Over the years, I've had my fair share of disagreements with both Linux and Linux users. But as Linux has entered its second quarter century, I've found myself thinking about all the fabulous things that run Linux.
Two years ago, I wrote an article about the five reasons I'd rather run Windows 8 than Linux. While Windows 8 didn't work out all that well, Windows 10 is clearly a barn-burner. Today, in fact, you can find Windows 10 running inside a Raspberry Pi (and it's free for individuals) as well as inside of very inexpensive PCs.
But ever since I threw OctoPrint on a $35 Raspberry Pi and created a 3D printing server, I've felt I've come to terms with Linux. I think we can be friends again.
So I thought, if I can use Linux to build 3D objects, what else would I use Linux for? Here are 10 places where the phrase "I'd rather run Linux than Windows" applies quite nicely.
For the attention of the users, supporters, fans and corporate users of ArduPilot:
The ArduPilot project is going through a transition. We will no longer be associated with DroneCode and instead will be focused directly on the needs of our users, contributors and partners.
We had high hopes for DroneCode as a collaborative project. DroneCode was born out of the ArduPilot project and we led the technical collaboration since its inception nearly two years ago. As part of that collaboration we welcomed and nurtured close ties with the PX4 project and worked closely with a number of corporate partners.
Unfortunately DroneCode has a built-in flaw. The structure and bylaws of DroneCode are built around exceptional power for the Platinum members, giving them extraordinary control over the future of DroneCode. This is a fundamental flaw in a project meant to promote free and open source software as it means that the business interests of a very small number of members can override the interests of the rest of the members and the community.
In the early days of Linux it was possible to do high-quality audio recording, but it was often difficult to set up. Then Ubuntu Studio made it a lot easier.
Back in 2000-2002, after studying B2B marketing, I started to work at an engineering office. Aside from marketing and sales stuff, I was in charge of optimizing the number of workstations and licenses to match our real needs and cut costs.
We had many expensive CAD workstations that were mainly running Unix at the time, from vendors such as SGI, IBM, and Sun, with costly CATIA, Euclid, and Unigraphics software.
I was a computer geek but because of my studies in marketing, I didn't have the opportunity to play with Unix systems. Then I discovered GNU/Linux, and I downloaded some available distributions, including Red Hat, Mandrake, and Debian. These distros were not easy to install like they are today, and often even getting the network working was difficult, but having a terminal on a cheap laptop was great.
In 2004 I adopted Ubuntu, a version of Linux that was good for new users.
Thanks to Framasoft.org, I already was using a lot of open source applications before switching to Linux, such as Firefox, OpenOffice, Gimp, and Inkscape.
As vendors scramble to update their OpenStack distributions based on the latest Mitaka release, developers are already teasing what’s in store for the next version of the cloud computing fabric, dubbed OpenStack Newton.
A number of vendors have already gotten their latest releases based on Mitaka out of the door, including Red Hat Inc. and Rackspace Inc. The latter released its updated private cloud distribution on Monday, labeling it a “managed services” platform rather than just a regular OpenStack platform due to its reference architecture based on the OpenStack-Ansible project that aims to add “security hardening” to the open-source software. Rackspace is clearly gunning for the more security-conscious among the OpenStack crowd, and took pains to emphasize in a whitepaper about the trade-off relating the application of more comprehensive security configurations and potential performance and availability issues.
OpenStack cloud computing distributions, many of them based on the latest Mitaka build of the OpenStack platform, are proliferating. With so many vendors competing in this arena, market consolidation is also underway.
Only days ago, Red Hat announced its latest platform: OpenStack Platform 9. Directly on the heels of that, VMware introduced VMware Integrated OpenStack 3. These distributions are based on the OpenStack Mitaka release. Now, Rackspace has rolled out version 13 of Rackspace Private Cloud powered by OpenStack. The new version addresses stability and security requirements for enterprise customers and is based on the Mitaka release.
Stability and security are points of focus for Rackspace because the OpenStack market is now competitive enough that each vendor participating needs to make clear what the competitive differentiators are. Rackspace is also, as usual, focused on "fanatical support."
Any rational organization that wishes to run mission-critical services on containers will at some point ask the question: “But is it secure? Can we really trust containers with our data and applications?”
Amongst tech folks, this often leads to a containers versus virtual machines (VMs) debate and a discussion of the protection provided by the hypervisor layer in VMs. While this can be an interesting and informative discussion, containers versus VMs is a false dichotomy; concerned parties should simply run their containers inside VMs, as currently happens on most cloud providers. A notable exception is Triton from Joyent, which uses SmartOS Zones to ensure isolation of tenants. There is also a growing community who believe that container security and isolation on Linux has improved to the point that one can use bare metal container services not using VMs for isolation; for example, IBM has built a managed container service on the public Bluemix cloud service that is running without VM isolation between tenants.
The more the enterprise gravitates toward software-defined architectures, the more it is confronted with diverse data loads and increasingly complex application requirements. This is leading to a Catch-22 in that while overall hardware requirements are diminishing, the enterprise still needs to field a wide variety of solutions in order to provide optimal support for emerging workloads.
The latest Raspberry Pi VC4 DRM driver changes have now landed in DRM-Next for in turn landing in the mainline kernel when the Linux 4.9 merge window opens in a few weeks.
The two main feature additions for the VC4 DRM driver are interlaced vblank timing and a memory/CPU overhead reduction when 3D rendering is taking place. The overhead reduction is from not forcing the new binner overflow allocation per-draw. Aside from the VC4 DRM driver work, with Linux 4.9 is where there finally might be mainline support for the Raspberry Pi Zero.
The open-source OpenDayLight Software Defined Networking (SDN) project is set to debut its fifth release this week, codenamed Boron. The Boron release follows the Beryllium update, which debuted in February.
There has already been more improvements hitting Mesa Git this week.
Among the noteworthy recent additions in Mesa Git include:
- A RadeonSI change not to preload constants at the beginning of shaders. By doing so, very simple tests are seeing improvements -- a big decrease in SGPR spilling for shader-db tests by up to 68%.
Intel's Precise Touch and Stylus (IPTS) technology offers GPU-accelerated multi-touch/stylus handling using OpenCL. While there have been kernel patches for a few months floating around, this support has yet to be merged into the mainline Linux kernel.
A Phoronix reader wrote in this morning to say that the IPTS code remains available for Linux but isn't mainline. He also pointed out that the IPTS support is needed for supporting the touchscreen/stylus on devices like the Microsoft Surface Pro 4.
Today, most of us use graphical text editors, but many developers still use vi, or its modern clone Vim, or Emacs, and they're as passionate about their choice of editors as ever. I'm not sure why since vi is clearly the better choice.
After almost 40 years of development, there's not a lot left to be improved in Vim. But, after a decade, some things needed changing. So it is that Vim 8 has just been released.
The monthly maintenance update of the popular, open-source, and cross-platform VirtualBox virtualization software from Oracle is here, VirtualBox 5.1.6, available now for GNU/Linux, Mac OS X, and Microsoft Windows platforms.
VirtualBox 5.1.6 was released on Monday with many fixes and minor improvements for this Oracle cross-platform virtualization tech.
Rocket League blasted on to Linux at the end of last week and we were ridiculously about it — but perhaps you're not caught up in the excitement.
Linux gamers making use of a Steam Controller will want to try out the latest Steam Client Beta.
Although some may think that this is a cheap marketing campaign, there is a truly interesting article written by the developers where they explain the alleged reasons for not making games anymore. Though, after reading it, I can’t help but wonder: what would happen if the game turns out to be a massive commercial hit? Would they change their minds?
Space Pirates and Zombies 2 [Official Site] looks damn good, the reviews are looking good for it too and it is still planned for Linux which is great news.
The Warlock of Firetop Mountain is a fantasy solo RPG with turn-based battles, it's made in the style of a table-top game. The developers have confirmed it's coming to Linux.
Today, September 13, 2016, the KDE development team proudly announced the release and immediate availability of the last maintenance update to the KDE Plasma 5.7 desktop environment series.
Today, September 13, 2016, the KaOS development team had the great pleasure of announcing the availability of a new, updated installation medium of their KaOS Linux computer operating system.
KDE regularly polls as the most popular desktop environment for Linux. However, because more desktops use GNOME applications, to many users KDE might as well be a separate operating system. That is unfortunate, because some of the most feature-rich free applications are designed for KDE.
I am not referring here to utilities like the Kate text editor, the Konsole terminal, or even the Dolphin file manager. All of these are well-integrated into KDE and have all the features any user could want, but most of them are matched by GNOME counterparts. Rather, I am thinking of applications that are outstanding by any measure, the best of breed in their software categories.
Now that the GUADEC (GNOME Users And Developers European Conference) event for the soon-to-be-released GNOME 3.22 desktop environment has come to an end, the GNOME Project is already planning for the next year's installation.
It looks like running the GNOME desktop environment natively on Wayland should be in pretty good shape after a round of last-minute improvements.
GNOME 3.22 package updates this week provided a number of important Wayland fixes:
Mutter 3.21.92 fixes for Wayland: absolute pointer motion events, animated cursors, various crashes, XWayland pointer warp emulation, and other non-Wayland improvements.
Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced that Herzog Technologies, a leader in the railroad signal and communications industry, has launched a cloud-based positive train control (PTC) solution using Red Hat technologies. The enterprise-grade foundation of Red Hat Enterprise Linux provides the backend to the complex IoT system required for the intelligence and dynamism expected of PTC, while Red Hat CloudForms and Red Hat Satellite help Herzog with systems management and compliance. Combined, Red Hat’s powerful open source technologies are helping Herzog provide railroads with the ability to more quickly adopt PTC technology, helping to enable safer and more efficient rail transportation.
Now that the final release of the upcoming Debian GNU/Linux 9 "Stretch" operating system is getting closer and closer, the Debian developers are gathering together later this month in Salzburg, Austria, for a bug squashing party.
The legacy copyright industries keep insisting that it's "easy" to recognize when something is infringing and thus it's "easy" to stop copyright infringement. They're very, very wrong on both counts for a variety of reasons. We could go into the details for why, but it's easier to just let them show us themselves. Not too long ago we wrote about Warner Bros. issuing DMCA takedown notices on its own sites (and also Amazon and IMDB links for its movies), and now TorrentFreak alerts us to Paramount issuing a DMCA takedown on a torrent of Ubuntu, the popular version of Linux that many people use all the time.
It's kind of a weird request, and it's not at all clear why it's included in this takedown notice, which is for a variety of movies. In the section on the movie Transformers: Age of Extinction, Paramount (filed by notoriously clueless IP Echelon), it includes a link to a torrent of an Ubuntu iso.
While Google is normally pretty good at stopping daft take-down requests from the movie studios, it seems to have missed a doozy.
Paramount Pictures ordered a takedown of a link to a 32-bit alternate install image Ubuntu 12.04.2 LTS because it apparently infringed on Paramount movie ‘Transformers: Age of Extinction‘.
The link pointed to a stock and dated old Ubuntu release which has nothing to do with the god awful flick.
Ubuntu SDK developers Benjamin Zeller and Zoltán Balogh are announcing the release of the Ubuntu SDK 4.1.0 IDE (Integrated Development Environment) for the Ubuntu Linux operating system.
A new drone is about to hit the tech world by storm and it is called the S.L.A.M. dunk by Parrot from France. This news started roaming around the Internet on September 8. But it is not just a drone because when it is not up in the air flying, it also serves as a computer, which is powered by Linux.
Today, September 13, 2016, the development team behind the Deepin Linux operating system were happy to announce the availability of the third maintenance update to the Deepin 15 series.
Via unveiled three new Linux- and Android-based IoT devices, including a multiwireless home gateway, a telestrator, and a wireless display system.
