Intel is selling well in up-scale machinery like premium PCs, servers and some gadgets, many running GNU/Linux.
No one becomes a programmer to become an intellectual property (IP) expert. But, in today's lawsuit-happy world, with patent trolls ready to attack and licensing becoming increasingly complicated, developers needs to know some IP law.
Open source development looks to be here to stay, and the TODO Group and Linux Foundation want all industries to push much, much farther into open source software development.
Linux Foundation Tosses Legalese Lifeline to Software Developers
The open source ecosystem gained another major partner collaboration this week with the announcement that the TODO Group has become a Linux Foundation project, increasing the investment of a number of major companies in open source.
If you are looking for some Wayland drama, check out the most commented on mailing list thread this week: collaboration on standard Wayland protocol extensions.
Drew DeVault who has been developing the Sway Wayland compositor as a drop-in replacement to X11's i3 window manager, started this mailing list thread in trying to foster more collaboration over Wayland protocol extensions between the different desktop environments / compositors.
It seems we're currently pacing at a rate where almost each day there is new OpenGL 4.x or OpenGL ES 3.2 activity reaching Mesa Git master.
The interesting slides from this month's Game Developers Conference (GDC) are now available online.
GDC'16 happened a few weeks back and while there's been the video recordings of some of the sessions to surface online, more of the presentation slides are now available for those not having the time to sit through an entire video presentation.
Following a two week delay to the schedule, the list of nominees for the X.Org 2016 Board of Directors elections was published this morning.
The nominees include Bryce Harrington, Alex Deucher, Egbert Eich, Keith Packard, and Lucas Stach. These five individuals are competing for four board seats with the terms ending for Alex Deucher, Matt Dew, Egbert Eich, and Keith Packard.
As a Windows user, my options for decent text editors to write my articles with are fairly limited. The majority of them are either best suited for coding or too greedy for system resources.
ALSA 1.1.1 is out today as the newest version of this Linux audio library, utilities, plugins, and tinycompress for the Advanced Linux Sound Architecture.
Back in 2011, when Microsoft bought Skype for US$8.56 billion, people were wondering if it would continue to update the Linux client that the VoIP platform had.
It looks like the fears of these folk are slowly coming true. The last release of Skype for Linux was a 32-bit update in 2014 to version 4.3.
Those who had paid for subscriptions in the hope that they would one day get a 64-bit client with an improved user interface have been waiting and waiting in vain.
Now a group of users is reporting that from, February 22, the Linux Skype client is unable to join calls.
They say that numerous tweets to @SkypeSupport have gone unanswered.
Opera Software, through Bà âaà ¼ej Kaà ºmierczak, today, March 31, 2016, proudly announced that the highly anticipated Ad Blocker functionality to be implemented in future versions of the Opera web browser has just landed in the Beta channel.
Earlier this month, we had the great pleasure of exclusively reporting on the release of the Opera 37 web browser with integrated ad-blocking capabilities, which promised an increase in browsing speed of up to 90 percent. However, at that moment in time, Opera 37 lived only in the Developer channel.
That changes today, as Opera Software has pushed the anticipated Opera 37 web browser to the Beta channel for all supported platforms, including GNU/Linux, Mac OS X, and Microsoft Windows, offering users a much more stable Ad Blocking experience, and many other great improvements.
CrossOver developer CodeWeavers has just informed us via an email announcement about the immediate availability of CrossOver 15.1.0 graphical interface for Wine, for both GNU/Linux and Mac OS X platforms.
CodeWeavers this morning announced the release of CrossOver 15.1 as the latest version of their software to allow Windows programs to run on Linux and OS X. CrossOver 15.1 is now powered by Wine 1.8.1.
Yes, that's right, you're reading it correctly: as of today, March 31, 2016, there are over 2,000 games on Steam that offer support for the Linux platform, including Valve's SteamOS gaming operating system based on Debian GNU/Linux.
Today, March 31, 2016, Epic Games has had the great pleasure of announcing the general availability of its brand-new Unreal Engine 4.11 game engine software for all supported platforms.
After more than four months of development, free RTS (real-time strategy) game 0 A.D. was updated on March 31, 2016, by developer Wildfire Games to version Alpha 20, dubbed Timosthenes.
0 A.D. Alpha 20 Timosthenes comes with a bunch of cool new features, among which we can mention ten new maps, including the Stronghold, Hell’s Pass, Empire, Ambush, Lions Den, Island Stronghold, Flood. There are also Frontier random maps, and the Golden Island and Forest Battle skirmish maps for two and four players, respectively.
Don't Starve: Shipwrecked Expansion is a pretty big expansion to the really great survival game Don't Starve. It is now fully available and features Linux support.
I haven't had a chance to look at it yet myself, but the reviews are suggesting it's amazing.
1993 Space Machine a game that was originally supposed to be on Amiga, but never released is out for other platforms. The developer has confirmed it's on its way to Linux.
It doesn't just look retro, it really is retro. The game was built in 1993 and has been released in 2016. Now this right here is a proper classic game.
The anticipated Hyper Light Drifter role-playing game that was first spotted on Kickstarter two and a half years ago, has been finally released today on Steam.
Epic Games is ending out the month by releasing the newest version of UE4, Unreal Engine 4.11.
Unreal Engine 4.11 delivers a wide variety of performance improvements, greater parallelism thanks to threading improvements. new realistic hair shading, realistic eye shading, improved skin shading, realistic cloth shading, capsule shadows, particle depth of field, improved hierarchical LOD, support for LLVM Clang 3.7 on Linux, and a ton of other improvements.
With yesterday's Nouveau Kepler vs. Maxwell Performance On Linux 4.6 + Mesa 11.3-dev benchmarks, a number of Phoronix readers expressed their surprise how well the GeForce 600/700 "Kepler" series hardware was performing on the open-source Nouveau driver once manually re-clocking these graphics cards. It's certainly much better than the GTX 900 series performance on Nouveau as the Maxwell GPUs don't have any re-clocking support on Nouveau at all. I'm working on some fresh Nouveau vs. NVIDIA Kepler tests and for one Steam Linux game, this reverse-engineered NVIDIA open-source driver is able to beat out the "binary blob" from NVIDIA.
I have double checked this, and it seems to be accurate. Linux now has 2,000 games on Steam, and that's a pretty healthy milestone.
As QtWebKit will be remove from official Qt package I decided some months ago to evaluate QtWebEngine.
For sure QtWebEngine < 5.6 was too limited. But I started to use it. I evaluated QtWebEngine 5.5 but some features were missing (as possibility to block request or use custom scheme url).
