After Linux took off (as GPL'd free software), I could see clearly how freedom worked because the means were there—not just for demonstrating it to everybody, but for developing more and more with it. I suspect the same could be true for promise-based financial dealings such as rent and buy.
So my request here is to help Kevin debug the case he makes for his ideas, while putting them to work.
Nate will continue to contribute articles to LWN. But we suspect that the intricacies of Béziers, brush strokes, and kerning are going to take a lot of time and attention, meaning that we will be needing somebody to help fill his shoes. Thus, LWN is hiring. If you would like to write full-time for one of the most discriminating readerships in the world — but also one of the most interesting, engaged, and supportive readerships — we would like to hear from you. This is your chance to make your mark on one of the community's oldest publications.
Speaking of "oldest," the basic format of LWN's Weekly Edition has changed little over the last 18 years. Some pages have come and gone (long-time readers will remember the desktop page, or the once-interesting "Linux in the News" page), but substantive changes have been few indeed. That format has served us well over the years; among other things, it helps us to ensure that each edition covers a wide range of topics. But it can also be somewhat limiting; it is a sort of treadmill of slots to be filled each week that makes it hard to focus on specific areas in response to what is happening in the community.
This was sometime around 2008. I wasn't even 20 years old. I didn't know how to code (apart from basic HTML stuff), nor did I have any particular tech skills. However, I was part of a community radio station that was embedded in an open source culture. After a full year as a member of that community, I decided it was time to fully convert and decided to install a Linux-based OS on my first ever laptop.
My friends (and engineers-in-the-making) at Radio Zero were split between the recommended distributions, with some leaning towards Debian and others towards Ubuntu. After carefully listening to pros and cons and asking many times about whether I'd be able to actually work with any of them, I decided to go with Ubuntu.
I was determined to install an open source OS on my computer regardless of my Dad's* warnings about possible compatibility issues. Despite not being a programmer, or anything even remotely related, I was incredibly excited about what Linux had to offer. The promise of an operating system that was designed and developed with accessibility for all in mind, that you can tweak and improve as you please, and that is developed by and for the community sounded like a dream coming true. On top of all this, it was free. So, what was there not to like?
If you're a Linux user who happens to dual-boot with Windows, you should exercise extreme caution when upgrading to the just-released Windows 10 Anniversary Update. Not long after Microsoft's latest release, reports began to hit the Web concerning issues of hard drives having their data deleted. The issue has proven to have enough credence to push Ubuntu's Community Manager Alan Pope to shoot out a warning...
Microsoft hoped the Windows 10 Anniversary Update would literally be a revelation for all users, but shortly after installing the update, users encountered various issues. Despite Microsoft’s efforts to anticipate all the possible bugs, the list of complaints is getting longer every day.
Networking professionals hear all the time that they need to learn new skills to keep up with a rapidly changing industry. On-the-job training would be a practical option, but if your company hasn't plunged into software-defined networking – and plenty haven't -- how do you expand your knowledge when you're mired in CLI?
As it turns out, the options for learning new approaches to networking are growing as SDN adoption gradually expands beyond hyper-scale Internet companies and service providers. This spring, the Linux Foundation rolled out a software-defined networking training course to address what the foundation described as a skills gap for networking pros. In launching the SDN training, the foundation said many network engineers lack experience with software virtualization.
Isle of Man startup Credits has become the first to offer blockchain DLT to Britain's public sector
Britain’s public sector can start experimenting with distributed ledger technology (DLT) for the first time after confirmation that blockchain-as-a-service startup Credits has been enrolled as part of the latest G-Cloud 8 framework agreement.
Credits is a small Isle of Man firm whose back story was recently covered in sister title Techworld but access to the distributed ledger technology (DLT) that comes with blockchain marks an important milestone for the G-Cloud Digital Marketplace and its public sector users.
It appears that Linux gamers running AMD Radeon graphics cards could soon be treated to long-awaited FreeSync support. Some eagle-eyed folks at reddit spotted interesting Kernel patches submitted yesterday that both requests the addition of a FreeSync ioctl device, and also the mechanism for activating and deactivating FreeSync with full-screen apps.
Because this patch would be implemented in the Linux kernel itself, the FreeSync mechanism should be able to work with both the open-source and proprietary drivers. I am unsure about the state of G-SYNC in the open-source Nouveau driver, but NVIDIA’s proprietary driver has supported G-SYNC for quite some time.
I've been a bit behind on my file-system benchmarking the past few months but for your viewing pleasure today are some EXT4 vs. Btrfs vs. F2FS file-system tests on an NVMe SSD when testing the Linux 4.4, 4.5, 4.6, and 4.7 kernels.
The three file-systems were each tested on the latest four stable kernel series. In the next week or so I will provide some complementary figures using Linux 4.8 Git once the merge window is over and the release candidates begin. All of the file-systems were tested with the Samsung 950 PRO M.2 NVM Express SSD.
The Tor Project is proud to announce the general availability of a new stable branch of the widely-used Tor software for anonymity online. The Tor 0.2.8 series is currently the most advanced one and build 0.2.8.6 is now ready for download.
According to the release notes, the Tor 0.2.8 stable branch has been in development for the past several months, during which the development team managed to implement over 300 changes. The biggest new features since Tor 0.2.7 are performance improvements to client bootstrapping, production-ready authority-side implementation for better identity keys for relays, as well as new security features for Linux OSes.
Fotoxx developer Michael Cornelison announced a new monthly release of the open-source and free image editor software for GNU/Linux operating systems, version 16.08.
Fotoxx 16.08 is the August 2016 maintenance update of the popular software application, bringing numerous new features and improving existing ones. According to the release notes, there's now support for removing multiple images just by clicking on their thumbnails in Albums, and users will be able to drag image thumbnails from a gallery or file manager directly into an album, and position them.
The popular and widely-used NetworkManager open-source network connection management software for GNU/Linux operating systems has been updated today, August 3, 2016, to version 1.2.4.
NetworkManager 1.2.4 is the second maintenance update in the major 1.2 series of the application, and, according to the internal changelog that we've attached at the end of the article for your reading pleasure, it brings quite some nice additions and fixes for the most annoying issues reported by users since NetworkManager 1.2.2.
Atom is a free, open source "hackable text editor for the 21st Century" developed by GitHub, available for Linux, Windows, and OS X. It features a built-in package manage that allows searching and installing new packages (and themes) from within Atom, smart autocompletion, file system browser, multiple panes, and more.