Via Technologies announced a Via IoT Studio series of products for smart home control, building automation, educational applications. The Via IoT Studio line is headlined by a “Via Alegro 100” multiprotocol home gateway router with support for WiFi, Bluetooth, ZigBee, Z-Wave, Ethernet, and KNX communications. The customizable gateway is supported with Android 4.0 and Linux 3.0.8 BSPs (board support packages).
This week, the Raspberry Pi Foundation announced it has sold more than 10 million Raspberry Pi boards and celebrated the milestone by releasing a new Raspberry Pi Starter Kit. While many of these Linux-driven hacker boards were used for the foundation’s original purpose -- creating a low-cost computer for computer education -- a large percentage have been sold to hobbyists and commercial developers working on Internet of Things (IoT) projects ranging from home automation to industrial sensor networks.
Linux-driven open source and commercial single board computers and modules sit at the heart of the IoT phenomenon. They are usually found in the form of gateways or hubs that aggregate sensor data from typically wirelessly enabled, sensor-equipped endpoints. Sometimes these endpoints run Linux as well, but these are more often simpler, lower-power MCU-driven devices such as Arduino-based devices. Linux and Windows run the show in the newly IoT-savvy cloud platforms that are emerging to monitor systems and analyze data fed from the gateways in so-called fog ecosystems.
Over the next few weeks, I’ll be analyzing the IoT universe, with a special focus on Linux and other open source technologies used in home and industrial automation. I’ll look at major open source products and projects, IoT-oriented hacker boards, security and privacy issues, and future trends.
The Samsung wearable devices are growing by the day in numbers and so too will the need for some apps which would aid them achieve maximum users experience. Apart from individuals, companies are adopting the smartwatches in their business processes. In order to fast track and ease the process of developing softwares, Samsung has released a Software Development Kit for its wearables known as Knox Tizen Wearable SDK
Today, September 13, 2016, Android-x86 developer Chih-Wei Huang was happy to announce the general availability of the final release of the Android-x86 6.0 operating system for personal computers.
Your old Android tablet just isn't good enough to be your daily driver anymore, but it isn't valuable enough to trade in or sell on eBay. However, that doesn't mean you have to throw it in the trash or leave it languishing in a drawer.
From turning it into a security camera to making it a smart remote or handing it off to your kids, here are 10 great uses for an old Android tablet.
Today, September 13, 2016, we are being informed by Jide Technology about the availability of the latest OTA software update for the Remix OS for PC Android-x86-based operating system.
Android has just released the latest detailed statistics regarding the operating system’s version distribution, and it’s no real surprise to see that Android 7.0 Nougat isn’t quite on the listing yet. These numbers represent data taken over the past month, so Nougat still isn’t represented on the charts. Android only counts versions equal to or exceeding .1 percent of the ecosystem.
If a comment on a CyanogenMod commit thread by founder Steve Kondik is any indicator, rumors that Cyanogen Inc. is basically getting out of the OS development business seem to be coming to fruition.
Right now you can pick up a Samsung Chromebook 3 for just $180 at Amazon, a savings of $50. The 11.6-inch Chromebook offers 4GB of RAM, a 16GB SSD, an Intel Celeron N3050 processor to help it run Google's Chrome OS with ease. Samsung's Chromebook 3 offers 11 hours of battery life, which should get most people through an entire day's use without plugging it in.
LG announced all the details of the V10 successor and after several days it looks like a worthy competitor to the Samsung Galaxy Note 7. Unfortunately, we don't know when it will hit the streets.
At first glance, one big reason why a company not in the business of software development might more enthusiastically embrace an open source program office is because they have less to lose. After all, they're not gambling with software products that are directly tied to revenue. Facebook, for example, can easily unleash a distributed key-value datastore as an open source project because they don't sell a product called "enterprise key-value datastore." That answers the question of risk, but it still doesn't answer the question of what they gain from contributing to the open source ecosystem. Let's look at a few potential reasons and then tackle each. You'll notice a lot of overlap with vendor open source program offices, but some of the motivations are slightly different.
As open source software matures and is used by more and more major corporations, it is becoming clear that the enterprise software game has changed. Sam Ramji, CEO of the Cloud Foundry Foundation, believes that open source software is a positive sum game, as reflected in his keynote at ApacheCon in Vancouver in May.
Invoking his love of game theory, Ramji stated emphatically that open source software is a positive-sum game, where the more contributors there are to the common good, the more good there is for everyone. This idea is the opposite of a zero-sum game, where if someone benefits or wins, then another person must suffer, or lose.
In a recent article, we provided an overview of 45 AI projects that seem particularly promising or interesting. In this slideshow, we're focusing in on open source artificial intelligence tools, with a closer look at fifteen of the best-known open source AI projects.
Years ago I was at a Canonical sprint in Europe, where a colleague, who was an active gamer, shared his idea for some kind of high-scores system in which community members could compete in the way they contributed. His off-the-cuff idea got me thinking.
Although a competitive framework was not interesting to me—we had tried a hall of fame, which ultimately didn't deliver the results we wanted—the idea of a gamification platform got me excited.
What happens when the way we buy, sell and pay for things changes, perhaps even removing the need for banks or currency exchange bureaus? That's the radical promise of a world powered by cryptocurrencies like Bitcoin and Ethereum. We're not there yet, but in this sparky talk, digital currency researcher Neha Narula describes the collective fiction of money — and paints a picture of a very different looking future.
Bitmain, one of the world's leading manufacturers of Bitcoin mining hardware, has announced the launch of an open-source bitcoin mining pool, as a part of its free bitcoin block explorer, analytics tool and bitcoin wallet BTC.com.
IT managers are seeking alternative ways to replace their legacy software, without dropping Windows operating system due to high cost implementation and license dependency of proprietary software. Open Source software has found its way into enterprises infrastructures as it provides access to third party vendors and developers to modify the software and publish them. They are also known as Free or Libre Open Source Software (FLOSS). FLOSS licenses users with the freedom to study and modify the program, to run for any function and to redistribute copies of either the original or modified source code (without having to pay royalties to previous developers). And, enterprises can update the FLOSS executions according to their requirement and also publish it for the other user’s requirement. This is one of the reasons why enterprises appreciate Open Source products and its advantages.
Due to the open nature of the software, the design deliberations are open in contrast to the closed processes of proprietary vendors’ software. Also, the Open Source software products are easy to assess and evaluate with the help of the Community and Help pages. Open Source allows anyone to contribute code and permits software to integrate with not commonly encountered use cases, that a proprietary vendor would least taken into consideration. In terms of innovation, the Open Source development reflects Bill Joy’s law: “No matter who you are, most of the smartest people work for someone else.” That is unfeigned for all the software vendors, so leveraging a product with potentially larger developer base enables access to greater innovation.
Braid is designed as an open source tool for developing artificial intelligence (AI) systems. According to Vinay Kumar Sankarapu, CEO and founder of Arya.ai, by introducing open sourcing key tools in AI, the emerging field will grow faster and developers will be able to easily design more impactful applications.
Startup Arya.ai on Monday introduced Braid, an open source tool available for free to companies developing neural networks. Braid is a flexible, customizable, modular meta-framework that works with operating systems for deep learning. It is designed for rapid development and to support arbitrary network designs. It is simple and scalable, for use with networks that need to handle many data points at large volume, Arya.ai said. Braid allows for quick experimentation without having to worry about the boilerplate components of the code.
The little talked about stress of Open Source project release management…
So I really enjoy writing code. Been doing it for years, since I was 8! I still do it now when work needs me to, or in my less than copious free time.
The problem I tend to find on these projects is that you can make them as simple or as complex as you like. This can be a curse and a blessing.
For me it tends to be a curse.
Oracle's open-source NetBeans IDE could become the next former Sun Microsystems project to land at the Apache Software Foundation (ASF).
In recent posts, we've taken note of the many projects that the Apache Software Foundation has been moving up to Top-Level Status. The organization incubates more than 350 open source projects and initiatives, and has squarely turned its focus to Big Data and developer-focused tools in recent months. As Apache moves Big Data projects to Top-Level Status, they gain valuable community support and more.
Recently, Apache Bahir became a Top-Level Project (TLP). Now, the foundation has announced that it is making available Apache Syncope 2.0, a digital identity and access management system. Implemented in Java EE technology, Apache Syncope is designed to keep enterprise identity data consistent and synchronized across repositories, data formats, and models.
"Syncope 2.0.0 is a major milestone for the community," said Francesco Chicchiriccò, Vice President of Apache Syncope, and one of the original creators of the project. "The numbers of this release look great --new features, new components and tools, new contributors, more enterprise appeal, and even more extensibility."
Researchers Balint Seeber, Marc Newlin and Matt Knight to Speak and Host Wireless Hacking Challenge for Conference Attendees
With the current focus on the cloud it might seem that the Internet works from the center out -- if the Internet can be said to have a center. And with the massive move of IT infrastructure to the cloud, DevOps folks might be wondering what this means for the future of their careers and if increasing centralization will mean a shrinking job market, a question Robert Shimp with Oracle's Linux and virtualization unit, took a stab at answering at last month's LinuxCon.
[...]
Shimp was giving a presentation on "Linux Administration in Distributed Cloud Computing Environments." Despite the use of the word "Linux" in the title (it was LinuxCon, after all), he spent the first half of his presentation laying out his vision for what the Internet holds in store, with none of it being Linux specific. The future, it seems, will almost certainly be operating system agnostic.
Come share snacks and refreshments with the free software community. FSF campaigns manager Zak Rogoff will be happy to talk about our ongoing battle against Digital Restrictions Management in Web standards, the recent European net neutrality victory, our role in the new White House source code policy, and almost anything else you ask him about. The FSF will provide the first round of snacks and beers, with more available from the menu.
This is an informal gathering for anyone interested in spending time with the free software community or learning more about the FSF; you are welcome, whether you are free software noob or hacker extraodinaire.
News began circulating yesterday that the popular open source database MySQL contains a publicly disclosed vulnerability that could be used to compromise servers. The flaw was discovered by researcher Dawid Golunski and began getting media attention after he published a partial proof-of-concept of the exploit, which is purposefully incomplete to prevent abuse. He said the exploit affects "all MySQL servers in default configuration in all version branches (5.7, 5.6, and 5.5) including the latest versions." In addition, MariaDB and Percona DB which are derived from MySQL are affected.
A proposal posted today is looking to shift the NetBeans integrated development environment from being an Oracle project to one within the Apache incubator space.
Geertjan Wielenga, an Oracle employee who serves as the project manager for Oracle JET and NetBeans, posted a proposal today looking to offload NetBeans from being the open-source IDE maintained at Oracle to becoming "Apache NetBeans."
Almost one year ago our organisation, Taunton and Somerset NHS FT, achieved an important milestone in delivering transformational change in our digital programme: we became the first NHS trust to go live with an open source electronic patient record (EPR).
Some may have perceived this as a risky choice. An open source EPR was untested within the NHS, and NHS organisations can tend to do what everyone else has already tried. Yet we saw that, by having a flexible system that had no licence fees, we would be able to tailor the system as we went along, to suit the needs of our clinicians, patients and our healthcare partners in Somerset.
OpenEMR, OpenMRS, and VisTA are three of the most well-known open source applications in the health IT genre. OpenEMR has worldwide acceptance as a complete and flexible electronic healthcare records (EHR) system that can be tweaked with relative ease to work anywhere. That is evident in its adoption by the International Planned Parenthood Foundation, the Peace Corps, and most recently by the Health Services Dept of Israel. OpenMRS is a respected tool set and API that has been predominantly used in Africa, and has been adopted for targeted healthcare needs all over the world. Despite being a US-based project, its adoption in the US is minimal. VisTA is the US Veteran's Administration EHR and it is now, due mainly to the formation of OSEHRA.org, beginning to get traction in other countries as a solution to the high cost of proprietary EHR systems for hospitals. New on the horizon are projects like FHIR, started in Australia, and adopted by hl7.org.
