Android Wear ecosystem, even though it hasn’t spent anywhere near as long on the market. But with Google’s platform getting a high-profile supporter this week, is it time for change?
Word on the street is that Google is in talks with chip manufacturers in an effort to gain more control over the chip design process. Clearly the company is striving to patch up the fragmented Android ecosystem, but is this a step toward becoming more like Apple? And would such standardization be a good thing?
If Google succeeds in convincing microchip producers to start building their chips based on Google’s specs, this could bring a lot of uniformity to Android smartphones. On the one hand, this may make Android more competitive with iOS and make developing for the operating system simpler. On the other, the Android ecosystem stands to lose the very thing that originally defined it: diversity.
The Android probe was prompted by complaints from small European ad blockers, app stores and the like, along with the Microsoft-backed FairSearch. Yandex, a company with a $4.8 billion market cap, weighed in in April, too. But now, buoyed by its success in Russia, Yandex is sharing its involvement publicly and ramping up its complaints in Brussels.
That big Android Wear update isn't just about allowing cellular data on smartwatches -- it's also really helpful if you don't have a hand free. Google has quietly revealed that Android Wear 1.4 has a ton of new wrist gestures beyond the usual flicks to navigate cards. You can take action on a card by pushing your arm down, for instance, or go back to your watch face by wriggling your wrist. You're probably going to look silly if you use nothing but wrist gestures, but this beats dropping a bag (or freezing your hands) just to touch your watch for a brief moment.
The BlackBerry resurgence continues apace. Mere days after the launch of the Priv slider, a second BlackBerry smartphone running on Android has leaked: the Vienna.
Google just might decide to design its own chipsets to power Android devices. If it can pull this off Android might give even stronger competition to iOS, but this is easier said than done.
There are a lot of valid reasons why someone would want to run Android emulators on their PC. App developers may be trying to test their application before shipping it out. Gamers may want to use a mouse and keyboard on their games. Maybe you just want it there to have it. In any case, Android emulation on PC is possible and we’re going to take a look at the best Android emulators for PC.
So should you shell out your hard-earned money for the Nexus 6P? If you call yourself an Android lover, I would say the new Nexus 6P is worth the upgrade.
It’s got a premium body, a stunning camera, one that is perfect for snapping memories of your get togethers without any low-light worries and yes it comes with latest version of Android. As far as premium goes, the Nexus 6P offers the entire experience, and unlike other premium devices, does not cost a bomb.
Focus on community and technology will follow. That's a fundamental principle for successful open source projects, according to the Apache Software Foundation's Jim Jagleski, a self-described and self-evident "graybeard" of open source communities.
Apache is one of the great open source success stories. First released 20 years ago, Apache serves 56% of websites worldwide. Jagleski serves on the board of the Apache Software Foundation, which incorporated in 1999, and is its most senior still active contributor.
In the era of mobile and cloud, we are becoming consumers of our own data and the companies whose services we use are becoming the owners.
These five technologies or projects ensure that we remain in charge of our digital lives.
On a desktop computer, you think of an operating system as a big piece of complex software. For small systems (like an Arduino) you might want something a lot simpler. Object Oriented State Machine Operating System (OOSMOS) is a single-file and highly portable operating system, and it recently went open source.
OOSMOS has a unique approach because it is threadless, which makes it easy to use in memory constrained systems because there is no stack required for threads that don’t exist. The unit of execution is a C++ object (although you can use C) that contains a state machine.
Last year, a pair of creators crowdfunded OpenBCI — an open source software suite and interface board that made biosensing — taking readings of electricity in the human body, especially the brain — far more affordable and accessible. Now, the same people are back with the pushes this even further with new, even more affordable gear.
Earlier this week, Google made a splash when it released its TensorFlow article intelligence software on GitHub under an open-source license. Google has a sizable stable of AI talent, and AI is working behind the scenes in popular products, including Gmail and Google search, so AI tools from Google are a big deal.
Today on GitHub, TensorFlow, primarily written in C++, is the top trending project of the day, the week, and the month, having accrued more than 10,000 stars in about one week.
FOSSCOMM (Free and Open Source Software Communities Meeting) is a Greek conference aiming at Open Source enthusiasts, developers, and communities. It has been hosted in various cities around Greece and its goal is to promote the use of FOSS in Greece and to bring FOSS enthusiasts together.
Freedom and privacy go hand in hand. In an ideal world, we wouldn't have to worry about who was looking over our shoulders. None of us would have anything to hide, and we would have ulterior motives. As citizens of the real world though, we have to take measures to protect ourselves.
Building privacy features into the software we use makes that protection easier to accomplish. And, that's why Mozilla has extended Firefox's private browsing feature with a new option to prevent third-party sites from tracking your on-line activity.
Firefox OS Smart TVs are televisions that run based on the Firefox OS platform from Mozilla. It was announced in early 2015 on the Panasonic VIERA series, It has now been fully launched and is available across the world.
There are many possible ways to download URL lists to the browser and check against that list before loading anything. One of those is already implemented as part of our malware and phishing protection. It uses the Safe Browsing v2.2 protocol.
It was all the way back in 2012 when we covered the news of Mozilla's Firefox browser arriving for Android. At the time, there were some compelling reasons to use the browser on Android, too. For example, it worked seamlessly with Flash content, while Apple's iOS devices didn't.
For organizations wanting to run data sets and perform quick data analytics without having to use statistical software packages, IBM Cloud Infrastructure for Analytics offers a secure, cloud-based analytics platform that is now backed by a feature called Secure Hadoop. Secure Hadoop protects data that is moving to and from a cloud platform and data at rest, which gets encrypted and remains protected when moved to IBM's SoftLayer object storage or the Hadoop Distributed File System (HDFS).
AGCO Corp. announced that its AgCommand Application Programming Interface now is open to approved third-party developers and service providers of farming applications, such as management dashboards and mobile apps.
This new capability will enable AGCO customers to access their machine data through their other farm and fleet management tools.
Today, the US Department of Energy announced that it had established a partnership with Nvidia that would be enhancing the LLVM compiler collection. The goal will be to port an existing Fortran compiler that targets massively parallel GPUs. The results are expected to be released as open source in late 2016.
The US Department of Energy's National Nuclear Security Administration has teamed up with NVIDIA's PGI compiler division to create an open-source Fortran compiler atop LLVM.
As some extra benchmarks to toss out there this weekend are some Clang 3.8 SVN compiler benchmarks when trying out different optimization levels.
LLVM Clang 3.8 SVN was tested as of a few days ago atop an Ubuntu 15.10 x86_64 system. The Clang 3.8 tests were done when the CFLAGS/CXXFLAGS set separately to -O3 -march=native, -O3, -O2, -O1- and -O0. These numbers are just being put out there for reference purposes and using just a random selection of tests... Basically there was free time on one of the test systems and I was just running some extra benchmarks for testing some different code paths of the Phoronix Test Suite prior to its Hammerfest release.
Today the NNSA and its three national labs announced they have reached an agreement with Nvidia’s PGI software to create an open-source Fortran compiler designed for integration with the widely used LLVM compiler infrastructure.
Remove FTP passive to active fallback due to privacy concerns.
Add support for --if-modified-since.
Add support for metalink through --input-metalink and --metalink-over-http.
Add support for HSTS through --hsts and --hsts-file.
Add option to restrict filenames under VMS.
Add support for --rejected-log which logs to a separate file the reasons why URLs are being rejected and some context around it.
The Freeciv project was founded on November 14 1995, by Peter Joachim Unold, Claus Leth Gregersen and Allan Ove Kjeldbjerg. The three Danish students created this open source strategy game while studying computer science at Aarhus University. Today, 20 years later we have interviewed the founders of the project to find out about the early history of Freeciv.
GNU Pem is a handy tool to help you keep track of your personal income and expenses. It is portable across all platforms GNU Linux, MS Windows, Apple OS X, FreeBSD, you name it.