In subuser 0.5 release cycle we’ve seen an overall trend towards the stabalization of the source tree, a reduction in bugs, and the beginning of work packaging subuser. Thanks to Stanislas Leduc, subuser is now in Debian sid and Ubuntu Yakkety! Packages for the RPM based distributions are in the works. You can find the packaging code here.
One of the major stepping stones on the way to subuser stability was the solidification of UTF-8 support. This meant that we had to drop support for Python 2.
A few years ago, the hardware vendor Yubico made a bit of a splash when it introduced its YubiKey line of inexpensive hardware security tokens powered by open-source software. With its most recent product release, however, Yubico has dropped open source and started deploying only proprietary software in its devices. Consequently, many community members have started looking for a viable replacement that will adhere to open-source principles. At present, one of the leading contenders for Yubico's departed customers is Nitrokey, which manufactures a line of hardware tokens capable of generating one-time passwords (OTPs), storing and using OpenPGP keys, and several other features. The devices made by Nitrokey run open-source software and are open hardware as well.
To recap, Yubico had produced YubiKey products for several years and, historically, released its own open-source software for working with the devices. The original devices focused on OTP, and they were popularized by their ability to support the Hash-based message authentication code (HMAC)-based One-Time Password (HOTP) and the Time-based One-Time Password (TOTP) algorithms. HOTP and TOTP were already used in a number of two-factor authentication smartphone apps; the YubiKey's ability to replace a smartphone with a small, lightweight, and nigh-indestructible hardware token was a selling point.
Today marks one year since the initial commit of Sway. Over the year since, we’ve written 1,823 commits by 54 authors, totalling 16,601 lines of C (and 1,866 lines of header files). This was written over the course of 515 pull requests and 300 issues. Today, most i3 features are supported. In fact, as of last week, all of the features from the i3 configuration I used before I started working on Sway are now supported by Sway.
I am sure everyone has tried to use ed at least once. And I’m also sure some people have read Ed, the standard text editor. Its cryptic error messages (just ? actually) and the lack of any user interface probably turns most people away from it. I have to admit, I tried to use it before without any success. I spent probably 15 seconds in it before kill -9‘ing the process. But the truth is, ed is actually really easy to use after doing about 3 minutes of reading.
The latest work on RAD Game Tools' Oodle data compression with new compression codecs have it handily beating the open-source alternatives.
There's been much interest in recent times around the open-source Google Brotli project as well as Zstd and others, but the latest work done by RAD Game Tools to their commercial and proprietary compression tech is now putting the open-source lossless compression alternatives further behind.
It is the moment you have all been waiting for!...ish. I am sticking one toe in the water and putting out a very, very unpolished release of the very first version of the engine (the isometric engine, which differs from what I previously said I would release first, due to demand). Other versions are to follow. It was a fair amount of work to prep just this release, as unpolished as it is. And there are many things wrong, which I am mostly aware of (see the README.md). As noted, the point was not to make a perfect release, the point was to get the code in your hands as fast as possible (and I am sorry it has taken this long for me to get it out!).
We already knew that Total War: WARHAMMER was coming to Linux, but we didn’t know when as it seemed like it was forgotten about. Now we know it’s being ported by Feral Interactive!
This is good news, as I’ve been pretty happy with Feral’s porting work and their support of their products has been top notch. Pleased to see them get more porting work to continue pushing our platform.
Hopefully I will be able to do my usual thing of giving it a run over before release, if not, I will try to after release.
Ark, the file archiver and compressor developed by KDE, has seen a lot of development for the upcoming 16.08 release. This blog post provides a summary of the most important changes.
I was invited to the KDE Randa Sprint meeting this year, and started to develop the osm-simplify tool as part of my GSoC project. This will be used to style, cut and optimize the vector data which in the end will be downloaded and rendered by the Marble app. Instead of .png raster images, the tile data will be stored in a compressed vector format(.o5m), specially created for the OSM data.
I Approached around 50 brazilian artists for this, I’m not sure how many of them will answer, but this was the first answer that I got. This konqui is made by André Noel, the Real Programmer, owner of the web comic strip “A Programmers Life”, which you can read here in portuguese or here in english.
The developers of Toutou, a minimalist GNU/Linux distribution based on Puppy Linux, are continuing the development of the Toutou Linux 6.3.2 "SlaXen" release with a second Alpha milestone.
Curtis Gedak and the GParted team have announced the release and general availability for download of the GParted Live 0.26.1-5 stable Live system for OS-independent disk partitioning operations.
Based on the latest Debian Sid software repository as of July 23, 2016, GParted Live 0.26.1-5 is here to patch a BIOS boot issue and missing window bars problem when running the Live system on the VirtualBox virtualization software, and improves support for FAT32 filesystems by patching the libparted library.
The conundrum for many enterprise-level businesses is that the demand for data storage is significantly outpacing the shrinking price for storage. The upshot for many is that budgets for storage are growing faster than data demands. Fortunately SUSE wants to reduce your storage costs, which is why it released the new SUSE Enterprise Storage 3.
At Red Hat, we recognize this, and I want to share what we've learned about meritocracy...
The upcoming Ubuntu 16.10 (Yakkety Yak) operating system is currently in development, with a second Alpha build seeded to public testers at the end of July 2016.
Canonical, though Martin Pitt, the systemd maintainer for the Ubuntu Linux operating system, announced recently plans to unify and clean up the networking configuration in Ubuntu via a new project called "netplan."
Instagraph is an unofficial Instagram app for Ubuntu Touch. The app is free, and supports photo uploads, commenting, liking and more.
GNU/Linux developer Arne Exton has released a new version of his Ubuntu-based Exton|OS operating system, build 160728. The Exton|OS Light edition has been updated, which uses the Openbox window manager.
Linux Mint 18 is a solid update and continues the slow but steady evolution of what may be the most popular Linux desktop out there. If you're an existing Mint user, it's definitely worth upgrading, though do bear in mind that this upgrade may be a bit more difficult compared to the very simple upgrade process for 17.x updates. As of this writing, Linux Mint has not published its usual upgrade guide, and I installed a clean copy, so I can't comment on the upgrade process.
Mint 18 remains my recommendation both for anyone who's new to Linux as well as seasoned Linux users who want a desktop that just works and gets out of the way. Thanks to its incremental development approach, its dedication to evolving features slowly, and its development of power user features and configuration options, Mint manages to serve both newcomers and Linux power users well.
Canonical, through April Wang, is pleased to announce that the Snappy Ubuntu Core operating system for embedded and IoT (Internet of Things) devices is now officially available for the Bubblegum-96 single-board computer (SBC).
