A man appears to have deleted his entire company with one mistaken piece of code.
By accidentally telling his computer to delete everything in his servers, hosting provider Marco Marsala has seemingly removed all trace of his company and the websites that he looks after for his customers.
Mr Marsala wrote on a forum for server experts called Server Fault that he was now stuck after having accidentally run destructive code on his own computers. But far from advising them how to fix it, most experts informed him that he had just accidentally deleted the data of his company and its clients, and in so doing had probably destroyed his entire company with just one line of code.
The owner of a web host has unwittingly deleted his customers data after executing a powerful line of code on his servers.
Marco Marsala has appealed for help to recover his punters' info after accidentally running a Bash script on his Linux servers via Ansible.
Mark Shuttleworth said in an interview published today that Linux would be difficult to use everyday if not for Ubuntu. Elsewhere, Patrick Volkerding announced Slackware 14.2 RC2 and one sysadmin had a real bad day after accidentally running rm -rf. Reiserfs creator and convicted murderer Hans Reiser is featured in a new motion picture that's getting mixed reviews and Neil Rickert shared his thoughts on btrfs.
New contributors to OpenStack are welcome, but having a road map for navigating within this maturing, fast-paced open source community doesn't hurt. At OpenStack Summit in Austin, Paul Belanger (Red Hat, Inc.), Elizabeth K. Joseph (HPE), and Christopher Aedo (IBM) will lead a session on OpenStack Infrastructure for Beginners. In this interview, they offer tips and resources to help onboard new OpenStack contributors.
The biggest news about Docker 1.11 isn't features in the application, but that it uses component versions standardized under the aegis of the Open Container Project.
The Open Container Initiative (OCI) has taken the next step in establishing a standards base for the emerging container ecosystem. The organization has launched a project to establish a container image format specification.
Docker has issued a report based on a survey of more than 500 people currently using and deploying container technology in various stages. The full report, “Evolution of the Modern Software Supply Chain” is available here: https://www.docker.com/survey-2016
The report sheds light on container technology in general as well as how Docker is fitting in in the ecosystem. Among other findings, the report noted that Docker is central to many hybrid cloud/multi-cloud strategies. In fact 80 percent of respondents using Docker describe it as part of their cloud strategy for a variety of reasons including migration, hybrid cloud portability and avoiding lock-in to a single cloud vendor.
With Weave Net 1.5, officially released today, Weave Net goes beyond its Docker container roots. That said, Docker and CNI are not exactly polar opposites either. Weaveworks COO Mathew Lodge explained to Enterprise Networking Planet that CNI and Docker Networking (libnetwork) have similar aims.
"Libnetwork enables Docker Networking for the Docker platform, including the entire Docker toolchain such as Swarm, UCP and others," Lodge said.
This guide lists 10 Linux commands that you need to know in order to be able to navigate around your file system using the Linux terminal.
It provides commands to find out which directory you are in, which directory you were previously in, how to navigate to other folders, how to get back home, how to create files and folders, how to create links
In short: Novelist Stephen Elliott (James Franco) find himself drawn to the high-profile Hans Reiser (Christian Slater) murder trial - a case that brings him closer to his own troubled past with father (Ed Harris). Amber Heard, Wilmer Valderrama and Cynthia Nixon also star. (Watch the trailer)
While Romanowsky gamely tries to negotiate the same structural tricks as the book, which employed the Reiser case as a base camp from which the author could depart and return, in the film it feels more like a subplot despite the cinematic tricks -- the cross-cutting and slo-mo flashbacks -- that the director uses to try to connect the stories. At times it feels flat, other times risible, and only occasionally do the stories resonate in any kind of harmony.
Short version — I will continue to use “ext4” in future installs.
Note that this a personal view, not a recommendation. My own choice depends on how I use computers and my practices for backup, recovery, etc. Your practices are likely different. Much of this post will be about my considerations in deciding against “btrfs” for my own use.
Collabora's Emil Velikov has published details about the availability of the RC (Release Candidate) build for the upcoming point release for Mesa 3D 11.2 Graphics Library.
One of the new set of patches published this week for the Intel DRM kernel graphics driver is for engine reset and recovery support for Broadwell "Gen8" graphics hardware and newer under Linux.
Now with the new Apache HTTP 2.4.20 update, there are some incremental improvements, most notably in HTTP2 support.
Since mid-2015 we were using the dep11-generator in Debian to build AppStream metadata about available software components in the distribution.
Last night I found time to finally install the first release candidate of Volumio 2, my preferred audio player software. This is more exciting than it sounds, because when I read the blogpost last summer that Volumio is going to be completely rewritten, with replacing the base technologies, I was a bit afraid that this will be one of the last bits that we heard from this project. Too many cool projects died after famous last announcements like that.
Kovid Goyal, the developer of the open-source and cross-platform Calibre ebook library management software, has announced today, April 15, 2016, the release of the Calibre 2.55 update for all supported platforms.
The final release of the Clementine 1.3 open-source and multiplatform music player software has debuted today for all supported operating systems, bringing dozens of new features and improvements over previous versions.
Yesterday, Gammu 1.37.1 and Gammu 1.37.2 have been released. As usual it collects bug fixes and minor improvements.
Opera Software, through Aneta Reluga, has announced the availability of a new Beta build for the upcoming Opera 37 web browser, which promises to introduce some unique new features.
Notes is a clone of the official Mac and iOS Notes app, except that there are also versions that run on Microsoft Windows and Linux.
The Wine developers have just announced today, April 15, 2016, the release of the eighth milestone towards the 2.0 stable branch of the free implementation of Windows on Unix software.
It's always good to get things reconfirmed near the main release. Dambuster has confirmed Linux gamers haven't been forgotten about for Homefront: The Revolution.
If you read GOL often, you would have already known that Homefront: The Revolution was coming to Linux. It was originally planned to be a day-1 release, but then it wasn't so clear and now it seems for sure it's not until after the initial release.
I'm really excited to give this one a go, as it looks awesome, but I couldn't get the beta to work right. I am hoping the Linux release is nice and polished.
The newest game in the Heavy Gear series built with Unreal Engine 4 is heading to Linux, the developers shared two images of the game running on Linux. Quite exciting, as it looks pretty good.
Well, not long after someone reported the issue to Valve from my benchmarks, the performance penalty of using Vulkan with the Steam Overlay seems to be mostly fixed.
Stellaris, the soon to be released space strategy from Paradox is now available to pre-order and it also has a new trailer.
Virtual Programming have released their latest Linux ports, and today we are graced with the crazy Saints Row 2 & Saints Row: The Third. They are also now on sale.
We have some great news today for Linux gamers, as developer Volition just announced the availability of the Saints Row 2 and Saints Row: The Third titles for the Linux and SteamOS platforms.
As you probably are aware already, the Linux port of Saints Row IV, the latest installment in Volition's open-world franchise, was officially announced last Christmas, so it was the right move for the developers to bring the rest of the series to the Linux gaming community.
Now that I've had a chance to play some Saints Row 2 on Linux (purchased personally), here are some thoughts on the performance.
A much nicer start up than Saints Row 2, it has proper mouse support! Looks like when it was originally created they put at least a little more thought into the PC version.
KTorrent for KF5 is available officially, please spread the news.
One known issue that struck many people is downloading to ntfs partition being slow even on ssd (!) and causing ui unresponsiveness (the root cause is inside ntfs driver). In the next release i will introduce an autodetection of ntfs and suggestion to download to a non-ntfs partition with moving files to ntfs after download finishes.
Andy Updegrove wrote yesterday, "The top IT companies are increasingly opting to use open source software to solve problems that they used to address with open standards." Elsewhere, Larry the BSD Guy said UbuntuBSD should consider what happened to Kubuntu when considering becoming an official Ubuntu flavor and Jesse Afolabi was "blown away" by Deepin OS 15. Jonathan Riddell announced a new rebasing of KDE Neon and Bruce Byfield looks at the Free Software Foundation's High Priority Projects.
KDE developer David Rosca has recently talked about the improvements coming to the Audio Volume applet of the KDE Plasma 5 desktop environment, which should be implemented in the next update.
KDE neon is a package archive of KDE software built on a stable foundation. We use Ubuntu because it’s good technology that we’re familiar with and which provides a Long Term Support foundation we can use. When we started the only practical version to use at the start was 15.10 so our packages have been built using that. But with 16.04LTS due out next week it’s time to move to a solid foundation where we expect to stay for the next couple of years.
Ex-Kubuntu maintainer Jonathan Riddell has announced the upgrade of the KDE Neon base packages from Ubuntu 15.10 (Wily Werewolf) to the upcoming Ubuntu 16.04 LTS (Xenial Xerus) branch.
The developer introduced the KDE Neon project to the Linux community at the end of January, during the FOSDEM (Free and Open Source Software Developers' European Meeting) 2016 event, which was welcomed in particular by those who love having the latest KDE technologies on top of an Ubuntu Linux base.
Qt 5.7 continues moving along and due to the concurrent release work with the much-delayed Qt 5.6 that finally shipped in March, the Qt 5.7 beta is already imminent.
The Qt Company today uploaded Qt 5.7 beta packages for Windows, Linux, Mac, and then the source packages. These Qt 5.7.0 beta packages will be promoted to being the official beta in a few days time if no serious bugs are discovered by early testers.
The chemistry created by the Kolab Systems-Collabora Productivity partnership enabled CloudSuite, the first 100% open-source, enterprise-grade cloud office suite. Kolab Systems' contribution is its Kolab open-source groupware and collaboration framework; Collabora Productivity is the architect behind LibreOffice Online, the cloud-based office productivity suite. The integration of CloudSuite into Kolab allows users to work on documents simultaneously using a full-featured on-line office suite.
The GNOME 3.20 desktop environment has just received its first point release, version 3.20.1, bringing numerous small improvements to various of the project's core components and apps.
Finally there are now stable builds of the Gnome 3.20 runtime. I updated the Runtime wiki page with details on how to install it.
This has been a long time coming, because this new runtime as well as the freedesktop.org runtime that it is based is built in a new way. It used to be built with a custom script, but now it uses the new xdg-app-builder tool. This makes it a lot cleaner and easier to maintain.
The GNOME apps are ready to go for you. Let them help you find your location, check the weather, play your music, and view your photos. Each app has come a long way since inception and are outstanding additions to the usual set of desktop tools. GNOME Maps is no exception...it’s incredibly handy and one of the easiest desktop map tools you’ll ever come across.
A few days ago, I set out to get some experience with building an application as an xdg-app. In this post, I’m collecting some of the lessons I learned.
Since I didn’t want pick a too easy test case, I chose terminix, a promising terminal emulator for GNOME. Terminix uses GTK+ and vte, which means that most dependencies are already present in the GNOME runtime.
Hey everybody,
the release schedule for GNOME 3.21/3.22 is out:
https://wiki.gnome.org/ThreePointTwentyone
There also an ICS file available for your calendar, and it's also linked from https://wiki.gnome.org/MaintainersCorner
Cheers, andre
GNOME 3.20.1 is out today as the latest stable version of the GNOME desktop environment.