The council of the Swiss capital of Bern on 12 November ordered the IT department to end its dependence on proprietary software. The council halved the city’s request for a six-year licence contract, and insisted on an exit plan. A majority of councillors wants the city to replace proprietary software by open source solutions, such as Linux and LibreOffice.
I don’t know why FLOSS should have to be voted in a council but here we have it again. IT departments should just announce smaller budgetary requests and make it happen. Bern, like many jurisdictions in Europe will have Free Software sooner or later.
After one year, the UK Open Government Forum now has over 600 members. The platform was established by Involve in November 2014 on behalf of the UK Open Government Network (OGN). It aims to help coordinate work on the Open Government Partnership (OGP), and build and support the open government movement in the UK.
With PHP 7.0 RC7 being the final development version of PHP 7, which is expected to be officially release at the end of the month, I've carried out some fresh benchmarks of PHP using our in-house benchmarking software. Compared in this latest PHP 7 benchmarking comparison is PHP 5.5 as packaged on Ubuntu 14.04 LTS and then comparing fresh builds of PHP 5.6.15 and PHP 7.0.0 RC7. On the HHVM side was using Facebook's HHVM 3.10.1 release as packaged for Ubuntu 14.04 LTS.
Not only is this is a great opportunity to make an impact on the software that the community uses every day, but it’s also a chance to gain one of the more rare and exclusive Fedora badges, Parselmouth! To help show how you can help, Fedora Python maintainer Matej Stuchlik answered some of the Community Operations team’s questions on the Community Blog.
OpenMP 4.5 was formerly known as OpenMP 4.1 but was renamed due to the massive changes for this popular parallel programming API.
"Every time you don't clean up after yourselves, we'll add another Justin Bieber song to the playlist."
Police were called on Saturday morning to reports of “suspicious actions” on the man’s part. They said explosives ordinance disposal specialist officers at the airport but that it was too early to determine what the item was.
Police said they were called at around 9.30am on Saturday morning following 'suspicious actions by a man who discarded an item at the airport'.
In a statement they said that the man was arrested and EOD (explosive ordnance disposal) specialists have been called to the airport to investigate the item.
Eyewitness Tim Unwin tweeted that the terminal is in a 'shutdown situation'.
GATWICK'S North Terminal has been evacuated this morning.
There are unconfirmed reported of a "suspicious package" at the site.
It was a role he relished and he often returned to it over a period of four decades.
He was a consummate character actor who took on a wide variety of roles on stage, screen and television.
And despite playing Johnny Speight's infamous creation for such a long time, he managed to avoid being typecast as Britain's favourite bigot.
Warren Mitchell was actually born as Warren Misell on 14 January 1926 in north London.
There were sixty technicians on board the high speed TGV train on Saturday when it crashed near Eckwersheim, leaving ten people dead. Local authorities said the train appeared to have "derailed because of excessive speed."
The train derailed and caught fire at about 6:15p.m. local time (1700 UTC) according to local press reports. The wreckage fell into a canal.
The crash happened on the second section of the Paris to Strasbourg high-speed TGV line, which is due to open in April 2016.
Five people died and at least seven were injured when a high speed train derailed in France during the country's highest ever terror alert.
Early reports suggest the TGV 2369 test train caught fire before overturning and smashing onto its side in Eckwersheim, near to Strasbourg this afternoon.
The train is thought to have been undergoing a trial run when witnesses said it hit a nearby bridge just before setting fire.
Crash scene investigators are probing whether the derailment was caused by "excessive speed".
American computer architect and high-tech entrepreneur Gene Myron Amdahl died Tuesday at the age of 92.
Amdahl’s wife Marian said he had suffered from Alzheimer’s disease for about five years, before succumbing to pneumonia. "We are thankful for his kind spirit and brilliant mind. He was a devout Christian and a loving father and husband. I was blessed with having him as my husband and my best friend. I praise God for His faithfulness to us for more than 69 years."
Zoho, California-based online productivity and SaaS company said that the site has seen disruption in services as it has become subject to a cyber attack that began on Wednesday. Hackers issued threats and also tried blackmailing as well.
In other words, the point of stealing information from millions of JPMorgan Chase customers? To spam them with messages about penny stocks.
A few years ago, it was difficult to browse the web without coming across a site using Flash.
Released in 1996, the browser plug-in enabled animations, interactivity and streaming video on what was a largely static web.
But the software has been plagued by security problems, and has been criticised for affecting computer performance and battery life.
Now many experts say the media plug-in's days are numbered. Watch the video to find out more.
Canonical published details in a security notice about a number of Kerberos vulnerabilities that have been found and fixed in Ubuntu 15.10, Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems.
Some of the most popular continuous integration tools used by software development teams have not been designed with security in mind and can open a door for attackers to compromise enterprise networks.
Some of the most popular automated software building and testing tools used by developers have not been designed with security in mind and can open the door for attackers to compromise enterprise networks.
Linux.Encoder.1 is targeting websites deployed on servers running Linux and created on various content management systems, including WordPress and Magento.
Remember the mood in America just after 9/11? The surge of super-patriotism (dare we say jingoism)? The pall of political correctness (you’re fired, Bill Maher). The phrases that so resonated: “Let’s roll.” “You’re either with us or against us.” “Bring ‘em on.” Something like that is taking hold in France right now after Friday night’s horror, one of the worst terrorist attacks on Western soil since that terrible day 14 years ago.
Meanwhile, an explosion also occurred near the Stade de France, where the French national soccer team was playing against Germany. Hollande, who was attending the game, was evacuated according to French television station iTELE. The explosion could be heard clearly during the game, as captured by the live feed of the match.
Mohammed Emwazi was blown up as he climbed into a car near a clock tower in Isis’s Syrian stronghold city of Raqqa where its jihadists have staged hundreds of brutal public executions.
Last night US officials were "99 per cent sure" the 27 year old from London – branded the world’s most wanted man for the videoed beheadings of at least seven prisoners including two Brits – had been killed.
We are all France. Apparently. Though we are never all Lebanon or Syria or Iraq for some reason. Or a long, long list of additional places.
We are led to believe that U.S. wars are not tolerated and cheered because of the color or culture of the people being bombed and occupied. But let a relatively tiny number of people be murdered in a white, Christian, Western-European land, with a pro-war government, and suddenly sympathy is the order of the day.
"This is not just an attack on the French people, it is an attack on human decency and all things that we hold dear," says U.S. Senator Lindsey Graham. I'm not sure I hold ALL the same things dear as the senator, but for the most part I think he's exactly right and that sympathy damn well ought to be the order of the day following a horrific mass killing in France.
I just think the same should apply to everywhere else on earth as well. The majority of deaths in all recent wars are civilian. The majority of civilians are not hard to sympathize with once superficial barriers are overcome. Yet, the U.S. media never seems to declare deaths in Yemen or Pakistan or Palestine to be attacks on our common humanity.
China is ready to join France and the international community in stepping up security cooperation and combating terrorism, President Xi Jinping told French President Francois Hollande on Saturday, after attacks in Paris that killed about 120 people.
As terrorists murdered scores of people in Paris on Friday, Americans watching in horror from afar immediately began to show solidarity with the French people. Many harkened back to the September 11, 2001, terrorist attacks, when Le Monde declared, “Nous sommes tous Américains,” and French President Jacques Chirac issued repeated expressions of his country’s solidarity with the United States.
“I have no doubt for a single moment that terrorism, which is always fanatical, mindless, and mad, clearly represents the evil in today’s world. And so we must combat it with the greatest energy,” he told CNN in a representative interview. “The Americans are currently making a great effort, a very effective one, it seems to me, with the search for all the clues and then those to blame, so that they can determine who is at the origin of this murderous folly. And when subsequently it comes to punishment for this murderous folly, yes France will be at the United States’ side.”