This is my english version of the review on the Jolla C device from Techview Podcast.
MIT App Inventor is a groundbreaking tool for developing Android applications without any prior programming and coding skills. Using this open source tool, one can convert his/her creative ideas into Android applications. As this utility is browser and cloud-based, you don’t need to download any software or store anything on your computer.
In 2014, my colleague Jason Hibbets wrote up a great article based on an excellent talk from Mark Atwood on the skills necessary to get a job with open source.
Starting in the last years of the last century, when Linux and free software were first making their mark on the world, a website called Slashdot was the king-hell news and discussion site for such things, along with a variety of other topics that interested the kind of people you might meet at a LUG meeting or in the CS department of your local university. The original Slashdot tagline (no longer visible on the site) was “News for nerds, stuff that matters.” And one of the people who worked on Slashdot during those heady days was Timothy Lord, who is such a devout Linux person that he has a Tux tattoo (which we forgot to have him show in the video, darn it).
FOSS was not the only news that interested nerds, and other stuff mattered, too, as the extensive Wikipedia Slashdot page explains. So let us go then, you and I, while FOSS Force is spread out, Prufrock-like, upon the monitor, to a distant land and time, with Timothy — and learn how things were in the days of yore, when Linux was still unknown to the masses and the people who cared about it, and about FOSS in general, were an interesting bunch we shall politely not call weirdos since many of them became our good friends over the years. But normal they were not, which was a large part of their charm — and what gave Slashdot its unique flavor.
Electrolysis is the project name for Mozilla’s efforts to split Firefox into multiple processes to improve responsiveness, stability, and security. The first phase of this work was to split Firefox into a UI process and a content process.
A Finagle inspired network application framework for Rust.
The Document Foundation announces LibreOffice 5.2, a feature-rich major release of the best free office suite ever created – targeted to early adopters and power users – with several user interface improvements and enterprise grade features.
At the same time, LibreOffice 5.1.5 has been released, for enterprise class deployments and more conservative office suite users.
The Document Foundation today announced the releases of LibreOffice 5.2 and 5.1.5. LibreOffice 5.2 is the latest in the Fresh branch of the popular office suite bringing a new document classification system that will help keep prying eyes out. Other improvements include a single line toolbar option, quicker access to Print to File, and several other goodies. Of course, they're always tweaking the core code as well making for a faster and more stable experience. But wait, there's even more...
As security concerns increase the Transglobal Secure Collaboration Program is a public-private partnership formed to secure electronic communication primarily for defense contractors and government entities. They've laid out specifications and frameworks that allow for more secure shared documents over the Internet. LibreOffice 5.2 adheres to these document classification specifications so it can be deployed in more sensitive projects.
Ludovic Courtès reports for the GNU Guix project, an open-source package management system for the GNU system, on the availability of the Guix System Distribution (GuixSD) 0.11.0.
It appears that this is the first time we write here something about the Guix System Distribution, so we feel obliged to inform the reader about the fact that GuixSD is an advanced distribution of the GNU system powered by the Linux-libre kernel and using GNU Guix as default package manager, thus respecting user's freedom.
Q2 2016 saw Backblaze: introduce 8TB drives into our drive mix, kickoff a pod-to-vault migration of over 6.5 Petabytes of data, cross over 250 Petabytes of data stored, and deploy another 7,290 drives into the data center for a total of 68,813 spinning hard drives under management. With all the ins-and-outs let’s take a look at how our hard drives fared in Q2 2016.
The school superintendent in Portland, Oregon, has resigned amid a widening scandal, after news broke that the district waited months to tell the public that drinking water at two elementary schools had tested positive for lead.
Even school employees only learned about the elevated lead levels at Creston and Rose City Park when a local newspaper ran an exposé.
“What set all of us off initially was the cover-up,” said Belinda Reagan, president of the union that represents school clerical staff. “They lied about it. They knew. That’s a notorious manner of handling things in this district. They are not forthcoming.”
The first two schools were just the tip of the iceberg. “Now we are finding out, as they are testing more schools, that all of them have the issues,” Reagan said.
The four unions representing teachers, custodians, and clerical employees quickly united to put pressure on the district—and to find out how this problem went unfixed for so long. They’re demanding testing of all schools, safety protection for students and employees, and a role in the plan to make schools safe by the fall.
The security firm allocates $50,000 to pay security researchers for responsibly disclosing flaws in its security products. Kaspersky Lab is no stranger to the world of vulnerability research, but the company is now opening up and enabling third-party security researchers to disclose vulnerabilities about Kaspersky's own software.
A series of scripts are created to do reproducible builds for Linux kernel with PaX/Grsecurity patch set.
Thanks to:
PaX/Grsecurity Debian GNU/Linux Community Shawn C[a.k.a “Citypw”] Linux From Scratch
Without the contributions of the projects, community and people, the scripts cannot be accomplished.
SECURITY RESEARCHERS have uncovered at least four flaws in the HTTP/2 protocol, the successor to HTTP that was launched properly only in May last year, after Google rolled up its SPDY project into HTTP/2 in February.
The flaws enable attackers to slow web servers by overwhelming them with seemingly innocent messages that carry a payload of gigabytes of data, putting them into infinite loops and even causing them to crash.
The HTTP/2 protocol can be divided into three layers: the transmission layer, including streams, frames and flow control; the HPACK binary encoding and compression protocol; and the semantic layer, which is an enhanced version of HTTP/1.1 enriched with server-push capabilities.
What does the power struggle between President Recep Tayyip Erdogan and powerful Islamic cleric Fethullah Gülen mean for Turks who want democracy?
A striking feature of the aftermath of the attempted coup in Turkey are the mass gatherings and demonstrations that have been taking place on a nightly basis in towns across the country. But what has spurred people to take to the streets in such numbers? And how is the government’s narrative of traitors and infiltrators, in opposition to defenders of democracy, likely to shape future developments in Turkey?
Whereas significant incidents, such as the spate of recent terrorist attacks, have generally been met by an immediate media blackout in Turkey, this time the media clearly had a crucial role to play. It was in a live broadcast on CNN Turk that President Recep Tayyip Erdoßan launched his appeal for people to take to the streets to ‘defend their democracy’, as the military coup attempt was unfolding on July 15th. The call was made via mobile application Facetime and was then widely disseminated via social media – an irony given Erdoßan’s well-known aversion to such platforms.