Sebastian Thrun’s online education startup Udacity recently created a self-driving car engineering nanodegree, and on stage at Disrupt today Thrun revealed that the company intends to build its own self-driving car as part of the program, and that it also intends to open source the technology that results, so that “anyone” can try to build their own self-driving vehicle, according to Thrun.
The crowdsourced vehicle plans will ultimately be created in service of the school, rather than a product in and of itself. The open-sourcing of the data should help other projects ramp up, and will include driving data and more to contribute to other people’s projects.
SFU alumna Jennifer Zickerman is making it easier to access locally grown, high quality herbs through her venture, the Lower Mainland Herb Growers Co-op.
The co-operative offers economy of scale to local small growers growing culinary herbs. It will buy fresh herbs from local growers, then dry and package them as culinary herb blends and distribute them to retail stores.
Zickerman first developed this business idea as a student in SFU's Community Economic Development (CED) program. She pitched it as part of the program's annual Social Innovation Challenge, winning $12,000 to implement her idea.
The co-op's high quality products aim to replace the poor quality dried herbs found in most retail stores that are imported from countries with poor environmental and labour standards.
Local farmers will also have a new market for a crop that grows well in this climate and requires few artificial supports such as fertilizer, pesticides and greenhouses.
Open source software and open data play key roles in implementing Chile's long-term energy planning, identifying ways to get the maximum value from development, minimizing its impact, and requiring less development overall.
Over the past two years, our company—in partnership with the Centro UC Cambio Global of the Pontificia Universidad Católica de Chile—has been designing, building, and testing a framework to support Chile's Ministry of Energy in policy evaluation and regional hydroelectric power planning activities. Open source software and open data play a key role in this framework, but before I explain how, I need to summarize the context.
The mobility service is based on information published on the open data portal of the City of Ghent. It also incorporates data from innovative sources like thermal cameras and a carpool system. Participants in the pilot will receive travel advice each morning through a pop-up on their mobile phones.
David L. Jones, an electronics design engineer based in Sydney Australia, explains his pragmatic solution to the use of the open source hardware logo — inspired by the varying gradations of the Creative Commons licenses.
Developers need help. It comes with the territory for software companies employing thousands of developers, many who live and work in remote locations all over the world. At Red Hat, Rafael Benevides doles out lots of help. He teaches developers about tools and practices so they can be more productive, and he'll be taking the show on the road for the tech conference All Things Open this year where he'll share his specfic thoughts on cloud development.
Eyeo GmbH, the company that makes the popular Adblock Plus software, will today start selling the very thing many of its users hate—advertisements. Today, the company is launching a self-service platform to sell "pre-whitelisted" ads that meet its "acceptable ads" criteria. The new system will let online publishers drag and drop advertisements that meet Eyeo's expectations for size and labeling.
"The Acceptable Ads Platform helps publishers who want to show an alternative, nonintrusive ad experience to users with ad blockers by providing them with a tool that lets them implement Acceptable Ads themselves,” said Till Faida, co-founder of Adblock Plus.
Publishers who place the ads will do so knowing that they won't be blocked by most of the 100 million Adblock Plus users. The software extension's default setting allows for "acceptable ads" to be shown, and more than 90 percent of its users don't change that default setting.
Eyeo started its "acceptable ads" program in 2011. With the new platform, it hopes to automate and scale up a process that until now has been a cumbersome negotiation. What once could take weeks, the company boasts in today's statement, now "takes only seconds."
As technology embraces the digital, abandoning the crude and primitive notion of "physical existence" entirely, the idea that you actually own the media you buy is vanishing faster than that goddamn Walkman you swore was in the closet. And it's more than inconvenient for consumers; it may be apocalyptic for our society.
[...]
If you tried to purchase an Adobe product recently, you're already aware of this trend. As of 2013, you can no longer buy programs such as Photoshop, Flash, or Dreamweaver. You can only "subscribe" to them for a monthly fee. Yes, now you have the privilege of paying for your software forever. Isn't the future wonderful?
With the latest version of the patches, the NET policy subsystem is now disabled by default, the queue selection algorithm has been modified, amd there are various other changes. For those failing to remember what this is all about, "NET policy intends to simplify the network configuration and get a good network performance according to the hints(policy) which is applied by user. It provides some typical "policies" for user which can be set per-socket, per-task or per-device. The kernel will automatically figures out how to merge different requests to get good network performance. NET policy is designed for multiqueue network devices. This implementation is only for Intel NICs using i40e driver. But the concepts and generic code should apply to other multiqueue NICs too."
Furthermore, Mr. Born held that the terms of the Switzerland-Uruguay Bilateral Investment Treaty cannot be understood to provide the host state with a ‘margin of appreciation’ – a concept developed in a different context, namely the European Convention on Human Rights. The case has been used by NGOs (see for instance the Global Justice Now website) as an example of the allegedly deterrent effect of investment arbitration on states that intend to issue public health measures (so-called ‘regulatory chill’). The dismissal of Philip Morris’ claims shows that such fears are largely unfounded. On the other hand, even though the arbitral tribunal’s majority decision is well-reasoned, the question remains whether it is appropriate to bring about a result whereby a lawful business can be subjected to a such severe restriction in respect of core assets, such as its brands, without being paid any compensation (even in case of a public health measure). In this respect, the dissenting opinion of Mr. Born raises convincing arguments in favour of Philip Morris.
Bottled water is a con. It makes about as much sense as designer bottled air, but after a few decades on the market, one’s instinct often says to reach for a bottle of Dasani when your mouth’s dry and brain’s half-pickled on a hot day. It’s not water, it’s Water, baby!
Bottled water in Canada comes from aquifers near the Great Lakes, where it’s pumped for $3.71 per million litres by companies that later sell it for a massive profit. This is in a country where dozens of First Nations communities are living under decades-long boil water advisories, and all of their drinkable water is trucked in by the bottle. Naturally, it comes from Nestle and other corporate producers.
Policymakers and activists have raised calls to hike the price that companies pay to pump water from municipal sources, but some experts say that doesn’t go far enough. Instead, according to critics, the practice of pumping water for a profit should be banned wholesale for social and scientific reasons and Nestle’s license to do so shouldn’t be renewed by the provincial government.
I have a favorite saying: "If you are a systems administrator, you have the keys to the kingdom. If you are an open-source programmer, you don't know which or how many kingdoms you have the keys to." We send our programs out into the world to be run by anyone for any purpose. Think about that: by anyone, for any purpose. Your code might be running in a nuclear reactor right now, or on a missile system or on a medical device, and no one told you. This is not conjecture; this is everyday reality. Case in point: the US Army installed gpsd on all armor (tanks, armored personnel carriers and up-armored Humvees) without telling its developers.
This article focuses on the needs of infrastructure software developers—that is, developers of anything that runs as root, has a security function, keeps the Internet as a whole working or is life-critical. Of course, one never knows where one's software will be run or under what circumstances, so feel free to follow this advice even if all you maintain is a toddler login manager. This article also covers basic security concepts and hygiene: how to think about security needs and how to keep your development system in good shape to reduce the risk of major computing security mishaps.
By default, the web is not secure, enabling data to travel in the clear, but that's a situation that is easily corrected through the use of SSL/TLS. A challenge with implementing Secure Sockets Layer/Transport Layer Security has been the cost to acquire an SSL/TSL certificate from a known Certificate Authority (CA), but that has changed in 2016, thanks to the efforts of Let's Encrypt.
Let's Encrypt is a non-profit effort that that was was announced in November 2014 and became a Linux Foundation Collaborative Project in April 2015. Let's Encrypt exited its beta period in April 2016 and to date has provided more than 5 million free certificates.
There have been far too many “incidents” recently that demonstrate the Internet is not as secure as it needs to be. Just in the past few weeks, we’ve seen countless headlines about online security breaches. From the alleged hack of the National Security Agency’s “cyberweapons” to the hack of the Democratic National Committee emails, and even recent iPhone security vulnerabilities, these stories reinforce how crucial it is to focus on security.
Internet security is like a long chain and each link needs to be tested and re-tested to ensure its strength. When the chain is broken, bad things happen: a website that holds user credentials (e.g., email addresses and passwords) is compromised because of weak security; user credentials are stolen; and, those stolen credentials are then used to attack other websites to gain access to even more valuable information about the user.
One weak link can break the chain of security and put Internet users at risk. The chain only remains strong if technology companies, governments, and users work together to keep the Internet as safe as it can be.
The Internet of Things business model dictates that devices be designed with the minimum viable security to keep the products from blowing up before the company is bought or runs out of money, so we're filling our homes with net-connected devices that have crummy default passwords, and the ability to probe our phones and laptops, and to crawl the whole internet for other vulnerable systems to infect.
Linux/Mirai is an ELF trojan targeting IoT devices, which Malware Must Die describes as the most successful ELF trojan. It's very difficult to determine whether these minimal-interface devices are infected, but lab tests have discovered the malware in a wide range of gadgets.
First, a little background. If you want to take a network off the Internet, the easiest way to do it is with a distributed denial-of-service attack (DDoS). Like the name says, this is an attack designed to prevent legitimate users from getting to the site. There are subtleties, but basically it means blasting so much data at the site that it's overwhelmed. These attacks are not new: hackers do this to sites they don't like, and criminals have done it as a method of extortion. There is an entire industry, with an arsenal of technologies, devoted to DDoS defense. But largely it's a matter of bandwidth. If the attacker has a bigger fire hose of data than the defender has, the attacker wins.
A big player, most possibly a nation state, has been testing the security of companies that run vital parts of the Internet's infrastructure, according to well-known security expert Bruce Schneier.
In an essay written for the Lawfare blog, Schneier, an inventor of the Blowfish, Twofish and Yarrow algorithms, said that the probes which had been observed appeared to be very carefully targeted and seemed to be testing what exactly would be needed to compromise these corporations.
Schneier said he did not know who was carrying out the probes but, at a first guess, said it was either China or Russia.
Pointing out that the easiest way to take a network off the Internet was by using a distributed denial of service (DDoS) attack, he said that major firms that provide the basic infrastructure to make the Internet work had recently seen an escalation of such attacks.
Hackers are trying to tarnish the U.S. Olympic team by releasing documents they claim show athletes including gymnast Simone Biles and tennis players Venus and Serena Williams used illegal substances during the Rio Games.
The medical files, allegedly from the World Anti-Doping Agency, were posted Tuesday on a site bearing the name of the hacking group Fancy Bears. “Today we'd like to tell you about the U.S. Olympic team and their dirty methods to win,” said a message on the hackers' site.
The World Anti-Doping Agency confirmed it had been hacked and blamed Fancy Bears, a Russian state-sponsored cyber espionage team that is also known as APT 28 -- the very same group that may have recently breached the Democratic National Committee.
The United States will never forget the September 11th attacks. It is interwoven into the fabric of the nation. Its identity is partially defined by remembering the horror that unfolded that day, but that is part of why a provocative question must be asked: What if America happened to forget the attacks?
For fifteen years, politicians, military leaders, celebrities, corporate executives, as well as the families of those killed on 9/11, have deployed the words “Never Forget” when speaking about the attacks. The words function as a kind of pledge, a loyalty oath to show one’s allegiance to the country. Those who do not pledge to “Never Forget” may not be as American as those who openly relive trauma by sharing where they were that day, even if these individuals were nowhere near the World Trade Center or the Pentagon.