In the annals of shame and hypocrisy, few things match America’s duplicity toward its veterans.
For their troubles, they earn lip service from politicians, are allowed to board some airplanes first, receive a few bucks off at restaurants and, once a year, get their own holiday on which everybody expresses support for them. They are also honored at sporting events in ceremonies that, despite appearances, are actually paid for with taxpayer dollars.
But step away from these feel-good exercises, and you get a bucket of cold water in your face. Let’s take a frank look at the serious problems that veterans are facing every day — and what is or isn’t being done about them.
Relationship can be described as a paradox, where cooperation is more about the US’s own interests
In an interview with German weekly Der Spiegel, Thomas Drake, a former employee for the US’s National Security Agency (NSA), described the NSA’s relationship with Germany by saying, “It’s a sort of paradox in that relationship.”
Drake was drawing attention to the fact that, while Germany and the NSA are partners, the NSA does not hesitate to spy on Germany when the US’s national interest is on the line.
When it comes to the whistleblowing on the NSA, Edward Snowden is not the first one. According to NGO ‘GAP(Governmental Accountability Project)’, Thomas Drake has dedicated his life to safeguarding his country. He served in the Air Force specializing in intelligence, and then worked as a CIA analyst and contractor for the National Security Agency (NSA)for 12 years before joining the NSA full time in 2001. Drake worked at the agency as a software contractor until 2008. When he saw abuse in the billions of dollars spent on the allegedly illegal surveillance program, he took his concerns to his superiors at NSA, to Congress and to the Department of Defense Inspectors General, but nothing changed. Finally, Drake made legal disclosures of unclassified information to a Baltimore Sun reporter. He was prosecuted by Department of Justice under the Espionage Act. He faced the possibility of decades in prison. NGOs and media made this issue public. The DOJ finally dropped all of the Espionage Act charges. Drake pled guilty to a misdemeanor and was sentenced to one year of probation and community service, but lost his pension. The Hankyoreh interviewed with Drake on Oct. 12 for one and half hours through video chat. He declined to disclose specific declassified information but provided worthwhile insight.
South Korea and the South Korean public have been under complete surveillance from every possible direction. The scope of wiretapping around the world revealed by Edward Snowden, former contractor for the US’s National Security Agency (NSA) and the results of the Hankyoreh’s investigative reporting into the documents he leaked bring about that feeling of shock and horror.
The “Five Eyes” intelligence-sharing group that was led by the US and included four other English-speaking countries was able to monitor online information for anyone, anywhere in the world, at any time. South Korea was no exception.
This snooping took place at any time that these countries deemed it necessary for their national interest, even when there was no legitimate excuse.
Xkeyscore is a key program used by the US National Security Agency (NSA) to collect, organize, and search data. Internal NSA documents released by the Intercept describe it as a “DNI [digital network intelligence] exploitation/analytic framework.” It can be used by the NSA to search for information through specific email addresses or keywords. A document stating that the candidate names, genders, email addresses, and the term “candidacy” were used as keywords to search for information during the 2013 election for World Trade Organization director-general gives a hint of the program‘s capabilities.
The Venezuelan president will resort to various international organizations to denounce Washington’s recent violation of the country’s territory.
Venezuelan President Nicolas Maduro said he will denounce Washington's new threats against the South American country to international organizations after a United States intelligence plane violated the country's airspace twice on Friday.
The sound of an apparent explosion can be heard on the flight recorder of the Russian-operated plane that came down over the Sinai peninsula, killing all 224 people on board, adding to the evidence that a bomb was smuggled aboard, French media sources said on Friday.
Giving further credence to the idea that the plane crash was a terrorist act rather than because of structural failure, Russia, which for a week has been resistant to speculation about a bomb, suspended flights to all Egyptian airports.
An Egyptian-led international team of aviation experts, including some from France, successfully recovered the black box, the flight recorder, from the crash site. Several French media outlets, including the television station France 2, reported that the investigators had listened to it and concluded that a bomb had detonated, which would seem to rule out structural failure or pilot error. The pilots can be heard chatting normally, including contact with airport controllers, up until the apparent explosion.
“Patients burned in their beds, medical staff were decapitated and lost limbs, and others were shot by the circling AC- 130 gunship while fleeing the burning building. At least 30 MSF staff and patients were killed,” the introduction to the report says. The dead include 10 patients, 13 staff and seven more bodies that were so badly burned they have not yet been identified.
EFF has long fought for the public’s right to use federal and state public records laws to uncover controversial and illegal law enforcement techniques. That’s why we filed an amicus brief in a federal appellate court case this week asking it to reconsider a decision that makes it much easier for law enforcement agencies such as the FBI to conceal their activities.
Consumers for Smart Solar, the group promoting an anti-home-solar constitutional amendment in Florida, has collected half a million dollars from the 60 Plus Association, a group that has itself received at least $34 million since 2010 from organizations financially backed by the Koch brothers.
Unlike most states, Florida does not allow homeowners to enter into contracts for the no-upfront-cost installation of solar on their homes. In other states, this freedom has contributed to the dramatic 80% increase in home solar installations across the US in 2014, and seen large financial investments from corporations like Google.
Rival constitutional amendments are being proposed for the Florida ballot in 2016.
One of these would allow homeowners increased rights to install solar energy; that one is backed by consumer and environmental organizations.
A tsunami advisory was issued for parts of southern Japan on Saturday after a magnitude 7.0 earthquake struck off the coast of Kyushu.
A magnitude 7.0 earthquake has struck off Japan's south-western coast, triggering a small tsunami.
The Japan Meteorological Agency (JMA) said a 30cm (1ft) tsunami was registered on the southern Nakanoshima island, part of Kagoshima prefecture.
There were no immediate reports of damage or injuries.
A tsunami warning issued for Kagoshima and Satsunan islands was later lifted. The quake happened at a depth of about 10km (six miles).
Over the years, President Obama has repeatedly called on Congress to kill the sizable subsidies the federal government annually grants to oil companies. “It's outrageous,” he said in a 2012 speech. “It's inexcusable. I'm asking Congress: Eliminate this oil industry giveaway right away."
Toxic fumes from the Indonesian fires that have spread a choking haze across Southeast Asia may be doing more harm to human and plant health than officials have indicated, scientists measuring the pollution say.
Farmers are expecting a poor harvest because plants have too little sunlight for normal photosynthesis, while government figures of half a million sickened by the smoke are only the "tip of the iceberg", said Louis Verchot, a scientist with the Center for International Forestry Research (CIFOR).
Indonesia's forest fires, which this year sent vast plumes of smoke across the region described by climate officials as a "crime against humanity", could return as early as February, the forestry minister said on Friday, but on not such a large scale.
Slash-and-burn agriculture, much of it clearing land for palm oil crops, blanketed Singapore, Malaysia and northern Indonesia in a choking "haze" for months, pushing up pollution levels and disrupting flights, as it does every year.
But this year was unusually severe.
Major Indonesian conglomerate Sinar Mas Group, in a tie-up with the central government, conducted a forest-fire extinguishing test on Nov. 5 using a product developed by several small Japanese companies. The exercise puts Japan's technology into practical use as Indonesia struggles to cope with forest fires and the smoke emanating from them, which pose an ever-worsening problem for Indonesia and neighboring countries.
The test took place on the outskirts of Palembang, a city on Sumatra Island, in a forest plantation owned by Asia Pulp and Paper Group, where a fire had continued to burn. Asia Pulp and Paper is a member of Sinar Mas Group, which is run by ethnic Chinese.