I started to focus on Akregator as it still used khtml, I migrated it to QtWebKit and after that to QtWebEngine. (For 16.04 there is a experimental option to activate compilation).
The GTK+ open-source GUI (Graphical User Interface) toolkit has been updated today, March 31, 2016, to version 3.20.2, the second maintenance release in the stable 3.20 series of the software heavily used in the GNOME 3.20 desktop environment.
The strange thing about PCs is that as they get older, even though they appear to be working fine, they can eventually become unusably slow. Successive operating systems take up more and more resources until your PC grinds to a halt.
You don’t need to throw your computer away and upgrade to get access to the latest software, though; a lightweight Linux-based operating system will let you have the latest web browser and office software, while running smooth as silk in as little as 256MB RAM. Here's our pick of the best lightweight Linux distros for older computers - and best of all, they're all free.
The developer of SparkyLinux, a Debian-based Linux operating system made in Poland, announced today, March 31, 2016, the immediate availability of the third milestone towards SparkyLinux 4.3.
Earlier today, March 31, 2016, the developers behind the Simplicity Linux project, a GNU/Linux distribution derived from LXPup, a Puppy Linux variant built around the LXDE desktop environment, announced the release of Simplicity Linux 16.04 Beta.
The Beta of Simplicity Linux 16.04, which should see the light of day later this Spring, at the end of April, comes one month after the release of the Alpha builds on February 29, 2016, bringing a new kernel rebased on the upstream Linux 4.4.4 LTS (Long-Term Support) branch, thus adding support for new and modern hardware components.
I am currently in the process of interviewing the leaders of every Linux distribution on the planet, with the goal of helping us get to know the people behind the projects better. Having just wrapped up discussions with the heads of both elementary and Fedora (and others in the works) I decided it was time to talk about openSUSE.
This gets a little tricky as, earlier this year, I was elected to a position on the openSUSE board. I thought, for a moment, about either skipping the openSUSE interview or having someone else conduct it – to avoid the perception of bias.
There are 15 more days to submit a proposal for the openSUSE Conference in Nuremberg June 22 – 26, so I would like to provide an update to the community about the conference.
As you might already be aware, there will be SaltStack, ownCloud, Kolab and SUSE Labs summits during the conference and we also plan on having a program for kids on Saturday, June 25.
Sam Varghese today again asked about Red Hat and its dealing with the NSA saying, "Red Hat is receiving a goodly sum to assist the NSA in activities that infringe on people's privacy." Red Hat today offered its enterprise operating system free of cost to developers and Phoronix.com said Fedora 24 is "looking great." Paul Thurrott posted screenshots of Ubuntu Bash on Windows 10 and Bryan Lunduke today asked, "Will openSUSE develop the SUSE Phone?"
This catalogue of resources now includes access to Red Hat Enterprise Linux Developer Suite as well as the Red Hat JBoss Middleware portfolio, both available via no-cost developer subscriptions.
With this suite, developers have access to development tools and in addition to the latest version of Red Hat Enterprise Linux Server.
Two years after making its JBoss suite of middleware tools free for non-production use, Red Hat Inc. is introducing the ability to download its flagship Linux distribution under the same terms. The move should make it much more straightforward for developers to take advantage of the platform, which has until now been fairly tricky to access without a paid support subscription even though it’s open-source.
Red Hat Enterprise Linux Developer Suite now available through no-cost developer subscription, helping to streamline the creation of traditional and cloud-native enterprise applications
Red Hat Ceph Storage software is now officially tested, optimized and certified to run on SanDisk’s InfiniFlash storage system thanks to a strategic partnership between the two vendors.
The alliance – announced this week – is Red Hat’s first partnership involving an all-flash array. Ross Turk, director of storage product marketing at Red Hat, said running Ceph software-defined storage on performance-optimized hardware has been a hot topic of discussion at events and conferences.
It's always been easy to get started with Linux development. Download a distro, learn some C, and you were ready to go. But, to program for Red Hat Enterprise Linux (RHEL), you needed more. Sure, Fedora, Red Hat's community Linux, and CentOS, Red Hat's free server Linux, can help, but it's not the same thing.
Trailing the Fedora 24 Alpha x86 release by a few days is now the secondary architecture spins for POWER and AArch64 (64-bit ARM).
With testing Fedora 24 Alpha this week, I also spent some time test driving the GNOME on Wayland experience even though developers have already decided F24 will continue to use the X.Org Server by default.
I did run some quick game tests this afternoon of Fedora 24 Alpha when running on the X.Org Server (default) and then when running GNOME on Wayland where the games end up getting piped through XWayland. For your viewing pleasure, here are those quick results.
Since Tuesday's release of Fedora 24 Alpha I've been having a wonderful time trying out this test release with all of the exciting changes building up for Fedora 24.
Fedora Project's Peter Robinson announced on March 31, 2016, the release and immediate availability for download of the Fedora 24 Alpha operating system for POWER and AArch64 hardware architectures.
RPM of PHPUnit version 5.3 are available in remi repository for Fedorra ââ°Â¥ 21 and in remi-test repository for Enterprise Linux (CentOS, RHEL...).
A new Linux distribution based on Knoppix will be written entirely in the COBOL programming Language.
COBOL has been given a lease of new life in recent years including the birth of object oriented COBOL.
COBOL can also be used as a client side scripting language and many people see it as a replacement for JavaScript. Forget JQuery, the new kid on the block is COBQuery and angularCOBOL.
Canonical and BQ may have partnered to create the first Ubuntu tablet to ship with support for both mobile and desktop user interfaces. But if you’re looking for something a bit more powerful than the BQ Aquaris M10 Ubuntu Edition tablet which recently went up for pre-order, a startup called MJ Technology thinks it has the answer.
Earlier this year MJ Technology announced plans to launch a crowdfunding campaign for a 10 inch tablet with an Intel Atom Cherry Trail processor and Ubuntu software. While the campaign is launching a little later than expected, it’s now live at Indiegogo, and the developer hopes to ship the first tablets in August, assuming the campaign raises at least $200,000.
We reported earlier this month that Dell launched its highly anticipated XPS 13 Developer Edition laptop in US, as well as the worldwide launch of the Dell Precision line of Ubuntu-based workstations.
And today, March 31, 2016, Dell is happy to announce that the XPS 13 Developer Edition laptop, which also ships with the Ubuntu Linux operating system pre-installed, is available in countries around Europe too, including United Kingdom, Ireland, Germany, Austria, France, Italy, Spain, Switzerland, Netherlands, Belgium, Denmark, Norway, and Sweden.