GNOME 3.20.1 comes with various bug fixes and translation updates compared to GNOME 3.20 that shipped last month with many shiny features.
The GNOME 3.22 release schedule has been finalized.
You can see the GNOME 3.22 release schedule via wiki.gnome.org. Andre Klapper had posted to the desktop-devel-list this morning to say the schedule is out there.
But if GNOME’s designers manage to implement a proposed top-to-bottom redesign of the app comes, that could change.
When it comes to CPU workloads, stunning in our Linux distribution comparisons has been Intel's Clear Linux distribution. This Intel Open-Source Technology Center project has led many of our distribution / OS comparisons with Intel engineers investing heavily in performance optimizations via AutoFDO, LTO-optimized binaries, aggressive compiler flags by default, and more. But how does the OpenGL performance compare for Clear Linux? Here are some graphics benchmarks and in select cases the results are quite a surprise.
It is a great moment to us and we are very proud to release the 100th Core Update today.
This update will bring you IPFire 2.19 which we release for 64 bit on Intel (x86_64) for the first time. This release was delayed by the various security vulnerabilities in openssl and glibc, but is packed with many improvements under the hood and various bug fixes.
Michael Tremer today, April 14, 2016, announced the release and immediate availability for download of the 100th Core Update of the IPFire 2.19 Linux kernel-based firewall distribution.
The Manjaro development team has announced the general availability of a new update pack for the Manjaro Linux 15.12 (Capella) operating system, urging users to update as soon as possible.
I, along with other members of the openSUSE community, were fortunate enough to attend Rather’s keynote speech. Rather, who came from a small farming town in Texas and whose father was a ditch digger, credits self-determination, his wife and great teachers, who believe and care about students, as a key to his prosperity.
It seems to be difficult in the last weeks to find really interesting new features to write about. The fact that Plasma 5.6 and GNOME 3.20 are already available takes a lot of wind out of the sails. So a request to all of you: keep the things coming
I am running openSUSE Leap 42.1 in a Vagrant box and while I had to debug a small executable file, I came across a message prompting me to install the glibc-debuginfo-2.19-19.1.x86_64 package.
The upcoming Open Build Service (OBS) 2.7 release will deliver massive improvements to the way we are dealing with git sources for builds.
OBS was designed for Linux distribution creation, not software development. In your typical distribution creation work flow you get a new upstream release in the form of a tar ball from time to time, and you add patches on top of that for local fixes. Nowadays the OBS is also used for development of software projects not in the context of a distribution. That work flow has completely different requirements: for every commit a new build, developers want continuous builds.
After announcing yesterday the release of Slackware-based SlackEX Build 160413 distro, Linux developer Arne Exton is back today, April 14, 2016, with a new version of his CRUX-based CruxEX operating system.
Slackware developer Patrick Volkerding has rolled out the second RC (Release Candidate) version of Slackware 14.2 to early adopters with a clear indication that this new build is likely to become the final shipping version of the anticipated Linux OS.
In my first month at Red Hat, we made several significant decisions, some I was not involved in. I recognized then that an organization allowed to see things in the market and respond quickly, without an order coming down the chain of command, has the ability to be extremely competitive. What's more, because people feel empowered to act, they're more engaged.
We don't experience change management problems the way other organizations do. While being open means including more people and weighing their feedback, all of which can take time, once we've made a decision at Red Hat, things happen quickly. I would say we spend more time in the decision-making process so that once decisions are made, execution is fast.
...slow down music in order to transcribe it
On behalf of the fedora KDE SIG, I'd like to personally thank everyone involved in contributing to help make this happen. Special kudos to Helio Chissini de Castro for initial COPR setup, hard work on Qt prelease packaging, upstream poking, and general awesomeness.
This part was just me by myself coming up with an initial proposal for discussion. I think brainstorming as a team effort produces the best results – here I took some initial direction from the team in terms of what they wanted, the look they were going for, the symbols they wanted embedded in the logo. The initial concept in the first frame reflects that opening conversation – they wanted the logo to relate to carbon, they wanted something clean (the Ansible logo was brought up as an example of a style they liked), and they wanted it to somehow depict interoperability.
There’s a few outstanding issues folks might hit, but we figured it was finally time to push to stable. If you use includes for handlers you might hit ( https://github.com/ansible/ansible/issues/13485 ). This one will be fixed in 2.1 by allowing you to add a config option to set includes as static or dynamic. Also, you might see some intermittent issues with some hosts saying “unable to resolve remote temp directory” ( https://github.com/ansible/ansible/issues/13876 ). Hopefully this will be fixed in 2.0.2.0, and there are some workarounds in the issue.
The developers behind the Debian-based Parsix GNU/Linux distribution have officially ended support for the Parsix GNU/Linux 8.0 (Mumble) release, starting today, April 16 2016.
Our good friends at Softpedia reported last week that the fledgling UbuntuBSD variant could be seeking the imprimatur from Canonical and become an official Ubuntu “flavor.”
Jon Boden, the lead developer of UbuntuBSD, submitted a post on the Ubuntu developers’ discussion list to let them know that he would “like to contribute all my work to Ubuntu Community and, if you think it is worthy, make ubuntuBSD an official Ubuntu project like Xubuntu or Edubuntu.”
The launch of the highly anticipated Ubuntu 16.04 LTS (Xenial Xerus) operating system is upon us, and now Canonical has just announced that the GNU/Linux distro has entered final freeze.
On April 14, 2016, Adam Conrad announced that the "Final Freeze" development state was in effect for Ubuntu 16.04 LTS. This means that there will be no new features added to the upcoming operating system, nor major changes will happen until its official launch next week, on April 21, 2016, with the exception of critical bugs.
Time flies when you're having fun testing the latest release of Ubuntu Linux, which we've been using on some of our computers since the beginning of the year to keep up with all the changes Canonical had planned for its next LTS (Long Term Support) release of Ubuntu, and share the highlights with our readers.
The next version of Ubuntu system, expected next week, will facilitate the management of applications with the Snap format.
The LTS versions (Long Term Support) Ubuntu have a support five years. They are mainly for businesses but also to users not wishing to necessarily update their equipment and wanting to have a stable OS. But the applications of support was not optimal.
One of the (few) sucky things about sticking with an Ubuntu LTS release is when newer versions of apps you love are released and you can’t install them.
Well, prepare to bid that pang of disappointment goodbye.
Ubuntu 16.04 LTS will come with support for Canonical’s (relatively new) Snap packaging format.
Snaps are the aspirin to the headache of dependency-addled app upgrades.
If you’ve been following Canonical/Ubuntu at all, you’re probably aware of the announcement of their first Ubuntu Tablet, the Aquaris M10 Ubuntu Edition. It is being produced by the manufacturer that made one of Canonical’s first Ubuntu phones, BQ, headquartered out of Spain. Currently there are two versions to choose from: The FHD (Full HD) and regular HD versions.
In my ongoing quest to interview the leadership of every Linux distribution on the planet (see my interviews with the heads of elementary, Fedora and openSUSE) I reached out to the top dog in the Ubuntu world: Mark Shuttleworth.
This is not a hard-hitting, no-holds-barred sort of interview. It’s just a casual chat to hear about Ubuntu from the guy that started it and hopefully, in the process, get to know him a little better.
What follows are his unedited answers. I have some opinions (both good and bad) about Mark's answers—and I expect most of you will, too. But I'm going to keep them to myself here. I'll let his answers speak for themselves without much commentary from me.
Just a few minutes ago, Canonical informed the Snappy Ubuntu community about the general availability of the Snapcraft 2.8 release in the default repositories of the Ubuntu 16.04 LTS (Xenial Xerus) operating system.
As Canonical cloud marketing manager Bill Bauman said, "Ubuntu OpenStack continues to dominate the majority of deployments with 55 percent of production OpenStack clouds."The previous survey showed Ubuntu OpenStack at 33 percent of production clouds. Ubuntu has seen almost 67 percent growth in an area where Ubuntu was already the market leader. These numbers are a huge testament to the community support Ubuntu OpenStack receives every day."
LXC and LXD, two of the newest open source container platforms, can seem as difficult to understand as IRS tax rules. But they're not actually that complicated. Keep reading for an explanation of LXC, what makes it different from LXD and what both platforms have to do with Linux, Canonical and Ubuntu.
OEMs are building some impressively small computers these days, but not many of them pack an entire PC into a package the size of a Nintendo DS like this one does.
This is the latest amazing project to come from Chris Robinson over at NODE. It’s basically a miniaturized laptop — it has a full-color LCD display, QWERTY keyboard, and a battery — built around a Raspberry Pi 2 board.
If you’re into electronics DIY stuff, you’ve probably worked with Raspberry Pi and Arduino. While they could be used to solve similar problems at many occasions, they are quite different. For beginners, Arduino is a microcontroller — a single component of a computer — and Raspberry is a fully functional computer.
Till now, Arduino IDE and Raspberry Pi existed miles apart from each other. However, finally, the experimental builds of Arduino IDE for Raspberry and other ARM devices are now available.
This open source Arduino software makes it easier to write code and upload it to your board. Written in Java, this software could be used with any Arduino board in the market.
Aaeon’s UP board, an Atom-based RPi lookalike, has finally been completed, with shipments in May. There’s also a new 4GB RAM version and other changes.
Aaeon Europe, a subsidiary of Asus, had huge success on Kickstarter last fall with its Intel Atom-based UP board, raising €105,117 from 671 backers. It was originally intended to ship in February, but as is so often the case with crowdsourced hardware, the project has slipped. The good news for backers and others who want to buy the board starting at $89, is that the final PCB has been completed, and boards are expected to start shipping the first week of May.
Raspberry Pi is one of the most loved devices used by electronics DIY-enthusiasts. People have used their Pi to create amazing things like PiPhone, a smart temperature controller, Pirate FM Radio Station and more.
While OEMs like Apple and Samsung are busy making their notebooks thinner, you can go one step ahead and create a Linux computer packaged into the size of a Nintendo DS.
This amazing tutorial was originally shared by Chris Robinson from NODE who basically built a miniature laptop with the help of Raspberry Pi 2, QWERTY keyboard, color LCD display, and a battery.
For those making use of DPI panels with the Raspberry Pi but haven't been able to try out the open-source VC4 driver stack rather than the binary blob due to its lack of DPI support, that is changing in Linux 4.7.
Eric Anholt at Broadcom mailed out his latest DRM-VC4-Next changes for the DRM-Next tree that in turn is being queued up for Linux 4.7. The most prominent change with this -next tree is adding DPI panel support for the VC4 driver. There is also minor bug fixes.
Udoo has surpassed its Kickstarter goal for a “Udoo X86” hacker SBC with a quad-core Braswell SoC, 4GB RAM, and Arduino compatibility via a Curie module.
Seco’s Udoo.org project has won Kickstarter funding for the Udoo X86, the third community-backed, x86 based hacker-friendly single board computer we’ve seen that’s not backed by Intel or AMD. With its Intel Braswell processor, it appears to also be the fastest x86 hacker board around. Like the Intel MinnowBoard Max and AMD Gizmo 2 boards, but unlike the third-party Jaguar Electronics JaguarBoard and the newly updated UP board from Aaeon, it comes with promises of fully open spec hardware.