The New Zealand government released the final text of the Trans-Pacific Partnership agreement, the White House followed suit hours later. The massive trade deal, which includes 12 countries and 40% of the world's economy, has been shrouded in secrecy until now. Parts of the deal have been leaked along the way, but it's the first time the public has had a chance to read what may become the the most broad reaching trade deal in history if all the interested countries ratify the treaty. The agreement has enormous implications for global labor, food and product safety, access to affordable medications, the environment and much more. For a look at how the TPP agreement would affect the internet and what access to redress would look like under the corporate-driven agreement, FSRN's Shannon Young spoke with Evan Greer, Campaign Director of Fight for the Future, a group best known for its advocacy of an open and neutral internet.
The US faces lots of issues right now, from being sucked into a war in Syria to stagnating salaries and a shrinking middle class – and ahead of the upcoming presidential elections, people are looking for a candidate who can actually bring change to the way the country's been going on in domestic and foreign policies. But what games are the candidates playing? Is the choice of candidates wide enough, or too limited? We ask the former mayor of Salt Lake City and founder of the U.S. Justice party.
Though careful never to mention Clinton by name, Sanders has drawn a series of contrasts with the former secretary of state on issues that include her backing of the war in Iraq, trade and the minimum wage.
When State Senator Virginia Lyons thought it would be wise to develop legislation to reduce harmful electronics waste in her state of Vermont, the last complaint she expected to receive was from the People’s Republic of China. The Chinese it seemed, had issue with how new E-Waste reduction measures for Vermont would impact their sales of electronics to the USA.
The European Commission has formally presented its proposed reforms on the controversial investment protection and dispute resolution for the Transatlantic Trade and Investment Partnership (TTIP).
The 'more transparent' investment court system will replace the so-called investor state dispute settlement (ISDS) mechanism. It aims to safeguard the right to regulate and create a court-like system with an appeal mechanism based on clearly defined rules, with qualified judges and transparent proceedings.
In a bipartisan bid to encourage commercial exploitation of outer space, the U.S. Senate this week unanimously passed the Space Act of 2015, which grants U.S. citizens or corporations the right to legally claim non-living natural resources—including water and minerals—mined in the final frontier.
The legislation—described by IGN's Jenna Pitcher as "a celestial 'Finders Keepers' law"—could be a direct affront to an international treaty that bars nations from owning property in space. The bill will now be sent back to the House of Representatives, which is expected to approve the changes, and then on to President Barack Obama for his anticipated signature.
The bill would prohibit companies from hiring H-1B employees if they employ more than 50 people and more than 50 per cent of their employees are H-1B and L-1 visa holders.
There’s a reason Sanders’ online fundraising operation has caught the eye of Democratic Party leaders nationwide: He raised $3.2 million in just the two days after the last debate — roughly as much as O’Malley raised over June, July, August, and September combined.
Lott is a well-known pro-gun advocate and frequent source of conservative misinformation about gun violence. He rose to prominence during the 1990s with the publication of his book, More Guns, Less Crime, although his conclusion that permissive gun laws reduce crime rates was later debunked by academics who found serious flaws in his research. (Reputable research indicates that permissive concealed carry laws do not reduce crime and may actually increase the occurrence of aggravated assault.)
When civilians are killed, media reaction is often contingent upon who did the killing and why. Instead of blanketly condemning such attacks, the bombing of civilians can be implicitly justified if those civilians were in the wrong place at the wrong time—say, in a Doctors Without Borders hospital in Afghanistan, or, more recently, in a neighborhood in Lebanon.
Two ISIS suicide bombers killed at least 43 people and wounded more than 230 in attacks on a heavily Shia Muslim community in Beirut on November 12. This was the worst attack on the city in years.
After President Obama condemned the attacks in Paris, France, calling the attacks "terror" and an "attack on all humanity," right-wing media personalities immediately attacked Obama, in particular for not criticizing Islam.
Probably because he’s ahead in the polls, attention is currently focused on Ben Carson’s distant relationship with the truth, most interestingly his story of getting offered a scholarship to West Point. It’s a ridiculous tale given the fact that many young Americans try to get into the military academies (I applied to Annapolis), so a lot of people know the real deal. If you gain acceptance after a grueling application process — I remember a battery of physicals that took all day and having to obtain a sponsorship from a member of Congress — tuition, room and board is free. But you’re committed to serving as a junior officer for six years after graduation.
The Government of Quebec has introduced new legislation that requires Internet service providers to block access to unlicensed online gambling sites. The provisions are contained in an omnibus bill implementing elements of the government’s spring budget, which included a promise to establish website blocking requirements. The bill provides that “an Internet service provider may not give access to an online gambling site whose operation is not authorized under Québec law.” The government’s lottery commission will establish the list of banned websites:
Earlier this week, an administrator for a private Facebook group called “Winchester, MA Residents” received a notification from Facebook that a comment made on the group’s site had been removed.
The comment was made beneath a controversial post about a local high school not using the pledge of allegiance, but what was unusual was that the comment in question neither incited violence nor was it harassing—in fact it seemed quite measured in its tone.
”Yeah that’s an unfortunate conflation of government and religion,” the commenter wrote. “I’m in favor of removing all references to god from all governmental documents and instruments, including our legal tender.”
In the notification to the group administrator, Facebook said only that the post had been removed because it didn’t "follow the Facebook Community Standards.”
The ISP under legal pressure to block The Pirate Bay in Sweden has criticized efforts to make the provider an accomplice in other people's crimes. In a joint statement two key executives of Telenor / Bredbandsbolaget warn that folding to the wishes of private copyright holder interests could mark the beginning of the end for the open Internet.
Blocking The Pirate Bay and other file-sharing or torrent sites is glaring example of severe censorship that a Swedish internet service provider or ISP said will eventually curtail the free flow of information that users enjoy. Sweden denying access to TPB will doom the Open Internet concept, a new report said.
Can an internet service provider (ISP) be requested to block access to a torrent site like The Pirate bay?
When we look at the number of resolved crimes against journalists, it turns out that in more than 90 percent of murder cases, those killings are left unresolved, which keeps the executioners safe while the killing of journalist becomes one of the cheapest form of establishing censorship, along with blocking investigative journalism, preventing distribution of progressive ideas and opening the space for debate, etc.
Conservative alumni, already suspicion of Nichol, saw this as the long-feared first strike against their heritage and the school's rightfully Christian identity. They launched a grassroots campaign to pressure the college to reinstate the cross and, if necessary, fire Nichol.
One of the organizers of this campaign was a former college board member. While writing for the student paper, I once found that she had been ghostwriting student op-eds criticizing Nichol, passing them off to conservative students and encouraging them to publish them in the school paper under their own names. When I asked her about it, she told me that if I reported what she'd done she would use her "connections" in Washington media to make sure I was "toxic" and thus would never find work as a journalist. I mention this not to insert myself into the story, but rather to illustrate that this larger campaign was not some high-minded intellectual debate but rather was experienced on campus as a bitter fight in which activist alumni were not above threatening students.
Members of the Portage High School Thespians had been rehearsing Bad Seed for two weeks when they received word from administrators that the play would have to be rewritten to expurgate references to drugs, alcohol, and sex. The students would have none of that.
The best way to address censorship is to resist it, veteran Indonesian writer Goenawan Mohamad said.
It was just another lazy afternoon when I was watching a rerun of one of the episodes of my favourite sitcom, Friends, when I heard the beeping of the word ‘boobies’ throughout the entire episode. In the 21st century, it is hard to believe that the ‘watchdogs’ of our Indian society would believe the audience to be this easily excitable when exposed to this word. Not only is it inconvenient for the viewers to watch the same, but it also downrightly rejects their level of intelligence.
The truth is, religious groups are granted a unique concession when it comes to the right to be offended. This is not so much about the battle between believers and non-believers, this is a battle between censorship and freedom of speech.
Yale and the University of Missouri both made headlines last week after students who started out passionately protesting allegations of racism and cultural insensitivity wound up attacking professors' speech rights and freedom of the press.