Canonical’s open source software finally gets into the mobile devices officially. After being babbling about the mobile experience for years, they finally get to field their Ubuntu US in a tablet device, which has now started entered the pre-order phase.
Canonical and BQ may have partnered to create the first Ubuntu tablet to ship with support for both mobile and desktop user interfaces. But if you’re looking for something a bit more powerful than the BQ Aquaris M10 Ubuntu Edition tablet which recently went up for pre-order, a startup called MJ Technology thinks it has the answer.
The RaspEX Linux distribution for Raspberry Pi 3 single-board computers has been updated today, March 31, 2016, by developer Arne Exton, bringing support for various hardware components on the new Raspberry Pi board.
RaspEX Build 160331 arrives today as a free upgrade for existing users, and includes the Kodi media center software, Wicd network manager, Mozilla Firefox web browser, VNC4Server VNC connection manager, Samba file sharing tool, PulseAudio sound server, and Bluetooth support.
Sadly Victor, Chrome isn’t available for the Pi 2. There are however, various methods for installing Chromium onto your Pi if you’re needing something that it provides. I must warn you though, you’re not going to be watching much browser powered video on your Pi 2. If you do, you will be pretty disappointed.
Instead, might I encourage you to do the following instead. Install an alternative browser like QupZilla or Midori. For YouTube videos, you might try something like SMTube or Minitube. Personally, I’d suggest Minitube as it provides the best overall experience. Still, watching videos on a Pi 2 is going to depend on what else you have running at the time.
Makeblock’s “Codeybot” is a dancing, singing, laser-shooting robot that runs OpenWrt Linux, and teaches kids how to program using mBlockly.
With 42 days left on Kickstarter, Shenzhen-based Makeblock is close to achieving its $100,000 goal for its Codeybot educational robot. The $99 packages are gone, but you can still pick up a Codeybot with docking station for $129, or $149 with one laser LED add-on. Deliveries are expected in August.
The Arduino is a truly powerful piece of electronics. Small, low power, flexible, and completely open source. Lots of makers and hackers have already figured out that giving their project an Arduino-brain ensures a simple, yet powerful and reliable core. There are more and more Arduino libraries and shields being released every day, so there's a good chance you won't even have to write a lot of code to use one.
In celebration of Arduino Day tomorrow—April 2, 2016—here are three Arduino-powered projects that I like lately. And, if you're new to Arduino, here are three projects to get you started. Remember fellow makers and tinkerers, the Internet of Things is just a fancy way of saying, "I can hack an Arduino into that."
Today, the Tizen Store received a major update in terms of both the user Interface for consumers and also back end for developers that will be discussed later. Just in case you didn’t know the Tizen Store is the online shop that houses all the current smartphone apps. The Store will begin automatically updating itself once it is launched, taking it to version 1.5.0. The new app has a much simpler layout that provides you version number, file size and ratings at a glance.
It seems hard to understand what is currently going on with BlackBerry. Although to be fair, many will say that has long been the case with BlackBerry as they have been a company that until recently stuck to their guns relentlessly and continued on pushing their own operating system, in spite of sales figures and adoption rates making it clear that the rest of the world had moved on. But BlackBerry did move on and really well. After mountings of speculation, BlackBerry did finally confirm that they were going to release a handset which solely ran on the Android operating system. A move which although many saw as an admission of the failings of their own OS, was a move which was significantly long overdue. Nevertheless, they did announce an Android smartphone and towards the close of the year, they did release it. Enter, the BlackBerry PRIV.
A few days after the launch of the iPhone SE by Apple, the 'Apple of China', Xiaomi published data and an image of its new 4.3-inch Mi 5 Mini with a Snapdragon 820 processor. Chinese media outlets see the Mi 5 Mini as Xiaomi's response to the 4-inch smartphone from Apple.
Android 6.0 Marshmallow was announced nearly six months ago and according to Google, it has only found its way to 2.3% of Android devices so far. That… is not a lot of Android phones. Since Marshmallow has been available for six months and it’s only found on less than 3% of devices, you can imagine how long it will be before Android N makes its way to end users. Google surprised us all when it released a developer preview build earlier this month, and the final build of Android N is expected to be released sometime this summer. So if trends stay true, we can expect N to become the most widely used version of Android sometime in 2018. Seriously.
The tablet keyboard is a personal thing. To one user, it's just a means for typing messages and statuses, entering data while on the go. To someone else, it's a way of making the mobile experience more efficient and enjoyable.
Out of the box, the Android keyboard is serviceable... especially on the smartphone form. But once you venture into the realm of the tablet, that stock keyboard seems a bit less than user-friendly.
There are other differences between the two devices. The Nexus 6P doesn’t have wireless charging or expandable storage, nor does is it have IP68 certification. For most consumers, these features aren’t crucial to the experience though they’re certainly nice to have. Once you do use a device with wireless charging, it’s hard to live without.
Most people will go with Samsung simply because it’s a recognizable and trusted brand. And, let’s be honest, on paper it’s superior to the Nexus 6P. But it’s not always about specs—often times it’s about the experience that counts.
Despite the general public displeasure with all things on the Internet come April 1, the big companies in the tech space just can't help themselves. Year after year we get tons of April Fools' Day jokes, gags and pranks. Most are flops and some are worth a chuckle, and no matter how well they go over we're rounding them all up right here.
Ever wished to create your own digital assistant that talks back to you and completes your day-to-day tasks? Now it’s easier than ever with an open source tool Abot that’s written in Go programming language. Know more about it here and start coding one for you.
Software source codes and hardware designs tend to be closely guarded trade secrets. But researchers recently made the full design of one of their microprocessors available as an open-source system.
Before I discovered open source software in 2005, I had never touched a digital design package and probably couldn't have named one. In fact, I never believed myself to be creative in any way, let alone thought about teaching myself an entirely new discipline.
Starting a successful open source project requires a lot more than technical skills. You need to have wise strategies, which Michael DeHaan, founder of the IT automation company Ansible, clearly explains in this valuable video. In this talk, recorded March 22 on the Centennial Campus of North Carolina State University, he explains that for users to adopt your open source creations, the documentation needs to be outstanding. Your web site needs to be very well done. Learn these and other tips in this video.
This year, we are delighted to say hello to 335 new and returning members. This means that our membership numbers are up 172% over last year, which is wonderful to see!
James Wallbank is a founder of one of the longest-running hackerspaces in the U.K. Access Space opened in the center of the northern industrial city of Sheffield in 2000 with the goal of being open to all.