React Native is a fast growing JavaScript framework which enables developers to create cross-platform apps. At its recent F8 developer conference, Facebook announced that React Native support is coming to major operating systems as an open source project. The SDK has already been made available for iOS and Android developers.
The HTC 10 takes the HTC design formula and distills it down to its purest form. There's nothing but excellent smartphone here—no silly gimmicks or odd design decisions. Even the software was treated rather well, with any curiosities relegated to optional parts of the OS that can be turned off or replaced.
HTC really seems to have taken the feedback from the One M9 to heart. The design is much more compact with less bezel dead space dedicated to speakers and an HTC logo. The SoC is improved by dumping one of the first and hottest Snapdragon 810 implementations for the cooler, faster 820. The ugly side ridge design of the M9 is gone. The camera is a lot better too, particularly when it comes to low light.
The HTC 10 is more than a solid bet if you’re looking for a nice, reliable Android smartphone. If you typically stream music and video from your phone, it’s an especially great choice given its impressive speakers and sharp screen. Photography enthusiasts might not be blown away by the 10, but its camera is satisfactory enough for most casual users. The software is clean and easy to navigate, providing an experience that’s much more delightful than phones loaded with bloatware.
Japanese manufacturer Sharp has taken the unusual step of launching a small robot that doubles as an Android cellphone. First previewed at last year’s CEATEC trade show, the so-called RoboHon was given an official press launch today, where its retail price of 198,000 yen ($1,814) was finally revealed.
Costing over twice as much as even the most premium Android flagships, RoboHon — currently only for sale in Japan, with foreign launches being explored — aims to compete not on specs, but on a unique set of features not found in other phones that don’t also happen to be small automatons. Running Android Lollipop 5.0 and powered by a Qualcomm Snapdragon 400, the foot-tall bot features just a two-inch, QVGA display on its back, along with a 720p projector embedded in its head.
Multiwindow is shaping up to be the next big thing to hit Android in recent times. It will finally allow tablets an edge over their phablet counterparts, giving them better use of their increased screen real estate.
HTC Boost+ is a new -- beta -- tweaking application by HTC that the company has released to Google's Play Store for devices running Android.
The new application is available for all devices running Android 5.0 or higher regardless of whether they have been manufactured by HTC.
Android retention rates compare favorably to iPhone retention rates.
Android N Developer Preview 2 has landed, with new features for developers to incorporate in their apps.
More than five years after the EU opened the search probe, it’s still weighing whether to fine Google or order it to change its business practices. In previous antitrust cases, the EU has forced Microsoft Corp. and Intel Corp. to pay billions of euros in fines.
But publishing source code could also let attackers “construct highly targeted attacks against the software,” or “build-in malware directly into the source code, compile, then replace key software components as 'doppelgangers' of the original,” DHS’ Office of the Chief Information Officer argued in comments posted on GitHub.
Writing a myth-debunking piece for such an informed audience poses a certain risk. The readers of the IEEE Software Blog already know what open source software is, and many have probably written some. How can I be sure that anyone reading this even holds the belief about to be debunked?
ownCloud, Inc. has had the great pleasure of announcing the availability of the Enterprise Edition (EE) of its powerful ownCloud 9.0 self-hosting cloud server solution.
Engineered exclusively for small and medium-sized business, as well as major organizations and enterprises, ownCloud 9.0 Enterprise Edition is now available with extensive file control capabilities and all the cool new features that made the open-source version of the project famous amongst Linux users.
Want a solution like Box, Dropbox or Egnyte but one you can deploy everywhere? Feel passionate about open source and want to leverage a community solution? ownCloud might just have something for you.
ownCloud offers an on-premises enterprise file access platform, but one which is an open source solution. The company firmly pitches its wares with stated differentiation through openness, modular architecture, extensibility and federated sharing abilities. So are they onto something here?
Another complementary approach to standards development is the release of designs and specifications into the open source community as open hardware and interface standards for others to adopt. Examples include Arduino, Raspberry Pi, and Beaglebone, which enable quick prototyping, as well as the mangOH open hardware reference design, an open source design that is more easily scalable in commercial settings and is built specifically for IoT cellular connectivity.
Open source platforms like these enable developers that may have limited hardware, wireless or low-level software expertise to start developing IoT applications in days—rather than months. If executed properly, these can significantly reduce the time and effort to get prototypes from paper to production by ensuring that various connectors and sensors work together automatically with no additional coding required. With industrial-grade specifications, these next-generation platforms not only allow quick prototyping, but also rapid industrialization of IoT applications.
When big data mavens debate the merits of using Apache Spark versus Apache Storm for streaming data processing, the argument usually sounds like this: Sure, Storm has great scale and speed, but it's hard to use. Plus, it's slowly being overtaken by Spark, so why go with old and busted when there's new and hot?
That's why Apache Storm 1.0 hopes to turn the ship around, not only by making it faster but by also easier and more convenient to work with.
Are you familiar with Apache Storm? Not everyone is, but it, along with another Apache tool called Flink, is competing with tools like Apache Spark in the Big Data space. These tools focus on streaming data processing, which is emerging as a huge theme in the data analytics world.
The last time I wrote about Apache Wookie was May 2012, on the occasion of the open-source project's 0.10.0 release.
OSM was formed under the auspices of European Telecommunications Standards Institute (ETSI) earlier this year, around the same time as the OPEN-Orchestrator Project (OPEN-O), a Linux Foundation group that is taking a different approach to unified open source-based orchestration efforts.
Slide decks from 41 OpenIoT Summit talks are now online, from sessions including AllSeen, Brillo, mBed, Iotivity, Tizen, Weave, Zephyr, and IoT security.
Last week, we pointed you to 50 slide decks released by the Linux Foundation from the Embedded Linux Conference (ELC), held in San Diego in April 4-6. Now, the non-profit Linux advocacy organization has released 41 more slide presentations, this time from the inaugural OpenIoT Summit track co-located with ELC.
At this point, how much effect the continuing economic backlash caused by the North Carolina General Assembly’s passage HB2, otherwise known as the “Bathroom Bill,” will have on the state’s two major open source conferences is anybody’s guess. Certainly, the past three weeks have not been good for operators of event venues in North Carolina, nor have they been good for the state’s bean counters, whose job is to make what the General Assembly spends balance with incoming tax revenue, which is certainly taking a hit in at least some counties.
ApacheCon is just a few weeks away, and I, for one, am really looking forward to it. I think it's going to be the best yet. I think that every time, and so far, I've been right.
We've been doing ApacheCon for more than 15 years now, and it just keeps getting better. This year it will take place May 9-13 in Vancouver, Canada.
We have some great news for our Linux readers living in the US, as the upcoming LinuxFest Northwest 2016 event is taking place next week, between April 23-24, in Bellingham, WA.
For those of you not in the known, LinuxFest Northwest is an annual event, targeted at novice, intermediate, and advanced Open Source and Linux enthusiasts, that usually takes place on the last weekend of the month of April, in Bellingham, Washington, United States of America (USA).
Google has released Chrome 50 for Windows, OS X, and Linux. The update brings several improvements, as well as bug and security fixes, apart from new features. An update for Android and Chrome OS is also expected to roll out soon.
The Rust team is happy to announce the latest version of Rust, 1.8. Rust is a systems programming language focused on safety, speed, and concurrency.
As always, you can install Rust 1.8 from the appropriate page on our website, and check out the detailed release notes for 1.8 on GitHub. About 1400 patches were landed in this release.
Rust 1.8 has been declared stable by the team working on this increasingly popular programming language focused on safety, speed, and concurrency.
Developing the Internet and defending its openness are key to global growth that is equitable, sustainable, and inclusive. The Internet is most powerful when anyone — regardless of gender or geography — can participate equally.
I was contacted by Mozilla with the request to "police" our forum, since we (Pale Moon devs) are in direct control of the things discussed and posted here.
I'd like to clarify our position on this kind of thing to keep things from becoming unpleasant in both our relationship with you, the community, and our relationship with Mozilla:
We do not censor your posts, and this will not change in the future -- this is an open forum.
Results from the seventh OpenStack Foundation user survey are out, and they paint a picture of a powerful cloud platform that has squarely moved from the evaluation stage at many enterprises to deployment stage. Sixty-five percent of OpenStack deployments are now in production, 33 percent more than a year ago, according to the findings. And 97 percent of community members said that “standardizing on the same open platform and APIs that power a global network of public and private clouds” was one of their top five considerations in choosing OpenStack.
Sharone Zitzman is no stranger to community. As a lead for the Cloudify open source community at GigaSpaces, and an organizer of many local events including OpenStack Israel, DevOps Days Tel Aviv, and the DevOps Israel meetup group, she knows well what it means to be involved with bringing people together for common goals across open source projects.
As reported here earlier this week, the Hortonworks' Hadoop Summit has been underway in Dublin, Ireland, and one of the biggest pieces of news there was that Pivotal, already a player in the Hadoop distribution arena, will be reselling Hortonworks Data Platform (HDP), which is Hortonworks' Hadoop platform. A corollary piece of news is that Pivotal is also shifting from focusing on its own distribution to the Hortonworks platform.
Hortonworks this week announced a series of enterprise security efforts to bolster performance and data safety with its Hortonworks Data Platform.
The company announced Tuesday that Pivotal Software will standardize on Hortonworks' Hadoop distribution. Hortonworks also will resell extract, transform and load tools developed by Syncsort.
The thrust of the Hortonworks' product announcements, which were made in conjunction with its Hadoop Summit, concerned updates on applying security policies and maintaining data governance to simplify the provisioning of clusters in hybrid clouds. Those procedures were designed to make it easier for customers to interactively explore data in Hadoop.
Cumulus Networks, Dell and Red Hat have forged a partnership to bring to DevOps efficiencies to the open source cloud by automating networking and deployment for OpenStack clusters, according to news announced this morning.
Cumulus Networks, the leading provider of Linux networking operating systems, today announced a collaboration with Dell, the leading provider of open and innovative technologies, and Red Hat, Inc., the world's leading provider of open source solutions, to simplify large-scale OpenStack deployments without the need for any proprietary software-defined networking (SDN) fabric solutions. The resulting solution offers an all-Linux OpenStack pod that is easy to install and maintain, and incorporates the latest networking technologies.
There are a lot of different ways to deploy an open-source OpenStack cloud, and one of the best ironically is with OpenStack itself, via a project known as OpenStack on OpenStack (OOO), or just simply TripleO.
The three vendors were able to use such open DevOps tools as Git and Ansible to install and deploy a 300-plus-node OpenStack cluster in six hours.
Volkswagen plumped for an OpenStack-based private cloud to kick-start its new approach and, after a shoot-off between Mirantis and Red Hat, the company opted for the former.
Ubuntu continues to dominate OpenStack deployments, interest in containers is strongly increasing and DevOps remains the top focus of open source clouds. These are among the takeaways from the latest OpenStack user survey, which debuted this week.
My Percona Live Data Performance Conference talk is called ActorDB: an alternative view of a distributed database. ActorDB is an open source database that was developed using a distributed model: it uses an SQL database that speaks the MySQL client/server protocol.