Yet, what are people pledging when they reflexively attach these words to memories or statements?
Pentagon Deputy Secretary Bob Work declared at the Pentagon’s 9/11 memorial the “enemy” will “fail because all of us as Americans will never forget what we stand for. We will remain steadfast in our determination to stamp out this evil and secure a better future for our children. And we will work together collectively to create a world free from terror and oppression.”
Work also said, “We must never allow—never allow—those who were lost to ever fade from our memories…as well as those who have sacrificed in the long wars ever since. And we must continue to allow them to motivate us in our continuing struggle against those who would seek to destroy that which we hold dear.”
#NeverForget911 . Wait, did something happen yesterday besides #ClintonCollapse ? I forgot.
OK, ok, serious now. It’s been 15 years now people, so we can talk about this kind of thing, ‘kay? That’s what anniversaries are for, after all.
Peter Bergen, at CNN, who is often the sanest clown in the CNN circus, tell us that al Qaeda really blew it on 9/11.
“Like the attack on Pearl Harbor,” says Bergen, “9/11 was a great tactical victory for America’s enemies. But in both these cases the tactical success of the attacks was not matched by strategic victories. Quite the reverse.” He goes on to remind us the U.S. totally kicked Japan’s butt.
Now it can get a little fuzzy when you try to jam 9/11 and al Qaeda into the Saving Private Ryan narrative framework. So it’s important to understand what Bergen thinks al Qaeda’s goal was with the attacks 15 years ago. I’ll quote him so when I call him an idiot a bit later, you’ll understand my reasoning:
“Bin Laden believed that al Qaeda’s attacks on New York and Washington would result in an American withdrawal from the Middle East. Instead, the United States quickly toppled the Taliban and al Qaeda… The United States not only did not reduce its influence in the Middle East, but it also established or added to massive bases in Bahrain, Kuwait, Qatar and the United Arab Emirates. And, of course, it also occupied both Afghanistan and Iraq. Bin Laden’s tactical victory on 9/11 turned out to be a spectacular strategic flop.”
Newly leaked emails show how a key U.K. architect of the Iraq war expressed relief that the “Brexit” vote to leave the European Union would reduce media coverage of the devastating results of an inquiry into the United Kingdom’s role in the the war.
On July 4, former British Foreign Secretary Jack Straw emailed former U.S. Secretary of State Colin Powell to discuss the upcoming release of the Chilcot Report– a document detailing the British government’s inquiry. The report probed, among other things, the depth of private British commitment and support for the American-led war in Iraq.
In anticipation of coming press coverage, Straw asked Powell to review a statement in a Word document he drafted. He wrote that the “only silver lining of the Brexit vote is that it will reduce medium term attention on Chilcot — thought it will not stop the day of publication being uncomfortable.”
In pursuit of a new Cold War with Russia, Official Washington wants to expand NATO into the ex-Soviet republic of Georgia, creating the potential for nuclear war to protect a sometimes reckless “ally,” writes Jonathan Marshall.
Official Washington loves its Putin-bashing but demonizing the Russian leader stops a rational debate about U.S.-Russia relations and pushes the two nuclear powers toward an existential brink, writes Robert Parry.
The G20 summit in China marked a possible tectonic shift in global economic power, with China’s President Xi pushing for a new model based on physical connectivity, like “One Belt, One Road,” writes ex-British diplomat Alastair Crooke.
The damage done to U.S. foreign policy in the wake of the 9/11 attacks was largely self-inflicted, a case of wildly overreacting to Al Qaeda’s bloody provocation, writes ex-CIA analyst Paul R. Pillar.
The new ceasefire agreement between Secretary of State John Kerry and Russian Foreign Minister Sergey Lavrov, which went into effect at noon Monday, has a new central compromise absent from the earlier ceasefire agreement that the same two men negotiated last February. But it isn’t clear that it will produce markedly different results.
The new agreement incorporates a U.S.-Russian bargain: the Syrian air force is prohibited from operating except under very specific circumstances in return for U.S.-Russian military cooperation against Al Qaeda and the Islamic State, also known as Daesh, ISIS or ISIL. That compromise could be a much stronger basis for an effective ceasefire, provided there is sufficient motivation to carry it out fully.
Is Israel on the verge of civil war, as a growing number of Israeli commentators suggest, with its Jewish population deeply riven over the future of the occupation?
On one side is a new peace movement, Decision at 50, stuffed with former political and security leaders. Ehud Barak, a previous prime minister who appears to be seeking a political comeback, may yet emerge as its figurehead.
The group has demanded the government hold a referendum next year – the half-centenary of Israel’s occupation, which began in 1967 – on whether it is time to leave the territories. Its own polling shows a narrow majority ready to concede a Palestinian state.
Donald Trump named former CIA director and extremist neoconservative James Woolsey his senior adviser on national security issues on Monday. Woolsey, who left the CIA in 1995, went on to become one of Washington’s most outspoken promoters of U.S. war in Iraq and the Middle East.
As such, Woolsey’s selection either clashes with Trump’s noninterventionist rhetoric — or represents a pivot towards a more muscular, neoconservative approach to resolving international conflicts.
Trump has called the Iraq War “a disaster.”
In a few days the Swedish court shall rule on Assange’s freedom; or it will rule in favour of prosecutor Ny. This article deals with prosecutor Marianne Ny’s assaying anew to influence the court, in exactly the same fashion that she did the last time; I question Ny’s statement, made during her press conference, on Swedish prosecutors fairness, €and that “all should be treated equal”; I base my query on factual cases, i.e. allegations against a right-wing Swedish politician that were similar to the one against Assange, and that were quickly dropped by the prosecutors at the time Assange was under arrest in London by orders of Ny. This article also refers to the Swedish media reactions after the revelations in the recent TV program Uppdraggranskning, which dealt with the extradition of Assange to the US. This program – aired the same day of Ny’s press conference –partly failed to comment, or even mention, the resolution of the UNGWAD ruling for the immediate freedom of Mr Assange; and partly omitted for the Swedish viewers crucial facts which ascertain the absolute existence of a ‘criminal investigation’ against Assange in the US, based among other on the new laws on terrorism. All that makes the extradition of Assange to the US not only ‘probably’ – as publicly acknowledged for the first time in the Swedish state-owned media (or for that part in all mainstream media of Sweden)– but also its request by the US highly incumbent.
We continue our conversation Food & Water Watch’s Hugh MacMillan about his new investigation that reveals the dozens of financial institutions that are bankrolling the Dakota Access pipeline, including Bank of America, HSBC, UBS, Goldman Sachs, Wells Fargo and JPMorgan Chase. "They are banking on this company and banking on being able to drill and frack for the oil to send through the pipeline over the coming decades," MacMillan says. "So they’re providing the capital for the construction of this pipeline."
In a nugget of very good news for the renewable energy sector, a survey of 163 wind energy experts has found that in the coming decades, the cost of electricity generated by wind should plunge, by between 24 and 30 percent by the year 2030, and even further by the middle of the century.
One key reason? New wind projects are about to get even more massive, in both the offshore and onshore sectors. As turbines get taller and access stronger winds, and as rotors increase in diameter, it becomes possible to generate ever more electricity from a single turbine.
“Our experts clearly anticipate a significant potential for further cost reductions, both onshore and offshore,” said Ryan Wiser of Lawrence Berkeley National Laboratory, who conducted the study with colleagues from several other institutions, including the National Renewable Energy Laboratory, the University of Massachusetts, Amherst, and an International Energy Agency task force on wind energy.
More than one in 10 of the UK’s wildlife species are threatened with extinction and the numbers of the nation’s most endangered creatures have plummeted by two-thirds since 1970, according to a major report.
The abundance of all wildlife has also fallen, with one in six animals, birds, fish and plants having been lost, the State of Nature report found.
Together with historical deforestation and industrialisation, these trends have left the UK “among the most nature-depleted countries in the world”, with most of the country having gone past the threshold at which “ecosystems may no longer reliably meet society’s needs”.
The comprehensive scientific report, compiled by more than 50 conservation organisations, spells out the destructive impact of intensive farming, urbanisation and climate change on habitats from farmland and hills to rivers and the coast. It found that the fall in wildlife over the last four decades cannot be blamed on past harm, but has continued in recent years.
NOAA's Center for Operational Oceanographic Products and Services maintains a permanent observing system that includes 210 continuously operating water level stations throughout the U.S. and its territories. These water level stations provide real-time oceanographic and meteorological observations, which are critical data for communities, particularly during storms impacting the coast.
This graphic depicts highest water levels along the coast throughout the duration of this storm. Highest water levels are measured in feet above Mean Higher High Water (MHHW). MHHW is defined as the average daily highest tide. Inundation typically begins when water levels exceed MHHW.
French President François Hollande on Tuesday endorsed the investigation into the conduct of former European Commission chief José Manuel Barroso, aimed at deciding if he broke EU law by joining Goldman Sachs in July.
“I fully support this initiative,” Hollande said, two days after Commission President Jean-Claude Juncker ordered a probe into his predecessor’s decision to take up the role as chairman and senior adviser at the international arm of the investment bank.
“When you know that Goldman Sachs was one of the reasons for the difficulties we encountered” during the financial crisis, “that justifies a procedure, the one that Juncker has just started,” the French president said during a trip to Bucharest, AFP reported.
Such accusations have been made lately against a bewildering alphabet soup of global treaties now under negotiation, including the TTP, TTIP, and TISA.
NAFTA protests rage on worldwide, reignited by recent Chapter 11 cases and the threat of new and looming trade treaties such as TTP, TTIP and CETA. Photo by Billie Greenwood licensed under the Creative Commons Attribution-Share Alike 2.0 generic license
History tells us periods of globalisation do not come smoothly. According to economic commentator Thomas Friedman, our current era of globalisation is new, unique, terrifying and exciting. As exciting as it is, such change can be disquieting and the spoils of globalisation are not equally distributed. Against this new political and economic backdrop is a political reaction which, consciously or unconsciously, seeks to reverse this trend. This idea of a policy reaction is the subject of a recent US Chamber of Commerce report, "Preventing Deglobalization: An Economic and Security Argument for Free Trade and Investment in ICT."
Friedman divides globalisation into three phases. The first, starting with the 'discovery' of the Americas, runs from 1492 to 1800, which he argues is the globalisation of countries. The second phase is from 1800 to 2000, a time dominated by the Industrial Revolution, in which companies become globalised. In our present era, from 2000, it is the individual who joins globalisation. Not everyone wins, and periods of increased globalisation are often followed by periods of political turmoil. The ICT sector is a dominant sector driving change in our current wave of globalisation.
There is much to cheer in the U.S. Census Bureau’s 2015 report on American incomes, poverty, and health coverage released Tuesday.
Median real income household income rose 5.2 percent from 2014 to 2015, and the poverty rate declined by 1.2 percentage points.
The percentage of Americans without health insurance coverage declined to 9.1 from 10.4 in 2014. Overall, the number of Americans without health insurance declined to 29 million.
These numbers point to an economy that is seriously starting to rebound from the Great Recession. The Census also notes that number of “full-time, year- round workers increased by 2.4 million in 2015.”
But many Americans continue to see their incomes lag behind where they were around a decade ago.
Median household income increased from 2014 to 2015, but it is still 5 percent behind where it was in 2007.
As technology ushers more and more things towards the realm of "post-scarcity", an inevitable conversation has arisen around the very roots of capitalism and what this rapid change means for our economic systems at the most fundamental levels. But the answer is far from simple — is capitalism dying? Can it evolve? Is the whole question being framed incorrectly? This week, we discuss the notion of a post-capitalist world, what it might look like, and how close it actually is.