The recent debates over free speech and "safe spaces" in the academy may have reached a watershed with last week's debacle at Yale University, where a group of students had a meltdown over an email defending culturally "insensitive" Halloween costumes. Several video clips of a confrontation in which protesters mobbed a beleaguered administrator went viral on the Internet -- serving, one hopes, as a wake-up call for the nation.
The pre- and post-election period in Turkey has seen a mass of violations meted out against media workers. Here are just five examples of how press freedom is on the wane in Turkey
In recent weeks, Iran's powerful hardline Islamic Revolutionary Guards Corps (IRGC) has rounded up a number of artists, journalists and U.S. citizens, citing fears of Western "infiltration".
Over the past few years, there has been an interesting debate going on regarding how Bitcoin should position itself in the regulatory landscape. While the opinions are divided as to how the solution should look like, there may be a third solution hardly anyone has ever thought of. Sometimes it’s not about picking sides, but trying to collaborate with every party involved.
Three days ago a petition popped up on the website Change.org urging Mark Zuckerberg to “support freedom of expression in India” by unblocking an atheist Facebook group there with over 13,000 members.
Facebook, the petition said, had not given any reason for the blockade. One day users in India who tried to visit the site were simply hit with a message that the content was “unavailable.” This was not the first time a Facebook page for atheists had been censored in the secular state. In June, another atheist Facebook group was reportedly labeled “unsafe” and its members were unable to share its content.
A video from The Rubin Report discussing the growing culture of censorship on U.S. campuses was recently censored by a moderator on Reddit, despite its popularity among users.
Last night Stephen Colbert showed a penis on CBS’s The Late Show. Don’t worry, he showed it for only two seconds, the maximum length of time that the network’s censors would allow. He also attempted to show numerous sets of female primary and secondary sex organs, but they were blurred out. For those getting their knickers in a twist and preparing to complain to the FCC about how Colbert is corrupting your children (but, seriously, what were your kids doing up at 11.30pm on a school night?) all of these organs were on works of art. Yes, Colbert can show the statue of David, but only at far remove and only for two whole seconds because that is the country we Americans live in.
It’s no secret that TV censors can be arbitrary, bewildering, and sometimes downright goofy. But on Thursday’s Late Show, Stephen Colbert demonstrated just how bizarre—and specific—some of these policies can be. As he discussed the recent sale of Modigliani’s “Nu Couché” (“Reclining Nude”), Colbert noted that several networks, CBS included, won’t display the painting without blurring out, as Colbert put it, “both Hootie and the Blowfish.”
Turkey’s government has blocked Reddit under its Internet censorship law 5651. Under this law, the country’s officials are allowed to ban sites that contain content that is pirated, is pornographic in nature or contains criticism of the current President Mustafa Ataturk.
It was the scrawl of red ink snaking around paragraphs that told novelist Sheng Keyi how much things had changed. Just over a decade ago, Sheng’s best-selling breakthrough novel, Northern Girls, was published uncensored in mainland China to critical acclaim.
But last month, as editors prepared to launch a third edition of the book, the author was informed that parts of her text were no longer publishable.
“It is ridiculous,” Sheng complained, pointing to an editors’ manuscript on which a red ballpoint pen had been used to highlight sections that now needed excising. “It doesn’t feel like something that could happen in real life and it makes me quite angry.”
Don’t get me wrong, my favorite comedian is Louis CK, probably one of the most offensive, least politically correct comedians ever. I personally love his jokes, but maybe others don’t, and guess what? That’s okay. I will not attempt to convince people otherwise. Not everyone likes what everyone else has to say, but labeling criticism of speech as an attack on freedom of speech is a bit overzealous. You can’t tell people what they can and cannot say, but you also can’t mandate how they should respond. We all come from differing backgrounds, which means some buttons are a bit easier to push than others. You might think a rape joke is “funny,” but a sexual assault survivor will not. (I would sincerely hope anyone reading thing does not find rape jokes funny, but, I don’t know, different strokes).
Details of the TPP (Trans-Pacific Partnership) agreement were finally released late last week following a secretive, seven-year negotiating process. The purported trade deal's 6,194 pages of mind-numbing legalese actually cover a wide range of policy questions that have little to do with tariffs, imports, or exports -- including a chapter on intellectual property that will likely dismay supporters of an open Internet.
President Obama may boast that the trade bill eliminates more than 18,000 taxes that countries impose on U.S. exports, but TPP also enshrines the very measures sought by SOPA, a controversial copyright infringement bill that failed in Congress three years ago.
Quebec Finance Minister Carlos Leitao tabled legislation on Thursday to implement the provincial budget that was announced in March, including amendments to the province’s Consumer Protection Act that direct Internet service providers (ISPs) to “block access” to a list of “unauthorized gambling sites” to be drawn up by Loto-Québec. Failure to comply could lead to a fine of up to $100,000 and twice that for subsequent offences.
Myanmar’s government has been notorious for its censorship.
American musicians have it tough, but try making it work in Myanmar. To be an artist in the isolated Southeast Asian country is to face nearly impossible barriers. The Internet is spotty, the music scene virtually nonexistent and every original song must still be approved for release by a government-affiliated censorship board.
The search field would make it easier to find content on specific profile pages. For instance, a user could type the name of a publication or website to find any links from that particular site that have been posted on that profile. Typing in the word “cat” would pull up any posts containing that word.
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including phones, TVs, tablets, and computers.
The ultrasonic pitches are embedded into TV commercials or are played when a user encounters an ad displayed in a computer browser. While the sound can't be heard by the human ear, nearby tablets and smartphones can detect it. When they do, browser cookies can now pair a single user to multiple devices and keep track of what TV commercials the person sees, how long the person watches the ads, and whether the person acts on the ads by doing a Web search or buying a product.
Gurgaon and San-Francisco based startup Silverpush has secured 8.2 crore funding from Hiro Mashita led Japanese early-stage investment firm, M&S Partners. IDG Ventures India and Dave McClure-led incubator and investor 500 Startups which are among the existing investors also participated in the funding round.
These fresh funds will be used in the development of a new platform by the company called PRISM which would help brands to measure their television ratings of their ad commercials.
Initially, in April last year the company raised INR 9 crore in funding IDG Ventures India and Ronnie Screwvala’s Unilazer Ventures and was also a part of incubation batches of GSF Accelerator and 500 Startups and received $100K from both the incubators. Now with the latest round of funding, its latest product PRISM aims to solve the most pressing concern of advertisers to gauge the ratings of their ads.
Traditionally, it takes days and sometimes even months after the ad has been relayed to measure its effectiveness on brand awareness, website traffic and other data. With PRISM, the companies would be able to get quick insights about their ads being run on TV.
A research project conducted by Carnegie Mellon University's (CMU) Software Engineering Institute (SEI) could have unmasked newly-launched Tor hidden services in just two weeks, according to a source familiar with SEI's work. The method used by the SEI may have also let other observers of the Tor network “hijack” SEI's information and de-anonymize Tor sites or users themselves.
SEI “had the ability to deanonymize a new Tor hidden service in less than two weeks,” the source said. “Existing hidden services required upwards of a month, maybe even two months.”
The Obama administration may have punted for now on the topic of encryption, but Kentucky Sen. Rand Paul said he’ll ensure Americans can securely protect th
Police said Quartavious Davis was part of a stunning crime spree. Armed and masked, Davis, with a group of others, robbed a string of businesses in the Miami area: witnesses put him at stick-ups at Little Caesar's, a gas station, a Walgreens, an auto parts store, a beauty salon, a Wendy's, and a jewelry store. One witness claimed Davis pointed a gun at his head and robbed him. Another witness said, when he attempted to write down the plates on the getaway car, Davis opened fire. The witness fired back.