Facebook doesn’t sell software, but it’s arguably the largest open source software company in the world.
In the last few years, the social network has accelerated its contributions to open source, providing not only code it uses in its own operations, such as its artificial intelligence software Torch, but also designs for servers and entire data centers. At the company’s F8 conference for developers and business partners this week, Facebook’s open source leaders announced continued progress on such projects as React Native, which helps developers use the same code on different operating systems.
With GCC 6.1 due out soon with its plethora of new features and improvements, I decided to run some fresh benchmarks this week of GCC 4.9.3 vs. GCC 5.3 vs. GCC 6.0.0 on a Debian stable system.
From the Xeon E3-1280 v5 system with MSI C236A Workstation, I was using Debian 8.4 x86_64 as the base Linux OS for this benchmarking while building clean compilers of GCC 4.9.3, GCC 5.3.0, and GCC 6.0.0 20160410.
In 2008, the Free Software Foundation (FSF) created its list of high-priority projects that "are important for increasing the adoption and use of free software and free software operating systems."
However, the list has been neglected in recent years, to the extent that the page for projects that no longer need to be on the list includes nothing added in the last five years.
Consequently, the FSF is considering ways to reintroduce the list. In the process, it is revealing its own priorities, and how those have changed over the years -- sometimes with unexpected results.
The GNU Compiler Collection (GCC) made it today to having no P1 regressions (the highest priority) and thus they've now branched the code for the GCC 6 series, GCC 7.0 is now on the master branch, and GCC 6.1 should be released next week.
For those still confused by the new GCC versioning scheme, GCC 6.1 will be the first stable release in the GCC 6 series. Jakub Jelinek of Red Hat who is managing the release hopes to ship GCC 6.1 by the end of next week or shortly after that point. A GCC 6.1 RC1 candidate is meanwhile imminent.
The OpenEMR community has released version 4.2.1. This new version is 2014 ONC Certified as a Modular EHR. OpenEMR 4.2.1 has numerous new features including 30 language translations and a patient flow board.
A local government digital service standard has been agreed and published after taking into account the views of council staff in a consultation last month.
The standard is a common approach for local authorities to deliver good quality, user centred, value for money digital services - and is a local government version of the original Government Digital Service Standard used across central government.
The New Zealand Government Open Access and Licensing (NZGOAL) frame work is being extended to incorporate software licensing. The draft below is an initial draft for which we are seeking feedback on. The intention of this extension to NZGOAL is to ensure that publicly funded bespoke software is appropriately licensed to enable reuse by the public as well as government. This should enable more efficient maintenance and improvement, and potentially accelerate innovation going forward.
The Dutch government should set up a resource centre on free software and open standards, says Member of Parliament Astrid Oosenbrug. “There is a serious lack of understanding of these two topics in the government”, the MP says. The centre should remedy this, and Ms Oosenburg has started studying possibilities and options.
Italy’s parliament on Monday will hold a public debate on possible regulations on free and open source software, open standards, open data and open government. The meeting on Monday 18 April is hosted by Mirella Liuzzi, of the Five Star Movement.
The U.S. White House Office of Management and Budget (OMB) is considering a new policy for sharing source code for software created by or for government projects. There’s a lot to love about the proposed policy: it would make it easier for people to find and reuse government software, and explicitly encourages government agencies to prioritize free and open source software options in their procurement decisions.
EFF submitted a comment on the policy through the White House’s GitHub repository (you can also download our comment as a PDF). The OMB is encouraging people to send comments through GitHub, reply to and +1 each other’s comments, and even offer direct edits to the policy via pull requests.
You can submit your own comments regarding this proposal, supporting the FSF's suggestions and adding your own ideas for improvement, through 11:59pm EDT on Monday, April 18, 2016.
Despite its historic significance, Rome’s Tiber River has become extremely polluted. In a bid to clean up the murky, trash-infested waters, deltastudio designed Albula, an interactive floating structure that combines elements from historic water mills with bio-based techniques like phytoremediation. Even better, the Albula is designed as an open-source and scalable project that can be replicated in a variety of contexts.
Last year a new project hit Kickstarter called Mycroft that promises to build an artificial intelligence assistant. The campaign set out to raise $99,000 and raised just shy of $128,000.
Governments should listen to society in order to connect to and be part of an increasingly open world. Open data and citizen participation, rather than organisations and processes, are now the starting point for creating a government that is in close contact with society, knows what is going on, and defines problems and finds solutions in collaboration with society. So say three Dutch public servants in an article just published on Platform Overheid (Platform Government).
My love for Wikimedia started while I was reading an article about the Bangladesh Liberation war on the English Wikipedia after my 10th board exam (like, an annual exam for 10th grade students in America). By mistake I clicked on a link that took me to an India Wikipedia article, and I started reading. Something was written in Odia on the lefthand side of the article, so I clicked on that, and reached a à ¬Âà ¬¾à ¬°à ¬¤/Bhārat article on the Odia Wikipedia. I was excited to find a Wikipedia article in my native language!
The creation of programming languages and platforms is rarely without challenges. A case in point is in the experiences of the community around the Node.js platform. Node.js allows the creation of backend services using JavaScript and a collection of “modules” that handle various core functionality and other core functions. Node.js’ modules use an API designed to reduce the complexity of writing server applications. Node.js’ package ecosystem, npm, is the largest ecosystem of open source libraries in the world.
Easy to program in. No need to recompile, you can hack in as you would in shell. Fun.
The tools, AltDNS and Assetnote, help hackers to automatically identify subdomains and hosts, then generate mobile phone push notifications the minute new possibly-vulnerable domains are published.
Nearly 20 years ago, Monica Lewinsky found herself at the heart of a political storm. Now she’s turned that dark time into a force for good
April is National Poetry Month in the United States and Canada. During April, individuals and institutions take part by reading, sharing, and writing poetry. You can find National Poetry Month events at your local library, your local bookstore, and at many other places. To give National Poetry Month an open source spin, in this article I'll share three open source projects for reading or writing poetry. From reading classical Greek and Roman poetry, to exploring the corpus of Persian poetry, to crafting poems of your own with a handy Android application, these projects take advantage of the creativity of open source to enhance the experience of reading or writing poems.
The Obama administration has released a major new report on how manmade global warming is making Americans sicker—and it's only going to get worse.
Developed over three years and involving approximately 100 climate and public health experts, the 332-page report was based on more than 1,800 published scientific studies and new federal research, and was reviewed by the National Academies of Sciences.
Unless you are living in a black hole aka SCIF, or otherwise totally disconnected from various news outlets, you have likely heard about the numerous vulns that dropped as a series of CVEs better known as ‘badlock’ Tuesday. Well, there is good news for those on Redhat based distros! Patches are already in the default repos for Fedora / RHEL / CentOS.
TL;DR: short URLs produced by bit.ly, goo.gl, and similar services are so short that they can be scanned by brute force. Our scan discovered a large number of Microsoft OneDrive accounts with private documents. Many of these accounts are unlocked and allow anyone to inject malware that will be automatically downloaded to users’ devices. We also discovered many driving directions that reveal sensitive information for identifiable individuals, including their visits to specialized medical facilities, prisons, and adult establishments.
Two security researchers have published research exposing the potential privacy problems connected to using Web address shortening services. When used to share data protected by credentials included in the Web address associated with the content, these services could allow an attacker to gain access to data simply by searching through the entire address space for a URL-shortening service in search of content, because of how predictable and short those addresses are.
Black Hats are the bad guys: cybercriminals (like Russian cybercrime gangs), cyberspies (like the Chinese state-sponsored hackers that broke into OPM), or cyberterrorists (ISIS hackers who want to crash the power grid). They may or may not include cybervandals (like some Anonymous activity) that simply defaces websites. Black Hats are those who want to cause damage or profit at the expense of others.
[...]
The biggest recent debate is “0day sales to the NSA”, which blew up after Stuxnet, and in particular, after Snowden. This is when experts look for bugs/vulnerabilities, but instead of reporting them to the vendor to be fixed (as White Hats typically do), they sell the bugs to the NSA, so the vulnerabilities (call “0days” in this context) can be used to hack computers in intelligence and military operations. Partisans who don’t like the NSA use “Grey Hat” to refer to those who sell 0days to the NSA.
WIRED’s definition is this partisan definition. Kim Zetter has done more to report on Stuxnet than any other journalist, which is why her definition is so narrow.
Severity analysis of vulnerabilities by experts from the information security industry is rarely based on real code review. In the ‘Badlock’ case, most read our CVE descriptions and built up a score representing a risk this CVE poses to a user. There is nothing wrong with this approach if it is done correctly. CVEs are analyzed in isolation; as if no other issue exists. In the case of a ‘Badlock‘ there were eight CVEs. The difference is the fact that one of them was in a foundational component used by most of the code affected by the remaining seven CVEs. That very specific CVE was marked CVE-2015-5370.
Windows operating system has been plagued by ransomware since years, and the attackers have generated millions in revenue. The ransomware is expanding to Mac, Android, and Linux now. It is being said that this year is a critical one in terms of ransomware, and all major operating systems are predicted to get affected. Also, the attackers are constantly working on improving the ransomware, making it harder to deal with.
Werner Koch announced the release today of libgcrypt 1.7, a major update to this general cryptographic library.
Libgcrypt 1.7 adds a nnumber of new hash algorithms, ChaCha20 stream cipher support, various other new algorithms/modes and also some new curves for ECC.
Also on the show: “No US apology for Hiroshima” was many media’s thumbnail of Secretary of State John Kerry’s recent visit to one of the Japanese cities—along with, of course, Nagasaki—where the US killed more than 200,000 people with atomic bombs dropped in 1945. The dominant Hiroshima “narrative”—lamentable but necessary, ultimately saved more than it killed—has remained remarkably unchanged, in good part because of US media’s defense and preservation of it. We discussed that narrative years ago with military and diplomatic historian Sanho Tree, now director of the Drug Policy Project at the Institute for Policy Studies.
Saudi Arabia has for the first time publicly confirmed Malaysia's claim that $681 million in Prime Minister Najib Razak's bank accounts was a donation from the Saudi royal family, countering accusations that the money was siphoned from heavily indebted state investment fund 1MDB.
Saudi Arabian Foreign Minister Adel Al-Jubeir called the money a "genuine donation" in comments Thursday to Malaysian reporters in Istanbul after a meeting with Najib. On Friday, Malaysia's foreign ministry provided a video clip of Al-Jubeir's comments, which Najib's office said vindicate the prime minister, who has faced months of pressure to resign from critics including former Prime Minister Mahathir Mohamad.
Part 2 of our conversation with Marylia Kelley. Her group, the Alliance for Nuclear Accountability, just published a report titled "Trillion Dollar Trainwreck: Out-of-control U.S. nuclear weapons programs accelerate spending, proliferation, health and safety risks."
Perhaps the height of Official Washington’s madness is the casual decision to invest $1 trillion in a new generation of nukes, including a downsized, easy-to-use variety, with almost no debate, a danger that Michael Brenner addresses.