A few weeks ago, we wrote about a really great and detailed look by BuzzFeed's Chris Hamby into "investor state dispute settlement" (ISDS) provisions in international trade agreements -- something we refer to as corporate sovereignty, because it enables companies to effectively force countries away from certain regulations. Hamby's piece was about how rich corporate execs were using corporate sovereignty provisions to get out of criminal prosecutions. That was only part I of his investigation. Part II of the series may have been the most useful, because it detailed how the mere threat of an ISDS case could pressure countries into changing regulations. This is super important, because one of the key talking points from defenders of corporate sovereignty provisions is to point to stats on actual cases. But if the threats are really effective, the stats on cases really is only showing a portion of what ISDS is doing.
It's now or never for the Trans-Pacific Partnership (TPP). It's almost certain that if the TPP can't pass during the lame duck session of Congress in its present form before the new President takes office, it won't pass at all.
You may also have heard that a lame duck vote on the TPP is off the table—but that's false. In fact, the administration's pressure for such a vote to take place following the election has never been greater. Officials held a new round of meetings just last week with business interests to encourage them to sell the flawed agreement to an increasingly skeptical public and Congress. So you shouldn't believe for a moment that the TPP can't still pass within the next few months. It can.
As a simple example, for a number of years, Keynesianism was the form of knowledge about the economy. Then it was replaced by neoliberalism. That’s the historical situation as I see it today. Why it changed, the genealogy of that change, is open to discussion. One strand of the discussion can be found in Philip Mirowski’s Never Let A Serious Crisis Go To Waste.
4. Foucault suggests that the family as a model for the economy had to be overcome and replaced by operations on the population as a whole. As we know, the idea of the family as model for both government and for government of the economy as a whole has not died out, but like most bad ideas will never die.
This year, some suggested that Donald Trump, the Republican nominee for president, should not be privy to classified briefings due to his habit of sneezing out the unfiltered contents of his head into the public domain. “This man is dangerous,” said Sen. Harry Reid, the Democrats’ minority leader, in a recent interview. Reid suggested that intelligence officials deceive Trump with phony secrets: “Fake it, pretend you’re doing a briefing,” he said.
In 1952, Harry Truman started the practice of letting presidential candidates sample secret intelligence. Three candidates have since declined to receive the special briefings — Barry Goldwater in 1964, Walter Mondale in 1984, and Bob Dole in 1996. But how to deal with a candidate who can’t keep his mouth shut? In Trump’s case, fairness prevailed over caution. President Obama decided to admit Trump into the classified world, although this year’s briefings are reportedly classified at the level of secret, not top secret as they were during the 2008 race.
As lawmakers continued to probe Hillary Clinton’s private email use, the aide who set up the service declined to appear before the House committee. FBI officials had to be given a summons to produce documents on the investigation.
On Tuesday, the House Oversight and Government Reform Committee summoned contractors and former State Department officials who set up and maintained Clinton’s email servers and mobile devices. However, the key Clinton aide, Bryan Pagliano, did not show up for the hearing, pleading Fifth Amendment protections against self-incrimination.
The afternoon before, the committee dressed down FBI’s Acting Assistant Director for Congressional Affairs Jason Herring, who was at pains to explain his absence from a major meeting last week and the bureau’s reluctance to hand over unredacted investigation documents.
Claiming victimhood after critical coverage of Saudi donations to the Clinton Foundation, Hillary Clinton campaign Press Secretary Brian Fallon recently whined on Twitter that comparable Saudi links to a Bush family foundation didn’t receive anything like the same level of media scrutiny.
A furious “Full Frontal” host returned from a break to rail against NBC’s Matt Lauer—who oversaw the recent live forum featuring presidential nominees Hillary Clinton and Donald Trump—and the rest of the members of the mass media who are failing to ask tough questions during this election cycle.
Former Secretary of State Colin Powell attempted to discourage Hillary Clinton and her team from using him as a scapegoat for her private email server problems, according to newly leaked emails from Powell’s Gmail account.
“Sad thing,” Powell wrote to one confidant, “HRC could have killed this two years ago by merely telling everyone honestly what she had done and not tie me to it.”
This is pure, unadulterated speculation—the kind of “what if, then they might” house of cards one would expect from an episode of Ancient Aliens, not in one of the most influential papers in the English-speaking world. In a moment of outright self-parody, Applebaum notes that “rumors of election fraud can create the same hysteria as real election fraud” while spending 800 words doing nothing but spreading rumors of election fraud. We have met the rumormonger, Ms. Applebaum, and she is you.
One sure way to undermine confidence in US elections is to speculate wildly about such scenarios. Evidence-based discussions of the potential for electoral fraud are useful–and it’s important to note that there’s always a risk of voting manipulation–but running away with wholly speculative scenarios built on even more speculative scenarios, while pontificating about “media hysteria, hearings, legal challenges, mass rallies, a constitutional crisis,” does nothing to inform the reader, much less address the real dangers of election fraud. It simply serves to frighten the public by cynically appealing to our baser Cold War instincts.
There's been plenty of talking going around this election cycle about the terrible security problems with our current voting technology -- along with some conspiracy-theory level talk of foreign agents looking to "hack" the election. We haven't been very impressed with officials telling us all to calm down and it's difficult to see how FBI director James Comey did himself any favors by basically arguing that the voting system is secure... mainly because of what a complete and utter mess it is. The larger point he's making is somewhat valid, if clunky, in the fact that each state runs their own voting, so it's not like hackers can get into one central system and wreak havoc. The different systems definitely make it harder.
Riley Roberts, speechwriter for former attorney general Eric Holder, has a fascinating examination of James Comey's first four years as the head of the FBI. It details his frequently-antagonistic relationship with, well, nearly everyone, as well as his long history of going head-to-head with high-ranking government officials.
Roberts says no FBI director since J. Edgar Hoover has acted with such autonomy. The unprecedented public discussion of the agency's Clinton email investigation is just one such example. While Comey was undoubtedly correct that there was significant public interest in not just the outcome, but the inner workings of the investigation, his decision to hold a press conference and release investigative documents came as a surprise to his closest colleagues.
Jill Stein (G): It is a major concern that many Americans don’t trust our scientific and regulatory agencies, and extremely unfortunate that there are valid reasons for this declining trust that must be addressed.
For example, the current FDA commissioner appointed by President Obama was a highly paid consultant for big pharmaceutical corporations, as Senator Sanders pointed out in opposing his nomination. In the case of Vioxx, the FDA approved a profitable pain reliever that caused up to 140,000 cases of heart disease, and even tried to silence its own scientists who discovered this deadly side effect.
A recent USA Today poll found 76% of voters want debates with four candidates including not just the two most hated candidates in history, the Republican and Democratic nominees and their vice presidential running mates, but Jill Stein and Ajamu Baraka of the Greens, and Gary Johnson and Bill Weld of the Libertarians.
Any candidate on enough ballots to achieve 270 electoral college votes should be in the debates. The people have a right to see all candidates debating the issues who are on their ballots.
The deceptive debate commission, which is called a debate commission just to hide the truth: it is a corporation of the Democrats and Republicans whose purpose is to limit debates to their two parties, has no legitimacy. It has a major conflict of interest – why should the two establishment parties decide their opponents cannot debate? It is an obvious conflict of interest that the media should be calling out. The media should join the demand of the people – open debate are essential for democracy.
The candidates for president have responded to America's Top 20 Science, Engineering, Tech, Health & Environmental Issues in 2016. These key issues affect voters’ lives as much as the foreign policy, economic policy, and faith and values views that candidates traditionally share with journalists on the campaign trail. Several of America’s leading science and engineering organizations are urging the candidates and the press to give them equal priority in the national dialogue. For three cycles, presidential candidates have chosen to share their views here, as the Democratic and Republican candidates did in 2008 and 2012. In 2016, we also invited the Green and Libertarian candidates.
Donald Trump says he has donated millions to charity.
Earlier this year, Washington Post reporter David Fahrenthold set out to prove him right.
But finding evidence to support Trump’s claims turned out to be surprisingly difficult. The Republican presidential nominee provided few details. His campaign offered little help. Even Trump’s son, Eric, who runs his own charitable foundation, couldn’t cite specific donations.
Fahrenthold reached out to dozens of charities, and took to Twitter, asking his followers for leads. Despite his exhaustive efforts, he hasn't been able to come close to accounting for the $8.5 million Trump publicly pledged over a 15-year period.
She responded this way when challenged about potential conflicts of interest involving her family’s foundation, and again when questioned about her use of private email to conduct government business.
And now, when asked about her health Sunday, Hillary Clinton has fallen back on the same strategy she has used for decades: silence.
Her secrecy seems to create as much controversy – if not more – than the initial issue itself, perpetuating a belief held by most voters since the start of the presidential campaign that she is not honest.
In other words, Clinton’s careful attempts to avoid political trouble only seem to get her into more political trouble.
CBS News edited a video clip and transcript to remove former President Bill Clinton's comment during an interview that Hillary Clinton, now the Democratic presidential nominee, "frequently" fainted in the past.
Bill Clinton sat down with CBS's Charlie Rose on Monday to try to clear the air around questions regarding his wife's health after she collapsed while getting into a van at a 9/11 memorial ceremony on Sunday.
"Well, if it is, then it’s a mystery to me and all of her doctors," Bill Clinton said when Rose asked him if Hillary Clinton was simply dehydrated or if the situation was more serious. "Frequently — well, not frequently, rarely, on more than one occasion, over the last many, many years, the same sort of thing’s happened to her when she got severely dehydrated, and she’s worked like a demon, as you know, as secretary of State, as a senator and in the year since."
But the "CBS Evening News" version cut Clinton's use of "frequently" out. And a review by The Hill of the official transcript released by the network shows that Clinton saying "Frequently — well, not frequently," is omitted as well.
Chuck Ross of The Daily Caller first discovered the edit of the television version
Everything in America, including our Internet search engine, is corrupt. Progressive Stephen Lendman reports that Google has put its search engine in support of Hillary, a crazed warmonger with medical problems, as president of the US.
What is extraordinary is that the rest of the world’s governments have accepted US control of the Internet and relies on the United States, the tyrannical government of which despises every country that is not an American puppet state. Why militarily powerful countries such as Russia and China and rich countries such as China allow Washington to control the Internet is the mystery of our time.
The need is desperate for competing Internet systems and search engines available to all, or the Internet will become another censored provider of Washington propaganda.
Newly compiled data reveals Google and its affiliates have attended meetings at the White House more than once a week, on average, since President Barack Obama took office.
Numbers crunched by the Campaign for Accountability and the Intercept show 169 Google employees have met with 182 government officials in the White House.
The meetings took place at least 427 times. The data used spans from Obama's first month in office in 2009 until October 2015, and includes government meetings with representatives of Google-affiliated companies Tomorrow Ventures and Civis Analytics.
Last week one of the big stories of the week was Facebook blocking people from posting an iconic photo from the Vietnam War because it showed a young girl, naked, running from an attack. After lots of press and lots of public outcry, Facebook relented and claimed that it would be adjusting its policies. And yet... another week, another set of stories of problems on Facebook. It's unclear how widespread this is, but on Monday there were suddenly reports (on Twitter, of course) of Facebook randomly blocking perfectly reasonable links. The first example I saw of this was reports that Facebook was blocking this story from The Intercept about Rep. Barbara Lee's lone vote against the PATRIOT Act (the only member of the House to vote against it) a few days after September 11th.
On his website, Hamburg lawyer and blogger Joachim Steinhöfel collects deleted Facebook comments which didn't pose a threat. He believes that the platform is under political pressure, and that it isn't neutral in its approach to censorship. Currently, he is preparing a case against Facebook, and may set a precedent.