In what may have come as a surprise to those familiar Erdoßan’s polarising rhetoric, people across the country heeded the call in vast numbers. Zehra Aydogan, living in an area close to Istanbul’s main airport, reported that within an hour the streets of her neighbourhood were flooded with men and boys streaming towards the airport.
The clandestine group’s goal was clear: Obtain the building blocks of a radioactive “dirty bomb” — capable of poisoning a major city for a year or more — by openly purchasing the raw ingredients from authorized sellers inside the United States.
It should have been hard. The purchase of lethal radioactive materials — even modestly dangerous ones — requires a license from the Nuclear Regulatory Commission, a measure meant to keep them away from terrorists. Applicants must demonstrate they have a legitimate need and understand the NRC’s safety standards, and pass an on-site inspection of their equipment and storage.
But this secret group of fewer than 10 people — formed in April 2014 in North Dakota, Texas and Michigan — discovered that getting a license and then ordering enough materials to make a dirty bomb was strikingly simple in one of their three tries. Sellers were preparing shipments that together were enough to poison a city center when the operation was shut down.
More than 400 government documents have gone missing from the National Archives in the last four years.
They include Foreign Office files from the 1970s on "military and nuclear collaboration with Israel" and a 1947 letter from Winston Churchill.
One MP from the parliamentary group on official archives told the BBC he was "concerned" by their loss.
The National Archives said it was running a "robust" programme to locate the documents.
A response by officials to a Freedom of Information request from the BBC showed that 402 historical files remain unaccounted for since 1 January 2012.
They include more than 60 Foreign Office files, more than 40 from the Home Office and six from the official records of former prime ministers.
The National Archives in Kew, London, holds more than 11 million official documents, many of which have been transferred from government departments and are often opened as public records after 30 years.
Donald Trump asked a foreign policy expert advising him why the U.S. can't use nuclear weapons, MSNBC's Joe Scarborough said on the air Wednesday, citing an unnamed source who claimed he had spoken with the GOP presidential nominee.
"Several months ago, a foreign policy expert on the international level went to advise Donald Trump. And three times [Trump] asked about the use of nuclear weapons. Three times he asked at one point if we had them why can't we use them," Scarborough said on his "Morning Joe" program.
Scarborough made the Trump comments 52 seconds into an interview with former Director of Central Intelligence and ex-National Security Agency Director Michael Hayden.
Olympic thieves have robbed Denmark’s team of mobile phones, clothes and sheets, and even had the cheek to deprive Morten Rodtwitt, the country’s Olympic boss of his iPad.
“It’s extremely irritating,” Morten Rodtwitt, Denmark’s chef de mission in Rio, told Berlingske.
“In connection with the many extra workers, cleaners and housekeepers who have been squeezed into the Olympic village because of our requirements and requests, we have been subjected to a series of thefts,” he told TV2.
The thefts come on top of a string of problems with the athletes rooms which have forced the Danish delegation to complain of no fewer than 150 issues with their 36 apartments.
Before a campaign stop at a boutique tie manufacturer in Denver and a rally, Democratic presidential nominee Hillary Clinton raised money from a deep-pocketed donor with a potential interest in one of the most controversial issues facing voters in Colorado this November.
Clinton attended an Aspen fundraiser Tuesday hosted by Charif Souki, who amassed his fortune working for natural gas companies including one he founded last year, Tellurian Investments. The debate about fracking is intensifying in Colorado. In recent months, activists in the swing state have been pushing ballot initiatives to limit the practice while the oil and gas industry has pushed back with a multimillion-dollar campaign.
Under Clinton, the U.S. State Department was a major proponent of fracking, and her campaign has benefited from millions of dollars from donors connected to the oil and gas industry, according to a recent report from Greenpeace. By some estimates, Clinton raised at least $650,000 at the fundraiser with Souki, based on the number of people in attendance and the price of admission.
During the primary season, Clinton refused to say that she would completely ban fracking as president but implied that with the various restrictions she supports, including the ones being fought for in Colorado, there wouldn’t be a lot of land left over for fracking developments.
The Center for Biological Diversity today sued California regulators for supporting a so-called “aquifer exemption” plan to turn underground water in the Price Canyon area of San Luis Obispo County into a permanent disposal site for oil wastewater and other fluids. There are at least 100 water supply wells for drinking water and crop irrigation within a mile of this aquifer.
Today’s lawsuit, filed in Superior Court in San Luis Obispo, faults regulators for not analyzing the aquifer exemption plan’s risks as required by the California Environmental Quality Act. The suit asks the court to set aside the state’s approval of the aquifer exemption and halt oil company injection into this underground water until regulators have complied with CEQA.
Time Inc., which in recent weeks has undergone a major corporate reorganization and a retooling of its sales and marketing staff, is laying off an estimated 110 people across all areas of the company, according to people familiar with the situation.
As part of its reorganization efforts, Time Inc. has created new teams to focus on specific advertising categories in a bid to sell more advertising and advertising services to marketers across all its titles.
When you woke up this morning, chances are your morning routine was touched in some way by a private equity firm. From the water you drink to the roads you drive to work, to the morning newspaper you read, Wall Street firms are playing an increasingly influential role in daily life. So says a compelling new article in The New York Times, "This Is Your Life, Brought to You by Private Equity." For more, we speak with New York Times reporter Danielle Ivory, one of the contributors to the series as well as co-author of the recent article "When You Dial 911 and Wall Street Answers."
In uncertain economic times, austerity is oft prescribed as a panacea to a nation’s economic ills. International organisations, business groups, mainstream political parties and the media lead the cheer squad about nations needing to live within their means. To the person on the street, there is logic to it; in household finance, earning more than you spend is seen as prudent, therefore governments should follow the same formula.
The trouble is, if you have ever studied a reasonable mainstream version of economics, you would know that in uncertain economic times, governments need to go into deficit to sustain economic growth. Although the aforementioned groups would have you believe otherwise, this is not a radical notion. In fact, it is largely attributed to a stuffy product of the British establishment, the economist John Maynard Keynes and his concept of the circular flow of income.
Britain’s central bank cut Thursday interest rates from 0.5 percent to 0.25 percent—their lowest levels ever since the Bank of England was established in 1694. The cut is also the first since March 2009, when the world was in the midst of the great recession.
The move Thursday is an attempt to boost the U.K.’s economy after the unease caused by the Brexit vote.
CNN announced Wednesday it will host one of its town hall events with the Green Party's presumptive presidential nominee Jill Stein and her presumptive running mate, Ajamu Baraka.
The hour-long event will be held on Wednesday, August 17 at 9:00 p.m. ET. The event will broadcast live on CNN, CNN International, CNN en Espanol and online via CNNgo.