The National Security Archive just got a number of documents on the funding of the Haqqani network, showing it gets (or got) funding from Gulf donations, the Taliban in the tribal lands, and Pakistan’s ISI. A particularly interesting DIA cable describes how a guy named Qabool Khan, on orders of the Haqqani, got a job — thanks to Hamid Karzai’s brother Mahmoud’s influence — running security for the US Salerno and Chapman bases. Along with intelligence about Americans on the base, of the $800 he made for each guard at the base, Khan sent $300 back to the Haqqanis.
This week, SU-24 fighter-bombers buzzed a U.S. destroyer in the Baltic Sea. The Russian planes carried no missiles or bombs.
Message: What are you Americans doing here?
In the South China Sea, U.S. planes overfly, and U.S. warships sail inside, the territorial limits of islets claimed by Beijing.
In South Korea, U.S. forces conduct annual military exercises as warnings to a North Korea that is testing nuclear warheads and long-range missiles that can reach the United States.
IN ITS ANNUAL human rights report on Saudi Arabia, the State Department ignored thousands of civilian casualties from the Saudi-led bombing campaign in Yemen and overlooked the widespread use of illegal cluster munitions by the bombing coalition.
Saudi Arabia launched an air campaign in Yemen last March after Houthi rebels in Yemen threatened the rule of the Saudi-backed president. The Saudi military has been widely criticized for targeting civilians, destroying homes, schools, and hospitals, and using internationally banned cluster munitions.
The Obama administration has supported the Saudi-led campaign throughout, providing the coalition with intelligence and selling them at least $20 billion in weapons since the campaign began in March.
Hillary Clinton calls on women to support her to be the first female President, but all Americans should look carefully at her record advocating bloody, neocon “regime change” wars, says ex-CIA analyst Ray McGovern.
Rules are for fools, and in this case the fools in question are you, me and what’s left of the American democratic system. Obama, in an interview, basically made it clear nobody is going to indict Hillary Clinton for exposing classified material via her unclassified email server, even if it requires made-up rules to let her get away with it.
The president’s comments in an interview last Sunday that “there’s classified and then there’s classified” made clear he imagines national security law allows for ample, self-determined fudge room when exposing classified material.
EU parliament has adopted new rules on the protection of trade secrets, shortly after passing those on data protection, reported by Ars earlier today.
A European Parliament press release explains: "The rules will introduce an EU-wide definition of trade secrets and oblige member states to ensure that victims of the misuse of trade secrets will be able to defend their rights in court and seek compensation. The agreed text also lays down rules on the protection of confidential information during litigation." According to the agreed rules, "trade secret" means information which is "secret, has commercial value because it is secret, and has been subject to reasonable steps to keep it secret."
A controversial issue is the impact the new trade secrets rules will have on whistleblowers and journalists: "MEPs stressed the need to ensure that the legislation does not curb media freedom and pluralism or restrict the work of journalists, in particular with regard to their investigations and the protection of their sources."
However, the Pirate Party MEP, Julia Reda, believes the new rules will harm journalism, writing that they have "created major uncertainties about the role of whistleblowers and investigative journalists. All information, including information about malpractice, can be protected as a trade secret. As a result, the burden of proof that the public interest outweighs the business interest will now always lie with the whistleblower."
One area where whistleblowing is crucially important concerns drug safety. Health Action International (HAI), a non-governmental organisation dedicated to strengthening medicines policy to improve public health, said it was was "deeply disappointed with today’s adoption of the European Union Trade Secrets Directive."
Rejecting calls for a vote to be delayed until the European Commission proposes tougher whistle-blower protections, the European Parliament on 14 April approved by 503-131 new rules giving companies redress for theft or misuse of trade secrets. Debate on the trade secrets directive showed sharp divisions among lawmakers, heightened by the recent “Panama Papers” and other leaks, over whether the legislation will help businesses safeguard their innovative ideas or lead to increased corporate secrecy.
In the end, the voices in favour prevailed, with 503 votes for and only 131 against. The strength of this majority is also fair reflection of the concerns, which were at times overstated. For a start, contrary to the suggestion from the Ecologist, the Directive has no impact on criminal law (this remains entirely a matter for national legislators). Recital 12a also makes clear that national judicial authorities have ample scope for taking account of national sensitivities. I suspect national approaches to whistleblowing and public interest will remain largely unchanged as a result of the Directive, although the impact of the Panama Papers is perhaps harder to predict."
Dr. Margaret Flowers is an environmental activist running for the U.S. Senate in Maryland as a member of the Green Party. In this episode of teleSUR’s “Days of Revolt,” she discusses political stagnation and revolution with Truthdig contributor Chris Hedges.
The two discuss the “corporate stranglehold” on American elections and the oppressive nature of two-party systems. Although she emphasizes the importance of grass-roots movements to incite political change, Flowers also notes that it’s “important to have people inside of the system.”
Secret conversations between American diplomats show how a growing water crisis in the Middle East destabilized the region, helping spark civil wars in Syria and Yemen, and how those water shortages are spreading to the United States.
Classified US cables reviewed by Reveal from the Center for Investigative Reporting show a mounting concern by global political and business leaders that water shortages could spark unrest across the world, with dire consequences.
[...]
The classified diplomatic cables, made public years ago by WikiLeaks, now are providing fresh perspective on how water shortages have helped push Syria and Yemen into civil war, and prompted the king of neighboring Saudi Arabia to direct his country's food companies to scour the globe for farmland. Since then, concerns about the world's freshwater supplies have only accelerated.
It's not just government officials who are worried. In 2009, US Embassy officers visited Nestlé's headquarters in Switzerland, where company executives, who run the world's largest food company and are dependent on freshwater to grow ingredients, provided a grim outlook of the coming years. An embassy official cabled Washington with the subject line, "Tour D'Horizon with Nestle: Forget the Global Financial Crisis, the World Is Running Out of Fresh Water."
Meteorologists on Greenland have recorded a 10 percent melt of the island's sheet ice, beating the record for the earliest date for this level of melting by ‘nearly a month.’
Research, however, shows no significant connection between increasing the minimum wage and jobs. A 2009 analysis of 64 United States minimum-wage studies found “little or no evidence of a negative association between minimum wages and employment.” Likewise, a 2013 Economic Policy Institute (EPI) report found that “Research over the past two decades has shown that, despite skeptics’ claims, modest increases in the minimum wage have little to no negative impact on jobs. In fact, under current labor market conditions, where tepid consumer demand is a major factor holding businesses back from expanding their payrolls, raising the minimum wage can provide a catalyst for new hiring.”
US corporate giants such as Apple, Walmart and General Electric have stashed $1.4tn (€£980bn) in tax havens, despite receiving trillions of dollars in taxpayer support, according to a report by anti-poverty charity Oxfam.
The European Union should consider introducing an EU-wide minimum wage to reduce the incentive for people to immigrate to Britain, Jeremy Corbyn has suggested.
The Labour leader today made his first speech of the EU referendum campaign, arguing that there was a “strong socialist case” for staying in the bloc.
But Mr Corbyn accepted that there were concerns about the impact of migration on the UK – and said changes to wage laws could help reduce perceived pressures.
Some 100,000 Dutch citizens have already signed a petition demanding a referendum on TTIP. 300,000 names are needed to trigger a non-binding vote on the issue, as was the case with the Ukraine plebiscite.
The Socialist Party (Socialistische Partij) is pushing for the referendum. Founded in 1977 as the ‘Communist Party of the Netherlands/Marxist–Leninist’, it won 15 out of 150 seats (10%) in the Dutch Parliament elections in 2012, equivalent to just under 910,000 individual votes.
Spokesman Jasper Van Dijk told EurActiv that the EU-Ukraine referendum had given the campaign, which has lasted a matter of months, added impetus.
NGOs against TTIP were part of the drive, he said, which had excited popular imagination.
Yay, it's tax season again! As our American readers will know, this is the wonderful time of year when we scramble to get all of our taxes and deductions paperwork in order, take them to some storefront that looks like a military recruitment center, push all of those papers in front of someone that looks like they just graduated from college, and scream, "You figure it out!" For our foreign readers, I should explain that we do this because our tax code is more complicated than the plot of Game of Thrones, our tax authorities are every bit as ruthless as that same series, and we've collectively allowed our citizens' payment of due obligations to become a for-profit industry. But seriously, though, come to America. It's great. I swear.
Like every American city in the Age of the 99 Percent, Los Angeles has a significant homeless problem. Full-on shantytowns are now a feature of LA’s urban landscape, with colonies of desperate men and women setting up camps, and building shelters out of tarps, wherever they can find safe space to do so.
A new video is set to spark debate on CETA (the Canada-European Union Comprehensive Economic and Trade Agreement) with the deal on the verge of a vote this year in the European Parliament, where opponents hope it will be defeated.
Today, the Council of Canadians, in partnership with the European Citizens’ Initiative against TTIP and CETA, is launching CETA: Lessons from Canada, a five-minute animation. Using a technique known as “handimation”, the short video gives a comprehensive background on the controversial deal, known to many as TTIP 1.0.
Saudi Arabia has told the Obama administration and members of Congress that it will sell off hundreds of billions of dollars’ worth of American assets held by the kingdom if Congress passes a bill that would allow the Saudi government to be held responsible in American courts for any role in the Sept. 11, 2001, attacks.
The Obama administration has lobbied Congress to block the bill’s passage, according to administration officials and congressional aides from both parties, and the Saudi threats have been the subject of intense discussions in recent weeks between lawmakers and officials from the State Department and the Pentagon. The officials have warned senators of diplomatic and economic fallout from the legislation.
Adel al-Jubeir, the Saudi foreign minister, delivered the kingdom’s message personally last month during a trip to Washington, telling lawmakers that Saudi Arabia would be forced to sell up to $750 billion in treasury securities and other assets in the United States before they could be in danger of being frozen by American courts.
Yanis Varoufakis, previous finance minister for Greece, offers insights as an economic insider about the current workings of global finance. He suggests the key challenge of our time is a lack of democracy to balance today’s unchecked capitalism. Capitalism without democratic oversight can become a very uncivilized system—brutish and destructive. This current imbalance threatens the global economy, our environment, and the future of civil society.
But while media are busy working through anti-LGBT talking points, they aren’t asking Republican politicians to explain how they’ll enforce laws that would require people to prove their “biological sex” at the bathroom door. The law says people must use facilities that corresponding to the sex “stated on a person’s birth certificate.” So people should carry their birth certificates with them at all times?
More than 400 people were arrested in a non-violent sit-in on Capitol Hill April 11, many having marched 150 miles from the Liberty Bell in Philadelphia. The protest, called Democracy Spring, is about ending the influence of big money in politics and ensuring free, fair elections through things like restoring the Voting Rights Act. The next day, another 85 mostly elderly people were arrested, many chanting, “Democracy is not for sale, [we’re] not too old to go to jail.”
As of March 2016, a review of recent corporate news coverage indicates that many of the themes in Jamail’s article have not been covered in the corporate press, including especially the extent to which the seafood we eat contains plastic, as well as a number of the solutions to this problem, as discussed by Dr. Wallace Nichols and other researchers.