Beyond being a place for coding and programming, Access Space refurbishes donated laptops for charitable use. It was also the subject of a recent academic study on barriers to womens' participation in hackerspaces and makerspaces. In this interview, Ikem Nzeribe of Moss Code and I ask Wallbank about his experience running the hackerspace, revealing lessons that all projects looking to support diversity can use for themselves. The hackerspace model of economic self-empowerment could lead to a more diverse tech sector, but Wallbank makes it clear that there are no short cuts. The challenge may be finding enough champions of genuine diversity with the right balance of vision, critical evaluation, and persistence to enable under-represented communities.
Brett Gaylor is a Director at the Mozilla Foundation, where he helps helm the current encryption education campaign. He also oversees Mozilla’s Open Web Fellows program, which places open source technologists and activists at leading nonprofits like Amnesty International and ACLU.
As it began to develop, the Big Data trend--sorting and sifting large data sets with new tools in pursuit of surfacing meaningful angles on stored information--remained an enterprise-only story, but now businesses of all sizes are evaluating tools that can help them glean meaningful insights from the data they store. As we've noted, the open source Hadoop project has been one of the big drivers of this trend, and has given rise to commercial companies that offer custom Hadoop distributions, support, training and more.
Other specific features are performance boosters for today's more powerful big iron servers, analytics and productivity enhancements to speed complex query capabilities on extreme data volumes, and a foundation for horizontal scalability across multiple servers for importing entire tables from external databases.
On March 31, 2016, The Document Foundation Co-Founder Italo Vignoli announced the release plan for the upcoming major release of the world's popular free office suite, LibreOffice 5.2.
GNU social was created as a companion to my earlier project, GNU FM, which we created to build the social music platform, Libre.fm. After only a few short months, Libre.fm had over 20,000 users and I realized I didn't want to be another social media silo like MySpace or Facebook, so I came up with this vague idea called GNU social. A few prototypes were built, and eventually we started making GNU social as a series of plugins for Evan Prodromou's StatusNet project, with some help from Ian Denhardt, Craig Andrews and Steven DuBois. Later, StatusNet, GNU social and Free&Social (a fork of StatusNet) would merge into a single project called GNU social. If that sounds confusing and convoluted, it is.
RMS was in India, the Netherlands, and Canada this past month. He started his trip in February in Pilani, in Delhi, and in Roorkee, where he spoke, at APOGEE 2016, the annual Birla Institute of Technology & Science–Pilani technical festival, at Tryst, the Indian Institute of Technology Delhi's annual science and technology festival, and at Cognizance,1 IIT–Delhi's annual technical festival. He then moved on…
Prominent mobile device companies like Apple and Samsung have recently added the ability to run ad blockers on their phones and tablets. And many users have been installing them, making ad blockers some of the most popular apps in app stores.
Ad blockers are a hot topic of debate though, with revenue-starved sites being pitted against users who are concerned about malware as well as their overall reading experience. Users are defending their right to run ad blockers, while sites are requesting that they turn them off.
But there's another reason why so many people are using ad blockers on their mobile devices: mobile data allotments. It turns out that advertising can eat up a user's fixed data allotment very, very quickly and that could result in expensive overage charges.
To the broader outside world, Horn was best known as a Native American code talker who fought with the storied WWII deep penetration unit known as Merrill’s Marauders. But to those who knew him best, he was simply “Uncle Gil,” chief of the Fort Belknap Assiniboine Tribe.
“My dad touched a lot of people’s lives in a good way,” said Willowa “Sis” Horn, Gilbert Horn’s oldest daughter. “But to me he was just daddy – just my dad.”
Horn was born May 12, 1923, during an era when much of white society viewed Native culture as a quaint anachronism – something that would be gradually extinguished as Indian people were assimilated into the dominant western culture.
A representative of Sequirus, one of the largest vaccine manufacturers, on behalf of the International Federation of Pharmaceutical Manufacturers & Associations (IFPMA), the Biotechnology Innovation Organization (BIO), and another industry group, said industry supports the PIP Framework.
Genetic sequence data of influenza viruses with pandemic potential are not WHO PIP biological materials per the definition of PIP biological materials, the representative said. It is critical that GSD remain in the public domain for continued influenza R&D efforts, she said. In the context of the PIP Framework review, “industry is willing to consider an appropriate revision to the PIP biological definition to reflect anticipated technological advances.”
However, “not all influenza IVPP and IVPP GSD should be included in the definition and subject to the WHO PIP Framework obligations,” the industry representative said, rather only GSD which is used directly to develop and manufacture commercial IVPP products. “Attaching obligations to the general use and the sharing of publicly available GSD could potentially inhibit influenza R&D.”
Many of us identify with the growing movement to better understand our collective and individual impact on the environment and one another. We can look to our own communities for working examples of regulations, initiatives, and programs that have been developed to tackle the growing problem of electronic waste. Curbside donation programs have sprung up in many communities around the U.S., but most of us stop thinking about the disposal process once it leaves our hands. There has been a lack of media coverage regarding the global community’s outsourcing of electronic waste.
Steps have been taken on an international level to promote responsible disposal, for example with the creation of the Basel Convention. However, loopholes exist. In her report, Madeleine Somerville points to the fact that externalizing the costs of disposal contributes to the exploitation of marginalized communities as well as the environment. The fundamental problem is not that we don’t care about the effects of e-waste, but that we are relatively unaware of the complete life cycle of the electronics we use. We are not yet tuned in to how our everyday lifestyles contribute to the amount of production and subsequent waste.
President Obama has unveiled a series of steps aimed at addressing the epidemic of opioid addiction in the United States. We speak with journalist Maia Szalavitz about her new book, "Unbroken Brain: A Revolutionary New Way of Understanding Addiction," and about her own experience of overcoming addiction. "We need to create a more compassionate and loving drug policy," Szalavitz says. "Nobody is going to believe that addiction is a disease as long as the behavior is criminal."
The rise of antibiotic-resistant bacteria that trek between farms and clinics and across international boarders is unquestionably one of the most serious public health threats of our time. They currently sicken around two million people in the US each year, killing at least 23,000. To tackle the issue, the Obama Administration last year released a National Action Plan and established a panel of diverse experts to research and guide the government’s efforts to squash those deadly superbugs.
That 15-person panel, called the Presidential Advisory Council on Combating Antibiotic-Resistant Bacteria or PACCARB, convened this week in Washington, DC to discuss and vote on its first progress report and key recommendations, which now head to the president’s desk. Thursday, the council unanimously voted for six recommendations, which spanned calls for funding and collaboration. But chief among them is the call for the president to establish a White House-level leader that could coordinate all of the government agencies’ efforts to fight drug resistance.