"Facebook-Sperre — Wall of Shame" is Steinhöfel's website, where he documents the site's methodology for blocking posts. He believes the site's decisions are motivated by politics rather than its own stated principles.
My Instagram account is where I can share with my followers and also the rest of the world who I am as a person. I tend to share thoughts and beliefs on individual posts and can be very outspoken if it is something I feel strongly about. Recently however, Instagram has been removing some of my posts due to not following their community guidelines.
It started with them removing one picture of me which was censored to apply with their community guidelines, to me then retaliating by posting another censored picture. My nipples were not visible in these pictures. Instagram still removed them. They have also removed two older posts which were creative pictures by photographers, not showing any nipple. I will be reposting theses pictures later on.
Editors Sunetra Sen Narayan and Shalini Narayanan analyse the growth of new media in Digital India from a broad communications and interdisciplinary perspective in their latest book titled, India Connected, published by Sage Publications.
The book critically examines the growth of new media in India and offers a perspective on the opportunities and challenges it poses to governance, development, businesses as well as in social marketing efforts.
Narayan has more than 25 years of experience in communications, including in advertising, print journalism, documentary film production and teaching. She is currently associate professor at the Indian Institute of Mass Communication. Narayanan, D.Phil, is an independent media consultant and trainer with two and a half decades of experience in the government and non-government sectors.
Univision has said that it bought Gawker Media because it believed in the work that our publications do. That work, for well over a decade, was only possible because we knew that our company leadership would defend it if it came under frivolous legal attack.
Univision’s first act on acquiring the company was to delete six true and accurate news stories from our archive, because those stories had been the targets of frivolous or malicious lawsuits. This decision undermines the foundation of the ability of Gawker Media’s employees to do our work. We have seen firsthand the damage that a targeted lawsuit campaign can do to companies and individual journalists, and the removal of these posts can only encourage such attempts in the future.
We condemn this action by Univision’s executives in the strongest possible terms. It sets an alarming precedent both for our relationship with our new owners and for the business of journalism as a whole. It is unacceptable for a publisher to delete legitimate and true news stories for business reasons.
The door to modernizing Cuba's communications networks opened slightly wider recently after the FCC removed the country from the agency's banned nation list. That allows fixed and wireless companies alike to begin doing business in Cuba as part of an overall attempt to ease tensions between the States and the island nation. And while Cuba has been justly concerned about opening the door to NSA bosom buddies like AT&T and Verizon, it's still apparently not quite ready to give up some of its own, decidedly ham-fisted attempts to crack down on free speech over telecom networks.
A recent investigative report by blogger Yoani Sanchez and journalist Reinaldo Escobar found that the nation has been banning certain words sent via text message with the help of state-owned telecom monopoly ETECSA. The report, confirmed in an additional investigation by Reuters, found that roughly 30 different keywords are being banned by Cuba's government, including "democracy," "human rights," and the name of several activists and human rights groups. Words containing such keywords simply aren't delivered, with no indication given to the sender of the delivery failure.
With Palestinian municipal elections delayed, authorities will now have time to fix a contentious issue surrounding the names on the candidate lists.
Some of the literature used for the polls in the West Bank and Gaza that were scheduled for October had replaced the names of female candidates with "sister of...", "wife of..." or just their initials.
The issue first rose to prominence at the end of August when female voters and candidates started using a hashtag to voice their dissent and to call for women's names to be properly represented.
YouTube has been trending in the news due to various reports from YouTube creators displaying notifications received from the video-sharing website saying that their videos have been demonetized. In case you’re unfamiliar with how YouTube stars earn money, they have an AdSense account which allows them to earn revenue from ads on their videos. When a video is demonetized, it means the creator is unable to receive income from the AdSense revenue from said video.
The company, unfortunately, has the right to do this. In fact, they’ve been demonetizing videos since 2012, when they first introduced their new “ad-friendly” guidelines. At the time, and today, the company uses an algorithm to remove videos that do not follow the rules. But, even though the company has previously held guidelines for ad-friendly content, the descriptions of what is considered ad-friendly are vague and seem to censor creators, rather than help them create better content.
American author Lionel Shriver has sparked an international row about censorship, artistic licence and respect for minorities after she delivered a scathing attack on the concept of “cultural appropriation.”
Shriver, author of We Need To Talk About Kevin, which was turned into a 2011 film starring Tilda Swinton, was invited to the Brisbane Writers Festival to speak about fiction and identity politics.
But instead of delivering a mild address, her speech so shocked the organisers that they censored her on the festival website and publicly disavowed her remarks – hastily arranging a conference to rebut her views.
Filmmaker Hansal Mehta has often been at loggerheads with the Central Board of Film Certification (CBFC) and the director has appealed to the film fraternity to come together against censorship.
On the list of countries I've always wanted to visit but would be somewhat scared if I did, Russia is probably near the top. While there are certainly more dangerous parts of the world for any variety of reasons, I've found that the thing that gets me in the most trouble is my big mouth -- and the Russian government has made a habit of coming down on any kind of speech it doesn't like with a hand heavier than a Russian bear. This government uses its own laws in perverse ways to accomplish this, notably its laws that make it illegal to offend others on religious grounds, as seen chiefly in its treatment of punk band Pussy Riot.
This use of religious protectionism has proceeded to the present. The Russian government recently announced that it was locking up a noted atheist blogger for two months. His crime? Playing Pokemon Go in a church.
John McCain just had a hearing on cybersecurity. The primary point of the hearing seems to have been to get Admiral Mike Rogers to say the nation would be less safe if we split CENTCOM Commander from Director of NSA (that is, if we split his job into two). That’s in apparent contradiction to what Rogers said at an industry conference last week.
McCain’s secondary point seems to have been to raise concerns that an unsuccessful attempt by hackers to access Arizona voting data might affect his re-election effort.
His tertiary point seems to have been to attack Apple and Twitter for making efforts to protect their customers. After getting a witness to comment about Twitter’s long-term refusal to let Dataminr to sell Twitter data to the CIA, he suggested perhaps the response should be to “expose” the company.
So let me help Senator McCain in his efforts.
Edward Snowden’s 2013 release of once-secret documents about U.S. intelligence surveillance of the private communications of Americans and non-U.S. persons focused much-needed attention on the problem of how to control the burgeoning U.S. surveillance-industrial complex.
But while the USA Freedom Act began to limit national security surveillance to some extent—and we hope for more limits given that FISA Section 702 is scheduled to expire in December 2017—it did little to address the underlying problem of excessive executive branch secrecy. We remain largely in the dark about many of the facts of surveillance conducted by the U.S. government and its foreign intelligence community allies.
On one level the film presents Snowden’s story as a political thriller. A brave but frightened man, certain he is doing the right thing but worried if he can pull it off, smuggles some of the NSA’s most secret information out of a secure facility. He makes contact with skeptical journalists in Hong Kong, convinces them of the importance of what he has to say, and then goes on the run from a U.S. government out to arrest, or, possibly assassinate, him. In interviews Stone has made clear that he has dramatized and/or altered some events, and that his film is not a documentary. It does keep you on the edge of your beliefs, watching a story you know as if you don’t.
The next level of the film is a carefully constructed vision of the national security state, seen through Snowden’s eyes. For many Americans, this may be the first time they will react emotionally to the way our government spies on us. It is one thing to “know” the NSA can access webcams at will, it is another to watch a technician “spy” on a Muslim woman undressing in her bedroom.
When Snowden (played by Joseph Gordon-Levitt) slaps a piece of tape over his own webcam before an intimate moment with his girlfriend (played by Shailene Woodley), he has the wool taken from his eyes, his trust in government shattered. He is all of us.
The Defense Department supports strong encryption to protect military capabilities and commercial encryption technology that is critical to U.S. economic security, senior DoD officials said here today.
Marcel Lettre, undersecretary of defense for intelligence, and Navy Adm. Mike Rogers, commander of U.S. Cyber Command and director of the National Security Agency, testified before the Senate Armed Services Committee during a hearing on encryption and cyber matters.
In his remarks to the panel, Lettre said the department seeks robust encryption standards and technology vital to protecting warfighting capabilities and insuring that key data systems stay secure and impenetrable to adversaries today and into the future.
National Security Agency director Admiral Michael Rogers has said US intelligence agencies are concerned about the possibility of foreign governments harming the upcoming US elections through cyberattacks. During a Senate Armed Services Committee hearing, Republican Senator John McCain from Arizona and chairman of the committee asked Rogers if Russia could "somehow harm the electoral process" and potentially "disrupt the voting results in the upcoming election", NBC reports.
"We continue to be actively concerned," Rogers responded, Reuters reports.
Facebook has lost a legal bid to prevent a 14-year-old girl from suing the company over a naked picture of her that was posted on a “shame page” on the site as an act of revenge.
A high court judge in Belfast on Monday rejected Facebook’s attempt to have the claim by the girl struck out. She is also taking legal action against the man who allegedly posted the picture in what lawyers claim is the first case of its kind in the UK.
A lawyer for the teenager, who cannot be named because of her age, compared the publishing of the photo to a method of child abuse.
The girl is seeking damages for misuse of private information, negligence and breach of the Data Protection Act.
It was only a matter of time before the Internet of Things caught up with sex toys and led to products like apps that remotely control vibrators from an Apple or Android device via a Bluetooth connection.
And now, one of those apps is accused of being a little too connected to its users.
Standard Innovation—the maker of the We-Vibe vibrator and accompanying app—is the subject of a federal privacy lawsuit. The suit, which seeks class-action status, claims the We-Vibe vibrator app chronicles how often and how long consumers use the sex toy and sends that data to the company's Canadian servers. The suit says that the app also monitors "the selected vibration settings," the vibrator's battery life, and the vibrator's "temperature" with consumer consent. The data, along with the person's e-mail address, is stored on the vibrator-maker's Canadian servers, according to the lawsuit. (PDF) The app also has a "connect lover" feature, enabling partners to exchange text messages, engage in video chats, and "control a paired We-Vibe" device.
The suit was brought by an Illinois resident going by the pseudonym "N.P." The suit said N.P. paid $130 for the We-Vibe Rave vibrator and has used it "on several occasions."
"Though the data collected from its customers’ smartphones is undoubtedly valuable to the company, Defendant's conduct demonstrates a wholesale disregard for consumer privacy rights and violated numerous state and federal laws," the lawsuit says.
GCHQ research finds that thousands of emails are being sent out from official government addresses by criminals looking to hack customer details.
The U.S. government will not budge on its demand that former National Security Agency contractor Edward Snowden return to face prosecution for stealing thousands of classified intelligence documents, despite new calls for President Barack Obama to pardon him, U.S. officials said on Tuesday.
The officials said they expect Snowden's supporters to use the Thursday release of "Snowden" - directed by veteran filmmaker Oliver Stone - to mount a public campaign demanding a pardon before Obama leaves office in January.
A worldwide class-action privacy lawsuit against Facebook, initiated by Max Schrems, has been referred to Europe's top court.
The Court of Justice of the European Union (CJEU) will decide on the allowed scope of the suit, or possibly strike it down completely. If the CJEU allows a pan-European or even worldwide class action to proceed, it could have major implications for Facebook and many other online companies operating in Europe.
A Facebook spokesperson told Ars: "Mr. Schrems’s claims have twice been rejected on the grounds that they cannot proceed as 'class action' on behalf of other consumers in Austrian courts. We look forward to addressing the procedural questions presented to the CJEU to resolve these claims."
Schrems first brought his suit in 2014, and accuses Facebook of breaking EU privacy law in multiple ways, including supporting the NSA's Prism surveillance program. Later, 25,000 Facebook users from around the world—except those in the US and Canada, where different rules apply—joined Schrems in a class action under Austrian law by assigning their rights to him.
