When Microsoft’s Windows 10 deadline passed, many heaved a sigh of relief, thinking that Microsoft’s obnoxious popup reminders had finally been laid to rest.
Surprise! Microsoft’s at it again, reminding users to sign up for Microsoft Rewards (formerly Bing Rewards) by using Edge, Windows 10’s built-in browser. My colleague Brad Chacos was hit by the ad above after hours, reported it, and immediately erased Edge from his toolbar.
Here’s what we know: The popup doesn’t seem to appear if you use Edge frequently (Brad does not). Personally, I’ve never experienced a similar ad, though I use Edge as well as Microsoft Rewards, meaning there’s no need for such an ad to appear.
Windows 10 felt in many regards like an operating system that was not ready for release back when Microsoft released it. This was the case for the new system browser Microsoft Edge as well, as it lacked a lot of features.
While it was highly optimized, it felt like a browsing shell more than a full browser in many regards. Microsoft worked on improving Edge, and it did so over time by introducing new functionality such as browser extensions.
These ads appear over the Edge icon in the Windows 10 taskbar, even when Edge is not open. They do appear only when Edge is not the default system browser but that covers the majority of Windows 10 systems.
It does not take much to create a commercial Linux desktop. It's about hardware and software integration, a full-stack ownership of the product, commercial software plays a critical role, and it all costs money. But would you be willing to pay for a secure, stable, pretty Linux desktop that will be supported for 10 years, it comes with subscriptions to half a dozen multimedia streaming services, you can buy games and videos without ambling about the Web, and it runs on top-notch hardware?
I know I would. Then, does it matter what the operating system is called? So yes, the commercial birth of Linux is the death of our childish illusions. But after 25 years, maybe it is time for Linux to morph into a new entity, and it will no longer be our playground. Sounds sad, and it is, but I'm also tired of testing Linux distributions, testing and testing and testing and getting a small bit of my soul burned every time. You can only fail to print to an expensive printer so many times before it becomes ridiculous. Food for thought.
From the time when I first started to use Linux as my one and only OS in 2006, I’ve started to believe that Linux gets itself updated every year and offers a lot more than in 2005. It doesn’t disappoint you anytime always got something for everyone. So let’s look into the top 10 Linux Distros for Desktop & laptops based on many factors including customizability, best look and feel, best multimedia options etc.
My father got me a computer for graduation with 512 MB RAM and a Pentium processor. It came with Windows XP, and I used it to do 2D-animation with Adobe Flash. Back in those days, I was looking for my dream job as a 3D artist, and I’d often see job listings that said: “Linux knowledge required.” I had heard of Linux, but had never used it, so I decided to learn more. I didn’t have the time or energy to take a class, so I started exploring on my own.
The technical jargon was overwhelming at first (GNU, distros, flavors, UNIX, windows managers, GNOME, KDE, Bash, C shell…), but I kept reading articles, e-books, and forums. Finally, one day I bit the bullet and decided to install Linux.
Tiny laptops have always been devices that promise so much, yet fail somehow to deliver. From the Atari Portfolio palmtops through to the recent crop of netbooks they have been either eye-wateringly expensive if they are any good, or so compromised by their size constraints as to be next-to-useless. We’ve seen DOS, EPOC, Windows, WinCE, Palm OS, Linux distros and more in tiny form factors over the years, yet few have made a significant mark.
The prospect of a “proper” computer in your hand isn’t something to abandon just yet though. We are now reaching the point at which the previous generation of higher-end Android tablets are both acceptably powerful and sufficiently numerous as to be available at a very reasonable price. Perhaps these can provide the tiny laptop seeker with a basis for something useful. [NODE] certainly thinks so, because he’s produced a nice little Ubuntu laptop using a second-hand Nexus 7 tablet and a Bluetooth keyboard case. Android is replaced with an Ubuntu image, and a cardboard cut-out display bezel is held in place with magnetic strips. A step-by-step guide has been put up to help others interested in following the same path.
My first encounter with docker goes back to early 2015. Docker was experimented with to find out whether it could benefit us. At the time it wasn’t possible to run a container [in the background] and there wasn’t any command to see what was running, debug or ssh into the container. The experiment was quick, Docker was useless and closer to an alpha prototype than a release.
Fast forward to 2016. New job, new company and docker hype is growing like mad. Developers here have pushed docker into production projects, we’re stuck with it. On the bright side, the run command finally works, we can start, stop and see containers. It is functional.
Container systems are becoming easier to install, but setting up and managing production container platforms can still be challenging. In his presentation at CloudNativeCon in Seattle, Michael Friis, Product Manager at Docker, will explain what it takes to install and maintain container platforms on public clouds and describe some important considerations for choosing load balancers, logging, and storage solutions. Here, Friis gives us a preview of his talk and shares some recommended practices.
In this series on network functions virtualization (NFV), we’ve been spending time talking about some of the pitfalls and challenges involved in adopting NFVI components – and how to plan for deployment. This week we’re going to spend some time breaking down what to look for in moving to NFV hardware components.
The information I have gathered is based on feedback from various service providers and product experts on how to get NFVI ready for prime time. They have identified many of the key areas to look for in NFV hardware components.
It's 2016 (almost 2017) why is the time off on your system clocks? It became apparent to me that there are some folks out there that do not realize their clocks are off for a reason. My Twitter buddy Julia Evans recently made a graphic about distributed systems that mentioned clock issues and it made me really sad.
For a general base image it is important that the image be compatible with as much software as possible.
Some base images reduce size by using components such as musl libc and busybox that are very small, but don’t have some features that are expected by other software.
To be really useful to developers you want a base image to have a large library of software available to easily integrate into images.
Just a few minutes ago, Linus Torvalds announced the availability of the fourth RC (Release Candidate) development milestone of the upcoming Linux 4.9 kernel series.
Michael Kerrisk started his 2016 Kernel Recipes talk by noting that the man pages collection, which he maintains, now documents over 2,200 interfaces at the kernel level and above; it adds up to about 2,500 printed pages. In the course of writing and collecting all this documentation, he has seen a lot of ABIs. There are many lessons to be learned from this experience, he said, if we want to create better ABIs in the future.
There is a whole set of obvious goals that one might want to meet when designing an ABI. It should, naturally, be bug-free and as simple as possible, while being extensible and maintainable. Compliance with existing standards is important as well. Presumably, he said, we all agree on these goals — but we repeatedly fail on all of them.
We recently celebrated 25 years of the Linux project. KVM, or Kernel-based Virtual Machine, a part of the Linux kernel, celebrated its 10th anniversary in October. KVM was first announced on 19 October 2006 by its creator, Avi Kivity, in this post to the Linux kernel mailing list.
That first version of the KVM patch set had support for the VMX instructions found in Intel CPUs that were just being introduced around the time of the announcement. Support for AMD's SVM instructions followed soon after. The KVM patch set was merged in the upstream kernel in December 2006, and was released as part of the 2.6.20 kernel in February 2007.
After writing a few days ago about Fujitsu SP scanners getting Linux support but being only provided by binary blobs, a Phoronix reader pointed out that the Plustek scanner manufacturer is looking at providing open-source Linux driver support.
After writing earlier this week about DirectFB returning online after their project site disappeared, the lead developer has put out an update on the project.
Since writing that post on Thursday, a "DirectFB returns" message was posted to their new site at DirectFB.net.
With my recent NVIDIA GTX 1050 series Linux tests I included the latest Vulkan performance numbers for NVIDIA's Pascal card line-up, but if you're curious how the performance is going back to Maxwell and Kepler, here is a 13-way comparison of GeForce GPUs when running Dota 2 with OpenGL and Vulkan on Ubuntu Linux.
With swapping through 13 cards for some OpenCL/CUDA fresh benchmarks, I took the opportunity to run some fresh OpenGL vs. Vulkan Dota 2 numbers for the cards too. In the next day or two I'll complement this with some VLK vs. OGL numbers on the AMDGPU-PRO/RADV side too... So stay tuned for that.
This package contains the Pod::Man and Pod::Text formatters for Perl.
This is a bug-fix release that fixes a long-standing problem with Pod::Text on EBCDIC systems. The code to handle non-breaking spaces and soft hyphens hard-coded the ASCII code points and deleted the open bracket character on EBCDIC systems.
In September I’ve launched two small fundraisings on gspell and LaTeXila. The two goals are now reached, thanks!
I’ve started working on those two projects, here is a progress report.
PackPack is a new open-source (BSD-licensed) project for building RPM and Debian packages from Git repository software sources. PackPack leverages Docker containers, semantic versioning, and can interface with the Travis continuous integration software.
PackPack was developed by the Mail.Ru Group for automating release management of open-source and closed-source projects. It aims to reduce push-to-package time "from hours to minutes" and supports building packages of OS targets including Debian, Ubuntu, Fedora, and CentOS. Building for these different targets relies upon Docker for using an OS image for that particular target.
Two years later, with the 2.0 release, Vim's feature set had exceeded that of vi, so the acronym was changed to "Vi IMproved," Today, having just marked its 25th birthday, Vim is available on a wide array of platforms—Windows, OS/2, OpenVMS, BSD, Android, iOS—and it comes shipped standard with OS X and many Linux distros. It is praised by many, reviled by many, and is a central player in the ongoing conflicts between groups of developers. Interview questions have even been asked: "Emacs or Vim?" Vim is licensed freely, under a charityware license compatible with the GPL.
Many distributions, among which Fedora in 23 & 24, and Arch Linux, have recently shipped NSS 3.27, sometimes packaged as 3.27.0, or even 3.27.1. This release may just have triggered some confusion about disabling, enabling, and defaulting to or not, the NSS implementation of TLS version 1.3 (currently in draft). Fun!
GIMP is the multi-platform image manipulation tool stands for GNU Image Manipulation Program. It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. GIMP works on many operating systems and it is translated in many languages. It has many capabilities. It can be used as a simple paint program, an expert quality photo retouching program, an online batch processing system, a mass production image renderer, an image format converter, etc. GIMP is expandable and extensible. It is written and developed under X11 on UNIX platforms. Both stable and development version is available via 3rd party repositories.
Linux Mint is one of the most popular Linux distribution. Mostly advanced Linux users including LinuxAndUbuntu, it is always suggested to start with Linux Mint. So those who are newbies or thinking to use Linux Mint, here is a complete tutorial on how to install Linux Mint from USB and CD/DVD.
When did it hit me that the times were a changin’ at CodeWeavers corporate Headquarters (and no it wasn’t when Bob Dylan got awarded the Noble Peace Prize for Literature)? Maybe it was when we introduced CrossOver on a platform not in our sandbox – ANDROID. Or when we lost our COO of 14 years to a new career opportunity, or rearranged the office (everyone had to move offices and have a new office mate), or chalk painted furniture, or had an office pet for a day, or when the conference room moved, or the standard monthly company meeting date moved after 20 years in existence (revolution). AND we bribed attendance with bagels instead of donuts. Or was it when everyone went from a Linux or macOS to a Windows system?
CodeWeavers announced this week they've hit the milestone in CrossOver 16 development where they have been able to successfully register Microsoft Office 2016 in an internal alpha build of CrossOver 16. With this support in the upcoming CrossOver 2016, Office 2013 is working with all core functionality including Word, Excel, PowerPoint, and Project.
On the third day of November 2016, CodeWeavers, the company behind the popular, yet commercial CrossOver graphical user interface (GUI) to Wine, celebrated a major milestone, as they successfully registered Microsoft Office 2013 in the application.
Yes, you're reading that right, the next major CrossOver release, versioned 16, will bring support for the Microsoft Office 2013 office suite. What this means for you is that you'll finally be able to install, register and use Microsoft Office 2013 on your GNU/Linux or macOS operating system using CrossOver 16, due for release later this year.
Deus Ex: Mankind Divided is now available for Linux computers, port developer Feral Interactive has announced. The Linux port comes a little over 2 months after the game’s original release for Windows PC, PS4 and Xbox One. A Mac port is also under development, as was revealed back in September, but there is no word on when it will be released.
This is a like a long lasting drama. Some guys wanted to make a handheld and started making promises without having a prototype. It showed and they had to back down after a first disaster Kickstarter campaign. In the meantime, they secured some cash from investors, managed to be at the GamesCom 2016 with a prototype, and they have just relaunched their Kickstarter campaign with success – at the time of writing they already achieved their funding goal of 250k Euros, well ahead of the deadline. Not everyone gets second chances but I think they have learned from their mistakes and have come back with something to show that is more tangible than before.
Dead Age [Steam] is a pretty great looking Early Access Zombie survival RPG, it has turn-based battles, and a non-linear story that could set it apart from other Zombie games.
Company of Heroes 2 [Steam] has been updated for Linux by Feral Interactive, it brings in some important fixes as well as bring it up to date with the latest Windows-version patches.
Fans of the classics may be interested to know about 'VCMI' [Official Site], an open-source engine for Heroes of Might and Magic 3.
It needs the original data files, much like other open-source efforts do. You can find it on GOG if interested.
If you were interested in picking up 'White Noise 2' [Steam] from Milkstone Studios, you may want to hold off. It seems to be completely broken on any recent distribution.
I checked in on it, purchased it myself as it looked and sounded really fun, but it just doesn't work. The developers claim it works on Ubuntu 14.04, but it seems not many are having any luck, especially since that's two years old (which in Linux updates, is a long damn time). You can see the bug report here.
Manokwari is a desktop environment from BlankOn GNU/Linux operating system. In this manner, Manokwari is similar with Budgie from Solus OS, or DDE from deepin OS. While the current BlankOn OS is slowly moving into the new 10.0 version (codename "Tambora"), the current Manokwari gets a new feature I want to introduce here. This article is an intro for you who are totally new to Manokwari.
If you’ve dabbled with Linux distros in the past, then you’ve likely heard of KDE before. KDE stands for K Desktop Environment and it’s one of the main desktop environment options (next to GNOME) that can be used on Linux distros. KDE e.V. is a registered non-profit organization that represents the KDE community when in legal and financial matters. The team behind this organization has just announced a new, open source smartphone OS called Plasma Mobile.