Building botnets made up of routers, modems, wireless access points and other networking devices doesn't require sophisticated exploits. Remaiten, a new worm that infects embedded systems, spreads by taking advantage of weak Telnet passwords.
Remaiten is the latest incarnation of distributed denial-of-service Linux bots designed for embedded architectures. Its authors actually call it KTN-Remastered, where KTN most likely stands for a known Linux bot called Kaiten.
Malware coders have created a new DDoS bot called Remaiten that targets home routers running on common Linux architectures, which also shares a lot of similarities with other DDoS bots like Tsunami and Gafgyt.
Or worse. The open direct could lead to spyware and malware, rather than just advertising masquerading as content or bottom-feeder clickbait. Fortunately, you can keep an eye on what URLs are being reached using these open redirects via this link. Unfortunately, it may be only citizens keeping an eye on that page, and they're in no position to prevent further abuse.
People's passwords and their relative strength and weakness is a subject I know quite well. As part of my business, we regularly battle users who think very simple passwords, often times relating to their birthdays and whatnot, are sufficient. Sometimes they simply make "password" or a similiar variant their go-to option. So, when CNBC put together a widget for readers to input the passwords they use to get feedback on their strength or weakness, I completely understand what they were attempting to accomplish. Password security is a real issue, after all -- which is what makes it all the more face-palming that the widget CNBC used was found to be exploitable.
Just recently, a ransomware attack affected Hollywood Presbyterian in California, causing the hospital to pay $17,000 to regain access to its databases.
The United States and Canada on Thursday issued a rare joint cyber alert, warning against a recent surge in extortion attacks that infect computers with viruses known as "ransomware," which encrypt data and demand payments for it to be unlocked.
The warning follows reports from several private security firms that they expect the crisis to worsen, because hackers are getting more sophisticated and few businesses have adopted proper security measures to thwart such attacks.
The National Institute of Standards and Technology (NIST) has developed new encryption methods for securing financial data and other sensitive information.
The NIST publication SP 800-38G authored by Morris Dworkin specifies cryptography standards for both binary and non-binary data, preserving the look and feel of the unencrypted digits. Earlier encryption methods designed by NIST worked for binary data. But for strings of decimal numbers, there was no feasible technique to produce coded data that preserves the original format.
Every travel story about North Korea reads the same:
We went to North Korea voluntarily, and were shocked to find that we couldn’t like hang out at clubs with everyday Koreans, and the dudes there, like, spied on us.
And we couldn’t use WhatsApp or take selfies anywhere we wanted, or like mock the hell out of the fat guy who dictates the place LOL. It’s like so oppressive and I’m so glad to be back in the U.S. where sh*t is totally free, I mean literally, bro.
Wash, rinse, repeat.
There is a pervasive idea in today’s American society that regardless of political philosophy or party affiliation, one must never criticize the members of the United States military. Conventional wisdom holds that we must appreciate the sacrifice soldiers have made to “fight for our freedom,” and even if one is against the war, they must always “support the troops.” This line of thinking is not coming solely from the pro-war crowd; many of those who consider themselves antiwar (or at least oppose a specific war or conflict) have the utmost regard for those who fight in them. But is this canonization of those who take up arms in the name of the United States government truly just? Or is it a falsehood based on propaganda, emotion, and a lack of critical thinking?
That promise was not kept. Instead, the lobbyists, both foreign and domestic, went into overdrive in a campaign to extend NATO to the very gates of Moscow. It was a lucrative business for the Washington set, as the Wall Street Journal documented: cushy fees for lobbyists, influence-buying by US corporations, as well as political tradeoffs for the administration of George W. Bush, which garnered support for the Iraq war from Eastern Europe’s former Warsaw Pact states in exchange for favorable treatment of their NATO applications.
The Progress Report covers the second Italian OGP Action Plan (for the period 2014-2015), which was adopted in December 2014. The plan was developed by the new government that was installed at the beginning of that year and that "planned to set up structural reforms in many sectors of public administration, stressing the relevance of transparency, accountability, and open data."
The rise in public awareness of the dangers of corporate sovereignty provisions in agreements like TPP and TAFTA/TTIP has brought with it a collateral benefit: academics are starting to explore its effects in greater depth. An example is a new paper from Krzysztof J. Pelc, who is an Associate Professor in the Department of Political Science, at McGill University in Canada. Called "Does the Investment Regime Induce Frivolous Litigation?" (pdf), it looks at how the investor-state dispute settlement (ISDS) mechanism has evolved in recent years, and in a very troubling direction.
CurrencyFair, an open-source, peer-to-peer, international currency exchange with offices in the U.K., Ireland and Australia, has raised an additional €8 million and announced a new chief marketing officer.
Sometimes Vox does actually link to something at least attempting consensus, as they have done here and here. But more often, even when an attempt at consensus is reached, it’s plagued with blinders that render the “most economists” distinction suspect.
For example, the University of Chicago “poll” that sampled economists about the value of Uber, showing uniform consensus about how great it was, did not contain a single African-American or Hispanic economist. Does the class and racial composition —let alone the University of Chicago’s notorious association with free-market ideology—affect what this cohort of “most economists” thinks? Probably. Does anyone at Vox care? Evidently not.
Sometimes the “most economists” device is just a lazy placeholder, and it’s entirely possible that “most economists,” if subjected to anything approaching a scientific poll, would actually agree with the author’s assertion. Sometimes vague intuitions about what others think are true!
But like Fox News‘ use of “some say,” “most economists” or “most experts” is often a weasel phase that permits the writer to smuggle in their own opinion and ideology where it ought not be, and couches their own subjective, ad hoc analysis as something reflecting scientific consensus. Certainly, if “most experts” on a subject agree, what they agree on must therefore be objectively and undoubtedly true.
Ultimately, the “most expert/economists” cliche is a lazy appeal to authority that shortcuts actually showing one’s homework—how one got from premise to conclusion. If the news is going to be “explained” rather than just asserted, most media critics agree that Vox should drop this tic altogether.
There is a huge amount of polling evidence over decades that shows that the perception that a party is divided causes much damage to that party’s popularity rating. Indeed the perception of division or unity is almost as important as what the actual policies are. The spectacular tumbling of popular Tory support in the UK is therefore entirely expected when the Tories are kicking pieces out of each other over Europe and Osbornomics.
The corporate media, including the BBC, of course know this very well. That is why ever since those opinion polls the bitter Tory internal battles have simply stopped being reported. I have no doubt their political correspondents are having conversations like the one I had with an MP this morning, several times every day. Yet when did you last see one reported? Compare this to the regular reporting of every tittle tattle of anonymous Blairite briefing against Corbyn.