Crest hopes to grow the accreditation programme into a global initiative to certify cyber response capabilities
CREST, the UK-based certification and accreditation body for the infosec industry, has signed an agreement with the National Security Agency to take over its incident response accreditation programme.
Supported by the Foreign and Commonwealth Office in the UK, which is seeking to promote the UK's professional cyber security skills and experience abroad, CREST has signed a memorandum of understanding with the NSA.
On 6 June 2013, the Guardian broke the news National Security Agency (NSA) had ordered Verizon to provide it with the phone records of its customers. As the story developed it became clear that the two other major telephone networks as well as credit card companies were doing the same thing; and that the NSA and FBI were being provided with access to server systems operated by Google, Apple, Facebook, Yahoo, Microsoft and Skype.
On 11 June the Guardian reported the source as Edward Snowden, a 29-year-old who had been working at the NSA for four years.
Snowden believed it was important for him to publicly acknowledge his role in order to provide a human face to the story. He knew he was putting his life at risk and exposing himself to decades of incarceration. “My sole motive is to inform the public as to that which is done in their name and that which is done against them,” he explained. Snowden hoped to trigger a debate “about the kind of world we want to live in”. The US government began an immediate campaign to track, harass and silence him.
The National Security Agency chief said Tuesday he was "perplexed" over Twitter's move to block US intelligence from accessing data which may help thwart violent attack plots.
NSA director Admiral Michael Rogers made the comments at a congressional hearing in response to Senator John McCain's criticism of Twitter for refusing access to a real-time analytics service called Dataminr.
McCain queried Rogers about a Wall Street Journal report in May that Twitter had blocked intelligence agencies from using Dataminr, which uses algorithms and location tools to reveal patterns among tweets.
During the three years he has spent in Russian exile, Edward Snowden, the N.S.A. contractor turned whistle-blower, has maintained a surprisingly steady presence in American culture as a kind of virtual trans-border eminence. He appears via “Snowbot” and video link at conferences, in museums, and in theatres. He delivers lectures at universities and grants interviews to reporters, including, in 2014, a virtual interview with The New Yorker’s Jane Mayer. This past July, he turned up at Comic-Con, at a secret screening to promote “Snowden,” the new film directed by Oliver Stone, which comes out on September 16th. Snowden’s digital omnipresence has an ironic quality: he’s a ghost in the screen, a disembodied conscience, a spy in the sky. Yet in his most defining appearances to date, Snowden’s voice has come to us in mediated form, shaped by the artists and journalists whom he has engaged as collaborators—and sounding quite different depending on who is in the editing bay.
As anticipation about the upcoming release of the Edward Snowden movie biopic mounts, WikiLeaks' editor and legal researcher Sarah Harrison has denounced any speculation that the former NSA analyst Edward Snowden is an agent of the Russian state.
Harrison, who personally accompanied Snowden as he travelled out of Hong Kong and towards asylum in Latin America, gave an interview to Russian state media channel RT where she discussed the movie, the role of WikiLeaks and global mass surveillance.
When asked if there was any merit to the claims of former chair of the US House Intelligence Community and current NSA director Mike Rogers – who in 2014 claimed Snowden's escape was likely aided by the Kremlin – Harrison bluntly stated: "No, absolutely not."
The ACLU has been hinting at this for the past few months, but with the end of President Obama's term in office coming up and coinciding with the launch of Oliver Stone's feature film about Ed Snowden, the ACLU, along with Amnesty International, are launching an official campaign to ask the President to issue a pardon for Ed Snowden. They'll be hosting a press conference Wednesday morning, where Snowden will show up via video (perhaps using Robot Snowden?) to discuss. Not surprisingly, the ACLU says they've lined up a bunch of "legal scholars, policy experts, human rights leaders, technologists and former government officials," who will all be supporting a pardon for Snowden.
The aftershocks of the 9/11 sneak attacks triggered an explosion of America’s surveillance state — which one Oahu resident dared expose.
Three-time Oscar winner Oliver Stone has directed and co-written “Snowden,” a feature film about the former intelligence contractor who blew the whistle heard ’round the world, revealing Washington’s top-secret, warrantless mass surveillance of citizens.
The real Edward Snowden, who was also the subject of the 2014 documentary “Citizenfour,” has been living in exile in Moscow since fleeing the U.S. in 2013, having later been charged with violating the Espionage Act.
“Citizenfour” largely recounted the National Security Agency contractor’s spilling of the beans in Hong Kong to journalists Laura Poitras, Glenn Greenwald and Ewen MacAskill, who published blockbuster articles based on the document trove he gave them.
If the expression “I can’t breathe” holds power for you, it’s because of Ramsey Orta. He’s the one who held his cellphone camera steady while New York police officer Daniel Pantaleo choked the life out of Eric Garner in July of 2014.
Garner was Orta’s friend. He used to give Orta’s daughter a dollar to spend at the local store every time they walked past. Ramsey Orta’s been sentenced to four years in prison stemming from drug and weapon charges, those that stuck among the many and various police have brought against him since the Garner video came to light.
Chris Leday uploaded video of Alton Sterling’s killing at the hands of Baton Rouge police. Reporting to work the next day, he was arrested, handcuffed and shackled by civilian and military officers. First he “fit a description,” then it was assault charges that didn’t exist; finally, it was unpaid traffic tickets.
Earlier this year, I wrote about a wonderful library project that Tibetan friends in India are putting together for a Tibetan exile community there, with the support of His Holiness the Dalai Lama. Here's an update from my friend Phuntsok Dorjee, who is one of the organizers.
The Standing Rock Sioux Tribe’s remarkable struggle to stop the Dakota Access oil pipeline sparked a movement. Thousands of people – including representatives from more than 180 indigenous nations – traveled to North Dakota in solidarity with the Standing Rock Sioux Tribe as they defend their rights and protect nature. The companies behind the Dakota Access Pipeline responded by using attack dogs and bulldozing their sacred sites in order to forcibly displace them. Mounting pressure from the movement forced the Obama administration to intervene and temporarily stop the construction of the pipeline on indigenous land. However, it would be a mistake to believe that the struggle is over. The U.S. government has a long way to go in regards to respecting its treaties with Native American peoples.
New York, September 12, 2016 -- Prosecutors in the U.S. state of North Dakota should immediately drop all criminal charges against broadcast journalist Amy Goodman, the Committee to Protect Journalists said today. Goodman, who hosts the global news program Democracy Now!, faces criminal trespass charges in connection with her reporting on protests against the construction of an oil pipeline opposed by Native American tribes in the region.
The warrant, issued September 8, followed Goodman's filming of security guards using dogs and pepper spray to disperse protesters seeking to stop the construction of the pipeline, according to Democracy Now! and National Public Radio. Both protesters and security guards were injured in the September 3 clash, according to the reports.
The Morton County's Sherriff's Department issued a statement saying that protesters entered private land after breaking down a fence, according to the NPR report. Democracy Now! reported on its website that an officer from the North Dakota Bureau of Criminal Investigation acknowledged in an affidavit that Goodman is seen in the video identifying herself as a journalist and interviewing protesters. If convicted of the misdemeanor charge, Goodman could face a maximum penalty of 30 days in jail.
It is a strenuous, unceasing effort to cope with the ordeal of being incarcerated at a federal prison. I find myself identifying with the title character from Shakespeare’s “Richard II” when he laments his own effort to adjust to confinement by wondering, “I have been studying how I may compare this prison where I live unto the world.” I do my best to resist the thought that prison is a reflection of our society, but the comparisons are unavoidable. Unlike “Richard II,” my “studying” has not been so much a comparison as an unhappy realization.
From the moment I crossed the threshold from freedom to incarceration because I was charged with, and a jury convicted me of, leaking classified information to a New York Times reporter, I needed no reminder that I was no longer an individual. Prison, with its “one size fits all” structure, is not set up to recognize a person’s worth; the emphasis is removal and categorization. Inmates are not people; we are our offenses. In this particular prison where I live, there are S-Os (sex offenders), Cho-Mos (child molesters), and gun and drug offenders, among others. Considering the charges and conviction that brought me here, I’m not exactly sure to which category I belong. No matter. There is an overriding category to which I do belong, and it is this prison reality that I sadly “compare unto the world”: I’m not just an inmate, I’m a black inmate.
Thinking that you know about something and actually experiencing it are completely different. Previously, my window into prison life was informed, in part, by the same depictions in movies, TV shows, and books that the rest of America has seen. And unfortunately, as a child I heard firsthand so many stories about prison life from people I knew that it seemed commonplace. I expected there to be a separation of the races — by some accounts “necessary” racial segregation — because that is what I saw, read, and heard. My expectations and naiveté could not prepare me for actually living in it, however.
I didn’t have to be taught the rules of prison society, particularly in regard to racial segregation, because they are so ingrained in just about every aspect of prison society that they seem instinctual. Even though there is no official mandate, here, I am my skin color. Whenever, in my stubborn idealism, I refuse to acknowledge being racially categorized and question the submission to it, the other prisoners invariably respond, “Man, this is prison.”
Could someone explain why it’s noble, enlightened, justifiable, and progressive to boycott an American state, but hateful, bigoted, retrograde, and evil to support a boycott of a foreign country that has been imposing a brutal, discriminatory, and illegal occupation for many decades, a boycott that is led by people with virtually no political rights? How did that happen? Hillary Clinton is far from the only person espousing this bizarre distinction — New York Gov. Andrew Cuomo, as but one example, is punishing companies that support a boycott of Israel while forcing state employees to honor the boycott of North Carolina — but what could possibly justify U.S. politicians drawing the moral and ethical lines about boycotts in this manner?
If nothing else, the CWA hackings proved government agencies like the DHS and FBI must not be able to hear themselves talk when they demand more data on Americans, despite not being able to secure the information they already have from 16-year-old hackers who go by the name of "penis" on Twitter. Their efforts also made it clear that most cell phone service providers' authentication processes have miles to go before they even approach "competent."
On August 3, a judge in London ordered Saudi academic Mohammed Al-Jeffery to return his daughter, Amina, to Britain.
The deadline set by Mr Justice Holman has now passed and she has not yet returned.
His order was that Mr Al-Jeffery had to "permit and facilitate" his daughter's return to England or Wales by 4pm on Sunday.
The Guardian has published a long report detailing Senate staffer Daniel Jones' experience with the CIA while acting as the Senate Committee's chief investigator during the compilation of the "Torture Report." While much has already been written about the CIA's actions during this time, the Guardian's multi-part piece gives the public an insider's look at the effort the agency went through to disrupt the preparation of the report.
The process started off on the wrong foot. It was the New York Times, not the agency itself, that initiated the Senate's examination of the CIA's counterterrorism efforts.
Something historic is happening in North Dakota. People are protesting an oil pipeline. And the people who are protesting the oil pipeline are mostly Native Americans.
It’s historic because the 200 or so tribes that are protesting the construction of the $3.7 billion Dakota Access Pipeline have not united together for more than 150 years. Several thousand indigenous people from across the county have journeyed to a little-known pasture on the prairie just miles from the Standing Rock Sioux Tribe’s reservation — where the oil pipeline is slated to cross the Missouri River — to protect the land the tribes consider sacred and culturally significant as well as the water necessary for life. The protectors, as the protesters call themselves, are defending the land and water using little more than the right to assemble and speak freely, a long-standing protection afforded by the U.S. Constitution.
Unfortunately, there is another kind of history happening here. It’s a history that is all too familiar to indigenous people; it is the shameful cycle of government-sanctioned disregard for the human and civil rights of Native Americans. In response to the pipeline protests, North Dakota’s government suppressed free speech and militarized its policing by declaring a state of emergency and calling out the National Guard.