The team describes Plasma Mobile as a way to turn your smartphone into a “fully open hacking device, just like a PC.” Those of you who have used KDE in the past might be familiar with the Plasma workspace by the name “KDE Plasma”. KDE Plasma is available for desktops, netbooks, media centers for TVs, tablets and now mobile devices. If offers an adaptable user interface and in the future it will also offer a rapidly-maturing software system that is developed with an open life cycle.
Just recently, I have been very interested to KOrganizer, a calendar scheduling program from KDE. It is awesome in scheduling my personal tasks, it has calendar with categories and colors, and also it has reminders. This article gives a personal example from my own calendar, with some little reviews, and you can use that calendar file and edit it to suit your needs. And I'd like to say big thanks to Azzam Syauqi Azis to inspire me about how awesome KOrganizer was. Enjoy!
A couple of days after the release of KStars 2.7, the KStars team is happy to announce the availability of KStars Lite for Android, now available on the Google Play Store.
My friend Amelia Hamrick was doing commissions to help raise money to donate to Krita, and I love her work as well, so I thought I’d try it out!
Since several KDE folks were in town for the Google Summer of Code Mentor Summit they decided to come visit us as kind of an impromptu KDE 20th birthday party, and to meet KDE's newest/youngest disciple. She might still be a bit young to write code, but we'll see how long it'll take to change that. One of the reasons neither me nor blauzahl have been very active in KDE lately...
The classic Linux desktop -- a workspace, a panel, and a menu -- remains the most popular design for a graphical interface. Unfortunately, however, modern computers include too many applications to fit on a single desktop. Many users respond by launching applications from the menu, often drilling down several levels and sometimes even relying on incomplete menus to reduce clutter. However, KDE offers a more elegant solution in Activities, or multiple desktops, each with its own set of icons.
Activities were introduced with the KDE 4 release series. For some reason, they have never caught on, partly because the project has rarely emphasized or explained them, and partly because how they are different from virtual workspaces has never been clear. It doesn't help, either, that from the virtual workspace pager on the panel, you can set virtual workspaces so that each can have its own icons, widgets and settings, just as Activities can.
Usually, however virtual workspaces are sub-divisions of a desktop, extending workspace without the trouble of setting up multiple monitors. Using virtual desktops, for example, you can keep your browser or email reader open full-screen all the time.
By contrast, Activities are usually organized by tasks or project. By setting up different Activities, you can place all the necessary resources for a task or project in the workspace, a single click away. In effect, they make the classic desktop practical again.
While GTK3 on Linux with both X.Org/Wayland has supported HiDPI displays for a long while, only with the latest GTK4 development code should there be usable HiDPI support for those using this tool-kit on Microsoft Windows.
I’ve been keeping an eye on Rust for a while now, so when I read Alberto’s statement of support for more Rust use in GNOME, I couldn’t resist piling on…
From the perspective of someone who’s quite used to C, it does indeed seem to tick all the boxes. High performance, suitability for low-level tasks and C ABI compatibility tend to be sticking points with new languages — and Rust kills it in those departments. Anyone who needs further convincing should read up on Raph Levien’s font renderer. The usual caveat about details vis-a-vis the Devil applies, but the general idea looks exactly right. Rust’s expressiveness and lack of baggage means it could even outperform C for non-trivial code, on top of all the other advantages.
Xubuntu 16.10 Yakkety Yak is far from perfect. It's also not the finest Xubuntu release by a long shot, and the streak of awesome in 2014-2015 remains unmatched. Yes, it is very difficult to create successful distros when they are based on stupidity. However, Yakkety Xfce does manage a dose of normalcy and quality in the sea of dross.
The inconsistency in system behavior compared to Ubuntu is quite worrying, and this is nothing new. It remains Public Enemy No.1 in the Linux world. But if we put this crap aside, all in all, Xubuntu Yak displayed some fairly decent traits. It is fast, good looking, with adequate smartphone and multimedia support, even in the live session, solid results on the network side save for the Realtek card, neat performance, and solid hardware support. Yes, there are problems and glitches, and of course, the unholy Gnome Software needs to be destroyed with photon torpedoes.
Giving a high score to Xubuntu 16.10 Yakkety Yak may look as if it's getting credit only because all other Ubuntu releases this year were horrible. But it is not so. If we exclude the hardware-specific issues with the Realtek drivers, which is a big issue across the entire distro world, and the package manager choice, there weren't any huge, cardinal problems this time. It would seem that Xubuntu is recovering gently. Perhaps it is still too early to tell, but Yak is much, much better than Xerus. And it deserves 8/10. I feel as if a weight has dropped off my chest. After so much torture and pain, we finally get something reasonable. Even likable. Fun perhaps. Well there you go. This is a first Ubuntu release worth testing, after a whole year of failures. Go for it. See you soon.
Netrunner features its own backports channels, so anyone can decide if to stay on the installed versions or update to the backport repositories.
The following is a small tutorial how to get the latest packages from the backports channels.
These are the default versions that install with Netrunner Desktop 16.09
The PCLinuxOS Magazine staff is pleased to announce the release of the November 2016 issue. With the exception of a brief period in 2009, The PCLinuxOS Magazine has been published on a monthly basis since September, 2006. The PCLinuxOS Magazine is a product of the PCLinuxOS community, published by volunteers from the community.
Earlier this year in September, we told you about the release of Manjaro Linux 16.08 ‘Ellada’. Powered by Linux 4.4, the Xfce edition was released with a new Vertex-Maia theme. On the other hand, the KDE version came with Plasma 5.7 desktop.
A few days ago, after two months of development, the Manjaro development team announced the latest release in the form of Manjaro 16.10 Fringilla. For those who are new to the world of Manjaro, it’s often called Arch Linux for human beings. In the recent times, it’s climbing up high on different popularity charts.
After a long break, the developer of the GeckoLinux operating system proudly announced today, November 4, 2016, the general availability of a new set of updated editions of his GeckoLinux Rolling distribution.
A new release of the Chromium source code was made available earlier this week. For me this is the first Chromium 54 package and unfortunately the SlackBuild script needed a lot of rework. Google is quite “dynamic” when it comes to developing and discarding in-house tools. The change from “gyp” to “gn” to generate the “ninja” makefiles was not trivial to incorporate into my build script. But I think I did it right, and I hope that no functionality has been lost in the new chromium package.
The just released Red Hat Enterprise Linux 7.3 improves support for IoT by providing enhanced connectivity to IoT devices – better connection of “things” to the Intenet. To give a little context for this, IoT is based on machine to machine communication. IoT devices – sensors and actuators – talk to backend systems, usually in the cloud, using Internet protocols.
IoT devices are typically low-power, and use local communications. They connect to backend systems in the Cloud through an IoT Gateway. This IoT Gateway has to support both local communications to IoT devices as well as wide area networking connections to the backend systems.
In our previous two Inkscape articles, we have covered the basics of using Inkscape, creating objects, and doing some basic manipulations and color changes.
In this next installment, we are going to put all these new skills together, and create our first composition — a simple wallpaper.
It would be pretty amazing if your school ran Fedora for their computer classes, wouldn’t it? Of course it would! And for that, I’m proud to present to you, Jonathan Dieter. Jonathan is an active Fedora Ambassador and a true Fedora evangelist. He is an incredible inspiration to young students at the Lebanon Evangelical School in Beirut, Lebanon, where he has used Fedora for over 10 years! In the interview, Jonathan tells us a bit more about his school and other interesting projects he is following these days.
Yesterday, I just uploaded apt-file 3.1.2 into unstable, which comes with a few things I would like to highlight.
This year, Outreachy featured internships from organizations such as Debian, Fedora, GNOME, the Linux Kernel, Mozilla, Python, and Wikimedia, just to name a few. Each organization features mentored projects and in order to apply, applicants must contact the mentor, introduce themselves on the appropriate channels and make a small contribution to the project. After that, applicants might be required to fulfill additional tasks to demonstrate their abilities. Successful applicants will make quality contributions, communicate effectively with mentors, ask questions, fulfill tasks, help out their peers via mailing lists, and/or blog about their experience.
Maru OS, the open-source operating system providing a Debian desktop from your Android smartphone that's been making progress since being announced early this year, released version 0.3 of their OS stack this week.
With this release, Maru OS has fully made the transition from Android Lollipop (5.1.1) to Marshmallow (6.0.1). That means intelligent power management, granular app permissions, the latest security patches, and more!
Today is the transition freeze, as we announced in [1]. That means no new library transitions or package transitions that involve a large number of packages.
Debian 9 is stepping closer to being released with having hit the transition freeze this weekend. No new library transitions or package transitions on a large-scale will be permitted.
The Mythbuntu Linux OS that paired the MythTV HTPC software with an Ubuntu Linux base is being disbanded.
The remaining Mythbuntu crew announced tonight, "It's been a long and fun ride from 7.10, but it's time to turn in our badge...Mythbuntu as a separate distribution will cease to exist. We will take the necessary steps to pull Mythbuntu specific packages from the repositories unless someone steps up to take these packages over. MythTV packages in the official repositories and the Mythbuntu PPA will continue to be available and updated at their current rate."
Earlier today, November 5, 2016, the team behind the Mythbuntu GNU/Linux distribution sadly announced that the project has been discontinued effective immediately and no new releases will be made.
Mythbuntu was an operating system based on the widely-used Ubuntu Linux distro and built around the MythTV free and open source digital video recorder (DVR) project. It was an official Ubuntu flavor and used Xfce4 as default desktop environment. The first release of the OS was back when Ubuntu 7.10 (Gutsy Gibbon) was announced, and the last one was Mythbuntu 16.04.1 LTS (Xenial Xerus).
Mythbuntu as a separate distribution will cease to exist. We will take the necessary steps to pull Mythbuntu specific packages from the repositories (17.04 and later) unless someone steps up to take these packages over. MythTV packages in the official repositories and the Mythbuntu PPA will continue to be available and updated at their current rate.
We’ve been getting a ton of traffic at elementary.io and hearing a lot of chatter from Apple users after the underwhelming MacBook Pro event last week—mainly that Apple has abandoned the “Pro” market for which so many of their products are named. With this week-ish-long series, I’d love to show you how elementary OS is great for both casual computer users and professional developers. Particularly those coming from or more familiar with macOS.
I am a professional web developer working on multiple continuously delivered node apps on GitHub, working alongside a professional back-end developer who manages servers and our Elixir API app (among several other projects), and a quickly growing marketing team with an amazing graphic designer/illustrator who designs everything you see on System76.com.
I say this because I work in a very fast environment alongside extremely skilled professionals and need my tools to keep up. elementary OS and the tools available to me do so expertly.
The Inforce 6301 COM expands upon the Snapdragon 410 and new 410E, and offers 1GB RAM, 8GB eMMC, WiFi, BT, and GPS for $85, plus $100 for the carrier.
Inforce Computing announced its most affordable “Micro SOM” computer-on-module yet with an $85 Inforce 6301 that runs Android or Linaro’s version of Ubuntu Linux on Qualcomm’s Snapdragon 410 or recently launched 410E embedded version. The industrial temperature resistant module can be bought as part of a $185 starter kit (see farther below).
Mentor Graphics has released a version of Mentor Embedded Linux with expanded support for AMD’s 3rd Gen Embedded G-Series SoCs, featuring Qt Creator.
As promised in February when AMD announced its 3rd Gen, dual-core, Embedded G-Series SoCs, Mentor Graphics has updated its free Mentor Embedded Linux Lite Platform and commercial Mentor Embedded Linux (MEL) distribution for the SoCs. The extended support appears to include both the “Brown Falcon” (G-Series Sleepy and the more power efficient, but less graphics intensive “Prairie Falcon” (G-Series J) 3rd Gen G-Series models.
The Raspberry Pi line of single-board computers kicked off a trend of tiny, low-cost, low-power PC devices a few years ago. But a number of other companies have tried to get in on the action, both by offering products with competitive specs and pricing… and by adopting the “fruit + Pi” naming convention.
The Raspberry Pi has been hugely successful due to its ease of use, affordability, and adaptable nature, but there's a new rival to the mini-computer that's causing somewhat of a buzz.
The VoCore2 is an open-source Linux computer and fully-functional wireless router that happens to be smaller than a coin.
The Indiegogo campaign for the device has already received 917% of its funding goal, starting with a goal of $6,000 and racking up $55,009 at the time of writing.
Samsung has been working on a Tizen Operating System profile that would suit the Internet of Things (IoT), and they could be looking at releasing it “as early as the end of this year”, a source told the Korean Herald. While there are Tizen based smartphones out there in the market, it has a very long way to go before moving away from the shadows of iPhones and Android smartphones and that includes Samsung’s own Galaxy range of smartphones as well.
Recently Samsung have released a sizeable update for the Gear Manager application taking it to version 2.2.16101261. This update brings with it a brand new brighter and sleeker looking User Interface (UI), support for the new Gear S3 smartwatch, Improved stability, and bug fixes.
More good news for Tizen Users and especially for people Interested in detective type games. Games2Win have added a new interesting detective game named “Detective Byomkesh Bakshy”. All the Indian people may know the film “Detective Byomkesh Bakshy” which starred Sushant Singh Rajput and presented by Yash Raj Films. This game has been created to follow this movie.
You can already run Android apps on a Chromebook, but would you run games and other intensive mobile apps on it? Probably not. However, Google might be taking steps to make that practical. The creators of LeapDroid, an Android emulator that specializes in games, have revealed that they're joining Google just months after releasing it to the public. The team isn't discussing "specific plans," but they're halting both development and support for LeapDroid. You can continue running the latest version, but you won't get anything more than that.
Over the course of three months, more than 200,000 users have downloaded apps infected with an Android malware derived from the source code of the GM Bot, Czech security firm Avast reports.
GM Bot is a banking trojan created in 2014 and released for the first time on Russian underground hacking forums in October 2015.