A new report from FAIR looks at a year’s worth of anonymity in the New York Times, with media critic Reed Richardson taking an in-depth look at how unnamed sources were used in the paper in 2015. His research substantiates that the observation Times public editor Margaret Sullivan made in 2014 (12/29/14) is still true: “Anonymity continues to be granted to sources far more often than a last-resort basis would suggest.”
Wall Street’s sinister influence on the political process has, rightly, been a major topic during this presidential campaign. But history has taught us that the role that the media industry plays in Washington poses a comparable threat to our democracy. Yet this is a topic rarely discussed by the dominant media, or on the campaign trail.
Bernie Sanders is not on the ballot for Washington, D.C.'s Democratic primary on June 14, thanks to a clerical error.
Both Sanders, a senator from Vermont, and front-runner Hillary Clinton submitted their paperwork and the $2,500 fee in advance of the March 16 deadline. But due to a clerical error, the D.C. Democrats did not notify the Board of Elections until March 17, according to WRC-TV in Washington.
Rachel Maddow posed an interesting question to Sen. Bernie Sanders during their interview on Wednesday: Would he like to see the Republican Party just disappear? Sanders' answer was also an interesting one. He didn't take the bait; instead, he offered an alternative theory—the GOP would disappear if corporate media simply told the truth about the party's agenda.
[...]
"The Republican Party today now is a joke," he continued, "maintained by a media which really does not force them to discuss their issues."
Sanders was returning to one of his driving issues over the years—a fervent belief that corporate-owned media was steering democracy off a cliff. In 1979, he wrote an essay arguing that TV networks were "using the well-tested Hitlerian principle that people should be treated as morons and bombarded over and over again with the same simple phrases and ideas" to prevent them from thinking critically about the world around them. He hit those same themes (albeit more diplomatically) in his book, Outsider in the House, arguing that TV news coverage was dumbing down America by inundating viewers with superficial coverage of O.J. Simpson instead of "corporate disinvestment in the United States." Not surprisingly, when Maddow asked Sanders in an interview last fall what his dream job might be, he quickly blurted out, "president of CNN."
Last week, “Trump 2016” was chalked in many places across Emory University’s campus. The backlash was swift. Students called for an immediate investigation. Emory administrators responded quickly, saying they would review security footage in order to find the “perpetrators” to then execute disciplinary protocol.
In consistency with the free speech editorial we wrote in the fall, we write this in the hopes of criticizing this kind of censorship and policing culture often taken by college administration in response to speech that could be construed as hate speech.
We certainly are not condoning the type of rhetoric that Donald Trump espouses or the type of politics that he inspires, but rather are calling for a more long-term strategy for protecting the rights of the marginalized. As many legal experts have noted, the type of precedent this Orwellian approach to censoring and stifling speech — however advantageous in the short term it may be — will come to disproportionately affect students’ ability to voice opinions later. If the chalkings were anti-University administration, students have now inadvertently created a protocol under which that too can be stifled by Emory officials.
Manhattan-based artist Joyce Yu-Jean Lee never guessed she was in for a bit of international intrigue and even global headlines when she launched a show and accompanying discussion panels in February at a couple of alternative venues on the Lower East Side.
The installation, which lasted a month, was a pop-up Internet cafe dubbed “Firewall.” This is a reference to the “Great Firewall of China” (officially the “Golden Shield”) that filters the Internet in the People’s Republic.
Apple recently patented a software system that can automatically detect and remove swear words from streamed audio tracks. The patent, dubbed "Management, Replacement and Removal of Explicit Lyrics during Audio Playback" scans a piece of music, compares the lyrics against a database of banned words, marks any explicit bits it finds and then removes the offending content, replacing it with either a beep or silence. The technology can also, according to its patent filing, detect the background music and boost that to cover what's being censored. The system isn't limited to music, mind you, it can just as easily be applied to audio books. As with many of Apple's patents, there is no word on when -- or even if -- the technology will ever make it into an actual product.
Apple has been granted a patent for technology that can automatically scan songs being streamed online and edit out any swear words in the lyrics.
Pissed Consumer has uncovered an apparent abuse of the court system by reputation management firms. Getting allegedly defamatory links delisted by Google requires a court order, which is something very few people can actually obtain. But the plaintiffs featured in this Pissed Consumer post seem to have no trouble acquiring these -- often within a few days of filing their lawsuits.
We’re proud to announce today’s release of Onlinecensorship.org’s first report looking at how content is regulated by social media companies. Onlinecensorship.org—a joint project of EFF and Visualizing Impact (VI) that won the 2014 Knight News Challenge—seeks to encourage social media companies to operate with greater transparency and accountability toward their users as they make decisions that regulate speech.
Onlinecensorship.org was founded to fill a gap in public knowledge about how social media companies moderate content. As platforms like Facebook and Twitter play an increasingly large role in our lives, it’s important to track how these companies are regulating the speech of their users, both in tandem with governments and independent of them. As self-ordained content moderators, these companies face thorny issues; deciding what constitutes hate speech, harassment, and terrorism is challenging, particularly across many different cultures, languages, and social circumstances. These U.S.-based companies by and large do not consider their policies to constitute censorship. We challenge this assertion, and examine how their policies (and their enforcement) may have a chilling effect on freedom of expression.
Texas police launched a “complaint censorship” attack on David Warden’s YouTube channel News Now Houston, claiming his videos violate their privacy.
Which is a lie, because in public, nobody has a right or expectation of privacy.
Least of all public officials like police.
You can see a new video below, Warden talking about the agony of having been first assaulted and then attacked with complaint censorship on his news channel and three false complaints aimed at censoring his citizen journalism.
It’s his only way to monetize important public interest news-gathering activities.
It’s where he tells the world about official abuse.
Complaint censorship happens with false or improper complaints submitted with intent to damage a citizen journalist or news outlet’s online publishing access or tools.
A prominent Vietnamese blogger and his assistant were sentenced to prison last week in Hanoi for their work on a popular web site, read by millions of Vietnamese, that reported on human rights and government corruption. The case raises alarms of a new wave of repression against independent media and free expression online in Vietnam.
On March 23 a Hanoi court sentenced Nguyen Huu Vinh, a former police officer and the son of Vietnam’s ambassador to the former Soviet Union, to five years in prison for “abusing democratic freedoms to harm the interests of the state.” Nguyen Thi Minh Thuy, Vinh’s assistant, was sentenced to three years. Vinh, better known as Anh Ba Sam, set up a popular blog in 2007 and later launched two others. The sites provided news and comments about democracy, social and economic issues from state media and activists, and articles critical of Vietnamese government policies. One site, AhnBasam, was repeatedly attacked by hackers in 2013 and 2014; Vinh and Thuy were arrested in May 2014 in Hanoi and indicted on charges that articles posted on the sites had "untruthful" content and "distort the lines and policies" of the ruling Community Party.