Davis was eventually found guilty and sentenced to 1,941 months in prison — nearly 162 years. At the trial, prosecutors called on an array of evidence. DNA tied Davis to the car, and surveillance video put someone matching his description at multiple robberies. Others involved in the robberies testified against him. And then there was Davis' phone: through a controversial use of records, known as cell site location data, police were able to place Davis' mobile device near the location of six of seven robberies when they occurred.
Earlier this year, a research paper presented a new attack against the Diffie-Hellman key exchange protocol. Among other things, the paper came with a reasonable explanation of how the NSA might be able to read a lot of the Internet’s VPN traffic. I wrote a blog about this in May.
Last month, the paper was presented at the ACM CCS 2015 conference and thus made the news again. While the research does have serious implications, it did not signal the end of the use of the Diffie-Protocol as some suggested.
Facebook on Saturday sought to tamp down criticism that it had rolled out its widely-used Safety Check feature amid the terrorist attacks in Paris when the social network had not done so during a recent attack in Beirut.
UK ISPs have warned MPs that the costs of implementing the Investigatory Powers Bill (aka the Snooper's Charter) will be much greater than the €£175 million the UK government has allotted for the task, and that broadband bills will need to rise as a result. Representatives from ISPs and software companies told the House of Commons Science and Technology Committee that the legislation greatly underestimates the "sheer quantity" of data generated by Internet users these days. They also pointed out that distinguishing content from metadata is a far harder task than the government seems to assume.
Matthew Hare, the chief executive of ISP Gigaclear, said with "a typical 1 gigabit connection to someone's home, over 50 terabytes of data per year [are] passing over it. If you say that a proportion of that is going to be the communications data—the record of who you communicate with, when you communicate or what you communicate—there would be the most massive and enormous amount of data that in future an access provider would be expected to keep. The indiscriminate collection of mass data across effectively every user of the Internet in this country is going to have a massive cost."
A common misconception, Olsen says, is that the NSA began collecting the data without giving any thought to how controversial the program would be if word got out. “For all the time I worked on all of these issues, this was a constant discussion,” Olsen says. “How do we calibrate what we’re trying to do for the country with how to protect civil liberties and privacy?”
"If the Internet is being used against us, that is something we should know," he said. "We have to know what is going on."
“I am just a citizen. I was the mechanism of disclosure. It’s not up to me to say what the future should be — it’s up to you,” NSA whistleblower Edward Snowden told a packed house in Grant Hall.
One of the most wanted men in the U.S. just found a new ally. On Oct. 29, the European Union voted in favor of granting Edward Snowden, the whistleblower behind the infamous 2013 National Security Agency (NSA) leaks, political rights within member states. According to The Huffington Post, the parliament voted 285-281 on the proposed legislation which requested that member states “drop any criminal charges against Edward Snowden, grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as whistleblower and international human rights defender.” Snowden would later Tweet that the EU vote should not be seen as an attack against the U.S., but rather as a form of international friendship extended towards him.
The message is loud and clear: we have no fear!
"This mobile phone was used to call the personal number of William Binney, a former technical director of the US National Security Agency who quit in protest in 2001 and later became one of the first whistleblowers on illegal NSA programs," reads a bright yellow poster pasted to around 200 advertising columns in Cologne.
"Since [the phone] was used to call Binney, we must also assume that the number +49 174 276 6483 is now also under direct surveillance," the poster says.
All clear so far. But then presents you with what it calls an "opportunity" - and implores you to dial the number!
Only weeks before the US Patriot Act will be replaced with the USA Freedom Act a federal judge ruled that National Security Agency (NSA) Bulk Telephone Metadata Program which was revealed by Edward Snowden in 2013 that systematically collects Americans’ domestic phone records in bulk “likely violates the Constitution.” After waiting 2 years on the Circuit Court to rule, on November 9, 2015 US District Judge Richard J. Leon (District of Columbia) issued a 43 page Memorandum Opinion 20 days before the NSA Bulk Telephone Metadata Program was to end to cease collecting metadata calls of a California lawyer and his law firm as the Judge stated “…because of the loss of constitutional freedoms for even one day is significant harm.”
The reassurances may be misleading, because the NSA often uses the vulnerabilities to make its own cyber-attacks first, according to current and former U.S. government officials. Only then does NSA disclose them to technology vendors so that they can fix the problems and ship updated programs to customers, the officials said.
US tech giant Microsoft will be unable to evade the long reach of the National Security Agency (NSA) by relocating customer data to Europe, NSA whistleblower J. Kirk Wiebe told Sputnik on Friday.
This past week began with a federal judge handing a big win to privacy advocates opposed to the U.S. government's warrantless dragnet collection of domestic call records, and ended with an attorney straining to see that victory implemented before the clock runs out on the entire program.
A US federal court ordered the halt to the NSA’s bulk metadata collection programme, citing the Constitution and confirming a previous ruling. In a 43-page ruling, Judge Richard Leon of the Washington DC District Court writes “This court simply cannot, and will not, allow the government to trump the Constitution merely because it suits the exigencies of the moment.”
The ruling "says you can't just sort-of comply with the law, which is what the government had been saying it was going to do".
Leon noted the government's position: that "the immediate cessation of collection of or analytic access to metadata associated with plaintiffs' telephone numbers ... would require the NSA to terminate the program altogether".
A U.S. appeals court Tuesday temporarily blocked the ruling of a federal judge who this week called the National Security Agency’s bulk collection of Americans’ telephone records almost certainly unconstitutional, just weeks before the program’s scheduled phase-out.
US District Judge Richard J. Leon ordered the National Security Agency or NSA to stop its spying program immediately. He calls he phone data collection by the agency is as unconstitutional, the second federal judge to do so.
The police have been questioning a number of party leaders in Parliament regarding a leak from the Committee for the Intelligence and Security Services that ended up with a NRC journalist, the Telegraaf reported on Tuesday.
According to the newspaper, this investigation is related to the affair surrounding Internal Minister Ronald Plasterk and the 1.8 million telephone details shared with American service NSA early last year. Plasterk gave speculative information about this on television before informing the Tweede Kamer, lower house of parliament, which resulted in him narrowly surviving a vote of no confidence in February 2014.
Encryption service Tor was designed to keep its users anonymous, but early last year, it was compromised, handing reams of information about people who used the software to view the "dark web" to an unknown party. Now the non-profit Tor Project that develops and maintains the anonymity software thinks it has its culprit. The group says that Tor was cracked by the FBI, with the help of researchers from Carnegie Mellon University, who were allegedly paid $1 million for their work.
Stingrays are the best known of a class of devices known as “cell-site simulators”. Roughly the size of a suitcase, such devices operate by pretending to be cellphone towers, then stripping data and metadata from phones which connect to them.
Use of the devices does not require a warrant. A bill introduced by Chaffetz last week aims to change that.
In the letters sent out on Monday, Chaffetz, with the committee’s ranking Democrat, Elijah Cummings, and the chair and ranking member of the information technology subcommittee, Will Hurd and Mike Kelly, demanded agencies provide all documented policies and guidelines regarding Stingray use, as well as related memoranda, non-discl
The NRO, which costs the US taxpayer roughly $10 billion a year, is responsible – criminally irresponsible would be a better term – for the global satellite and air-breather constellation of collection platforms, and well as the delivery of that digital data from point of collection to point of processing.
It’s the hottest trend in spooking: Take law-abiding citizens, usually business owners, and use the justice system to compel them into being your enthusiastic deputies. People pitch in by opening their doors, both physically and digitally, so the government can make use of any supposedly private user data they might have. The seeming enthusiasm of the collaboration comes from the fact that these same orders make it a crime to reveal the collaboration, so service providers must also actively deceive their own users about the true level of privacy they provide.
Now the UK is getting in on the action, as it’s been revealed that under the upcoming Investigatory Powers Bill it will have the ability to order companies to build software “backdoors” into their products, and revealing that collaboration could result in up to a year in prison. More than that, the government is also empowering itself to enlist the services of talented individuals like hackers, and to also legally restrain these people from revealing the work they’ve done — even in open court. In the US, these orders are called as National Security Letters (NSLs), and they have come to be routinely served to everyone from a small business owners to major corporate executives.