The reason you and I will never see the transcripts of Hillary Clinton’s speeches to Wall Street fat-cats — and the reason she’s established a nonsensical condition for their release, that being an agreement by members of another party, involved in a separate primary, to do the same — is that if she were ever to release those transcripts, it could end her candidacy for president.
Please don’t take my word for it, though.
Nor even that of the many neutral observers in the media who are deeply troubled by Clinton’s lack of transparency as to these well-compensated closed-door events — a lack of transparency that has actually been a hallmark of her career in politics.
Nor do we even need to take Clinton’s word for it — as we could certainly argue that her insistence that none of these transcripts ever be seen by the public is itself a confession that her words would cause significant trauma to her presidential bid.
WHEN A CANDIDATE for high office can’t respond to a simple question with an honest answer, attention should be paid. More often than not these days, that kind of behavior is just greeted with a shrug by the members of the elite media, but specific acts of evasion are worth studying. Because if something’s important enough for a candidate that they concoct a ludicrous non-response, there’s probably a sore point under there somewhere.
Hillary Clinton may be the Democratic frontrunner, but her appeal is waning. According to the HuffPost Pollster average, 55 percent of the electorate now views Clinton unfavorably—and 40.2 percent of people view her favorably, according to the same average.
Earlier today I noted that someone who earns $200,000 pays an average federal income tax rate of 15 percent. Well, it turns out that Bernie Sanders is really, really average. He released his 2014 tax return tonight, and it reports that he had an adjusted gross income of $205,617 and total taxes due of $27,653. That's 13 percent of his income.
The United Kingdom could ‘better face the future outside the European Union’. That was the opinion of 43% of respondents in the European Union Public Opinion survey, the Eurobarometer, in May 2015. It’s hardly surprising that such a large proportion of the population has such a bleak view of the benefits the EU brings to the UK, considering that scrutiny of Brussels has intensified over recent years. And in the run-up to the referendum, the spotlight is well and truly fixed on the issue.
In fact, this primary campaign has produced a couple of surprises, more earthly than divine. Both surprises reveal widespread grassroots discontent with both Hillary Clinton and the whole American political establishment. However, this discontent so far fails to focus on the point of my book: the need to combat the ideology and practice of U.S. war policy personified by Hillary Clinton. Where is the effective alternative to the War Party?
The Texas Department of Criminal Justice is getting in the digital censorship game with a new policy that would punish an offender for having a social media presence, even when someone on the outside is posting updates on their behalf.
Western companies need to end their hypocrisy over free speech in China, and start helping to end censorship in the country, a leading anti-censorship activist has told the Guardian.
One of the three co-founders of GreatFire, an organisation dedicated to fighting the so-called Great Firewall of China, the technological heart of state censorship in the country, said it hurts to see companies such as Apple citing Chinese censorship in their battles with western governments, while co-operating with authoritarian state in order to earn money from its burgeoning middle classes and take advantage of its enormous manufacturing base.
Speaking in London shortly before winning a Freedom of Expression award from campaign group Index on Censorship, the activist, who goes by the pseudonym Charlie Smith due to the threat to his safety if the Chinese government discovers his identity, listed Apple and LinkedIn amongst his personal villains.
In its annual report on the challenges U.S. exporters face in foreign markets, released in April, the office of the United States Trade Representative (USTR) listed Chinese Internet censorship as a trade barrier for the first time. The move is likely to please U.S. businesses that operate in China or that are considering doing so. But previous U.S. attempts to encourage China to dismantle the so-called Great Firewall of Censorship, which keeps out certain foreign content Chinese authorities deem harmful, have had little effect. Will describing censorship as a trade barrier make a difference? In this ChinaFile conversation, experts discuss the implications of the new report, and how might China react to this pressure from Washington.
According to a leaked internal memo of the multinational ISP Telefónica in Ecuador, the Association of Internet Providers of Ecuador (AEPROVI) collaborated with the Ecuadorian government to block their users' access to websites. The memo was obtained and published by the Associated Whistleblowing Press and the Ecuadorian whistleblowing platform, Ecuador Transparente.
The memo describes how on March 28, 2014, between 7:20 pm and 7:53 pm, a technician received reports of users unable to access Google and YouTube. It explains that Telefónica staff verified the accessibility issues and reported them to Telefónica’s Network Operations Center (NOC). The NOC then confirmed that these websites were inaccessible due to AEPROVI “blocking access to certain Internet websites by request of the National Government." The leaked document explains that many clients were affected, prompting AEPROVI to roll back its website blocking in order to remedy the situation.
On Thursday, March 27, 2014, someone hacked the official Twitter account of Ecuador's President Rafael Correa. The next day, hackers posted personal emails from the country’s spy chief Rommy Vallejo on a Google-hosted blog, which contained a classic Anonymous-like YouTube video.
Hours later, some internet users in Ecuador reported not being able to access Google and YouTube. As it turned out, the outage wasn’t caused by a technical glitch, but a government censorship order, according to a leaked document from telephone giant Telefonica.
“The issues with accessing internet pages such as Google and YouTube was due to the fact that personnel at [Ecuador’s internet providers’ association] AEPROVI blocked access to certain internet pages by request of the national government," reads part of the document, which appears to be an internal Telefonica support ticket.
Jan Böhmermann, host of the late-night "Neo Magazin Royale," in Hamburg, Germany, on August 21, 2012. Turkish President Recep Tayyip Erdogan has filed a complaint against the comedian who recited a satirical and sexually crude poem about him on German television, complicating Berlin's attempts to get Turkey's help in dealing with Europe's migrant crisis.
Colleagues of satirist Jan Böhmermann at public broadcaster ZDF are campaigning to have his 'slanderous' poem about Turkey’s leader reinstated online - even as legal action looms against the comedian.
Those funds, spent by a public university, mind you, were spent in the wake of the pepper spraying incident specifically to reformulate the image of UC Davis by obfuscating search results, web mentions of the incident, and by crafting a deluge of other UC Davis content that was decidedly more brand-friendly. But, hey, are you still confused as to what incident we're talking about here? Maybe this video of the incident will help jog your memory.
What should be readily apparent to you by now is that trying to bury factual if unfortunate history by hiring so-called brand reputation groups works about as well as trying to cover up your inability to cook a decent meal by dumping chocolate icing on everything you make. Sure, icing is good, but you still burnt that bone-in ribeye, you fool.
More importantly, in true Streisand Effect fashion, the attempted coverup of the incident now has us all discussing it again. And not only discussing the incident, but multiplying information about the incident, and footage of it, throughout the internet.
This month the Texas Department of Criminal Justice (TDCJ) updated its offender handbook (PDF) to stipulate that inmates are not allowed to have social media accounts. While blog posts are still permitted, a spokesperson for the TDCJ told Ars that the rule was developed to get social media platforms to comply with the corrections department’s takedown requests more readily.
The ABC has strongly rejected criticism its Chinese web portal, AustraliaPlus.cn, helps Beijing to silence critical voices in the region.
An opinion piece in the Australian Financial Review by Prof John Fitzgerald, director of the Asia Pacific program in social investment and philanthropy at Swinburne University of Technology accused the ABC of selling out its news values in order to get a foothold in China.
“The ABC has not, and never has, entered into an agreement with China or any country in regards to censorship of its content,” the ABC said in a strongly-worded statement.
Taking place on 6-7 May 2016 at London’s Free Word Centre, the book fair coincides with the Tehran Book Fair, but unlike the Iranian counterpart, it’s free from censorship, and will feature censored books from independent Iranian publishers.
Most of the event will be in Farsi, but there will be an English-language session too on Friday 6 May from 4.30pm to 5.30pm – in association with Index on Censorship and Small Media.
Freedom of the press on campus has garnered plenty of attention with incidents at the University of Missouri and Wesleyan University. Yet the two incidents “are hardly the only examples,” warns Observer.
At Mizzou, a student photographer was pushed away from covering student protesters by former professor Melissa Click, who has since been fired and charged with assault. The Wesleyan Argus faced controversy and defunding threats after publishing a critical article about Black Lives Matter.
From software that records your every keystroke, to GPS tracking, to ignition kill switches—lenders have more power over their customers than ever.
This week, Facebook CEO Mark Zuckerberg appeared to publicly denounce the political positions of Donald Trump’s presidential campaign during the keynote speech of the company’s annual F8 developer conference.
“I hear fearful voices calling for building walls and distancing people they label as ‘others,’” Zuckerberg said, never referring to Trump by name. “I hear them calling for blocking free expression, for slowing immigration, for reducing trade, and in some cases, even for cutting access to the internet.”
[...]
“Facebook can promote or block any material that it wants,” UCLA law professor Eugene Volokh told Gizmodo. “Facebook has the same First Amendment right as the New York Times. They can completely block Trump if they want. They block him or promote him.” But the New York Times isn’t hosting pages like Donald Trump for President or Donald Trump for President 2016, the way Facebook is.
[...]
Facebook has toyed with skewing news in the past. During the 2012 presidential election, Facebook secretly tampered with 1.9 million user’s news feeds. The company also tampered with news feeds in 2010 during a 61-million-person experiment to see how Facebook could impact the real-world voting behavior of millions of people. An academic paper was published about the secret experiment, claiming that Facebook increased voter turnout by more than 340,000 people. In 2012, Facebook also deliberately experimented on its users’ emotions. The company, again, secretly tampered with the news feeds of 700,000 people and concluded that Facebook can basically make you feel whatever it wants you to.
POLICE IN CANADA took advantage of BlackBerry Messenger (BBM) security's "Achilles' heel" by compelling the company to hand over its universal decryption key, and using access to mobile operators' infrastructure to read more than a million messages.
Declassified documents arising from a Royal Canadian Mounted Police criminal investigation between 2010 and 2012 indicate that the police force kept a dedicated server at its headquarters in Ottawa to intercept messages. The server was connected to the network of Canadian mobile operator Rogers, which also cooperated with investigators.
Blackberry's CEO, John Chen, didn't care for the fact that Apple was "locking" law enforcement out of its devices by providing customers with default encryption. As he saw it, Apple was placing profits ahead of Mom, Apple pie and American-made motorcars.
The Freedom to Tinker Foundation has just released a study it compiled over the last 18 months -- one in which it scanned thousands of shortened URLs and discovered what they unintentionally revealed. Microsoft's OneDrive -- which uses link-shortening -- could be made to reveal documents uploaders never intended to share with the public. Worse, Freedom to Tinker discovered a small percentage of brute-forced URLs linked to documents with "write" privileges enabled.
Two researchers devised a method to automatically guess, or scan by brute force, millions of Microsoft OneDrive (1drv.ms) and Google Maps (goo.gl/maps) short links. This way, they found thousands of open OneDrive folders with potentially sensitive information, as well as Google Maps links that could be used to identify the people who created them, as well as their identity.
In other words, short URLs with five, six, or seven-character tokens that users might think as private, are not that private.
“When you are sharing something using a short URL, you are not sharing with just the intended recipient...you are sharing with the entire world.” Vitaly Shmatikov, a professor at Cornell Tech, and one of the researchers who worked on the study, told Motherboard in an email.