The trojan was a tremendous success, and many malware authors have bought its source code from its creator, a malware developer named Ganjaman.
While Ganjaman can take full credit for creating one of the most dangerous Android malware families known to date, he lacked one feature from his service, and that was customer support.
There’s no Nougat to be had this week for your Android device, but Shield Tablet users are getting some important patches that should improve their overall use and gaming experience.
There’s also a strange case of missing Android dashboard numbers and hints the Galaxy S7 Edge may be on track for Nougat.
Each week, we round up all the major software updates to hit the Android ecosystem, including phones and tablets on U.S. carriers, unlocked phones, smartwatches, and Android TV devices. Making sure your device is running the latest available software is a good housekeeping practice, ensuring you have the latest features with fewer bugs and security holes.
What happens when a luxury car manufacturer teams up with a Chinese smartphone maker? You get a phone that’s both very sexy and awfully familiar. Huawei and Porsche Design teamed up to produce a phone that is as desirable as it is expensive. The result is the Porsche Design Mate 9 and if its looks don’t knock your socks off, its price will. Join us for a quick unboxing and first impressions of the Porsche Design Huawei Mate 9.
Indus OS, the startup developing a localized version of Android for India, is now going after international OEMs after it clinched a deal that will local giant Intex sell smartphones powered by its operating system.
Intex has around 10 percent of sales in India, according to data from Counterpoint Research, so landing the firm as a partner will boost Indus’ coverage of India’s mobile landscape. The partnership also means that Indus has now struck deals with nearly all of India’s top phone brands — including Micromax, Karbonn, Celkon and Swipe but not Lava — meaning it can now focus its attention to the many overseas firms vying for marketshare in India, one of the few regions to buck the global trend of slowing phone sales.
During LinuxCon North America in Toronto, The Linux Foundation organized a women’s networking summit that included more than 100 women from different walks of life. What’s most exciting about this event was that instead of having one speaker, or a panel of speakers delivering speeches, each attendee was allowed to introduce herself, which turned all those 100 attendees into speakers and audiences.
The word ‘ware’ means an article of merchandise (among other things, but those aren’t the relevant meanings). The word is often combined with another word to describe the product, like in the word silverware. The fact that the word software has the suffix ‘-ware’, shows that it was intended to be sold. We all know how computer people love puns and other jokes in the technical terminology, so now we have software, hardware, firmware, freeware, shareware, malware, spyware, and the list goes on. But the funny thing is, there are a few of them that are oxymoronic, or self-contradictory, like freeware and shareware.
Libraries have always been spaces where members of a community can gather to gain knowledge, whether through books or through events and activities. But where can library staffers go to do their own learning? They need designated spaces too, which is why the Open Library Foundation is so important. This new organization encourages everyone in the library and library services communities to share their ideas for an open source future.
The Open Library Foundation was created “as an unbiased, independent not-for-profit organization designed to ensure the availability, accessibility and sustainability of open source and open access projects for and by libraries,” according to its About page. It provides the infrastructure that allows librarians, technologists, designers, service providers, and vendors to work together to develop resources for the library community.
Two years ago to the day the most-viewed article was about A Hobby Kernel and User-Space, Runs Mesa and GCC. That hobbyist OS written from scratch seemed promising back then but hadn't heard anything at all since. When deciding to check on the project today I was anticipating that it had died off, but surprisingly, it's still under development.
ToaruOS remains under development and has been since late 2011. The most recent Git commits were from 11 days ago according to their GitHub site. For those that don't remember the article from two years ago, the Toaru kernel provides a Unix-like environment with some similarities to Linux but is written from scratch.
Netrounds has joined the Open Source MANO (OSM) Community, which is focused on delivering an open source management and orchestration (MANO) stack aligned with ETSI NFV.
OSM was launched on 22 February 2016 and has been created under the umbrella of ETSI. It is an operator-led community collaborating to meet the requirements of production NFV networks. Founding members include Telefónica, BT, Canonical, Intel, Mirantis, RIFT.io, Telekom Austria Group, and Telenor, among others.
Open Source MANO’s charter consists of working with the OSM community to deliver a production-quality open source. MANO stack. OSM Release ONE was announced on 4 October 2016 and is available with full documentation today. The initial Release 0 of OSM code was already capable of orchestrating complex NFV use cases using vendor-neutral Information Models capable of capturing all of the significant features of an E2E service and the requirements of its individual Virtual Network Function (VNF) components.
The 100 Gbps router and transponder device called Voyager, announced last Tuesday, may be recorded in history as the first such device ever to have been created by a social network and a colocation provider. Facebook’s and Equinix’ joint laboratory are data centers SV3 and SV8 in Silicon Valley, in two of Equinix’ prime locations.
In an exclusive interview with Data Center Knowledge, Dr. Kaladhar Voruganti, Equinix’ vice president for technology innovation and formerly an IBM researcher, told us his company’s participation in Facebook’s Open Compute Project, and its networking offshoot Telecom Infra Project (TIP), is not some little experiment on the side. It’s a campaign necessitated by a perfect storm of conditions: the status of the cloud services market, the architecture of servers, and the laws of physics.
The Apache Calcite data management framework contains many pieces of a typical database management system but omits others, such as storage of data and algorithms to process data. In his talk at the upcoming Apache: Big Data conference in Seville, Spain, Atri Sharma, a Software Engineer for Azure Data Lake at Microsoft, will talk about developing applications using Apache Calcite's advanced query planning capabilities. We spoke with Sharma to learn more about Calcite and how existing applications can take advantage of its functionality.
Central to the development of open source software is the community. This is partly because many open source projects depend on contributions from unpaid volunteers, which makes community ties important. But even large enterprise projects must pay attention to community needs. Large scale projects like Hadoop, OpenStack, Hyperledger, and even Linux, all transcend corporate boundaries, which necessitates communities that span individual corporate cultures.
It's not surprising, then, that successful open source enterprises take on experts to help them develop, manage and nurture their communities.
Jono Bacon is one of the most visible open source community managers. For nearly eight years he was the community manager for Ubuntu. After that he spent time as the senior director of community at XPRIZE and as GitHub's community director. These days he heads his own consulting firm, with clients that have included IBM, Deutsche Bank, Intel and SAP.
In San Francisco, we have a hackathon going on, with an upstairs, where speakers are going on, and a downstairs, where code and society are being “hacked” on.
Videos of ten dozen talks and keynotes from last month’s Embedded Linux Conference and IoT Summit in Berlin are now available for free streaming on YouTube.
The videos span a wide range of topics relating to developing, deploying, and maintaining embedded devices and Internet-of-things gizmos that incorporate various forms of embedded Linux, Android. and other open source software. ELCE 2016 and the colocated IoT Summit featured more than 150 conference sessions, and offered “an extended scope to include user-space developers, the people building applications on embedded Linux,” says the Linux Foundation. The LF promotes the annual event as “the preeminent space for kernel, systems and user space developers to collaborate and learn.”
Microsoft’s browsers hemorrhaged another 40 million users last month, according to analytics vendor Net Applications, pushing the year’s total number of deserters near the one third of a billion mark.
Net Applications pegged the combined user share of Internet Explorer (IE) and Edge at 28.4% for October, a fall of 2.3 percentage points. The month’s decline was the second-largest ever for Microsoft’s browsers, behind only May’s plummet of 2.7 points.
Unlike in most previous months, Microsoft’s bane was not Google’s boon, but instead Mozilla’s. Firefox’s user share jumped nearly 2 percentage points, to 11.1%. Atop an almost-as-large increase in September, Mozilla’s Firefox has stepped away from a precipice, and in two months recovered almost all the losses it incurred during the past year.
IE has shed 20.2 percentage points in 2016, and the fall shows no sign of stopping, or even slowing. In the last six months, four have recorded declines of 2 points or more, twice the number of the six months before that.
Despite continued updates and improvements to its Edge browser, Microsoft can’t seem to hold on to users as they transition from various versions of Internet Explorer. The latest figures suggest that in October alone, Microsoft shed some 40 million users, with the likes of Chrome and Firefox scooping them up.
Looking at the latest data from NetMarketShare, Chrome is still the undisputed king of the hill, boasting the kind of percentages Microsoft used to enjoy — with a 55 percent market share at the end of October. It found an extra 0.58 percent from the likes of Internet Explorer, which dropped a surprising 2.5 percent — equivalent to about 40 million users, per ComputerWorld.
With the very latest open-source Chromium web-browser development code, WebGL 2.0 support is now being turned on by default for desktop (non-Android) builds.
With the latest Chromium Git as of yesterday, WebGL 2 is turned on by default for the desktop but isn't yet ready to be turned on for the Android builds. The WebGL 2 support can be toggled via about:flags.
Mozilla Firefox is dropping a feature that lets websites see how much battery life a visitor has left, following research showing that it could be used to track browsers.
The feature, called the battery status API, allows websites to request information about the capacity of a visitor’s device, such as whether or not it’s plugged in and charging, how long it will last until it is empty, and the percentage of charge remaining.
It was intended to allow websites to offer less energy-intensive versions of their sites to visitors with little battery power left: for instance, a mapping site could download less information, or a social network could disable autoplaying video.
Among the major highlights of the OpenStack Summit last week was the live on-stage interoperability challenge. 16 different vendors participated in the challenge, including AT&T, Canonical, Cisco, DreamHost, Deutsche Telekom, Fujitsu, HPE, Huawei, IBM, Intel, Linaro, Mirantis, OSIC, OVH, Rackspace, Red Hat, SUSE and VMware.
As part of the on-stage interoperability challenge, participants used Ansible to orchestrate an architecture including network, storage and security groups. Jonathan Bryce, Executive Director of the OpenStack Foundation, said that vendors have been testing different workloads over the last several month in advance of the challenge.
Hortonworks, which focuses on the open source Big Data platform Hadoop, has steadily been cementing its reputation as a leader in the Hadoop arena. The company's third quarter results are now reported, and they provide a window on the momentum that Hortonworks now has.
Back in May we had a Month of LibreOffice, crediting contributions to the software across the entire project. It was fantastic, with hundreds of badges and barnstars awarded to developers, translators, bug reporters, and also to people who help with documentation, the Ask.LibreOffice site and social media.
Acquia Labs has no illusions of making self-driving cars or shooting things into space like Google X, but the budding applied research arm of enterprise open-source Drupal provider Acquia does have designs on a slew of new applications for what it anticipates will be an increasingly browserless world.
Preston So, development manager at Acquia Labs and a 9-year veteran of the Drupal community, shared his vision for Acquia’s skunkworks-plus outfit at the company’s annual Engage event for customers held in Boston this week.
Boston is open sourcing its municipal website, three months after redesigning Boston.gov.
Taking the source code public, a move overseen by the city’s Digital Team, will speed the rate at which the site evolves through the addition of new features developed by local software designers, academic institutions and organizations.
Wix’s CEO, Avishai Abrahami, responded with a round of non-sequiturs that carefully evade the point that his product is built from source code for which they have not paid. One of his engineers equally misses the point, focusing on the circumstances surrounding the violation, rather than taking responsibility for the theft.
Some will take issue with the use of strong words like “stolen code,” and “theft,” with respect to a GPL violation. But that’s exactly what it is: software has been taken and deployed in Wix’s product, but the price for doing so has not been paid.
[...]
Many developers understand, and view the price of GPL as perfectly justified, while others (myself included) find it unacceptable. So what am I supposed to do? Not use any GPL source code at all in any of my proprietary products? Exactly. Because the price of GPL is too much for me, and I don’t steal source code.
Ring is now the newest GNU software project. Ring aims to be a universal communication software platform respecting user's freedoms and privacy. GNU Ring doesn't rely upon a centralized server and is based upon SFLPhone SIP/IAX2-compatible softphone for communication, far different from Skype.
Landing in the GNU Compiler Collection development code yesterday for next year's GCC 7 release is support for some new ARM processor targets.
The Cortex-M23 is now formally supported by the latest development code. Similarly, the Cortex-M33 is now also supported.
Today at the Linux Plumbers Conference, Software Freedom Conservancy hosts its second feedback session on the GPL Compliance Program for Linux Developers. These sessions, which Conservancy is hosting at relevant events over the next year and summarizing for public review, will seek input and ideas from the Linux community about GPL enforcement, answer questions, and plan strategies to deal with GPL enforcement actions that do not follow Conservancy and FSF's Principles of Community-Oriented GPL Enforcement.
Software Freedom Law Center, the pro-bono law firm led by Eben Moglen, Professor of law at Columbia Law School and the world's foremost authority on Free and Open Source Software law held its annual fall conference at Columbia Law School, New York on Oct. 28. The full-day program featured technical and legal presentations on Blockchain, FinTech, Automotive FOSS and GPL Compliance by industry and community stalwarts.
The program culminated in remarks by Moglen that highlighted the roles of engagement and education in building effective, ever-lasting communities. While expressing his gratitude to his colleague, friend and comrade Richard M. Stallman, Moglen emphasized the positive message relayed by Greg Kroah-Hartman and Theodore Ts'o --earlier in the day-- for creating win-win solutions and spreading users' freedom.
I must define some terminology in case readers are unfamiliar. Free software is defined by the Free Software Foundation (FSF) as software that carries four fundamental freedoms: the freedom to run the program for any purpose, the to study and change it, to redistribute unmodified copies, and to redistribute modified copies. The “free” refers not to price but to freedom, and is sometimes called “libre”, from the same Latin root as “liberate”.
The Free Software Foundation has been campaigning for “users’ freedom” since 1985. They advocate for the release of software under licenses they approve that give users those freedoms. Some of their notable successes include the GNU project, which develops various low-level and mid-level system tools, and their Defective By Design campaign to oppose digital rights management (DRM).
Within just a few generations, plastic has already taken over the world, and while this material enabled a revolution in manufacturing and design, plastic has also managed to become one of the biggest menaces on the planet, thanks to its convenience and ease of production. And although commercial collection and recycling of plastics is getting better and more accessible, in many areas plastics end up in the dump instead of the recycling facility, essentially burying this resource, which could be used to great effect if only the machinery were available to do so.