Stein has consistently polled as the fourth-most popular option in the presidential race, after Hillary Clinton, Donald Trump and Libertarian Gary Johnson. In the most recent CNN/ORC poll, Stein received 5% support nationwide, four points behind Johnson, her nearest competitor.
Republican presidential nominee Donald Trump had a baby thrown out of his rally in Virginia Tuesday night. No, really, he did. "Don't worry," he said, "the mom's running around, don't worry about it. It's young and beautiful and healthy, that's what we want. Actually, I was only kidding. You can get the baby out of here. I think she really believed me that I love having a baby crying while I'm speaking."
You're supposed to kiss the babies, jackass, not have them bodily removed. That was, by far and away, the least weird thing to happen on Planet Trump in the last 140 hours.
Khizr and Ghazala Khan's tectonic appearance at last week's Democratic National Convention transmuted Trump into a national punchline, again, for many prospective voters. He picked a fight with a Gold Star family and they ate his lunch on national television. The simple fact of the Khan family and the fallen soldier son they honor daggers home the lesson: Mess not with the righteous, lest you be shredded like cheese in the medium you thought you commanded.
A new ad from Priorities USA isn’t relying on Democrats to make the case against Donald Trump. Instead, it’s a who’s who of Republican leaders, from Mitt Romney to former CIA Director Michael Hayden, all arguing that the Republican nominee is a “clear and present danger” to the United States.
“What does this say about your party that this is your standard bearer?”
The headlines from President Obama’s excoriation of Donald Trump on Tuesday rightly highlighted his flat declaration that the Republican nominee is “unfit to serve as president.” But the challenge to Republican leaders who fell in line behind Trump was even more devastating.
Obama was not simply condemning a man whose brutal cruelty finally came home to anyone with a heart after Trump’s attacks on a Gold Star family. The president was also indicting the entire GOP leadership for courting the extremism that led to Trump and for acquiescing in his nomination.
Let’s focus on the most revealing aspect of this week’s turmoil within a party now aghast over the unstable egotist at the top of its ticket.
So, for decades Republicans were strategically pretending to be doofuses—Boot claims, for instance, that Dwight Eisenhower sometimes “resorted to gobbledygook in public…in order to preserve his political room to maneuver”—but have now been taken over by a real one. Ignoring for the moment the raw cynicism of this admission (consistent with the intellectual godfather of neoconservatism Leo Strauss’s theory of “the noble lie”), it’s important to note that “stupidity” in this context is simply a matter of marketing, not substance. Boot is right that Trump’s ignorance of the most basic facts is, on its own, disturbing, but what did the “thoughtful” GOP of the past get us?
Lamenting the lost reign of “Irving Kristol, Norman Podhoretz and George F. Will,” Boot offers, as exemplar of a remaining link to the party’s proud history in “the realm of ideas,” House Speaker “Paul Ryan, who devised an impressive new budget plan for his party.” Never mind that the plan impresses by zeroing out government agencies wholesale while taking food from the mouths of the poor; or that Ryan mindlessly votes in favor of every war, and has spent every moment in Congress making life harder for the poor, people of color, LGBT and women. In Boot’s world, pandering to voters’ ignorance in order to make life harder for the most vulnerable is A-OK, but a politician actually being ignorant calls for outraged denunciation.
And what does it mean to be “stupid,” anyway? Boot, who presumably considers himself part of the right-wing intelligentsia, was a staunch advocate of the Iraq War, which led to the deaths of over a million people and directly resulted in ISIS. He defended the war as late as 2013. He called for war against both Iran and Syria in 2011. In October 2001, he made “the case for American empire.” If this is the deliberative thoughtfulness Trump is deviating from, then it’s simply a different kind of stupid, not an absence of it.
Let this news, and the fact that it is news, sink in: Katrina Pierson, the former Tea Party activist who is now Donald Trump’s national spokeswoman, admitted on Wednesday that Barack Obama was not the president of the United States in 2004.
The reason it was considered necessary to extract this concession to reality from Pierson is that she had insisted, during an interview with CNN the night before, that President Obama was responsible for the death of Capt. Humayun Khan, an American soldier who was killed in Iraq five years before he became commander-in-chief.
Bernie Sanders supporters are flocking to Jill Stein, the presumptive Green Party presidential candidate, with donations to her campaign exploding nearly 1000% after he endorsed Hillary Clinton. Stein salutes Sanders for the progressive populist movement he began and says it is up to her to carry the baton. Can she do it? Critics say her radical policies will not hold up to scrutiny. But supporters say they are just the medicine the economy needs.
Stein goes even further than Sanders on several key issues, and one of them is her economic platform. She has proposed a “Power to the People Plan” that guarantees basic economic human rights, including access to food, water, housing, and utilities; living-wage jobs for every American who needs to work; an improved “Medicare for All” single-payer public health insurance program; tuition-free public education through university level; and the abolition of student debt. She also supports a basic income guarantee; the reinstatement of Glass-Steagall, separating depository banking from speculative investment banking; the breakup of megabanks into smaller banks; federal postal banks to service the unbanked and under-banked; and the formation of publicly-owned banks at the state and local level.
If you supported Hillary Clinton, it probably won't bother you that the Democratic National Committee is revealed in these documents to have essentially acted as an arm of the Clinton campaign during the contested primary season.
Most people guessed at this anyway. But it wasn't until these documents were dumped last week under mysterious circumstances that the extent to which the party both advocated for Hillary and against her opponent Bernie Sanders was made plain.
Nowhere is the discrepancy on greater display than in an episode involving the DNC's reaction to a May 2nd article by Politico reporters Ken Vogel and Isaac Arnsdorf, which itself pointed at a backdoor advantage for the Clinton campaign.
The exchanges over this Politico story were barely mentioned in the wake of the DNC leak, except by right-wing media that shortsightedly dinged Vogel for submitting a draft of his piece of the DNC before publication, suggesting "collusion."
Vogel maybe shouldn't have sent a whole copy for review, but his intent wasn't to give the DNC or Hillary a break – far from it. It seems pretty clear that he wanted to make sure he didn't miss with a piece full of aggressive, original reporting that took on a very powerful target.
In the piece, headlined "Clinton fundraising leaves little for state parties," Vogel and Arnsdorf discovered an anomaly in Federal Election Commission filings.
A joint fundraising committee called the Hillary Victory Fund, ostensibly designed to funnel money from rich donors to local party committees, had in fact been used as a cut-out to funnel money back to the national party and the Clinton campaign.