But instead of being a place of respite, the people who live on Joyce Taylor’s land find themselves in a technological horror story.
Geolocation is one of those tools that the less technically minded like to use to feel smart. At its core it's a database, showing locations for IP addresses, but like most database-based tools, the old maxim of GIGO [Garbage In, Garbage Out] applies. Over the weekend Fusion's Kashmir Hill wrote a great story about how one geolocation company has sent hundreds of people to one farm in Kansas for no reason other than laziness. And yes, it's exactly as bad as it sounds.
To date, four appeals courts have entered opinions on whether cell site location info is covered by the Fourth Amendment. So far, only the Fourth Circuit Court of Appeals has found this to be worthy of a warrant. All others find CSLI to be covered under the Third Party Doctrine. These cases all deal with historical cell site location info, usually obtained in bulk with subpoenas. Near real-time tracking using tower pings is another issue entirely -- one that's rarer because a) obtaining rolling CSLI from a provider is a pain and b) everyone's using Stingrays now.
During the first of a series of hearings in the last year in which Jim Comey (at this particular hearing, backed by Deputy Attorney General Sally Yates) pushed for back doors, they were forced to admit they didn’t actually have numbers proving encryption was a big problem for their investigations because they simply weren’t tracking that number.
Documents FOIA'ed by Ryan Shapiro and shared with the New York Times shed some new light on previous FBI efforts to break encryption. Back in 2003, the FBI was investigating an animal rights group for possibly sabotaging companies that used animals for testing. The FBI's Department of Cutesy Investigation Names dubbed this "Operation Trail Mix," which I'm sure endeared it to the agents on the case. At the center of the investigation were emails the FBI couldn't read. But it found a way.
That’s the logic the FBI is now peddling to reporters who are copping onto what was clear from the start: that there was never going to be anything of interest on Farook’s phone. After all, they’re suggesting geolocation data on the phone (some of which would be available from Verizon) might explain the 18 minutes of the day of the attack the FBI has yet to piece together.
The European Parliament today voted in favour of major reforms to data protection in the EU, first put forward in January 2012 as a replacement for the current rules, which were drawn up in 1995. The new law is done and dusted and will come into action in April 2018.
There are two components to the new law: the General Data Protection Regulation (GDPR), which is designed to give EU citizens better control of their personal data, and the Data Protection Directive, which covers how personal data is used by police in the EU.
As we've discussed at length, there are multiple cases going on right now in which the US Justice Department is looking to compel Apple to help access encrypted information on iPhones. There was lots of attention paid to the one in San Bernardino, around Syed Farook's work iPhone, but that case is now over. The one getting almost but not quite as much attention is the one happening across the country in NY, where magistrate judge James Orenstein ruled against the DOJ a little over a month ago, with a very detailed explanation for why the All Writs Act clearly did not apply. The DOJ, not surprisingly, appealed that ruling (technically made a "renewed application" rather than an appeal) to an Article III judge and the case was assigned to judge Margo Brodie.
The proposed bill put forward by Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA) to force US companies to build backdoors into their encryption systems has quickly run into trouble.
Less than 24 hours after the draft Compliance with Court Orders Act of 2016 was released, more than 43,000 signatures have been added to a petition calling for the bill to be withdrawn. The petition, organized by CREDO Action, calls for Congress to block the proposed law as a matter of urgency.
The lawsuit claims these gag orders violate multiple rights of multiple parties. Those whose data is being requested are having their Fourth Amendment rights violated by the undisclosed searches. Microsoft's First Amendment rights are being violated by the accompanying gag orders.
Today, the European Parliament adopted three texts on personal data: the regulation framework for personal data processing by private companies, the Directive on judicial and police processing of personal data, and the PNR (Passenger Name Record) that aims at the creation of national records gathering large amounts of data of persons travelling from or to the European Union, including internal flights. These texts feature numerous loopholes that threaten the right to privacy. Given the inability of the institutions to come up with regulations that actually protect Internet users, it is up to each and every one of us to learn how to protect themselves, their personal data and their privacy on the Internet.
She was a key Google executive, too
If you need another sign that Facebook’s world-dominating ambitions are just getting started, here’s one: the Menlo Park, Calif. company has hired a former DARPA chief to lead its new research lab.
With Pew's survey we found using my company analysis that the world has 5.0 Billion unique mobile phone owners (owning one or more mobile phones, which can be smart or dumb phones). Out of the 5.0B, the number of unique smartphone owners was 2.3 Billion last year (46%) and as we've measured out of the sales numbers the total installed base of all smartphones at 2.5 Billion so 200 million of the total smartphones in use worldwide are by those of us who have 2 phones in their pockets (or 9% of all smartphone unique owners have 2 smartphones). I published this breakdown of the world mobile phone unique ownership and smartphone vs dumbphone vs no-phone owners in February, based on Pew numbers:
Another federal appeals court is siding with the Obama administration's position that court warrants are not required to track a suspect's cell-site location. The Wednesday decision (PDF) by the 6th US Circuit Court of Appeals adds to the growing number of federal appeals court rulings siding with the government, likely meaning the US Supreme Court won't weigh into the legal thicket any time soon. Only one federal circuit has sided against the government, but that ruling was set aside, (PDF) and a new decision is pending after the court accepted the government's petition to rehear the dispute.
Ãâ¢Ã³Ã¾Ã⬠æòõÃâúþò (Egor Tsvetkov), a photographer in Russia, has taken photos of random people on the subway and connected them to social media portraits and complete profiles using face matching technology. This is a game changer.
It used to be that technology was good enough to say whether two photos appeared to be of the same person. We’ve now reached an inflection point where one input photo can (mostly) be used to find the matching person among tens of millions of people, and where the processing power used is low enough for that service to be free. This is a complete game changer.
The gravity of this doesn’t really hit you until you see the examples, where the photos are taken under radically different lighting and angles than the portrait photos, and sometimes with different facial hair, too. What’s more, this photographer used a freely available photo matching service – FindFace.ru – which has already imported a vast amount of (all?) photos on vKontakte, which is Russia’s equivalent of Facebook, and let a neural network study all of those photos.
The publishing platform responsible for marketing J.K. Rowling's Harry Potter series has gone on a bizarre anti-piracy rampage. Pottermore and its anti-piracy partners told Google that J.K. Rowling's Wikipedia page was infringing, but sadly that's just the tip of a ridiculous DMCA notice iceberg.
It was a little-noticed story in the Entertainment and Oddities section: The GCHQ is using its spying network to help the copyright industry prevent “unauthorized distribution of creative works” – meaning ordinary people sharing interesting things with each other. Yes, that spying network which was supposed to prevent horrible terror attacks, and only to prevent horrible terror attacks, to safeguard our very lives as a last line of defense, is now in the service of the copyright industry.
Senators Richard Burr and Dianne Feinstein released the official version of their anti-encryption bill today after a draft appeared online last week. The bill, titled the Compliance with Court Orders Act of 2016, would require tech firms to decrypt customers’ data at a court’s request.
The Burr-Feinstein proposal has already faced heavy criticism from the tech and legislative communities and is not expected to get anywhere in the Senate. President Obama has also indicated that he will not support the bill, Reuters reports.
Over 60% of Brazilians do not believe that President Dilma Rousseff should be subject to impeachment proceedings, but a cadre of corrupt far right politicians armed with NSA surveillance documents continue to push for her ouster.
On Monday, a 65-member congressional committee in Brazil voted to advance impeachment proceedings against President Dilma Rousseff, in relation to the "carwash" corruption investigation. Although President Rousseff is not herself implicated in illegal or corrupt activity, the impeachment is proceeding on the grounds of "a crime of responsibility," suggesting that she should have taken action to prevent corruption.
If you can't read that, she said: "I think it would be reasonable to ban the import of open-source encryption software." This is idiotic on any number of levels, and that an actual representative of law enforcement would make such a claim is immensely troubling and raises serious questions about the competency of the US Attorney's Office in Eastern Michigan.
First off, the Open Technology Institute released a paper late last year showing that there was a ton of both open source and foreign encryption products that weren't subject to US regulations. Another paper, released earlier this year by the Berkman Center and written by Bruce Schneier (along with Kathleen Seidel and Saranya Vijayakumar), found that there were 865 encryption products from 55 different countries on the market when they wrote the paper (it could be more by now), with 546 of those from outside the US. In other words, there are a lot of these kinds of products. So, at the very least, they'd be used by people outside of the US.
But, more to the point, a ban on importing them? We already had that legal fight, though back then it was on the question of exporting encryption. In Bernstein v. the US Department of Justice, the government sought to block Daniel Bernstein from publishing his algorithm for his Snuffle encryption system, saying it violated export laws related to exporting weapons. Eventually, the 9th Circuit ruled that software source code was speech protected by the First Amendment and any regulations preventing publication would be unconstitutional.
Remember, this was the same iPhone that the DOJ and the FBI said was critical in their investigation. This is the same iPhone that the San Bernardino District Attorney, Michael Ramos, insisted could be hiding evidence of a "dormant cyber pathogen" destined to destroy San Bernardino County's computer network.
The CryptoKids, if you're not aware, was a mid-2000s attempt by the NSA to appeal to the youth of today by creating a crazy cartoon cadre of codebreakers that's one pair of rollerblades away from a cease and desist from Burger King. It was generally considered a terrible idea, and then after news broke about the whole "spying on citizens" thing, an absolutely terrible idea.
As the push to backdoor or ban encryption heats up, kneejerk politicians have rushed to embrace each and every recent attack and to immediately point fingers at encryption. Right after the Paris attacks, politicians started blaming encryption, even though evidence suggested they communicated by unencrypted SMS. Even months later, the press was ridiculously using the total lack of evidence of any encryption... as evidence of encryption. Then with the Brussels attacks from a few weeks ago politicians like Rep. Adam Schiff immediately tried to blame encryption insisting that "we can be sure that terrorists will continue to use what they perceive to be the most secure means to plot their attacks."
SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept.
Yet among the 38 previously undisclosed companies receiving In-Q-Tel funding, the research focus that stands out is social media mining and surveillance; the portfolio document lists several tech companies pursuing work in this area, including Dataminr, Geofeedia, PATHAR, and TransVoyant.
The latest in the Matthe Keys case is that Keys has been sentenced to two years in federal prison for his involvement in a minor incomprehensible web defacement of an LA Times story that lasted for all of about 40 minutes. The prosecution was asking for 5 years, while Keys' lawyers asked for nothing more than probation. As we noted, the whole thing seems fairly crazy. It is entirely possible that Keys acted like an immature jackass regarding his former employer, but the actual case revolved around a single action: the claimed sharing of login credentials for the content management system of the Tribune Company, which another person (who is apparently known to law enforcement, but has never been charged with anything) used to do a minor defacement of a single story to have the headline read: Pressure builds in House to elect CHIPPY 1337.
This minor defacement was up for about 40 minutes before being taken down. When the government tried to add up the damages, the Tribune Company at first admitted that there were basically none. After being pushed, they "found" more damages and somehow it turned into nearly a million dollars, by making emails that "cost" $225 and talking about something totally unrelated to this hack -- some alleged harassment Key did by emailing people in a database from his former employer. If he actually did this (he denies it), it was a really shitty thing to do, but it also was not what he was on trial for.