On a Saturday evening in late March 2008, a 41-year-old Maryland man named Mark Castillo drowned his three children in the bathtub of a Baltimore hotel room.
Castillo and his wife of 10 years, Amy, had been embroiled in a grueling custody dispute. Amy Castillo had repeatedly warned the courts that her mentally ill husband was unraveling, and had physically threatened her and their children. As a result, she tried to persuade the judge in the custody case to end Castillo’s unsupervised visits with the children.
But the judge was not persuaded. He chose instead to rely on the testimony of a court-appointed psychologist, who said Castillo posed no risk to his family. Castillo’s visits with his children remained unchanged. Less than a year later, the children were dead. Castillo turned himself in hours after he killed them, having failed in his attempt to also kill himself. Castillo pleaded guilty in 2009 and is currently serving three life terms without the possibility of parole.
Anti-domestic violence plan to cite the Castillo case and others like it at a Congressional briefing in Washington on Tuesday in an attempt to gain support for family court reform. The advocates say that children are too often endangered by family courts and the supposed experts those courts rely on. Psychologists used by the courts to help make decisions “in the best interest” of children, the advocates argue, often lack expertise in child abuse and domestic violence.
A national campaign to rewrite state laws and allow businesses to decide how to care for their injured workers suffered a significant setback Tuesday when the Oklahoma Supreme Court ruled that Oklahoma’s version of the law is unconstitutional.
The 2013 legislation gave Oklahoma employers the ability to “opt out” of the state workers’ compensation system and write their own plans, setting the terms for what injuries were covered, which doctors workers could see, how workers were compensated and how disputes were handled. The statute was backed by the oil and gas industry and retailer Hobby Lobby.
Buoyed by the success in Oklahoma, proponents took the idea nationwide as a coalition led by Walmart, Lowe’s and several of the largest retail, trucking and health care companies sought to pass similar laws across the country. Bills and draft proposals have been floated in Tennessee, South Carolina, Georgia, Mississippi, West Virginia, Wisconsin and Illinois.
Imagine: you're a programmer who loves to code. You're studying at college, but you're also working as a freelance web developer. In what spare time you have, you polish and release your best work under an open source license, for the world to use. Your father has grown sick and may be dying, and so you take a short break to travel back to the country of your birth to visit him.
After the long flight, you take a walk along the streets of the capital — perhaps to shake off your jetlag. Two men approach you, and begin aggressively questioning you. You're confused. Are they police officers? Without warning, they grab you by the arm, handcuff you, and force you into an unmarked sedan. You are thrown into solitary confinement, and held there for months, out of contact with the outside world. You are tortured. You are told that you are a criminal mastermind behind a network of evil websites. If you confess, they say, you will be released. You confess. They show your confession on national television. Your mother has a heart attack when the confessions are shown. You are sentenced to death. Your father dies as you await your execution.
The decision of San Francisco 49ers quarterback Colin Kaepernick to sit during the pregame playing of the national anthem has had a larger impact than anyone could have foreseen.
President Obama has weighed in, endorsing Kaepernick’s “constitutional right to make a statement.” When Kaepernick changed his protest to kneeling instead of sitting, teammate Eric Reid joined him. Brandon Marshall of the Denver Broncos followed suit and lost an endorsement deal. Marcus Peters of the Kansas City Chiefs raised a fist during the anthem, a la John Carlos and Tommy Smith at the 1968 Olympics. An unidentified Navy sailor who took a seat in solidarity with Kaepernick may face disciplinary action. The protest has even spread to high school players across the country.
A reporter from Democracy Now! who documented security personnel with guard dogs working for Dakota Access Pipeline is facing criminal trespassing charges in Morton County.
Authorities have issued an arrest warrant for Amy Goodman of New York for a Class B misdemeanor, according to court documents.
So much for the First Amendment to the Constitution of the United States.
Despite well-established freedom of the press protections that outline and guarantee the rights of reporters who cover breaking news stories—including confrontations between demonstrators and authorities—North Dakota officials have charged Democracy Now! host Amy Goodman with criminal trespassing after she documented private security personnel’s use of dogs to attack Native American foes of the Dakota Access Pipeline project.
Video footage obtained by Goodman, an internationally respected and frequently honored independent journalist, helped to alert Americans to the tactics being used to stop demonstrations against the pipeline by the Standing Rock Sioux Tribe and their allies. On Friday, the Obama administration halted work on key portions of the $3.8 billion pipeline project—recognizing concerns raised by the tribe and environmental activists.
A Marine veteran says he was fired from the Weirton, West Virginia Police Department because he did not shoot an armed black man who was looking for “suicide by cop.” Two other officers arrived and killed the man, whose gun was not loaded.
Stephen Mader, 25, answered a call on May 6 from a distraught woman who said her boyfriend was trying to commit suicide. He tried to de-escalate the situation using his Marine Corps and police academy training, he told the Pittsburgh Post-Gazette. Weirton is a city of about 20,000 in the West Virginia panhandle, 36 miles west of Pittsburgh, Pennsylvania.
Thousands of Native Americans resurrected the fighting spirit of their forefathers as they stood in unprecedented unity to contest an oil company’s desecration of their sacred land in North Dakota. Considering its burdened historical context, this has been one of the most moving events in recent memory.
The standoff, involving 5,000-strong Native American protesters, including representatives of 200 tribes and environmental groups, has been largely reduced in news reports as being a matter of technical detail – concerning issues of permits and legal proceedings.
At best, both the tribes and the oil company are treated as if they are equal parties in a purportedly proportionate tussle.
“'Dakota' means 'friendly' and yet, it seems, neither side has been too friendly to each other,” wrote Mark Albert in the website of the American broadcasting television network, CBS.
We've long pointed how how broadband usage caps (especially on fixed-line networks) are arbitrary, punitive and confusing. In addition to being totally unnecessary, broadband caps open the door to anti-competitive behavior (like zero rating a company's own content but not a competitor's). The idea that caps are necessary to manage the network has long been debunked, and even the ISPs themselves have admitted that caps have nothing to do with congestion. Broadband caps are little more than glorified price hikes on captive markets, useful to protect legacy TV revenues from streaming video.
Netflix wants you to be able to stream plenty of TV shows whether you’re at home or on a mobile connection, so it’s pushing for the US government to make some data caps illegal.
In a letter sent to the Federal Communications Commission last week, Netflix said that the commission should consider banning data caps on wired internet connections and banning "low" data caps on mobile connections.
"Data caps (especially low data caps) and usage based pricing discourage a consumer’s consumption of broadband and may impede the ability of some households to watch internet television in a manner and amount that they would like," Netflix writes.
Stanford engineers have invented a technology that would allow an internet user to tell network providers and online publishers when and if they want content or services to be given preferential delivery, an advance that could transform the network neutrality debate.
Net neutrality, as it's often called, is the proposition that internet providers should allow equal access to all content rather than give certain applications favored status or block others.
On home networks, favored status is known as fast track delivery. On mobile devices the terminology is zero-rating, because favored traffic does not count against data usage caps.
While it is common knowledge that Kiondo is a Kenyan product produced not just by artists by ordinary women as well, it is widely believed in Kenya that the product was patented in Tokyo, Japan by some entrepreneur, something that is both shrouded in myth and controversy.
“I do not care if the basket was patented in Japan or not, all I know is that making covers for the basket gives me an income. In fact, I do not understand all this talk about patents or what they are all about,” Musyoka, told Intellectual Property Watch, his homemade needle in hand as he joins pieces of leather together to make the baskets.
Musyoka, like the tens of artisans and creators working at the popular market frequented by foreign tourists, displays little knowledge of intricacies surrounding patents.
About a dozen members of the World Intellectual Property Organization yesterday demanded to be provided with a report conducted by the United Nations Office of Investigation and Oversight Services (OIOS) on allegations against the WIPO director general.
“The report was requested by Member States and should be available to Member States,” they said in a statement, available here, to the WIPO Coordination Committee. “We reiterate our request that the CoCo [Coordination Committee] Chair immediately formally request that OIOS produce a full version of the OIOS report, redacted only to protect witness confidentiality, and to provide this to member states no later than September 26, one week before the General Assemblies. It is imperative for organizational transparency and Member State oversight. Any further delays in releasing the report are unacceptable.”
The FCC is about to make a decision about whether third-party companies can market their own alternatives to the set-top boxes provided by cable companies. Under the proposed rules, instead of using the box from Comcast, you could buy your own from a variety of different manufacturers. It could even have features that Comcast wouldn’t dream of, like letting you sync your favorite shows onto your mobile phone or search across multiple free TV, pay TV, and amateur video sites.
We’ve been closely following the “Unlock the Box” proposal since it was first introduced in February, but its history goes back much further. Congress first authorized the FCC to enact rules bringing competition to the set-top box market 20 years ago, as a part of the Telecommunications Act of 1996. We’re so close to finally unlocking the box, but pay TV providers and big content companies have been throwing out every distracting argument they can to stop it.
Advertising network JuicyAds has told a California federal court that it's not responsible for pirate sites that use its service to generate revenue. The case is the first where an ad-company stands accused of aiding pirate sites, which has been a major complaint from entertainment industry insiders in recent years.
Reactions have been all over the map about the European Court of Justice (ECJ) ruling on the legality of hyperlinks to infringing material. Some outlets despair that links can be illegal, others rejoice that links to infringements can be legal. The legal landscape is complex and there are many underlying issues – not the least being what the law says today, versus what the law should be saying.
The Electronic Frontier Foundation screamed out in despair that “this terrible ruling is hard to fathom” in a post titled that the ECJ “ushes in a dark era for hyperlinks”. In contrast, TorrentFreak proclaimed that the ruling means “linking is (usually) not infringement” (updated since original publication). There are other opinions and analysis pieces on the ruling all over the scale.
Why is this? A large amount of the confusion can be summed up in the conflation of two completely different issues: the first and obvious issue is whether the ruling is reasonable as the law stands today, but there’s also the issue of what the law says today versus what the law should be saying according to common sense of the net generation. While opinions vary on the morality of the copyright monopoly among the net generation, most seem to agree that you should be able to talk about a resource on the net, the same way you’re able to describe an address in a city without that description being illegal in itself (so-called “Analog-Equivalent Rights”). But this is not what the law looks like today.
MEPs Julia Reda (Greens/EFA, Germany), Marietje Schaake (ALDE, Netherlands), Brando Benifei (S&D, Italy) and Dan Dalton (ECR, United Kingdom) joined forces today to reject the European Commission’s proposal for a new extra copyright for European news websites. Commission President Juncker is expected to announce the plan in his State of the Union address on Wednesday.
Wikimedia, EDRI, Application Developers Alliance, along with other associations advocating for digital rights and NGOs representing digital creators and platforms, addressed a letter [available here] to, among others, EU Commission's President Junker, Vice-President Ansip, and Commissioner Oettinger, urging the Copyright Package expected to be released on 15 September to uphold
"the fundamental principles of the Digital Single Market such as rights of citizens to freedom of information, access to knowledge and the limitation of intermediaries’ liability, which lie at the very foundations of the internet".
In the letter published on 9 September, the signatories request the EU Commission:
- Not to create a new ancillary right for publishers. After the tragic experiments in Spain and Germany, the signatories stress, that - you guys should have understood that distorting copyright to tax snippets produce "no positive outcomes but has harmed consumers, innovation and the internet at large" -- i.e., not only Google, but many other small companies and startup aggregating and indexing news on the internet and struggling to fill the gap between old media and digital revolution. In the same regard, the signatories also urge the Commission to publish the response to the public consultation on the role of publishers in the copyright value chain and on the 'panorama exception'. The signatories say that "many have pointed out that new ancillary rights for publishers were harmful".