Germany’s Ministry of Education and Research has earmarkes EUR 1.2 million to finance the creation, over the next two years, of a portal to aggregate open educational resources, the ministry announced this week. The OER portal is to support schools and universities, and will be managed by the country’s Bildungsserver (Education Server).
The OER was announced by the ministry on Wednesday. “This is a major step towards a pedagogically meaningful and copyrighted use of open educational resources in all fields of education", Cornelia Quennet-Thielen, Secretary of State is quoted as saying.
The Agencia Española de Protección de Dato (AEPD), Spain’s agency for data protection, is encouraging the country’s public administrations to share their information. In October, the agency published a manual intended for managers at public administrations on how to facilitate information sharing, while keeping sensitive data safe.
A while back I received a Gyro sensor for the NXT Mindstorms controller as a birthday present. It had been on my wishlist for a while, because I wanted to build a Segway like balancing lego robot. I had already built a simple balancing robot with the kids, using the light/color sensor included in the NXT kit as the balance sensor, but it was not working very well. It could balance for a while, but was very sensitive to the light condition in the room and the reflective properties of the surface and would fall over after a short while. I wanted something more robust, and had the gyro sensor from HiTechnic I believed would solve it on my wishlist for some years before it suddenly showed up as a gift from my loved ones.
We’ve submitted a proposal to get the Creative Commons logo, license, and public domain icons into Unicode (more specifically, the Universal Coded Character Set or UCS). Unicode is the industry standard for encoding characters into text, which means that virtually all text-based editors, or tools with text-based editors, enable those characters and symbols that have been encoded into the standard. Examples of encoded characters range from ancient Greek letters to the current day €©, @, and universal ââ¢Â² symbols.
A German company is promising a new protocol dubbed "HTTP-SS" that "should be able to double Internet speed, decrease data volume almost by 90% and get rid of the other general issues" compared to HTTP/HTTPS, at least that's what they claim.
The HTTP-SS is short for HTTP Single Stream and this protocol aims to be faster, implements the Delta Data Algorithm, allow faster downloads, and other benefits. They claim this is a "revolutionary development" with the usual PR garbage mailed over this weekend.
I was in Barcelona last week for two big events: the OpenStack Summit and the OpenPOWER Summit. Luckily, the events were separated only by a five minute walk. Many of the slides from the OpenPOWER Summit are already available online.
One of my favorite talks was from Prof. Mateo Valero, the director of the Barcelona Supercomputer Center (Centro Nacional de Supercomputación). He was a great speaker and he talked a lot about how OpenPOWER has given them a new edge. It’s part of what helps them stay on the forefront of supercomputer technology.
Apple is offering an olive branch to new MacBook and MacBook Pro buyers annoyed that their old stuff won't work with their new laptops. The company is discounting most of the USB-C cables, dongles, and accessories it sells in its online and retail stores. The downside? The discounts only last from now until the end of the year, and prices will presumably go back up after that.
The USB-C to USB adapter goes from $19 to $9; the Thunderbolt 3 to Thunderbolt 2 adapter drops from $49 to $29; the USB-C to Lightning cable goes from $25 to $19 for one-meter cables and from $35 to $29 for two-meter cables; both the HDMI and VGA versions of Apple's multi-port dongles drop from $69 to $49; and SanDisk's Extreme Pro SD card reader drops from $49 to $29. All other third-party USB-C cables and peripherals will be discounted by about 25 percent. The only excluded products are Apple's USB-C power adapters and the USB-C charge cables sold for use with those power adapters.
My first Thinkpad was quite underpowered when compared to desktop PCs, it had 32M of RAM and could only be expanded to 96M at a time when desktop PCs could be expanded to 128M easily and 256M with some expense. It had a 800*600 display when my desktop display was 1280*1024 (37% of the pixels). Nowadays laptops usually start at about 8G of RAM (with a small minority that have 4G) and laptop displays start at about 1366*768 resolution (51% of the pixels in a FullHD display). That compares well to desktop systems and also is capable of running most things well. My current Thinkpad is a T420 with 8G of RAM and a 1600*900 display (69% of FullHD), it would be nice to have higher resolution but this works well and it was going cheap when I needed a new laptop.
Whatever happens November 8, marijuana won. It’s hit an all time high in popularity—60 percent of Americans now support legalization. That handily beats both major-party candidates in favorability. Twenty-five states and Washington, DC have already legalized it for medical use. And come election day, nine states will decide whether to loosen laws further (five voting on legalization, four more on medical use).
The psychoactive plant is no longer the gateway drug of deadbeats and loafers; it’s becoming acceptable socially and politically. And with the public opinion that it’s largely harmless, users have stoked hopes that it can safely and effectively treat a range of medical ailments, from chronic pain and migraines to epilepsy and autism
Marijuana advocates are delighted by these shifts, of course. But as voters, lawmakers, patients, and doctors look to make informed decisions on legislation and usage, they’re coming up with questions—and some are pretty simple. Are there long term effects? What diseases or symptoms can it really treat? In which patients? And how? What strains and products are best? Is it OK to mix it with prescription meds? What all does marijuana’s 60 or so active cannabinoids do in our brains exactly?
If you think the water crisis in Flint Michigan has gone away or has improved and been fixed you are sadly mistaken. Unfortunately, they are still using bottled water and water filters to get “clean” water to cook & drink with according to the Washington Post.
The residents of Flint Michigan who have suffered tremendously through this crisis are now able to file a lawsuit against the state of Michigan and city officials. A judge in the Michigan Court of Claims ruled that Flint residents have the right to sue for negligent decisions made leading to the contamination of the water supply.
To read more on that story click TheRoot.com.
Meanwhile, there is another story coming out of Michigan that involves the worlds largest food supply company Nestle. Apparently, the food company asked for more groundwater (from 150 gallons per min. to 400 gallons per min.) to be pumped from Michigan to supply it’s $36 million Ice Mountain bottling plant expansion project.
All for the cost of a $200 annual paperwork fee. So basically, because Nestle owns the “private property” they get to pump ALL of that water out for FREE.
The Flint water crisis has aroused public concern over the quality of our nation’s water infrastructure, leaving many to wonder when and where the next tragedy will occur. After temporarily relying on the Flint River while seeking a lower-cost water provider, locals immediately found themselves in murky waters.[1] Even though the state Department of Environmental Quality knew about the river’s highly corrosive properties, the agency failed to treat the water, in violation of federal law.[2] The untreated water caused service lines to leach lead into public waterlines,[3] exposing thousands to toxic levels of polluted water. Despite obvious warning signs, Flint Mayor Dayne Walling attempted the “come on in, the water’s fine” approach, even drinking Flint water on local TV to encourage citizens to follow suit.[4] Ultimately, Flint residents did just that, filing a class action lawsuit against the State of Michigan and others last November.[5]
Let’s turn the clock back and examine the evolution of federal standards for the lead content of drinking water. Congress promulgated the Safe Drinking Water Act[6] in 1974 in response to the discovery of contamination in public drinking water and the lack of enforceable national standards. The Act prohibits the use of certain non-lead-free (by statutory standards) materials in potable water systems and the introduction of such materials into commerce.[7] The Act was amended in 2011 with the Reduction of Lead in Drinking Water Act.[8] The amendment redefined the term “lead-free,” previously a weighted lead content of 8 percent or less, as a weighted average of not more than 0.25 percent.[9] In addition to congressional efforts to purify public drinking water, the EPA promulgated the Lead and Copper Rule (LCR) in 1991,[10] requiring local water systems to undertake corrective action where lead concentrations exceed federal standards.
The European commission has dropped plans to legally limit a pervasive but naturally occurring chemical found in food, that is linked to cancer, just days after lobbying by industry, the Guardian has learned.
Campaigners say that leaked documents revealing the legislative retreat show “undue influence” by the food industry over EU law-making and a “permanent scandal”, although the issue is complex.
Acrylamide is a hazardous substance found in the browned and burned parts of common starchy foods that have been fried, roasted or oven-cooked at temperatures higher than 248C (478F).
Crisps, potato chips, breakfast cereals and instant coffee all contain high levels of the substance, as do baby foods, biscuits and rusks.
Scientists are still trying to quantify the health risks posed, but acrylamide has been judged an “extremely hazardous substance” by the US Environmental Protection Agency.
The Dutch government will this year test the possibilities of voting via the Internet. The test will include citizens abroad: the pilot, by the Ministry of the Interior, will involve the city of The Hague, which manages the registration of citizens abroad.
The city recently invited citizens to take part in the tests - a simulated election. Participants will be able to vote for fictitious political parties and candidates. The pilot is intended to test security measures, and to check if Internet voting reliable.
Federal and state authorities are beefing up cyber defenses against potential electronic attacks on voting systems ahead of U.S. elections on November 8, but taking few new steps to guard against possible civil unrest or violence.
The threat of computer hacking and the potential for violent clashes is darkening an already rancorous presidential race between Democrat Hillary Clinton and Republican Donald Trump, amid fears that Russia or other actors could spread political misinformation online or perhaps tamper with voting.
With an ever-expanding mobile workforce, infosec teams are increasingly tasked with extending cybersecurity safeguards beyond the physical and virtual walls of their organizations. With endpoints not only increasing but on the move, the challenge is real. In addition to implementing the appropriate technical defenses, there is an important aspect to protecting corporate data and systems: Asking end-users to get involved.
KrebsOnSecurity received many a missive over the past 24 hours from readers who wanted to know why I’d not written about widespread media reports that Mirai — a malware strain made from hacked “Internet of Things” (IoT) devices such as poorly secured routers and IP cameras — was used to knock the entire country of Liberia offline. The trouble is, as far as I can tell no such nationwide outage actually occurred.
First, a quick recap on Mirai: This blog was taken offline in September following a record 620 Gpbs attack launched by a Mirai botnet. The source code for Mirai was leaked online at the end of September. Since then, the code has been forked several times, resulting in the emergence of several large Mirai-based botnets. In late October, many of the Internet’s top destinations went offline for the better part of a day when Mirai was used to attack Internet infrastructure firm Dyn.
MySQL, MariaDB, and PerconaDB administrators need to check their database versions, as attackers can chain two critical vulnerabilities and completely take over the server hosting the database.
The two critical vulnerabilities, which can lead to arbitrary code execution, root privilege escalation, and server compromise, affect MySQL and forks like Percona Server, Percona XtraDB Cluster, and MariaDB, according to security researcher Dawid Golunski, who provided details of the vulnerability on LegalHackers. Administrators should install the latest updates as soon as possible, or in cases where the patches cannot be applied, they should disable symbolic link support within the database server configuration by setting symbolic-links=0 in my.cnf.
While programming, it’s easy to get tunnel-vision or to accept some “tiny” risk that things could go wrong at some point but write the code that way anyway. That’s what happened with MySQL and MariaDB. Creating a database should not create a vulnerability but it does, because a repair operation allows changing permissions of a file with a particular name which a bad guy could substitute with malicious code…
Thanks to everyone who attended my talk at the OpenStack Summit in Barcelona! I really enjoyed sharing some tips with the audience and it was great to meet some attendees in person afterwards.
If you weren’t able to make it, don’t fret! This post will cover some of the main points of the talk and link to the video and slides.
Linux, FreeBSD, and Unix-like systems are multi-user and need some way of authenticating individual users. Back in the old days, this was done in different ways. You need to change each Unix application to use different authentication scheme. Also, authentication schemes differed between a variant of Unix systems. Porting was a nightmare. For example to use Windows Server (Active Directory) or LDAP for authentication you need to make changes to an application. Each application had its way of authenticating users. So Open Group lead to the development of PAM for the Unix-like system. Today Linux, FreeBSD, MacOS X and many other Unix-like systems are configured to use a centralized authentication mechanism called Pluggable Authentication Modules (PAM). The book “PAM Mastery” deals with the black magic of PAM.
A recently leaked 2014 email from Hillary Clinton acknowledges, citing Western intelligence sources, that the U.S.-backed regimes in Saudi Arabia and Qatar have supported ISIS.
“We need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region,” the document states.
This adds to a growing body of evidence that theocratic Gulf monarchies have helped fuel the surge of extremist groups throughout the Middle East.
Islamist rebels have intensified their attacks in Somalia, detonating larger, more sophisticated devices, bringing in more foreign expertise and doubling the death toll from last year, experts said.
The surge in violence threatens an upcoming presidential vote and the reconstruction of a nation whose population is already leaving in droves, swelling a global migrant crisis, analysts and academics told Reuters.
The findings, some of them also outlined in a coming U.N. report, reveal the challenge facing Somalia's Western-backed government as it battles militants who want to overthrow it and impose their harsh version of sharia, or Islamic law.
Indonesian President Joko Widodo has postponed his trip to Australia following the violent protest that erupted Friday in Jakarta. Widodo informed Prime Minister Malcolm Turnbull of his decision Saturday and instructed his Foreign Minister Retno Marsudi to reschedule his visit, according to a statement released from the palace.
Violent clashes erupted in Jakarta on Friday as protesters demanding the ouster of the city's governor, who has been accused of blasphemy against Muslims, clashed with police, CNN Indonesia reported. Gov. Basuki Tjahaja Purnama, commonly known as Ahok, is alleged to have insulted Islam by criticizing his opponents' use of a Quranic verse in a stump speech. Ahok is a member of Indonesia's Christian minority.
President Joko Widodo postponed a state visit to Australia, citing unrest at home after a rally called by hard-line Muslims drew 200,000 people protesting against the capital’s Christian governor.
We noted this towards the end of our post on how the FBI is leaking like a sieve in revealing details about the investigation into Hillary Clinton's emails -- that Comey seemed to be handing reporters a perfect comeback to the bullshit response the FBI normally gives that it "won't comment on ongoing investigations."