Matthew Keys was convicted of giving login credentials to the hacking group, in a decision civil liberties group calls ‘prosecutorial discretion run amok’
Swedish prosecutors still believe an arrest warrant for WikiLeaks founder Julian Assange should be upheld, they said on Thursday in reply to the Stockholm District Court that will decide whether to lift the warrant.
An elderly Christian woman has been caned in a conservative Indonesian province for selling alcohol, the first time someone from outside the Islamic faith has been punished there under strict religious laws.
The 60-year-old was whipped nearly 30 times with a rattan cane before a crowd of hundreds in Aceh province Tuesday (Apr 12), an official said, along with a couple who were subjected to 100 lashes for committing adultery.
Aceh is the only province in the predominantly Muslim country that applies sharia law, and public canings for breaches of Islamic code happen on a regular basis and often attract huge crowds.
Those caught engaging in adultery, same-sex relationships, drinking and even associating with unmarried members of the opposite sex can end up facing the cane.
Those responsible for the CIA torture program have never had to face their victims’ claims in a U.S. court because the government has always shielded the perpetrators. Until now.
In 1968, Richard Nixon’s operatives derailed President Lyndon Johnson’s Vietnam peace talks which could have brought that bloody conflict to an end that year – rather than four years later and saved millions of lives – but peace might have meant Nixon’s defeat. A sordid tale described in declassified U.S. government records.
In 1980, it was Ronald Reagan’s operatives who went behind President Jimmy Carter’s back to disrupt his negotiations to free 52 American hostages held by Iranian radicals and thus doom Carter’s reelection chances, a story described by more than two dozen sources from a range of different perspectives.
But these two well-documented cases apparently touch too raw a nerve, so they are not on CNN’s roster. Still, you can learn about them at Consortiumnews.com by clicking on the “October Surprise Series” tab and reading the stories there.
On Saturday, HBO will premiere the film "Confirmation" starring Kerry Washington as Anita Hill and Wendell Pierce as then-judge, now–Supreme Court Justice Clarence Thomas. The movie recreates the three days of Supreme Court confirmation hearings that riveted the country in October 1991, launching a national conversation about sexual harassment in the workplace and helping to lead to a watershed year for women in elected office. Twenty-five years later, these hearings still resonate as one of the greatest political, sexual, and racial dramas in modern history. Slate senior legal correspondent Dahlia Lithwick recently spoke with Gillian Thomas, a senior staff attorney with the ACLU Women’s Rights Project and author of Because of Sex, about Confirmation. (The two writers were also college roommates, graduating in 1990.)
The Clintons have always cultivated a warm affection for African-Americans. One iconic image shows Bill riffing on his saxophone for Arsenio Hall. Another pictures Hillary hugging parishioners in black churches. Similar beguiling images appear daily in the media as her presidential campaign progresses.
Hillary Clinton doesn’t want you to know who she would name to the Supreme Court.
European journalists were reminded today that their freedom to report is not only determined by national laws, but increasingly by European institutions. Today, after years of political battle, the European Parliament adopted the Passenger Name Record directive, the Data Protection Package, and the Trade Secrets Protection Act. The stakes were immense and the debates long and heated, leading to dissent and divisions within many political groups-and campaigns about the potential impact from journalists.
The fossil fuel divestment movement continued its momentum this week as students across the U.S. highlighted the need for their institutions to dump "support of global climate disaster, exploitation, and human suffering."
On Tuesday, for example, four members of Divest Harvard were arrested after staging a sit-in at the Federal Reserve Bank building, where the Harvard Management Company, which manages that university's endowment, is located.
That company "is the entity that actually does the day-to-day work investing in fossil fuel companies, so we thought it would be appropriate to take our message to this other important actor," Harvard Law School student and Divest Harvard student Kelsey Skaggs, told the Crimson.
An Anonymous hacktivist and former U.S. airman, who sought asylum in Canada claiming torture by American officials over his access to secret government documents, has unexpectedly had two years he spent in prison in Canada deducted from his sentence.
After his deportation from Canada last year when his refugee claim was rejected, Matt DeHart entered a plea bargain with U.S. prosecutors, admitting to possession of sexually explicit photos of two underaged teenagers and avoiding court by fleeing across the border.
With the FCC glacially pondering whether or not zero rating (exempting some content from usage caps) is a bad idea, the wireless industry has decided to try and settle the argument. According to a new study by the wireless industry, 94% of Millennials are more likely to try a new online service if it's part of a free data offering, 98% are more likely to stay with a carrier that offers such services, and 94% of Millennials are likely to use more data if it doesn't count against their data plan. As intended, the survey resulted in a lot of varied news headlines insisting that "consumers actually like ISPs to play favorites on mobile data caps."
As we just noted, the House has been pushing yet another bill that attempts to punish the FCC for its uncharacteristic new habit of actually standing up to giant ISPs. The "No Rate Regulation of Broadband Internet Access Act" (pdf) professes to be a bill focused on curtailing government run amok; with a particular eye on preventing the FCC from being able to regulate broadband rates (not-coincidentally just as ISPs begin heavily pursuing usage caps). But the bill uses a unique definition of "rate regulation" to, in reality, ban the FCC from doing, well, pretty much anything.
On October 12th, 1983, Bill Landreth called his friend Chris in Detroit to chat. Chris frantically explained that the FBI had raided his house. “Don’t call me anymore,” Chris said in what would be a very short conversation. Bill didn’t know exactly what was happening, but he did know this: If the FBI had come for Chris, then he might be next.
The next day, around a dozen FBI agents stormed Bill’s parent’s house just outside of San Diego, amassing piles of evidence including a computer that Bill, then 18, had hidden under his sister’s bed. Bill and Chris, who was 14 at the time, were the leaders of a coalition of teen hackers known as The Inner Circle. In a single day, the FBI conducted coordinated raids of group members across nine states, taking computers, modems, and copious handwritten notes detailing ways to access various networks on what was then a rudimentary version of the internet.
In a disappointing turn of events, the U.S. House of Representatives voted 241 to 173 to pass H.R. 2666, the No Rate Regulation of Broadband Internet Access Act, a bill that would undermine the FCC’s ability to enforce key net neutrality protections.
As we’ve mentioned previously, the bill’s ostensible purpose is to bar the FCC from regulating the rates of broadband Internet providers, thus locking into law a promise that the agency made when it introduced its new net neutrality rules last year. On its face, that’s not necessarily a bad idea.
The problem is that the bill is worded in such a way that it could be used to keep the FCC from enforcing many important protections of users’ rights. At best, H.R. 2666 is a poorly written bill that brings a host of unintended consequences. At worst, it’s a calculated attempt to undermine the net neutrality principles we’ve all been fighting for.
As the bill moves to the Senate this session, it’s crucial that senators reject it. Fortunately, President Obama has said that he will veto the bill if it reaches his desk.
After waiting for over a decade, the World Trade Organization is finally close to achieving the first ever amendment to its rule-book, with only a handful of members still needing to formally accept new intellectual property provisions dealing with one aspect of access to medicines.
South Africa commended WIPO on the interventions provided on successful technology licensing, intellectual property marketing, and IP valuation, in the document. South Africa suggested, as the way forward after the project, that WIPO set up a programme with the objective of advancing the skill set of individuals within offices of technology transfer in institutions, small and medium sized enterprises, and innovators.
I shouldn't have to start this post this way, but after someone flipped out in my last post about the treatment of Hillary Clinton and her emails, accusing me of being nothing more than a "BernieBro," I'll just make this explicit: I don't currently support any of the current Presidential candidates, and am pretty sure I've mocked all of them for ignorance around issues that concern those of us at Techdirt. Either way, I wonder how the guy insisting I was just a secret Bernie supporter will respond to this article...
Yes, because now Bernie Sanders' campaign is the latest in a long list of presidential candidates to abuse trademark law to try to stifle criticism. His campaign joins those of Hillary Clinton, Ben Carson, Ron Paul and more as presidential candidates, past and present, abusing trademark law.
The Delhi High Court has come to the rescue of trade mark applicants, who are aggrieved that the Indian Trade Marks Registry has abandoned nearly 200,000 pending applications
The recently introduced EU trade mark reforms limit the scope of the own name defence. James Whymark and Rachel Boakes explain why the change was introduced, and ask if it is really necessary
Anyone reading this site will know by now that the alcohol business has a trademark problem. As a quick refresher, what used to be an industry largely dominated by massive macro-companies has since evolved into one of small players, with craft breweries and distilleries exploding in popularity. With the increased amount of brands and inventory on the market, so too has the practice of creatively named brands come into vogue. And with that has come the trademark squabbles. Examples of the trademark disputes centered around these creative names for brands will include a beer called 'Strikes Bock', a brew entitled 'Mus Knuckle', and a brewery called 'Innovation Brewing'.
The Controller General of India’s Patent and Trade Mark Registry responded to Managing IP’s questions by email regarding the concerns over nearly 200,000 abandoned trade mark applications
The essence of the recent ruling was not an investigation of stealing, but a finding that there is sufficiently substantial similarity between the pieces of music for a further trial. So why do so many news sources that should know better continue to frame the issues into a theft narrative?
The MPAA wants Internet providers and services to take stronger actions against persistent copyright infringers. Ideally, the most egregious pirates should lose their accounts permanently, the group says. To accomplish this ISPs should be required to track the number of notices they receive for each account.
Earlier this year, after a bit of a roller coaster ride of a legal fight over the copyright status of the song "Happy Birthday," the two key parties finally reached a settlement that declared the song in the public domain. While many news reports had earlier claimed that the judge in the case had done the same, that wasn't really true. The judge simply declared that Warner Chappell did not hold the copyright, leaving it an open question as to whether or not anyone else did -- and some quickly raised their hands to claim the copyright.
Either way, the legal team that helped achieve this eventual victory has apparently decided to go for it again. Representing a group calling itself the We Shall Overcome Foundation (WSOF), they are claiming that The Richmond Organization (TRO Inc.) and Ludlow Music are falsely claiming copyright over the famous civil rights anthem "We Shall Overcome," because that song is in the public domain. The case has tremendous similarities to the Happy Birthday case. As in that case, the plaintiffs say they're making a documentary about the song. In this case, they sought a license for the song and were denied without explanation. TRO-Ludlow had first told WSOF that the song was "very difficult" to clear and they had to approve any use. WSOF recorded someone singing just one short verse, and then TRO-Ludlow flat out refused, but would not give any further explanation.
It's been less than a year since we discussed LMFAO, the band, and its attempt to bully a brewery into renaming its beer called LMFAO with intellectual property threats. Well, the bro-rock duo is back in the IP spotlight again, but this time with a win. Rick Ross had long ago sued LMFAO over its hit song Party Rock Anthem for including a line, "Everyday I'm shufflin'." Ross had his own hit song called Hustlin, which famously contained the line "Everyday I'm hustlin'," and Ross argued for copyright infringement, claiming LMFAO's lyric was an unauthorized derivative work.