Enigma Software joined the long line of aggrieved companies who feel that legal threats and questionable lawsuits are the best form of reputation management. It sued BleepingComputer over a "defamatory review" -- which was actually just a forum post by a member that detailed (with supporting links) its questionable SpyHunter software and its "rogue tactics" over the years.
In addition to the defamation claims, Enigma Software also argued that BleepingComputer only did this to steer site readers towards its own products, alleging a handful of Lanham Act violations.
Unfortunately, Enigma Software's dubious claims have survived a motion to dismiss by BleepingComputer, thanks to some similarly dubious reasoning [PDF] by the judge presiding over the case. Not only are the Lanham Act claims given far too much credence (thanks to some twisted judicial analysis that assumes that because trademark is a part of the Lanham Act, false advertising claims under the Lanham Act are also intellectual property claims, exempt from Section 230 of the CDA), but the court's decision to allow the lawsuit to process also punches a few more holes in Section 230 protections.
Because the author of the post was a third-party contributor, BleepingComputer should not have been held responsible for the content of the post. However, the court appears to be bothered that the user in question was referred to as a "staff member" by BleepingComputer, even if it was actually a volunteer administrative post and BleepingComputer did not directly control the content of the user's contributions.
Dear Mr. Zuckerberg,
I'd like to share with you a very personal account of censorship in the digital age.
About a month ago, during the Gay Pride weekend, I had the pleasure of attending the Annual NYC Dyke March, with its festive climax in one of my favorite Downtown spots, the Washington Square. Being an integral and proud part of the community of several thousand march participants and spectators, I documented the happy lesbians parading around and flashing their breasts in the fountain.
It was a cheerful, peaceful and liberating event, much-needed after a couple of dreadful weeks following the devastating news of the Orlando mass shooting. To commemorate this exciting moment, I posted a picture on my Instagram of one happy bull dyke with a cool hairdo wearing nothing but a patriotic American bikini -- the ideal poster girl for this year's NYC Dyke Pride.
Dr Kambwili said although the public media had been given the authority to cover opposition political parties, it was important to censor the information that would be disseminated to the public to avoid raising alarm.
The Palestinian Journalists’ Forum has denounced Google for deleting the name of Palestine from its maps and replacing it with Israel.
In a statement released yesterday, the forum said Google’s decision to remove Palestine from its maps on 25 July “is part of the Israeli scheme to establish its name as a legitimate state for generations to come and abolish Palestine once and for all.”
“The move is also designed to falsify history, geography as well as the Palestinian people’s right to their homeland, and a failed attempt to tamper with the memory of Palestinians and Arabs as well as the world.”
The forum said the move was “contrary to all international norms and conventions”, stressing that Google should back track on its actions.
A new U.S.-European Union data-privacy accord that took hold this week could have been a reason to celebrate for Max Schrems, the 28-year-old whose successful landmark lawsuit against Facebook last year led to the new rules affecting more than 4,000 companies. Instead, he's saying the new rules should be thrown out as well.
Schrems says the new framework is muddled, allowing mass amounts of data collected by American technology companies to continue making its way to U.S. national security agencies. He expects the new policy to be struck down again by courts, leaving global companies further in limbo. “Privacy Shield is the product of pressure by the U.S. and the IT industry – not of rational or reasonable considerations," Schrems said in a statement after the rules, which began Aug. 1, were passed by European lawmakers last month. "It is very likely to fail again."
We're all used to warnings and promos ahead of films, from candy-filled "let's all go to the lobby" sequences to a polite-yet-firm reminder to power phones off. Sometimes, those sequences get a cute touch-up (my favorite is probably this wild, vulgar parody from the Aqua Teen Hunger Force film), but starting this week, moviegoers can expect something a little darker—as in, a harrowing warning that sounds like it might have been written by Edward Snowden.
It wasn't, however. Instead, the message was written, and is delivered, by Snowden film director and script co-writer Oliver Stone.
The Oscar winner appears in the one-minute clip, seated in a lovely den—complete with decadent furniture and giant bottles of assumedly fine liquors—with a smartphone in his hand. He starts describing the many things "this amazing little device" can do, from mass communication to cat-video streaming (and we're shown a few kitties briefly to make the point).
While Tor Browser provides many security and privacy properties and features, not everyone around the world has the luxury to connect to use it. By default, Tor Browser makes all of its users look alike by spoofing UserAgent (and other methods) to avoid fingerprinting attacks. However, it doesn't hide the fact you're connecting to Tor, an open network where anyone can get the list of relays. This network transparency has many benefits, but also has a downside: Many repressive governments and authorities benefit from blocking their users from having free and open access to the internet. They can simply get the list of Tor relays and block them. This bars millions of people from access to free information, often including those who need it most. We at Tor care about freedom of access to information and strongly oppose censorship. This is why we've developed methods to connect to the network and bypass censorship. These methods are called Pluggable Transports (PTs).
Pluggable Transports are a type of bridge to the Tor network. They take advantage of various transports and make encrypted traffic to Tor look like not-interesting or garbage traffic. Unlike normal relays, bridge information is kept secret and distributed between users via BridgeDB. If you're interested in helping censored users, you can become a bridge operator. And if you're a developer and have interesting ideas on how to make new PTs or want to contribute code, we've some good documents to get you up to speed.
And finally, if you're a censored user and want to take advantage of PTs, I've good news for you. They're already included in Tor Browser and this how-to graphic should help you configure it to bypass censorship.
Like a ton of people and companies, we've been using Slack here. While we saw some folks claim it was revolutionary, we found it to be a nice, but somewhat marginal, upgrade to our previous use of Skype chat rooms. But, over time, it has certainly gotten comfortable, and there have been some nice feature add-ons and integrations that have made it a pretty cool service overall -- though if you really want to use it to its fullest extent and switch to the paid version, it can get pretty pricey, pretty quickly. I also am in a bunch of other group Slack chats, as it's basically become the platform of choice for group discussions.
However, in these days where hacked emails are in the headlines, I can see why some might get nervous about using a tool like Slack. Not that there have been any known breaches of Slack that I'm aware of, and I'm sure that the company takes security very seriously (it would undermine its entire business if it failed on that front...), it's been interesting to see other options start to pop up, which might be more appetizing for those who are extra security conscious.
The NSA whistleblower posted a puzzling tweet on Aug 3. He said, “It’s time” and requested his former colleagues, probably who were working with NSA, to reconnect with him. Snowden also mentions the name of Barton Gellman.