Charlie Galbraith, serving as a Clinton advisor, shared the campaign’s official statement in an e-mail to ICTMN: “We received a letter today from representatives of the tribes protesting the construction of the Dakota Access Pipeline. From the beginning of this campaign, Secretary Clinton has been clear that she thinks all voices should be heard and all views considered in federal infrastructure projects. Now, all of the parties involved—including the federal government, the pipeline company and contractors, the state of North Dakota, and the tribes—need to find a path forward that serves the broadest public interest. As that happens, it's important that on the ground in North Dakota, everyone respects demonstrators' rights to protest peacefully, and workers' rights to do their jobs safely.”
As ICTMN contributor Sarah Sunshine Manning reported this afternoon from the Treaty Camp, the newest camp set up by the water protectors directly in the pipeline’s path along Highway 1806. The police massed and pressed the protectors south, using piercing sirens, armored cars, and ATVs, while low flying planes and helicopters circled above. “Within minutes,” Manning said, “a large force of police arrived on both sides of the camp and surrounded about 400 to 500 water protectors.”
The definition of 'climate denier' should include the states and institutions that are not taking necessary steps to avoid dangerous climate change, says professor Chris Williams
In the last week, Republican presidential nominee Donald Trump has repeatedly vowed to zero out all federal spending on clean energy research and development. And the plan he released would also zero out all other spending on anything to do with climate change, including the government’s entire climate science effort.
You may have missed this bombshell because team Trump did not spell out these cuts overtly. In a campaign where the media has “utterly failed to convey the policy stakes in the election,” as Vox’s Matt Yglesias explained recently, it appears only Bloomberg BNA bothered to follow up with the campaign to get at the truth of Trump’s radical proposal.
Polling guru Nate Silver of fivethirtyeight.com fame gives Trump a one in three chance of becoming president. So I agree with Yglesias that we ought to seriously look at the implications of Trump’s proposalsââ¬Å —ââ¬Å especially since if Trump wins, he’s all but certain to have a GOP-controlled Congress to back him.
In February of 2009, during his second month in office, President Barack Obama stepped up to the lectern to deliver his first speech to a joint session of Congress. In it, he lobbied members of the House and Senate to come up with a mandatory cap on carbon emissions, a key tenant of his campaign stump. “I ask this Congress to send me legislation that places a market-based cap on carbon pollution and drives the production of more renewable energy in America. That's what we need,” he said. Not surprisingly, that didn’t happen.
Five years later, with Congress wallowing in its own motion-stopping muck, he took a different approach. He used existing federal laws to create climate legislation without needing the consent of Congress. The resulting mandate, known as the Clean Power Plan, requires States to significantly cut their carbon emissions from fossil fuel-fired power plants within the next 14 years. It was a major victory for environmentalists and gave serious credence to the U.S.’s role in the Paris Climate Agreement.
In a recent blog, Erich Pica, head of Friends of the Earth, argues against voting for Jill Stein and the Green Party, and tells environmentalists to vote for Hillary Clinton in order to defeat Donald Trump. The call of liberals like Pica to embrace a lesser-of-two-evils strategy is not going to save the planet or humanity.
Pica admits that Clinton has been bad on key environmental and climate justice issues and recognizes that the Green Party has a much better agenda. Stein’s agenda is in fact much stronger than that of FOE. The Green New Deal, for instance, calls for a transition to 100% clean renewable energy by 2030, a halt to the build-out of fossil fuels, and a full employment program.
Given the government majority, it seems likely that the TPP bill will finally pass at some point in the near future. But the fact that a rather unfunny joke was able to throw a spanner in the works even at this late stage shows that when it comes to trade deals, things aren't over until they are over, as the recent CETA saga also indicates.
There's another massive deal you've never heard of. The Trans-Pacific Partnership – negotiated in secret between Australia and 11 other nations over 10 years – appears to be dead.
It would have allowed US corporations to sue Australian governments in offshore tribunals, as they have long wanted to do, effectively trumping our own High Court. Donald Trump himself opposes it (bless him) as does Hillary Clinton, although she once helped to draw it up.
In that year, TPP went from a fringe issue to a central election battle, with Bernie Sanders and Donald Trump (and later, Hillary Clinton), all agreeing that it's not a "trade deal" -- it's a kind of wishlist from multinational corporations that will allow them to subvert environmental, consumer, labor and safety laws to ensure maximum profits -- and uniting in their opposition to it.
Now, add another name to the list of TPP's strange bedfellows opponents: Black Lives Matter, who have found a signature plank in Donald Trump's platform that they can endorse wholeheartedly, as improbable as that may sound. It's pitting the Congressional black caucus against Obama, who sees TPP as his legacy.
Think about the 7 million euros yearly which will be the running price paid by taxes from Helsinki. This means that every one of us who pays taxes in the capital will be paying a membership fee for this museum without having been asked for it. A membership fee of over 30 euros for each one of us every year. On top of that, the museum will charge entrance fees for us, as well as the tourists. By comparison, we have the Amos Anderson [2] museum, which is privately funding its new museum in the city center.
On top of that comes the construction of the building, which is another 80 million from our taxes (some 200 euros from each one of us for that) and handed over a top land piece just in the heart of Helsinki.
If approved, I suggest we then have a new optional tax clause for the citizens of Helsinki as we have for religious taxes; we should call it THE STATUS TAX. Whoever wishes to pay for the Guggenheim Museum from their taxes can click on it. If this goes ahead without these providences, I can see the start of a new business model where everyone asks for such a helping hand on the pretext of tourism and prestige! I know I will. I suggest that universities apply for such a business model to compensate for the recent budget cuts. For example, the Aalto University with its Alvar Aalto designed buildings, which attracts many tourists to Helsinki, should apply for an equal sum on terms of a fair opportunity clause.
If Guggenheim wants to open a museum in Helsinki or anywhere else, they should do so at their own costs.
After yet another long day at work, Matsuri Takahashi was at the end of her rope.
“It is already 4 a.m. now, and my body is trembling,” an employee of advertising giant Dentsu Inc. wrote on a social media site. “I am dying. It is too much. I am exhausted.”
Her words were posted on Oct. 21, 2015, after she spent nearly 19 hours--from 8:56 a.m. the previous day to 3:38 a.m.--at work, according to data kept by a flap barrier gate at the Dentsu head office in Tokyo’s Shiodome district.
A Supreme Court ruling in 2000 is described as the “bible” on preventing “karoshi,” or death from overwork.
The decision, concerning the death of a young and overworked male employee at Dentsu Inc., was supposed to have been a wake-up call for the advertising agency on taking care of its workers’ health.
However, inside sources say the mind-set at Dentsu remains faithful not to the “bible” ruling, but instead to the “Oni-jussoku” (Devil’s 10 principles) set by a former president.
One of those principles urges employees to reach their goals, even if it kills them.
The court case stemmed from the suicide of a second-year employee at Dentsu’s radio division in August 1991, when Japan was nearing the end of its asset-inflated “bubble” economy. He was 24.
Surrounded by desert marigold and prickly pear at the Ritz-Carlton’s Dove Mountain resort in Arizona’s Sonoran Desert, presidential hopeful Hillary Clinton revealed her greatest fears when facing cyberattacks. “It’s not only what others do to us and what we do to them and how many people are involved in it,” she said, recounting how the U.S State Department was attacked hundreds of times each day while she was secretary of state. “It’s what’s the purpose of it? What is being collected, and how it can be used?”
It was October 2013, and she was speaking at a private summit of Silicon Valley executives convened by Goldman Sachs, the audience peppered with such high-fliers as Anne Wojcicki, CEO of genomics firm 23andme and former wife of Google co-founder Sergey Brin, and Etsy CEO Chad Dickerson, among other luminaries. Cyberattacks, Clinton told them, whether perpetrated by state-sponsored groups or lone hackers, all tended to be for the same reason: “People were trying to steal information, use it for their own purposes.”
Included in WikiLeaks’ 30th release of Podesta Emails was a message sent Sunday, December 20, 2015, by Lisa Jackson. She is vice president of Environment, Policy and Social Initiatives for Apple and reports directly to CEO Tim Cook.
The Green Party candidate for president is pushing back against those who see her as a spoiler in the race.
Jill Stein, who is up to 4 percent in the latest CBS News poll, told WBZ NewsRadio 1030 that every vote counts.
“We encourage people not to throw your vote away on more of a two-party failed political system, but to invest your vote in a real movement for change that our party alone represents,” she said.
Will pro-Hillary progressives go along with a belligerent Clinton White House? It’s a fair question, given how quickly the last decade’s anti-war movement fell nearly silent after Barack Obama’s victory in 2008.
In an Oct. 25 essay, former U.S. Representative Dennis Kucinich warned readers of The Nation about the influence of a “bipartisan foreign-policy elite [that] recommends the next president show less restraint than President Obama… As this year’s presidential election comes to a conclusion, the Washington ideologues are regurgitating the same bipartisan consensus that has kept America at war since 9/11 and made the world a decidedly more dangerous place.”
Ms. Clinton’s own record and the endorsements she has received from Bush-Cheney neocons suggest we’ll see a shift from President Obama’s recent caution back to the war-machine polices of the last decade and even the last century. In 2017, that’ll mean a renewed Cold War with Russia with a possible standoff over Syria, deeper U.S. military involvement in Muslim nations in which civilians will suffer most (including more aid for Saudi Arabia’s assault on Yemen), and unconditional support for Israel’s violent suppression of Palestinian human rights.
Julian Assange counters the claims of Hillary Clinton and her media propagandists stating unequivocally that the source of the leaks that WikiLeaks has made a campaign fixture over the last few weeks is not, contrary to her deflective claims, the Russians.
The Clinton camp picked an impressive, overwhelmingly large and credible sounding number of 17 as the number of agencies that have supported their claims. No evidence has been provided, but we can trust Hillary. She’s not the kind of person to say something if it isn’t true, we all know that. Having 17 intelligence agencies backing up your allegations is the kind of support that would make the claims of Russian interference nearly irrefutable if they are true. “If and true,” here we go again. She could have chosen any number and been equally dishonest, as Mr. Assange explains.
Wealthy officials from Qatar and Saudi Arabia who donated money to Hillary Clinton’s charitable foundation also provided financial support to Isis, WikiLeaks founder Julian Assange has claimed.
In an extended interview at the Ecuadorian embassy in London with documentary maker John Pilger for RT, Mr Assange said the same Saudi and Qatari officials could be seen to be supporting both the Clinton Foundation – founded by Mrs Clinton’s husband Bill – and funding the activities of Isis.
Mr Pilger asked if Mr Assange believed that “this notorious jihadist group, called Isil or Isis, is created largely with money from people who are giving money to the Clinton Foundation”
A majority of voters believe Hillary Clinton has done something illegal, according to a new McClatchy-Marist Poll days before the presidential election.
A total of 83 percent of likely voters believe that Clinton did something wrong – 51 percent saying she did something illegal and 32 percent saying she something unethical but not illegal. Just 14 percent said she’s done nothing wrong.
By comparison, 79 percent think Donald Trump did something wrong, though not nearly as many think he did something illegal. Just 26 percent think he’s done something illegal, while 53 percent think he’s dome something unethical but not illegal. Just 17 percent think he’s done nothing wrong.
Hillary Clinton is dishonest and robotic, her friend Neera Tanden wrote in an email to Clinton campaign chairman John Podesta in August 2015.
In the email exchange, published by WikiLeaks on Friday, Tanden wrote that Hillary “often says she absolutely won’t do something and then does it.” It is not clear from the context of the email what specifically Tanden was referring to.
Tanden, president of the left-wing think tank Center for American Progress, urged Podesta to “stay on her” and “lock her in,” because if he did, “eventually [Hillary] will sound like a human.”
The Clinton Foundation has confirmed it accepted a $1 million gift from Qatar while Hillary Clinton was US secretary of state without informing the State Department, even though she had promised to let the agency review new or significantly increased support from foreign governments.
Qatari officials pledged the money in 2011 to mark the 65th birthday of Bill Clinton, Hillary Clinton’s husband, and sought to meet the former US president in person the following year to present him the check, according to an email from a foundation official to Hillary Clinton’s presidential campaign chairman, John Podesta. The email, among thousands hacked from Podesta’s account, was published last month by WikiLeaks.
Clinton signed an ethics agreement governing her family’s globe-straddling foundation in order to become secretary of state in 2009. The agreement was designed to increase transparency to avoid appearances that US foreign policy could be swayed by wealthy donors.
The Clinton Foundation has confirmed it accepted a $1 million gift from Qatar while Hillary Clinton was U.S. secretary of state without informing the State Department, even though she had promised to let the agency review new or significantly increased support from foreign governments.
Qatari officials pledged the money in 2011 to mark the 65th birthday of Bill Clinton, Hillary Clinton's husband, and sought to meet the former U.S. president in person the following year to present him the check, according to an email from a foundation official to Hillary Clinton's presidential campaign chairman, John Podesta. The email, among thousands hacked from Podesta's account, was published last month by WikiLeaks.
Clinton signed an ethics agreement governing her family's globe-straddling foundation in order to become secretary of state in 2009. The agreement was designed to increase transparency to avoid appearances that U.S. foreign policy could be swayed by wealthy donors.
Hillary Clinton deleted a 2009 email in which she forwarded classified information to her daughter, Chelsea.
The email was released on Friday by the State Department. It is one of thousands of documents recovered by the FBI from Clinton’s private email server.
WikiLeaks has released more emails from Hillary Clinton’s campaign chair John Podesta, with only four days until the presidential election.
The latest release contains more than 2500 emails, bringing the total number to over 50,000. WikiLeaks has said it would publish 50,000 emails before election day.
On Friday, there were two releases of Podesta emails. They revealed further examples of the campaign’s disdain for former Clinton rival Bernie Sanders, and shed light on Bill Clinton’s paid speeches when Clinton was secretary of state. The emails also revealed the campaign’s relationship with Apple and its influential donors.
The Hillary Clinton email investigation has rocked this year’s election with its timing, but it’s about to be rocked even more, that is if a report by online news source True Pundit is legitimate.