Underwater cables. Surveillance drones. Reconnaissance satellites.
California artist and geographer Trevor Paglen photographs the things we "don't understand how to see" — like the military infrastructure that quietly shapes our lives.
Today Paglen joins guest host Tom Power to discuss the surprising beauty of troubling things, why we shouldn't trust our eyes, and how his work has changed his online behaviour.
"The internet is quite hostile. It is preying on the fact that we are telling it our most intimate secrets."
It seems more and more apparent that all of the people waiting for federal courts to protect their privacy will decay into cobweb covered skeletons before the courts actually limit the power of the federal surveillance state.
On Monday, the U.S. Supreme Court rejected what Reuters called “a test case on privacy in the digital age.” The nine justices declined to weigh in on whether police need to obtain search warrants to examine cellphone location information held by wireless carriers.
The case revolves around a Florida man named Quartavious Davis. A court convicted him in a string of 2010 robberies in the Miami area. Police used Davis’ cell phone information to place him in the area of the crimes. He challenged his conviction because the police did not obtain a warrant before accessing his location information.
The SCOTUS declined to take up the case after the 11th U.S. Circuit Court of Appeals ruled in May that the failure to obtain a warrant did not violate Davis’ right to be free from unreasonable searches and seizures under the Fourth Amendment to the U.S. Constitution.
But Thomas Drake, a former employee for the US’s National Security Agency (NSA) argued that attention should be paid to how technology is changing. While intelligence organizations have always had the instinct to snoop on people, he said, the fact that they are now able to carry out indiscriminate surveillance online not on specific targets but on the public as a whole is a different story altogether.
They aren’t perfect, but there are some ways to go about protecting your personal information.
An increasing number of people are using PGP, a program that encrypts emails and files. The name of the program stands for “Pretty Good Privacy.” Basically, the program seals messages in an envelope that is hard for third parties to open.
Think of how often sit with your phone, tablet, or computer, quietly shopping or reading the latest headlines. Browsing the internet certainly feels like a solitary activity, but as a new study in the International Journal of Communication reveals, you may be surprised by just how many companies are observing.
Tim Libert, a doctoral student at the Annenberg School for Communication at the University of Pennsylvania analyzed the Alexa top one million websites, finding that 88 percent leak user data to third parties -- sites that would be unfamiliar to most users.
As more commerce moves online, encryption technology is not only securing the digital economy, it’s helping to grow it, according to economists.
Though difficult to quantify, there’s no doubt encryption has been a significant boon to the online economy, according to a Monday report from libertarian think tank the Niskanen Center.
“The problems of online security and the non-economic benefits of encryption are well understood, but there has yet to be a comprehensive analysis of the economic benefits created by the spread of encryption,” Niskanen Center policy analyst Ryan Hagemann and research associate Josh Hampson wrote.
The ECJ’s recent decision will certainly increase the already-existing legal insecurities relative to data transfer from Europe to the United States. The newly negotiated agreement between Brussels and Washington on the transatlantic transfer of personal data will most likely have little impact on this legal un-certainty, as the judges expressly doubted the European Commission’s authority to enact binding rules for member states’ data protection authorities.
Brett Lempereur is a lecturer at Liverpool John Moore's University, and to help make the abstract notion of surveillance more concrete, he's built a tool called "Icreacharound" (a play on the NSA's top-secret search engine ICREACH) that displays all of his Web data so that you can imagine what'll be like the agents of the government can have this kind of access to your browsing habits.
For the past two and a half years, many have hoped that the mass surveillance programs revealed by U.S. National Security Agency whistleblower Edward Snowden would inspire serious reform of Western intelligence agencies, nudging the post-9/11 national security pendulum back in the direction of privacy and civil liberties. Unfortunately, the opposite is occurring.
With few exceptions, the past year has seen governments around the world double down on intrusive mass surveillance. Unprecedented and draconian new laws crafted in the name of fighting crime and terrorism have emerged in France, Australia and many other countries. Last month the U.S. Senate passed the Cybersecurity Information Sharing Act, a deceptively named bill that has nothing to do with security and everything to do with having companies give more of their customers’ data to U.S. government agencies. And last week, U.K. Home Secretary Theresa May presented a long-awaited draft of the new Investigatory Powers Bill, a collection of sweeping reforms that would give more powers to British police and spy agencies, including the Government Communications Headquarters (GCHQ), the NSA’s close ally and longtime collaborator.
Legislation governing surveillance powers has appeared on both sides of the Atlantic: the draft Investigatory Powers bill has just been published in the UK while the US senate has voted through a proposed Cybesecurity Information Sharing Act. Following Edward Snowden’s revelations about the extent of government surveillance and communications interception, these proposed laws reflect the UK and US governments’ attempts to clarify their legal powers and address their citizens’ significant privacy and security concerns.
Surveillance powers outlined in the the Investigatory Powers Bill represent a gross invasion of privacy which would create an outcry about if the Bill used clearer language.
That's what Dr Joss Wright, Research Fellow, Oxford Internet Institute, told the House of Commons Science and Technology Committee whilst presenting evidence on the Investigatory Powers Bill.
A SECRETIVE BRITISH POLICE INVESTIGATION focusing on journalists working with Edward Snowden’s leaked documents has been designated the code name “Operation Curable,” according to details newly obtained by The Intercept under the U.K.’s Freedom of Information Act.
The counterterrorism unit within the London Metropolitan Police’s Specialist Operations division has been conducting the criminal probe for more than two years.
The Metropolitan Police first announced it had launched a criminal investigation related to the Snowden documents in August 2013. About four months later, in December 2013, the force’s then-assistant commissioner Cressida Dick acknowledged the investigation was looking at whether reporters at The Guardian had committed criminal offenses for their role in revealing British surveillance operations exposed in the leaked files.
Since 2013, few new details about the case have been revealed, with police officials attempting to withhold information about the investigation. Earlier this year, the Metropolitan Police repeatedly refused to disclose the status of the investigation on the grounds that doing so could be “detrimental to national security.” But following an intervention from the authority that enforces the U.K.’s freedom of information laws, the force reversed its position in late July and admitted that the probe remained ongoing.
If there’s one person that knows how to dodge electronic detection, it’s Edward Snowden.
The ex-NSA contractor remains one of the most controversial figures in American privacy policy — and a prolific commentator on cybersecurity issues.
Snowden eluded U.S. officials, fleeing the country in 2013 after leaking information on the NSA’s warrantless collection of individuals’ phone metadata to the press. Now living Russia, he has repeatedly lobbed criticisms at the U.S. intelligence community for its approach to individual privacy.
Whistleblowers are always accused of helping America’s enemies (top Nixon aides accused Daniel Ellsberg of being a Soviet spy and causing the deaths of Americans with his leak); it’s just the tactical playbook that’s automatically used. So it’s of course unsurprising that ever since Edward Snowden’s whistleblowing enabled newspapers around the world to report on secretly implemented programs of mass surveillance, he has been accused by “officials” and their various media allies of Helping The Terroristsââ¢.
Still, I was a bit surprised just by how quickly and blatantly – how shamelessly – some of them jumped to exploit the emotions prompted by the carnage in France to blame Snowden: doing so literally as the bodies still lay on the streets of Paris. At first, the tawdry exploiters were the likes of crazed ex-intelligence officials (former CIA chief James Woolsey, who once said Snowden “should be hanged by his neck until he is dead” and now has deep ties to private NSA contractors, along with Iran–obsessed Robert Baer); former Bush/Cheney apparatchiks (ex-White House spokesperson and current Fox personality Dana Perino); right-wing polemicists fired from BuzzFeed for plagiarism; and obscure Fox News comedians (Perino’s co-host). So it was worth ignoring save for the occasional Twitter retort.