It's not just FBI agents playing with Home-Grown Terroristâ⢠Erector Sets. It's also Canada's top law enforcement agency, the Royal Canadian Mounted Police. When there apparently aren't enough actual terrorists to be found, agencies like these need to front the $40 at Wal-Mart for terrorist supplies, or dupe someone with an IQ of 51 into becoming the latest Indictment Du Jour.
Despite this, courts have largely gone along with the charade. It's almost impossible for someone to successfully raise an entrapment defense, whether it's a group of senior citizens who've been molded by undercover agents into an ad hoc terror unit or a bunch of easily-impressed thugs being hounded into stealing nonexistent drugs from fake stash houses.
Up in Canada, though, the law enforcement game may be played by the same rules, but one court isn't willing to encourage the RCMP's Build-a-Terrorist shenanigans.
The FBI “terrorism” arrest of a Washington, D.C., Metro police officer making headlines all over the world on Wednesday actually involved a man who sent $245 worth of gift cards to an FBI informant he thought was his friend.
Nicholas Young, a 36-year-old Virginia man, had previously tried to dissuade the informant from joining ISIS, even as the informant spent years cultivating him and waiting for him to do something illegal.
Young was accused of attempting to provide material support to the militant group the Islamic State. News reports highlighted his job prominently and announced that he had been accused of “helping ISIS” — making it sound like he was about to blow up the subway.
If we really care to defend the European project, it is completely unreasonable to start institutional revisions before having radically changed the policies that brought us to this multi-faced crisis, so similar to the one of the 30s, in the first place. And the root-cause is not only in the EU's economic-financial make-up but also in its democratic failure, the disintegration of societies, and a loss of orientation and hope experienced collectively by European citizens.
Last week, shocking footage depicting security personnel in a Northern Territory (NT) juvenile detention center teargasing and torturing indigenous detainees made headline news in Australia. In contrast to the uproar it has now engendered, this incident was actually first reported two years ago and attracted little outcry from a largely disinterested Australian public. Despite the tireless efforts of indigenous and social justice advocates, the vast majority of Australians remain reluctant to address the elephant in the room: that the use of mass incarceration among indigenous people in Australia is a tool of ongoing colonization.
It’s been 25 years since the Royal Commission into Aboriginal Deaths in Custody made 339 recommendations on how the government could finally take action on the systematic discrimination and grave maltreatment of Aboriginal and Torres Strait Islander people in the Australian justice system. One of the foremost recommendations was that incarceration should be used as a last resort.
Stockholm syndrome: Feelings of trust or affection felt in certain cases of kidnapping or hostage-taking by a victim towards a captor.
In the 2016 Democratic primary, US labor unions overwhelmingly endorsed Hilary Clinton and invested millions of dollars in ensuring her nomination. Few eyebrows were raised, despite Clinton's questionable record and platform towards workers. Why not? Organized labor's support for political enemies of unions and workers is so common it has become expected. The labor movement suffers from a political Stockholm syndrome, embracing the very politicians who attack them. The embrace of Hillary Clinton, openly hostile to the current campaigns of some of the very unions who endorsed her, exposes the self-destructive absurdity of the situation. An intervention is needed or unions will be hard-pressed to reverse their current decline if they do not shake the Stockholm syndrome and adopt different political strategies.
Endorsing less-than-friendly politicians is nothing new for US unions but the widespread endorsement of Hilary Clinton is a reductio ad absurdum of the practice. Clinton, in addition to maintaining a general anti-labor slant, has opposed the principal campaigns of some of the very unions endorsing her.
For example, how did the Service Employees International Union (SEIU) respond to Clinton's refusal to support a $15 minimum wage, something the SEIU has invested many years and untold millions of dollars into? By enthusiastically endorsing her, investing millions of dollars into her campaign (SEIU has already given her more than $2 million), and vigorously mobilizing its members to vote and volunteer for Hillary as their champion.
In Chicago, the #LetUsBreathe Collective has transformed a lot adjacent to the Homan Square facility, exposed as a Chicago Police Department “black site” by The Guardian last year, into a beautiful organizing space aptly called Freedom Square. While the city continues to divest social resources from our communities, this site of torture has become a site of freedom and visionary love in a neighborhood that is over-policed and over-incarcerated. According to Million Dollar Blocks, North Lawndale committed nearly $241 million to incarceration in 2005-2009.
Throughout our 96-year history, the Constitution has guided so much of what we do at the ACLU — we strive to help people understand and care about our founding document and show how it’s relevant in our everyday lives. And suddenly, during this year’s election cycle, the Constitution ended up being an especially hot topic.
After Khizr Khan’s speech urging Donald Trump to read the Constitution, we decided to offer our pocket Constitutions free of charge from ACLU’s online store. We received a more enthusiastic response than we ever could have imagined, with over 100,000 copies ordered in the span of a few days! Thanks to this unprecedented demand, we are officially sold out of pocket Constitutions.
We’re thrilled to discover so many fellow Constitution nerds.
Was it meant as an epic parody or an insult to his audience’s intelligence? It was hard to tell.
Israeli prime minister Benjamin Netanyahu took to social media to apologise for last year’s notorious election-day comment, when he warned that “the Arabs are coming out to vote in droves” – a reference to the fifth of Israel’s population who are Palestinian.
In videos released last week in English and Hebrew, Netanyahu urged Palestinian citizens to become more active in public life. They needed to “work in droves, study in droves, thrive in droves,” he said. “I am proud of the role Arabs play in Israel’s success”.
Pointedly, Ayman Odeh, head of the Palestinian-dominated Joint List party, noted that 100,000 Bedouin citizens could not watch the video because Israel denies their communities electricity, internet connections and all other services.
A Chinese activist has been jailed for more than seven years for subversion, the second person jailed in two days in a crackdown on legal activism.
Hu Shigen pleaded guilty in Tianjin to "damaging national security and harming social stability", said state media.
On Tuesday, Zhai Yanmin was found guilty of subversion and handed a three-year suspended jail sentence. Two more activists also face trial.
The cases have been widely seen as an attempt to silence government critics.
Around 300 lawyers and activists have been arrested since last year as part of the nationwide campaign. About 20 are still detained.
When violence rocks a household, most often a woman bears the blows. But even if they’re just onlookers, children can become victims, too.
Some youngsters are amazingly resilient—after witnessing the horrors of domestic violence, they grow up without suffering from trauma.
In other cases, children don’t get over what they see at home. Their exposure to violence scars them mentally and emotionally, and the damage can last a lifetime.