The right-wing publication claim the new emails have exposed the Clintons for being involved in such atrocities as child sex crimes, child exploitation, sexual slavery, money laundering, perjury and obstruction of justice to name a few.
CTR has long been criticized for its announcement that it would engage in coordination with the Clinton Campaign. Citing a legal loophole, CTR enraged campaign finance reformers with what they considered to be illegal activity, announcing AstroTurf efforts over social media to assist Hillary Clinton. In June I wrote a piece about this supposed loophole.
Under the Code of Federal Regulations, activity is coordinated with a candidate, campaign or committee when it satisfies what is known as the three-pronged analysis: Payment, content, and conduct. When that happens, unless exempted, it is treated as an in-kind contribution or coordinated expenditure. We can spare ourselves the nitty gritty of each of these prongs because CTR has openly acknowledged that its activities meet the requirements to be considered coordinated.
We met Jill Stein, the Green Candidate for president, outside Hillary Clinton’s campaign headquarters in Brooklyn, a two fingers-up at her opponent.
A week ago this would have been an interesting interview, but it might have felt a bit peripheral to the main election story. Hillary was comfortably ahead in most polls, and no one was discussing Jill Stein and libertarian Gary Johnson as much.
Then the Great Tightening happened, and the polls narrowed. And suddenly the number of votes accrued by third party candidates feels very relevant indeed.
Averages have had Jill at about two percent recently, but the latest New York Times/CBS News poll released this week has her at four percent. That’s more than the gap separating Trump and Clinton in the same poll.
I asked her if she is willing to instruct her voters to back Hillary in key swing states. She said no.
“It is a race to the bottom with the greater and lesser evil,” she begins. “I urge people not to throw their vote away on the same political system that has thrown you under the bus. It’s very important to invest your vote in a real movement for change.”
Actress Susan Sarandon on Thursday tore into the Democratic National Committee (DNC), calling it "completely corrupt."
“After my experience in the primary, it’s very clear to me the DNC is gone,” she told CNN's Carol Costello.
“Every superdelegate is a lobbyist. The way that the system is set up in terms of trying of having superdelegates — you could win a state and not get the delegates. It’s crazy.”
Sarandon backed Sen. Bernie Sanders (I-Vt.) for the Democratic nomination. She said she still respects Sanders even though he endorsed Hillary Clinton for president.
John Podesta threatened to quit his position as Hillary Clinton’s campaign chairman late last year over an issue involving campaign contributions from his brother, superlobbyist Tony Podesta.
Podesta appears to have made the threat in order to protect Tony, who is the elder Podesta, from pressure that the campaign’s finance team gave over donations to the Hillary Victory Fund (HVF), a controversial joint fundraising committee coordinated between the Clinton campaign, the Democratic National Committee and 32 state party committees.
A hacked email released Saturday by WikiLeaks provided fresh evidence that top aides were frustrated that Hillary Clinton’s campaign lacked a vision or principles beyond simply acquiring power.
In the email, sent on Jan. 22, Clinton campaign chairman John Podesta responded glumly to a question from Morgan Stanley executive Tom Nides about how things were going.
The mayor also received an email from Podesta on a separate personal Gmail account that was included in the hacked emails posted by WikiLeaks.
The Clinton Foundation operated “more like a political operation” than a traditional charity, a lawyer warned in a memo marked “confidential” in 2008.
Bruce Lindsey, chairman of the foundation’s board of directors, sent the memo — an earlier draft of the final report — to Clinton family consiglieri Cheryl Mills in 2011. WikiLeaks released that email Saturday in its latest batch of communications hacked from the Gmail account of John Podesta, Hillary Clinton’s campaign chairman.
Actress, activist, and former Bern-feeler Susan Sarandon is now going Green in support of Jill Stein.
Sarandon appeared on CNN Thursday to discuss the Dakota Access Pipeline protests, and the corruption of both Hillary Clinton and Donald Trump. She also condemned the DNC.
“The DNC is gone and we need a progressive party,” Sarandon said in defense of her support for Jill Stein.
Sarandon talked to CNN’s Carol Costello as a representative on the side of the Standing Rock Sioux tribe pipeline protesters. She explained that the issue has been largely ignored because neither presidential nominee wants to talk about it.
“You’re not going to hear anything from her,” Saradon said about Clinton and the pipeline. “Because if you look at who supports their campaign and who’s contributed to Hillary’s campaign, it’s every single one of these corporations and banks.”
But if we want to move beyond the cycle of mobilization and retreat that dominates left electoral activity in the US, we have no choice but to build our own political formations, as difficult as that will be. They will have to do what all parties do—run candidates for office, particularly in states and localities where competition between Democrats and Republicans is low. Considering the many institutional barriers to effective independent politics, they will also have to launch fights to change ballot access laws and other measures aimed at maintaining the two-party duopoly.
Beyond that, they should also focus on building the intellectual and organizational capacities of their base between elections, and raise people’s expectations of what is possible instead of managing them downward. And perhaps most importantly, they must resist the tendency of unions and other social movement organizations to prioritize short-term interests and goals above all other concerns.
The Sanders campaign and the mini-revival of protest activity shows us that millions of people are fed up with the political order and want an alternative to it. Instead of accepting and working within the limitations of the system they despise, why not begin the hard work of offering one to them?
A U.S. judge in Ohio ordered Republican presidential candidate Donald Trump's campaign on Friday not to intimidate voters as voting-rights advocates scored a string of last-minute victories in several politically competitive states.
The ruling by U.S. District Court Judge James Gwin creates the possibility of fines or jail time for Trump allies who harass voters, a significant victory for Democrats who had worried the real-estate mogul was encouraging supporters to cause mayhem at the polls on Nov. 8.
The ruling also deals a blow to a Trump-aligned "exit poll" that seeks to mobilize thousands of supporters.
The Trump campaign appealed the decision.
The two are night-and-day. The Obama system is 4.5 TIMES BETTER. Not 4.5 PERCENT better (in a year when the election was decided by 5%). It was not 45% better. the Obama machine is 4.5 TIMES BETTER. 350% better. Understand. One side has something that is not 100% better or 200% better than your system. Its something that is 350% better than yours. When you spend a million dollars on a TV ad campaign that boosts your voter turnout by 10,000 votes. And the other side uses their system to run a better TV ad campaign - that also costs 1 million dollars, but they get 45,000 votes!!! 4.5 time better! 350% better!.
That is what Obama built in 2012. That is what was called ‘Narwhal’. That was using the bleeding-edge tech called Big Data. I wrote several blogs about it then and did a total analysis of the two systems compared head-to-head, written for MARKETING people, in other industries than politics, that I published here in early 2015. This is THE DEFINITIVE article about what is Big Data and why its the new era in databases. Why it makes psychographics like used by Romney (and now Trump) obsolete.
Next week, Americans will hold the first presidential election in 50 years without the full protections of the Voting Rights Act.
It’s a terrifying fact. The Voting Rights Act targeted policies that purposely kept black voters from the polls. But the US Supreme Court struck down part of the law in 2013, limiting the federal government’s oversight of states with long histories of suppressing minority voters.
As a result, states have passed more voting restrictions over the past several years — including controversial voter ID laws and cutbacks on early voting days and hours.
The whistleblowing site has published more than 50,000 emails in the lead up to the presidential election on Tuesday. Today’s trache contains 2074 new emails.
Saturday’s release contained transcripts from Bill Clinton’s fundraising speeches, which included the former president attacking UK Labour leader Jeremy Corbyn and discussing the need for a tough leader to “enforce the trigger that will re-impose sanctions” should Iran violate the nuclear deal.
This is how Clinton can so casually classify whole groups of people as "deplorables." And it is how the Clintons can treat transparency like it's something for other people, not for them.
As secretary of state, Hillary Clinton routinely asked her maid to print out sensitive government e-mails and documents — including ones containing classified information — from her house in Washington, DC, e-mails and FBI memos show. But the housekeeper lacked the security clearance to handle such material.
In fact, Marina Santos was called on so frequently to receive e-mails that she may hold the secrets to E-mailgate — if only the FBI and Congress would subpoena her and the equipment she used.
Clinton entrusted far more than the care of her DC residence, known as Whitehaven, to Santos. She expected the Filipino immigrant to handle state secrets, further opening the Democratic presidential nominee to criticism that she played fast and loose with national security.
The venerable New York Times ran a story saying Donald Trump lies about the height of his buildings.
For no apparent reason, the Times resurrected some information from 1979 saying Trump insisted on counting the basement levels of his signature Trump Tower in the overall count of how many floors the building has. The Times compares this lie to “reports” that Trump adds an inch to his actual body height in his bio materials, and also repeated the gag line that he boasted about how long his penis is (no word on whether it is or is not actually longer than expected.)
You have to wade down to paragraph 12 to learn other New York developers use the same count-the-basements levels gimmick to be able to advertise their buildings as taller. There is absolutely no news.
A Munich court has opened a lawsuit against Facebook founder Mark Zuckerberg, German media reported on Friday. News outlet "der Spiegel" wrote on its website, before the main weekly magazine's Saturday release, that it had obtained court documents charging the social media mogul with incitement to hatred.
Zuckerberg is reportedly being charged alongside Facebook CEO Sheryl Sandberg, chief Europe lobbyist Richard Allan, and his Berlin counterpart Eva-Maria Kirschsieper.
According to Spiegel, the complaint comes from the Würzburg-based attorney Chan-jo Jun. In the suit, he accuses Facebook of tolerating appeals for murder, threats of violence, and Holocaust denial, among other things.
Laws regulating hate speech in Germany are extremely tight, with most Nazi symbolism and racist propaganda strictly forbidden, a legacy of Germany's role in World War II. Although Facebook is obliged to remove illegal content from its site, it has repeatedly garnered hefty criticism for the time it takes to do so.
So, because internet porn is easier to access than ice cream, ISPs may be forced to stop allowing ice cream to flow uninterrupted through its lines unless customers of age specifically ask to be "exposed to" ice cream. If customers want porn to burst from every digital orifice connected to their ISP, they would need to opt-in via phone call, letter, or through the ISP's website.
Other people, who would just like to have their access to websites less effed up will also have to do the same, considering website filtering/blocking is far from perfect and tends to net a bunch of false positives. Critics of the bill only have to point to all the other times this has happened to provide examples of why this is a bad idea.
In addition, a list of opt-in users would be created because there's no way an opt-in "service" doesn't. I can't imagine why the government might be interested in the contents of such a list, but the fact that it's there means it could be obtained without too much paperwork if "needed." Then there are other outside forces, like malicious hackers, who might find it entertaining to plaster lists of "porn, please!" users all over the internet.
This coming summer, Chelsea Covington plans to hit the beach topless.
She's is not an exhibitionist or a nudist. Instead, she believes in normalizing the female body and has traveled throughout the mid-Atlantic, blogging about her interactions with people along the way.
She has taken photos at the Washington Monument, biked along trails in Philadelphia and visited beaches in New Hampshire, Assateague Island and Ocean City.
The 27-year-old from Maryland’s Eastern Shore advocates for "topfreedom," the belief that women have the same rights as men to not be obligated by laws cover their chests.
Covington believes that this type of gender shaming can be associated with "lifelong health concerns." She uses the term "bare chested," because she said topless is a gendered term that wouldn't be used to describe a man.
THE ANTI-FRIENDLY Turkish government has once again blocked local access to commonly used social networks including WhatsApp, Facebook and Twitter.
We have been here before. President Recep Tayyip Erdogan squats on communications every time anyone starts talking about him, his party, his family, and probably Turkey, in a less than positive way.
Today it is because some political opposition is getting the spotlight, so the move makes sense if you are someone like Erdogan who shuts down communications at the drop of a hat.
"The TurkeyBlocks monitoring network has detected restrictions on access to multiple social media services Facebook, Twitter and YouTube throughout Turkey beginning Friday Nov 04 2016 1:20AM local time, ongoing as of Friday noon," reported Turkey watcher TurkeyBlocks.
In what’s a significant escalation in its censorship efforts, the Turkish government now wants to block the very same tools that tech-savvy citizens use to get around the government-imposed social media blocks.
On Friday, the Turkish information technologies and communications authority, or BTK, ordered internet providers in the country to block Tor and several other censorship-circumvention Virtual Private Networks or VPNs, such as VPN Master, Hotspot Shield, Psiphon, Zenmate, TunnelBear, Zero, Vypr, Express, according to multiple local reports.
Earlier in the day, the government had already blocked Twitter, Facebook and YouTube, and restrictions on messaging apps like WhatsApp and Skype were also reported. The independent monitoring organization TurkeyBlocks also reported throttling and other forms of censorship on Friday, linking the disruptions and blocks to the arrests of pro-Kurdish party leaders.
As of a few hours ago, there’s a new VPN ban in Turkey. Turkey’s Information and Communication Technologies Authority has issued an order to Turkish Internet service providers (ISPs) telling them to institute a VPN ban. Many Turkish internet users were using VPNs to access social media platforms after Twitter, Facebook, and Youtube were blocked last night amid ongoing military operations and political unrest, according to Turkey Blocks. In addition to attempting to ban connections to VPN services, Turkish ISPs are also blocking access to VPN homepages as well as the Tor project homepage.
Ban is reportedly related to 11 arrests of opposition party politicians
Turkey has blocked Twitter, Facebook, WhatsApp and YouTube, according to censorship monitoring site, Turkey Blocks.
The group broke the news today around 1am local time, saying the government was throttling these services. This is a method of slowing down websites to the extent that they become difficult to use or unusable.
The Great Firewall of China is pretty well-known these days, as is the fact that it is by no means impenetrable. The Chinese authorities aren't exactly happy about that, and we have seen a variety of attempts to stop its citizens from using tools to circumvent the national firewall. These have included Chinese ISPs trying to spot and block the use of VPNs; deploying China's Great Cannon to take out anti-censorship sites using massive DDoS attacks; forcing developers of circumvention tools to shut down their repositories; and pressuring Content Delivery Networks to remove all illegal circumvention, proxy and VPN services hosted on their servers.