The producers of the film “Barney’s Wall,” about the creative vision and legacy of Barney Rosset, need money to cover post-production costs.
The film focuses on the man and the mural he made in his later years on the main wall of his apartment and office space in the East Village. He worked on the mural until the last days of his life in 2012. In the years following his death, the apartment was sold to developers, and it was clear that the mural would not survive there.
The U.S. Federal Communications Commission on Thursday advanced a proposal to ensure the privacy of broadband Internet users by barring providers from collecting user data without consent.
The proposed regulation from FCC Chairman Tom Wheeler won initial approval with a 3-2 vote to require broadband providers to obtain consumer consent, disclose data collection, protect personal information and report breaches -- but would not bar any data collection practices.
"It's the consumers' information and the consumer should have the right to determine how it's used," Wheeler said.
Egypt blocked Facebook Inc's (FB.O) Free Basics Internet service at the end of last year after the U.S. company refused to give the Egyptian government the ability to spy on users, two people familiar with the matter said.
Free Basics, launched in Egypt in October, is aimed at low-income customers, allowing anyone with a cheap computer or smartphone to create a Facebook account and access a limited set of Internet services at no charge.
The Egyptian government suspended the service on Dec. 30 and said at the time that the mobile carrier Etisalat had only been granted a temporary permit to offer the service for two months.
Two sources with direct knowledge of discussions between Facebook and the Egyptian government said Free Basics was blocked because the company would not allow the government to circumvent the service's security to conduct surveillance. They declined to say exactly what type of access the government had demanded or what practices it wanted Facebook to change.
Social networking forum reddit on Thursday removed a section from its site used to tacitly inform users it had never received a certain type of U.S. government surveillance request, suggesting the platform is now being asked to hand over customer data under a secretive law enforcement authority.
Reddit has removed the warrant canary posted on its website, suggesting that the company may have been served with some sort of secret court order or document for user information.
At the bottom of its 2014 transparency report, the company wrote: "As of January 29, 2015, reddit has never received a National Security Letter, an order under the Foreign Intelligence Surveillance Act, or any other classified request for user information. If we ever receive such a request, we would seek to let the public know it existed."
That language was conspicuously missing from the 2015 transparency report that was published Thursday morning. (Disclaimer: Ars and Reddit are owned by the same parent company, Advance Publications.)
Signal is a pretty amazing app; it manages to combine great security with great simplicity.
New Report Analyzes How Crypto Backdoors, Interference with Crypto, and Compelled Disclosure of Encryption Keys All Impact Free Expression and Privacy
Defending encryption is a human rights issue, according to a new Amnesty International report. The report calls on nation-states to promote the use of encryption tools as part of their international human rights obligations to protect the privacy of their populations.
National Security Agency (NSA) director Michael S. Rogers adamantly refused on Thursday to say whether Hillary Clinton’s private email server was ever hacked.
“It’s something I’m just not going to get into,” Rogers told Yahoo! News’ Michael Isikoff when asked in an interview if Clinton’s server was ever compromised.
The American government built underwater drones in the 1990s to tap into fiber-optics cables, he claims.
[...]
He later called it a "new series of fiber optic [remotely operated vehicles]."
Edward Snowden, who knows some things about secrets, called the disclosure "probably the most incredible leak of compartmented [top secret] material I've ever seen on LinkedIn."
IT systems in both the public and private sectors are woefully unprepared for an environment in which cyberthreats are becoming more constant and complex, according to Curtis Dukes, director of the National Security Agency’s Information Assurance Directorate.
The FBI’s request was part of a sustained government effort to exercise novel law enforcement power.
The government insisted that its effort to force Apple to help break into an iPhone as part of the investigation into the 2015 San Bernardino shootings was just about that one case. Even though the FBI no longer needs Apple’s help in that case, the FBI’s request was part of a sustained government effort to exercise novel law enforcement power.
The TOR Project has expressed its commitment to researching and developing new ways to mitigate the threats of security failure. Meanwhile, if TOR developers are asked to deploy some backdoor in the software, they would rather resign than honor the request.
The intelligence community is close to completing a plan to let the National Security Agency share more of the raw data it collects with other U.S. spy agencies, a system that would put an end to more than a decade of wrangling among the different organizations.
This would allow the FBI, for instance, to use NSA-gathered information to investigate crimes that have nothing to do with terrorism.
A top lawyer for the nation’s intelligence agencies is pushing back on mounting criticism about new plans to widely share intercepted data throughout the federal government.
Robert Litt, the general counsel for the Office of the Director of National Intelligence, confirmed that the change in policy is “in the final stages of development and approval” in a post on national security legal blog Just Security on Wednesday.
But Litt denied allegations that the change would allow the FBI and other agencies to use the sensitive data for domestic law enforcement matters, which members of Congress had speculated could be unconstitutional.
“There will be no greater access to signals intelligence information for law enforcement purposes than there is today,” Litt claimed in his blog post. “These procedures will only ensure that other elements of the intelligence community will be able to make use of this signals intelligence if it is relevant to their intelligence mission.”
Yesterday, at the excellent RightsCon event in San Francisco, Senator Ron Wyden gave a barn burnder of a speech, in which he detailed why it was so important to protect our privacy and security in a digital age, at a time when law enforcement and the intelligence communities are digging deeper and deeper into all of our personal information.
America makes a lot of questionable decisions, and when we do, the world is quick to call us out on it. For example, remember that time we impeached our president over an extramarital affair and countries lined up to express their amusement over the fact that we'd take such drastic steps over a relatively minor thing?
I'm not sure people are going to be more comforted that people are carrying guns they can't see, especially not US law enforcement, which has already demonstrated it fears cell phones as much as it fears guns.
Black Lives Matter activists are planning a protest in Minneapolis tonight after Hennepin County Attorney Mike Freeman announced no charges will be filed against the two Minneapolis police officers involved in the shooting death last fall of Jamar Clark, an unarmed 24-year-old African American. Clark was shot in the head after a scuffle with officers who responded to a report of an assault. In announcing the decision, Freeman rejected claims by multiple witnesses that Clark was shot while handcuffed. Freeman also claimed Clark placed his hand on an officer’s gun during the scuffle. Clark’s death sparked a series of protests in Minneapolis.