As school starts in the United States this fall, an ambitious national campaign will address the effects of domestic violence on children. Its goal is to raise awareness among adults who work with them, including teachers, coaches and social workers. The campaign will complement existing programs that help young people build resilience.
It's the most unsettling memory of my childhood.
Watching my father physically drag my mom out of bed, her body thumping onto the floor, and him throwing clothes at her while screaming. Every few words, he would hurl an item of clothing at her.
For Christ's sake Lois, get out of the *** ****** bed and take care of this ******* house. He stood over her, glaring while my mother curled into a fetal position and sobbed. He turned around and saw me in my doorway across from their bedroom. I quickly pulled my arms around myself in a protective posture and dropped my gaze to the floor. The hard slap to the side of my head never came.
He didn't say a word to me. He left the bedroom, slamming the door behind him and stomped down the stairs and out the kitchen door. The glass in that outer kitchen door shattered violently as he slammed it for punctuation. I waited to even move until I heard the engine of his old truck fire to life and the sound of tires on gravel as he left our driveway onto the main road.
It wasn't until I turned to go back into my bedroom, I realized I had urinated in my pajamas.
Baltimore County police shot and killed Korryn Gaines, a 23-year-old black woman, after an hours-long standoff on Monday — during which Facebook and Instagram, at police request, temporarily shut down Gaines' accounts.
Gaines, who police say was armed with a shotgun, is the ninth black woman shot and killed by police so far this year, The Washington Post reports. Her 5-year-old son was wounded in the exchange of gunfire. The case has attracted a significant amount of attention on social media.
In the midst of a five-hour standoff that turned deadly, Facebook granted an emergency request from the Baltimore County Police Department to take offline the social media accounts belonging to a woman who wielded a shotgun at officers.
Baltimore County Police officers shot and killed Korryn Gaines, 23, after she barricaded herself inside her Randallstown apartment with her 5-year-old son and pointed a shotgun at officers attempting to serve an arrest warrant.
A mother who was involved in an armed stand-off with Maryland police had been posting live videos to social media before she was shot dead in a raid which also saw her five-year-old son wounded.
Korryn Gaines, 23, barricaded herself in her apartment for five hours and allegedly pointed a shotgun at officers who were trying to arrest her over a missed court appearance.
Videos posted to Facebook and Instagram showed Ms Gaines talking to armed police stood in the doorway to her home, as well as to her son.
And it has now emerged that Facebook granted an emergency request from police to have Ms Gaines’ profile shut down during the stand-off, amid fears public comments on her videos could undermine negotiators’ efforts.
For many minorities, what happens in the community stays in the community.
But last winter, 17 Indian women from a tiny sect of Islam blew the lid off a guarded secret, spurring scrutiny, controversy, debate and vituperative abuse. Since then, online and off, they've been called sexually promiscuous, non-believers and traitors to their faith.
Their crime? They authored a petition asking the government of India to outlaw female circumcision.
Until the petition went public in December, many Indians didn't know female genital mutilation — or FGM — happens in the country at all. In India, the Dawoodi Bohra Muslims are the only community that practices female genital mutilation in the form of circumcision, a practice they call khatna that dates back 1,400 years, according to the clergy. There are about a million Dawoodi Bohra Muslims globally; the majority live in India and some in Pakistan, with diaspora populations across the world.
"Nobody talked about it at all. It was never a part of conversation, ever. It was such a secret, such a top secret," says Masooma Ranalvi, one of the women who spearheaded the petition. "Sexuality is not anything you talk about with anyone. What happened to me as a child, what part of me was cut or why was it cut, was never something I talked about with my mother or my sisters. My elder sisters had both been through it in a similar way — exactly the same procedure, my grandmother took them as well. We never communicated with each other, then or as adults. It remained between you and the grandmother that took you for it."
Ranalvi, who runs a publishing house in Delhi, says she was in college when she realized what had been done to her.
A "total ban" on Muslim state schools has been called for by Lisa Duffy, the Ukip leadership hopeful.
Ms Duffy, who is expected to be announced as once of the candidates in the party's leadership race at noon today, has called for Islamic faith schools to be shut down in a bid to tackle radicalisation.
Luton’s olympic swimming pool has began hosting gender-segregated swimming sessions because of “cultural” reasons, it has been alleged.
Users of the competitive pool at Inspire Sports Village in Stopsley – built with taxpayer-funded Olympic money – were given sudden notice that there would be men-only sessions on Friday evenings from July 29.
Women-only sessions will also take place on a Friday evening, but in the smaller community pool.
One outraged female swimmer told Luton News: “The Friday night session for everyone is now closed because of the listed men-only sessions.
“I have asked a team leader about it – as there are no managers at the weekend – and he said it was a ‘cultural thing’.”
Women who do not want to use the community pool are reportedly told to use Lea Manor or Lewsey Pools.
The woman added: “Why has one section of the community in Luton been allowed to dominate and take over the best pool in the borough?
“Why can’t they instead have booked Lea Manor or Lewsey pools?
One of the most important prelates in the Catholic Church in Hungary has warned that the enormous waves of migrants rolling into Europe are due in no small part to a Muslim “will to conquer,” by expanding their territory into the continent.
Corruption is on the up in Finland—and the private sector leads the way. That’s the main finding in a new report from the Police University College, which looked at how prevalent different forms of corruption are across business and the state sector.
LibreOffice 5.2, the newest version of the open source productivity suite, is aiming at becoming a tool of government and professional organizations, not merely a free substitute for Microsoft Office.
Most notably, Version 5.2 supports the Transglobal Secure Collaboration Program (TSCP) standards for document classification. These standards describe the sensitivity of the information in a document and how heavily its access should be restricted.
Apple, Google and Microsoft, are in an ideal position to deter piracy, according to a new report published by Black Market Watch and the Global Initiative against Transnational Organized Crime. The controversial report opts for voluntary or mandatory blocking of pirated content on the operating system level.
The lawyer of a 90-year-old woman, who mistakenly started filling in an art exhibit in the form of a crossword puzzle, claims that she holds the copyright of the "new" work. The 1977 creation by the 20th-century artist Arthur Köpcke was lent to Nuremberg’s Neues Museum by a private collector, and is said to be worth around €£68,000.
The retired German dentist, Hannelore K.—her full name has not been released—visited the gallery along with other pensioners last month. During a half-hour interview with the local police following the discovery of her additions to Köpcke's creation, the woman said that she started filling in the artwork's crossword puzzle because it bore the phrases "Insert words" and "so it suits."