Despite years of clampdown, anti-censorship tools are still being used widely in China -- one estimate is that 1-3% of China's Internet users do so, which would equate to millions of people. However, Global Voices has a report of police action in the Chinese region of Xinjiang, whose indigenous population is Turkic-speaking and Muslim, that may be the harbinger of even tougher measures against circumvention tools.
Twitter banner for 5 November protest outside Facebook's Warsaw HQ reads: Freedom of Speech for Nationalists - Stop Censorship. Photo: Twitter.com/Marsz Niepodlegà âoà âºci @StowMarszN
Deputy Justice Minister Patryk Jaki accused the social media giant of censorship, which he said was “outrageous”.
Facebook’s reported decision to block the pages comes ahead of Poland’s Independence Day, which falls on 11 November and is typically marked by marches organised by nationalist organizations and others in the country’s capital.
Tens of thousands annually take to the streets on the day, which has in recent years ended in outbreaks of violence and clashes with police.
Nationalists are planning a 5 November protest outside the social media site’s Warsaw offices.
ESPN has been losing hand over fist as consumers shift to streaming alternatives and new "skinny" TV bundles of smaller channels. The company is estimated to have lost roughly 7 million subscribers in just a few years, and a recent survey found that 56% of consumers would drop ESPN in a heartbeat if it meant saving $8 a month on their cable bill (the estimate of how much ESPN costs each subscriber). The losses are largely thanks to ESPN executives failing to see the cord-cutting threat coming. Apparently it's difficult to identify shifting viewership trends with your head buried squarely in the sand.
Fast forward to this week, when viewer-monitoring firm Nielsen released a report stating that ESPN lost more subscribers than ever last quarter. According to the original Nielsen report, ESPN lost 621,000 homes in a single month, as well as losing 607,000 ESPN2 households, and 674,000 ESPNU homes.
Another day, another example of copyright being a tool for censorship. MarkMonitor is one of the largest companies out there in the "IP protection" business -- and they also have a decently long history of filing bogus DMCA notices. And in one of its recent ones... they targeted a Techdirt news story. You see, three years ago, our own Tim Cushing wrote a little story about how Adobe launched its Creative Cloud subscription offering and had the DRM on it cracked within 24 hours. It was a fun (yet all too predictable) story.
The government says it will intensify its crackdown on websites accused of spreading hatred based on issues of ethnicity, religion and race (SARA) after receiving more requests to do so, raising the specter of online censorship.
The move came as religious sentiments over the upcoming Jakarta gubernatorial election escalated and spread online, mainly after Jakarta Governor Basuki “Ahok” Tjahaja Purnama was accused of disrespecting Al-Maidah 51, a verse in the Quran.
The Communications and Information Ministry claimed that since Oct. 31 it had received more requests to block websites allegedly spreading SARA-based hatred from several authorities, including the National Police, the National Counterterrorism Agency (BNPT) and the State Intelligence Agency (BIN)
In 1990, a Robert Mapplethorpe photography exhibit opened at the Contemporary Arts Centre in Cincinnati, Ohio. Both the centre and its director, Dennis Barrie, were charged with obscenity. The public outcry against censorship was remarkable. Later, the charges were dropped.
In 2016, the Montreal Museum of Fine Arts opens an interesting, if not entirely satisfactory, exhibit of the same Robert Mapplethorpe’s work, this one called Focus: Perfection.
A young generation of Vietnamese comic artists is struggling to get its work published as local publishers hesitate to give the nod to comics targeting older age groups.
The third volume of popular Vietnamese comic Meo Moc (Musty Mew) by rising 24-year-old artist Dang Quang Dung was recently recalled by publishers after a one month run in local bookstores.
The artist attributes the recall to a scene featuring the comic’s feline protagonist on the toilet and the word ‘poop’ appearing later in the volume, both of which were deemed ‘offensive’ by book censors.
One hundred years ago, film censorship was introduced to New Zealand, making it illegal to show any film without it first being passed by the Censor.
The 1916 Cinematograph Film Censorship Act was the government’s first attempt to restrict what New Zealanders could watch and hear in audiovisual media.
In what’s a significant escalation in its censorship efforts, the Turkish government now wants to block the very same tools that tech-savvy citizens use to get around the government-imposed social media blocks.
On Friday, the Turkish information technologies and communications authority, or BTK, ordered internet providers in the country to block Tor and several other censorship-circumvention Virtual Private Networks or VPNs, such as VPN Master, Hotspot Shield, Psiphon, Zenmate, TunnelBear, Zero, Vypr, Express, according to multiple local reports.
Earlier in the day, the government had already blocked Twitter, Facebook and YouTube, and restrictions on messaging apps like WhatsApp and Skype were also reported. The independent monitoring organization TurkeyBlocks also reported throttling and other forms of censorship on Friday, linking the disruptions and blocks to the arrests of pro-Kurdish party leaders.
There needs to be an open discussion against simplifying the past, says the award-winning author. Troyanov speaks to DW about the dangers of glorifying Communist dictatorship in Eastern European countries.
Last month, YouTube was accused of censorship after it emerged it has been removing the ability for users to make money from their videos if they express politically incorrect or offensive views.
And the latest video to fall victim to the site's new censorship rules is, ironically, one on left wing censorship.
The video, titled 'The Dark Art of Political Intimidation', was placed in 'restricted mode', making it inaccessible to schools, libraries and those with a YouTube filter.
One of the things I do is cryptography and infosec training for investigative journalists who have a need to keep either their sources and communications confidential so they can more safely do their work in the public interest. Often they work in places which are heavily surveilled, like Europe, or the United States. Ed Snowden’s documents explain a thing or two about how the US intelligence apparatus goes about its day-to-day business. They sometimes also work in places in the world where rubber hose cryptanalysis is more common than in say the U.S. or Europe. Which is why crypto tools alone are not the Alpha and the Omega of (personal) security. This requires careful consideration of what to use when, and in what situation. One of the things I have recommended in the past for various cases is the OpenWhisperSystems’ app called Signal, available for Android and iOS. In this article, I want to explain my reasons why I won’t be recommending Signal in the future.
GCHQ is urging internet providers to change long-standing protocols to stop computers from being used to set off large-scale cyber attacks.
The Government’s cyber-defence arm said it plans to work with networks such as BT and Virgin Media to rewrite internet standards to restrict “spoofing” - a technique that allows hackers to impersonate other computers and manipulate them to carry out anonymous attacks.
Dystopian corporate surveillance threats today come at us from all directions. Companies offer “always-on” devices that listen for our voice commands, and marketers follow us around the web to create personalized user profiles so they can (maybe) show us ads we’ll actually click. Now marketers have been experimenting with combining those web-based and audio approaches to track consumers in another disturbingly science fictional way: with audio signals your phone can hear, but you can’t. And though you probably have no idea that dog whistle marketing is going on, researchers are already offering ways to protect yourself.
The technology, called ultrasonic cross-device tracking, embeds high-frequency tones that are inaudible to humans in advertisements, web pages, and even physical locations like retail stores. These ultrasound “beacons” emit their audio sequences with speakers, and almost any device microphone—like those accessed by an app on a smartphone or tablet—can detect the signal and start to put together a picture of what ads you’ve seen, what sites you’ve perused, and even where you’ve been. Now that you’re sufficiently concerned, the good news is that at the Black Hat Europe security conference on Thursday, a group based at University of California, Santa Barbara will present an Android patch and a Chrome extension that give consumers more control over the transmission and receipt of ultrasonic pitches on their devices.
When the world’s nations sit down to talk nowadays, there is a distinct difference to the way diplomacy is done. Influence is no longer defined only by special relationships and old alliances, but which WhatsApp group you are invited into.
The rise of WhatsApp diplomacy is transforming the negotiating chamber. There are countless groups of allies and virtual huddles, exchanges over policy statements and fine print, and fair amounts of banter and even emojis (Vladimir Putin is referred to by widespread use of a grey alien avatar).
“You can form small groups of like-minded allies, take photos of annotated documents, ask people what they think without the whole room knowing,” a senior western diplomat said.
The tool is useful for communicating with allies who might not be sitting close to them, diplomats say, as well as for agreeing negotiating tactics during difficult sessions and for organising break-out huddles in a way that avoids offending those left out.
This week, Canadians received a shock to the system when a spate of news items revealed how police and spy agencies flout the law and moral conventions to spy on citizens and journalists, in some cases dating back for many years.
The largest blow to Canada’s often rosy image came on Thursday when a federal court ruling revealed that the Canadian Security Intelligence Service (CSIS) has been operating a secret metadata collection program since 2006, and retained citizens’ identifying information illegally. The question on every Canadian's mind now is: how, in our supposedly sleepy liberal democracy, did this happen?
In establishing the domestic spy agency with the CSIS Act, legislators largely left it up to CSIS itself to decide how the law should be interpreted. “It appears that CSIS got their own legal advice that gave them the most favourable spin or interpretation of the law that one could possibly take,” said privacy lawyer David Fraser in an interview. “Really, stretching it almost to the breaking point.”
The US election is imminent. It pits a dangerous demagogue in Donald Trump against an establishment candidate in Hillary Clinton. The list of those victimised by Trump is dwarfed only by his detractors.
On the campaign trail, Trump has managed to insult women, Hispanics and Muslims just to name a few groups. Yet Clinton hardly arouses the enthusiasm of voters. Many feel she has been co-opted by Wall Street and that she is a foreign policy hawk.
The Wikileaks revelations confirmed that the leadership of the Democratic National Committee worked against Bernie Sanders in order to secure Clinton the nomination. I am wondering what Oliver Stone makes of it all. But, getting hold of Stone, at several removes, proves to be difficult. You could say he is almost as elusive as the subject of his latest movie – Snowden.
Britain’s adversaries want to damage its economy and society and their new weapon of choice is the Internet.
Thirty years ago this sentence would have read like science fiction. Twenty years ago it would have sounded like technobabble. By 10 years ago it would merely have been dismissed as a bit far-fetched.
And yet this is what Philip Hammond, the UK Chancellor of the Exchequer, suggested yesterday in a speech outlining an ambitious UK cyber-security strategy that has been emerging gradually since 2010.
Operations around Sugar Grove have also been tied to the NSA’s controversial ECHELON surveillance program, according to National Security Archive researchers. The top-secret program was created during the Cold War to monitor Soviet and Eastern Bloc communications, but later evolved into a global interception and data harvesting system.
After being shut down last year, the spy town can now be yours—for a couple of million dollars.
Once home to some 400 government employees and their families, Sugar Grove Station’s only residents a year after it was decommissioned appear to be spiders and a particularly brazen groundhog. The spying activities have moved on, some of them to a related nearby base that’s still operational.
Donald Trump has shown he’ll stop at nothing to humiliate and intimidate his critics. He published Sen. Lindsey Graham’s personal cellphone number so Trump supporters could harass him. He encouraged the Russian government to hack Hillary Clinton (though he later claimed he was joking) and promised to imprison her. He has tweeted false and embarrassing accusations against Sen. Ted Cruz, former Miss Universe Alicia Machado, and many others.
The General Secretary of the European Federation of Journalists (EFJ) has chastised the UK government for its treatment of RT, in relation to state-owned British bank NatWest’s decision to close its accounts.
Former U.S. National Security Agency contractor and whistleblower Edward Snowden warned that phones can be compromised by security agencies to listen in on the user’s activities even when the device is not programmed to do so.
Snowden spoke about the surveillance state in an interview with Digits, a series on privacy during the age of the internet. The 33-year-old whistleblower rose to prominence when he leaked classified documents that revealed the NSA spying on U.S. citizens.
“The TV is a medium that you watch. The internet is a medium that watches you as you watch it,” Snowden reportedly said in the interview. ”Everywhere you go, even when you’re not actively using your phone, it’s still listening.”
The police spying crisis has gone from bad to worse, with Public Security Minister Martin Coiteux ordering an administrative investigation into the practises of the Sûreté du Québec dating back to 2013.
Coiteux made the announcement within hours of the provincial police force revealing it had tracked the calls and movements of six journalists that year after news reports based on leaks revealed Michel Arsenault, then president of Quebec’s largest labour federation, had his phone tapped.
The controversy began Monday after Montreal media outlet La Presse reported that police had tracked columnist Patrick Lagacé’s cellphone to find out if he was being leaked information from police officers.
Chelsea Manning tried to commit suicide last month at the start of a week of solitary confinement at the prison barracks at Fort Leavenworth, Kan., that was imposed on her as punishment for a previous attempt to end her life in July.
Ms. Manning, the former Army intelligence analyst who is serving a 35-year sentence for leaking archives of secret documents to WikiLeaks, disclosed the attempted suicide, which took place Oct. 4, in a statement she dictated over the phone to a member of her volunteer support network. She asked that it be sent this week to The New York Times, according to members of the network who want to keep their identities private.
Chase Strangio, an American Civil Liberties Union lawyer representing Ms. Manning, formerly known as Bradley Manning, said, “I can confirm there was a second suicide attempt.”
“She asked me to confirm that,” he added.
Democratic presidential nominee Hillary Clinton’s campaign manager Robby Mook was only too pleased after the U.S. Supreme Court struck down aggregate limits on individual donations to political candidates, parties, and political action committees (PACs), according to new emails released by WikiLeaks in connection with its dump of campaign chairman John Podesta’s server.
“Gotta have the state parties in the joint — so much money on the table,” he wrote to colleagues April 3, 2014, shortly after the Court’s ruling in McCutcheon v. FEC. McCutcheon is the spawn of the controversial Citizens United ruling, which authorized independent political expenditures by corporations or labor unions. Clinton denounces the decision regularly and says she will apply Citizens United as a litmus test against her judicial nominees.
At a time rife with speculation that the presidential vote on Tuesday may be rigged or tampered, we find it troubling - not to mention illegal - that Tim Cook has allowed the Apple store to distribute an app called #NeverTrump created by Trimian, whose mission statement is "Red or Blue, we must all unite to defeat Trump this election. Let's ensure Hillary wins in swing states, and make sure third-party votes count."