But now we’ve entered the inevitable “U.S. Officials Say” stage of the “reporting” on the Paris attack – i.e. journalists mindlessly and uncritically repeat whatever U.S. officials whisper in their ear about what happened. So now credible news sites are regurgitating the claim that the Paris Terrorists were enabled by Snowden leaks – based on no evidence or specific proof of any kind, needless to say, but just the unverified, obviously self-serving assertions of government officials. But much of the U.S. media loves to repeat rather than scrutinize what government officials tell them to say. So now this accusation has become widespread and is thus worth examining with just some of the actual evidence.
[...]
By itself, the glorious mythology of How the U.S. Tracked Osama bin Laden should make anyone embarrassed to make these claims. After all, the central premise of that storyline is that bin Laden only used trusted couriers to communicate because Al Qaeda knew for decades to avoid electronic means of communication because the U.S. and others could spy on those communications. Remember all that? Zero Dark Thirty and the “harsh but effective” interrogation of bin Laden’s “official messenger”?
Last week in the UK, the draft Investigatory Powers Bill was published outlining proposals for ISPs to retain user's browsing histories for a full year. Governments want to weaken encryption. The FCC ruled that Do Not Track requests are essentially meaningless. The NSA finds and takes advantage of vulnerabilities. It's little wonder that privacy groups are up in arms -- the erosion of online rights continues with terrifying speed. But all is not lost. There are still things you can do to help maintain your privacy. If you're concerned, here's what you can do.
Ad blocking tools are rarely out of the news these days. In times of heightened awareness about online privacy, more and more people are turning to things like Adblock Plus to banish ads and clean up their web browsing experience. For many people an ad blocker is seen as essential.
Edward Snowden goes further. The former NSA contractor says that it is a web user's duty to protect their computer by blocking potential attack vectors such as Flash and JavaScript-riddled advertisements.
In an interview with The Intercept, Snowden reveals what he believes everyone should be doing to keep themselves safe online. He recommends using encrypted communication app Signal, and to encrypt the contents of hard drives. A password manager should be used to create 'unbreakable' passwords, and two-factor authentication should be used whenever it is available.
Days after the head of the largest police union in the country issued a threat to filmmaker Quentin Tarantino, warning that “something is in the works” after the director dared to speak out against police brutality, Fox News Eric Bolling followed suit, reminding Tarantino that “everyone thinks they don’t need a cop until they do.”
Bolling, co-host of “The Five,” has repeatedly railed against Tarantino for supporting the Black Lives Matter movement. Tarantino has recently come under conservative fire after speaking at an anti-police brutality protest last month.
“Remember the two guys who were executed over here in Brooklyn? In days after that, that protest. People, as Dana [Perino] points out, people look up to Quentin Tarantino,” Bolling asked during a recent show. “They look up to Hollywood actors and directors, and it feeds into that narrative. Cop violence is going up.”
The hacker culture, and STEM in general, are under ideological attack. Recently I blogged a safety warning that according to a source I consider reliable, a “women in tech” pressure group has made multiple efforts to set Linus Torvalds up for a sexual assault accusation. I interpreted this as an attempt to beat the hacker culture into political pliability, and advised anyone in a leadership position to beware of similar attempts.
The CIA was relentless in their pursuit of CIA whistleblower John Kiriakou, who confirmed the name of an undercover operative to a reporter and was successfully prosecuted and jailed by the Justice Department. However, at least one CIA employee and one CIA contractor committed similar breaches of classified information and were not put on trial by the United States government.
VICE News journalist Jason Leopold obtained documents from the Office of the Inspector General at the CIA, which show the OIG completed 111 investigations of alleged crimes between January 2013 and 2014.
The Justice Department, according to Leopold, “declined to prosecute a case in lieu of CIA administrative action involving a CIA Special Activities Staff employee who ‘misused government systems by conducting unauthorized, non-official searches on sensitive Agency databases.’ The employee was warned “on more than one occasion to cease [the] behavior but [the employee] continued to conduct unauthorized searches.'”
The U.S. government's elite interrogation unit, formed in the aftermath of the al-Qaeda suspect torture scandal, has been providing extensive training to local police, other federal agencies and friendly foreign governments.
Since its creation in 2009, the High-Value Detainee Interrogation Group, overseen by the FBI with members drawn from the bureau, Defense Department and CIA, has sponsored instruction and research for at least 40 agencies, including the Los Angeles and Philadelphia police departments.
While members of the so-called HIG have been involved in controversial encounters with terror suspects, including interrogations aboard U.S. war ships, HIG Director Frazier Thompson asserted that the group's techniques bear no resemblance to the abusive treatment exposed following the capture of al-Qaeda suspects wanted for their alleged involvement in the 9/11 attacks and during the Iraq War.
Another week has gone by, and the White House still has not rolled out its long-awaited plan to close the detention facility at Guantánamo Bay, Cuba.
Chatter that the release was imminent picked up over the past week after defense and White House officials said they expected the Obama administration to deliver the document to Congress soon, likely by Friday. But several defense officials confirmed to Foreign Policy on Friday that the plan will not come this week, and they are unsure when President Barack Obama will sign off on it.
According to a recent article in the Wall Street Journal, while the federal government is pushing local and state law enforcement agencies to use body cameras for their law enforcement officers, federal law enforcement officers are not using such cameras when performing their own LE duties. According to the article, this is because the federal government hasn't adapted policies for the use of body cams and the storage of the video.
A Secret Service officer attached to the White House has been arrested on suspicion of soliciting a child for sex, CNN reported Thursday afternoon.
Lee Robert Moore turned himself in to federal authorities in Maryland on Monday and has admitted his guilt.
According to a criminal complaint filed in U.S. District Court in Delaware, Mr. Moore, 37, sent nude pictures of himself and lewd messages to a “14-year-old girl” who was actually an undercover cop. He also asked to meet the “girl” in person for sex.
Though President Obama touts America as a nation of laws and evenhanded justice, there is a blatant double-standard regarding how people are punished for national security breaches – whistleblowers are harshly punished but the well-connected get a pass, writes John Hanrahan.
T-Mobile has just announced "Binge On," a deal that gives customers unlimited access to Netflix, HBO Go, ESPN, Showtime, and video from most other huge media brands (but not YouTube!). It’s just like T-Mobile’s "Music Freedom" promotion, which gives customers unlimited high-speed data, as long as they’re listening to music from Spotify, Google Play Music, or one of T-Mobile’s other partners. It sounds like a sweet deal, and many customers will benefit! But it’s dangerous for the internet. When John Herrman writes that the next internet is TV — and you should believe him — this is part of how we get there. You know that viral picture that shows ISP internet bundles being sold as cable packages? That’s basically what’s happening here, except it’s more difficult to stop because, as the FCC might say, there’s "no obvious consumer harm" in giving people free stuff.
A possible release of Megaupload's servers, containing millions of files of former users as well as critical evidence for Kim Dotcom's defense, is still far away. Responding to questions from the federal court, the MPAA says that it's gravely concerned about the copyrighted works stored on there. The U.S. Government, meanwhile, doesn't want Megaupload to use 'illicit' money to retrieve any data.
This reference originated in the context of litigation between Hewlett-Packard (HP) and collective management rights organisation Reprobel.
In 2004 the latter informed HP that the sale of multifunction devices entailed payment of a levy of EUR 49.20 per printer, and - from what this Kat understands - this should apply retrospectively.
In 2010 HP summoned Reprobel before the Court of First Instance of Brussels, seeking a declaration that no remuneration was owed for the printers which it had offered for sale, or, in the alternative, that the remuneration which it had paid corresponded to the fair compensation owed pursuant to the Belgian legislation, interpreted in the light of the InfoSoc Directive.