Opponents call it "the Bathroom Bill." In a special session last week, the North Carolina state legislature passed HB2, officially called the Public Facilities Privacy and Security Act. Gov. Pat McCrory signed the law that night. The new law denies transgender people use of the bathroom, changing room or locker room that matches their gender identity. Resistance to the bill is fierce, and growing daily.
To make clear their rights, the ACLU has just released a Know Your Rights guide for women and girls who wear hijab.
Libraries and schools are supposed to be inclusive spaces for learning, growing, and tolerance. But two women last week — one in California, one in D.C. — learned these safe spaces do not always live up to their reputation.
The first year was hard. While my husband enjoyed his new position at the university, I was having a difficult time finding work in my field — civil rights. I took up cooking and working out, trying to keep up with these very elegant Southern moms who always looked well-manicured. I even joined the PTA. At my first meeting, I was approached by someone who appeared to be the head lady of the group.
“What church do you go to?” she asked, smiling from ear to ear.
“Church? Oh. Uh. I don’t. I’m Muslim.”
British hacker Lauri Love stands accused of causing "millions of dollars" in damages to US government computers -- charges he's been facing for more than two years. These charges originate in the US, but it's the UK that's been trying to get Love to give up his encryption keys for the past couple of years.
Under RIPA (Regulation of Investigatory Powers Act of 2000), the UK government can charge Love with "failure to cooperate" by refusing to comply with the order to decrypt files. To date it has not done so, despite Love blowing off its demands since the middle of February 2014.
At a court hearing earlier this month, the UK's National Crime Authority (NCA) demanded that Lauri Love, a British computer scientist who allegedly broke into US government networks and caused "millions of dollars in damage," decrypt his laptop and other devices impounded by the NCA in 2013, leading some experts to warn that a decision in the government's favor could set a worrisome precedent for journalists and whistleblowers.
Arrested in 2013 for the alleged intrusions but subsequently released, Love was re-arrested in 2015 and is currently fighting extradition to the United States. He has so far refused to comply with a Section 49 RIPA notice to decrypt the devices, a refusal that carries potential jail time. However, British authorities have not charged Love with any crime, leading him to counter-sue in civil court for the return of his devices.
Another indigenous environmentalist has been murdered in Honduras, less than two weeks after the assassination of renowned activist Berta Cáceres. Nelson García was shot to death Tuesday after returning home from helping indigenous people who had been displaced in a mass eviction by Honduran security forces. García was a member of COPINH, the Civic Council of Popular and Indigenous Organizations of Honduras, co-founded by Berta Cáceres, who won the prestigious Goldman Environmental Prize last year for her decade-long fight against the Agua Zarca Dam, a project planned along a river sacred to the indigenous Lenca people. She was shot to death at her home on March 3. On Thursday, thousands converged in Tegucigalpa for the start of a mobilization to demand justice for Berta Cáceres and an end to what they say is a culture of repression and impunity linked to the Honduran government’s support for corporate interests. At the same time, hundreds of people, most of them women, gathered outside the Honduran Mission to the United Nations chanting "Berta no se murió; se multiplicó – Berta didn’t die; she multiplied." We speak with Cáceres’s daughter, Bertha Zúniga Cáceres, and with Lilian Esperanza López Benítez, the financial coordinator of COPINH.
Describing a backdrop of long-term US “meddling” in Honduras, Caceres spoken out publicly in 2014 against Hillary Clinton’s role as US Secretary of State in the 2009 coup that ousted Honduran president Manuel Zelaya and opened what the Goldman Prize website described as the “explosive growth in environmentally destructive megaprojects that would displace indigenous communities.”
Turkish President Recep Tayyip Erdogan is visiting Washington, D.C. this week — and his security team has brought along some of its tactics for shutting down dissent and free speech.
Outside a planned speech at the Brookings Institution on Thursday, confrontations between protesters and Erdogan’s guards devolved into violence. Eyewitnesses reported that Turkish security forcibly removed one journalist from the scene, while another was kicked and a third was thrown to the sidewalk. Inside the event, journalists reported being forced to leave by Turkish security.
Cherelle Baldwin has been freed after a 12-member jury in Bridgeport, Connecticut found her not guilty of murder in the death of her abusive ex-boyfriend, Jeffrey Brown. According to the Huffington Post, Baldwin “collapsed to the floor in tears as the verdict was announced,” crying, “My baby will have his mommy back.”
EFF’s efforts to fix holes in oversight of the California Law Enforcement Telecommunications System (CLETS) are paying off.
New data and records released by California Department of Justice (CADOJ) show a steep increase in the number of agencies disclosing cases of abuse of the state's network of law enforcement databases—a major victory for transparency and law enforcement accountability.
Last year, EFF identified major failures in how a CADOJ committee charged with overseeing the system—the CLETS Advisory Committee (CAC)—reviews misuse investigations. The body, EFF found, had failed to follow established procedures for disciplining users who break access rules, leading to a 100% increase in reported misuse since 2010.
The cops raided my wife's pediatric practice looking for a fugitive, last week.
Actually, let's put the word "fugitive" in quotes. The story is an eye-opening tale in itself. It's also a glimpse at how business-as-usual in courts and cop shops around the country screws with people's lives and alienates the public from those who are allegedly their protectors.
My wife, Dr. Wendy Tuccille, was on her way to the office in Cottonwood, Arizona, when her phone rang. Frantic staff called to tell her that the clinic's parking lot was full of cops, there to arrest one of her employees, C.H. (it's a small town so we'll stick with her initials), on an outstanding warrant.
When my wife arrived she found a gaggle of cops—12 to 15 she told me, some in battle jammies—in plain view at the rear corner of the building. The parking lot was full of police vehicles, in sight of families and children arriving to be seen and treated.
We all know now that the Internet began as a US government project. Administration of parts of it was eventually outsourced, first to Network Solutions Inc and then to a non-profit corporation created just for the task: ICANN (the Internet Corporation for Assigned Names and Numbers). ICANN operates autonomously, but under a contract from the US government, specifically from the NTIA (National Telecommunications and Information Administration) in the US Department of Commerce.
Following the UK Supreme Court’s judgment in the Trunki design dispute, Managing IP summarises practical tips from UK practitioners on filing designs and eight lessons from the judgment
Anti-piracy cash settlement outfit Rightscorp has just announced a net loss of $3.5m for its operations during 2015. Interestingly the company cites a number of reasons, some of them cryptic, for decreasing revenues. Alongside the mysterious "shutting down" of unnamed file-sharing infrastructure, VPN use and ISP reluctance to assist trolling are major factors.