The app allows potential voters to trade votes, boosting Hillary's support in swing or battleground states, while 3rd party candidates get more (meaningless) support in blue states.
Blackwater founder and former Navy SEAL Erik Prince told Breitbart News Daily on SiriusXM that according to one of his “well-placed sources” in the New York Police Department, “The NYPD wanted to do a press conference announcing the warrants and the additional arrests they were making” in the Anthony Weiner investigation, but received “huge pushback” from the Justice Department.
This weekend you have the chance to add to Aaron Swartz’s legacy by boosting tools for whistleblowers.
The 2016 Aaron Swartz International Hackathon—held in honor of the late Internet and political activist—will take place during the day Saturday and Sunday at the Internet Archive in San Francisco. The hackathon will focus on whistleblower submission system SecureDrop, which was created by Swartz and Kevin Poulsen to connect media organizations and anonymous sources and is managed by the Freedom of the Press Foundation.
This weekend’s events—timed to what would have been his 30th birthday on Nov. 8—will also feature a series of speakers on Saturday night, including SecureDrop’s Conor Schaefer, Fight for the Future Co-founder Tiffiniy Cheng, and EFF Executive Director Cindy Cohn, as well as a special statement from Chelsea Manning.
In the spirit of commemoration, I thought we could mark this November the Fifth by taking some time out of our daily lives and consider again where society is going. Where once you had the freedom to object, to think and speak as you saw fit, you now have censors and systems of surveillance coercing your conformity and soliciting your submission. It may not be much, yet, but it is there. How did this happen?
British police arrested nearly 50 people in London Saturday during a protest they described as “anti-capitalist,” organized by the computer hacking group known as Anonymous.
A similar demonstration in Washington, said to be “anti-corruption,” resulted in two arrests for defacing or damaging public property.
The marches, which are organised through Facebook groups, call for people to protest against mass government surveillance, internet censorship and ‘corrupt politicians who put capitalism before the people’.
A post about the marches on the Anonymous website states: “2016 has arguably seen little, to absolutely no improvements, and in fact many situations have worsened tremendously in various regions of the world.
“It is crucial we stand together now to show our increasing numbers to those who call themselves the ‘elite’ and their political puppets.
“Join us in November to spread the message to the masses that our worldwide revolution is at hand.
“Stand with the Anonymous Movement, and together in one voice let us remind our world-dictators that we do not forgive and we do not forgot.
“They should have expected us.”
Thousands of protesters have descend on central London for the Million Masked March, despite Scotland Yard imposing strict restrictions on the event.
Supporters of the hacking collective Anonymous began marching on Trafalgar Square on Saturday with scores of police officers maintaining a tight perimeter.
The group's agenda is broadly anti-capitalist and pro-civil liberty, with many of the demonstrators wearing Guy Fawkes masks in an effort to recreate the final scene of cult film V For Vendetta. It is one of many similar marches held worldwide on 5 November.
Thousands of masked protesters have gathered in central London for the annual Million Mask March.
Wearing trademark Guy Fawkes masks, supporters of the hacking collective Anonymous met in Trafalgar Square in Westminster accompanied by scores of police officers.
Scotland Yard has imposed stringent restrictions on protesters after clashes with police, incidents of criminal damage and attempts to invade official buildings at previous years’ events.
Thousands of masked protesters descended on central London on Saturday night for the Million Mask March, an annual global anti-capitalism and pro-civil liberties demonstration.
Wearing characteristic Guy Fawkes masks, supporters of hacking collective Anonymous crowded into Trafalgar Square with scores of police on hand to keep order. The protest passed off without major incident, though by 10.45pm police had made 47 arrests, the majority for drug offences and obstruction of officers.
In the spirit of commemoration, I thought we could mark this November the Fifth by taking some time out of our daily lives and consider again where society is going. Where once you had the freedom to object, to think and speak as you saw fit, you now have censors and systems of surveillance coercing your conformity and soliciting your submission. It may not be much, yet, but it is there. How did this happen?
Rolling Stone magazine and a journalist have been found guilty of defamation over a false article about a gang rape at the University of Virginia.
The $7.5m (€£6m) lawsuit was brought by Nicole Eramo, an associate dean from the university, who said the article had cast her as the "chief villain".
The 2014 article, written by Sabrina Rubin Erdely, included the rape claim of an unidentified female student.
The magazine retracted the article in April 2015, citing inconsistencies.
The 9,000-word article, entitled A Rape on Campus, centred on the testimony of a student, referred to as "Jackie", who claimed to have been gang raped at a party held at the Phi Kappa Psi fraternity's house in 2012.
During the press conference on the flight from Malmö to Rome, Francis said “there is a political price to pay when imprudent calculations are made” regarding the numbers a country is able to host, resulting in it being unable to offer housing, schooling and jobs. The Pope also praised oratories and volunteers in Italy, that were born “from the apostolic zeal of parish priests” and he once again rejected the possibility of female priests in the Catholic Church
Travelling to the US from Swedish capital Stockholm is about get much easier, with the two countries signing a 'preclearance' agreement on Friday that will allow American customs procedures to take place in Sweden's Arlanda international airport before passengers board their flight.
The Swedish government said it hopes the increased ease of travel will have positive consequences like for example making Sweden a more attractive place for international companies to base their headquarters in.
Under the current EU agreement, Turkey takes back migrants who have travelled illegally through the country to Greece, but the warning could spark a new wave of migrants trying to use Turkey as a way in to Europe.
The deal was agreed last year when more than a million people arrived in Europe, most reaching Greek islands by boat and continuing by land to Germany.
The number of migrants arriving in Greece has fallen dramatically since the agreement, with 2,970 crossing the Aegean from Turkey in October compared with 211,663 in the same month last year.
ANOTHER young woman has been publicly caned in Indonesia after falling foul of the country’s strict Islamic laws.
The 20-year-old “criminal” was put through the harrowing ordeal after being caught standing too close to her boyfriend in Banda Aceh – the capital of Aceh province.
Security forces in the Indonesian capital Jakarta are on high alert in preparation for a Friday rally by hardline Islamist groups against the city’s non-Muslim governor.
Thousands of people are due to move into the capital to protest against Basuki Tjahaja Purnama, an ethnic Chinese and Christian nicknamed ‘Ahok’, who has governed the city since 2014.
They accuse him of blasphemy after he criticised his opponents for referencing a verse in the Koran that warns against allying with Christians and Jews.
In September, Ahok suggested those who used the passage against him were “lying”, leading to outrage from some hardliners who interpreted his comments as criticism of the Islamic holy text. He later apologised.
Myanmar police will begin arming and training non-Muslim residents in the troubled north of Rakhine State, where officials say militants from the Rohingya Muslim group pose a growing security threat, police and civilian officials said.
Human rights monitors and a leader of the mostly stateless Rohingya told Reuters the move risked sharpening intercommunal tensions in a region that has just seen its bloodiest month since 2012, when hundreds of people were killed in clashes between Muslims and ethnic Rakhine Buddhists.
Soldiers have poured into the Maungdaw area along Myanmar's frontier with Bangladesh, responding to coordinated attacks on three border posts on Oct. 9 in which nine police officers were killed.
Security forces have locked down the area - shutting out aid workers and independent observers - and conducted sweeps of villages in Maungdaw, where the vast majority are Rohingyas. Official reports say five soldiers and 33 alleged insurgents have been killed.
Uganda’s high court has ordered the closure of a chain of low-cost private schools backed by Bill Gates and Mark Zuckerberg, respectively the founders of Microsoft and Facebook.
Native American protesters have reported excessive force, unlawful arrests and mistreatment in jail where activists describe being held in cages
After having served nearly three months in a federal prison camp in central California, Matthew Keys is making the best of it.
In August 2016, the 29-year-old journalist began his two-year sentence in Atwater, California, about 120 miles east of San Francisco. Earlier this year, Keys was convicted at trial under the Computer Fraud and Abuse Act (CFAA), the notorious anti-hacking federal law that dates back to the 1980s. An effort to reform that law has languished in Congress.
Keys told Ars that, even post-conviction, he did not hand over any login information that led to the 40-minute alteration of a Los Angeles Times headline in 2010.
Hours before Keys’ sentencing hearing in April 2016, Ars received a letter from someone under the pseudonym “Sam Snow,” who claimed that he, and not Keys, was the one who actually handed over the login details. This new claim by Snow will likely have no impact on Keys’ appeal, which is pending at the 9th Circuit US Court of Appeals.
Ars has been periodically corresponding with Keys by e-mail through CORRLINKS, the monitored e-mail system set up for federal inmates, and the following interview has been edited for clarity. We hope to be able to visit him in person in the coming months.
Tunisia's prime minister sacked the minister of religious affairs on Friday after he accused Saudi Arabia's Wahhabi brand of Islam of being behind "terrorism and extremism".
"Prime Minister Youssef Chahed decided to dismiss Salem Abd El Jalil, minister of religious affairs, from his duties due to the lack of respect for government work and his statements that touched principles of Tunisian diplomacy," the premier's office said in a statement.
Tunisian media on Thursday quoted Abd El Jalil as saying in parliament: "I told the Saudi ambassador in Tunisia that terrorism and extremism historically came from you ... You should reform your (religious) school."
He could not be immediately reached for comment on Friday.
Consonant with Glushkov’s greater life-work commitments, the network plans reflected a deliberately decentralised design. This meant that, while Moscow could specify who received which authorisations, any authorised user could contact any other user across the pyramid network – without direct permission from the mother node. Glushkov intimately understood the advantages of leveraging local knowledge in network designs, having spent so much of his career working on related mathematical problems while ferrying between his home and the central capital (he jokingly called the Kiev-Moscow train his ‘second home’).
The OGAS project appeared to many state officials and economic planners, especially in the late 1960s, to be the next best response to an old conundrum: the Soviets were agreed that communism was the way of the future, but no one since Marx and Engels knew how best to get there. For Glushkov, networked computing might just inch the country toward an age of what the author Francis Spufford later called ‘red plenty’. It was the means by which the sluggish pulp-based lifeblood of the command economy – quotas, plans and wrist-bending compendiums of industry standards – would transform into the nation’s neural firings, moving at the sublime speed of electricity. The project signified no less than the ushering in of ‘electronic socialism’.
Such ambitions require brilliant, committed people willing to throw off the old ways of thinking. In the 1960s, those people could be found in Kiev – a couple of blocks from where the Strugatsky brothers wrote their science fiction by night and worked as physicists by day. There, on the outskirts of Kiev, Glushkov ran the Institute of Cybernetics for 20 years, beginning in 1962. He filled his institute with ambitious young men and women; the average age of researchers was about 25. Glushkov and his youthful staff dedicated themselves to developing the OGAS and other cybernetic projects in the service of the Soviet state, such as a system of electronic receipts for virtualising hard currency into an online ledger of accounts – this in the early 1960s. Glushkov, who was known to talk down Communist Party ideologues by quoting paragraphs of Marx from memory, described his innovation as a faithful fulfilment of Marxist prophecy of a moneyless socialist future. Unfortunately for Glushkov, the idea of Soviet e-currency stirred up unhelpful anxieties and did not receive committee approval in 1962. Fortunately, his grand economic network project did live to see another day.
As AT&T fires up its lobbyists and various policy tendrils to sell the company's $100 billion (including debt) acquisition of Time Warner, the focus of the conversation has very quickly shifted to net neutrality and zero rating. AT&T already exempts its own content from the company's usage caps, and its DirecTV Now streaming service, launching later this month, is expected to follow suit. Once AT&T acquires Time Warner and its various properties (HBO, CNN), the worry is that this content will also get a leg up by being cap-exempt, creating an unlevel playing field for competing content and streaming services.
Back in 2013, Time Warner Cable (now Charter Communications) struck an $8.35 billion deal with the LA Dodgers to create LA SportsNet, the exclusive home of LA Dodgers games. To recoup that money, Time Warner Cable began demanding exorbitant prices from competing cable providers if they wanted access to the channel. Unsurprisingly, all of Time Warner Cable's competitors in the region balked at the $5 per subscriber asking price for the channel. As a result, for three years now a massive portion of Los Angeles hasn't been able to watch their favorite baseball team, since Time Warner Cable's asking price not only kept competing cable operators from delivering the channel, but prohibited over-the-air broadcasts of the games.
To be fair to our neighbors to the north, Canada really tried. Amidst calls to implement something like the "notice and takedown" system for copyright infringement claims that we have in the States, Canada instead did what Canada does and tried to implement a nicer version of this, called "notice and notice." The idea was that ISPs and service providers, rather than simply taking down content or banning people from the internet over copyright violations, would instead notify users that their behavior had been reported as infringing. More specifically, it allowed copyright holders to pass along these messages, with ISPs acting as the go-between. The theory was that when internet users -- or in many cases family members of those internet users, such as parents -- learned that potentially infringing activity was occurring, the notifications would cause the behavior to cease.
As our own Karl Bode noted in 2014, this theory was backed by the ISPs, who claimed these notices helped curb a majority of piracy. We also noted in that post that the "notice and notice" system appeared to be preferable to our "notice and takedown" system because it appeared to be a less likely avenue for abuse by copyright holders and trolls. Sadly, that was immediately disproven by Rightscorp, with abuse of the system continuing up to the present. When eighty-year-old women are getting settlement shakedown threats from copyright trolls over video games, the aims of educating the public have clearly been subverted.
TED, a series of popular conferences, has the motto Ideas Worth Spreading. However, when a YouTuber made a video criticising and featuring content from a recent TED talk, the non-profit filed a DMCA notice with YouTube. Speaking with TorrentFreak, TED says that regardless of content, YouTube videos which violate its usage policy will be removed.
The Business Software Alliance, a trade group representing Adobe, Apple and Microsoft, is well known for its aggressive anti-piracy campaigns. The organization actively encourages people to snitch on software pirates, luring them with big cash rewards. Amusingly, however, the page where people can report unlicensed software is using 'unlicensed' jQuery code.