Kubernetes is in, container registries are a dime a dozen, and maximum container density isn't the only thing that matters when running containers.
Those are some of the insights gleaned by Sysdig, maker of on-prem and in-cloud monitoring solutions, from customers for how they're using containers in 2017.
Container management software vendor Rancher Labs announced the general availability of its RancherOS 1.0 Linux distribution on April 12, providing organizations with a stable, supported operating system option for container deployment.
Over the years, there has been a lot of mixed information as to what Linux cloud servers actually mean. This article aims to clear the air once and for all with a concise explanation while providing you with a list of Linux cloud server resources from which you can investigate for yourselves.
Creating and running an on-call rotation is the very first step in building truly reliable infrastructure at any scale, but it’s far from the last. As a company grows and scales, the systems that it builds and runs grow in complexity and require more sophisticated on-call practices. While there is no universal approach, there are industry best practices for setting up on-call and incident response at any and every size.
Gravitational, maker of a software-as-a-service support system built with Kubernetes, has released the latest open source iteration of a key part of that system.
Teleport, an SSH server that provides support teams with a simpler way to remotely manage server clusters, is an example of Google's Go language being used to devise safer but still performant replacements for critical infrastructure.
At last year’s Embedded Linux Conference Europe, Sony’s Tim Bird warned that the stalled progress in reducing Linux kernel size meant that Linux was ceding the huge market in IoT edge nodes to real-time operating systems (RTOSes). At this February’s ELC North America event, another figure who has long been at the center of the ELC scene -- Free Electron’s Michael Opdenacker -- summed up the latest kernel shrinkage schemes as well as future possibilities. Due perhaps to Tim Bird’s exhortations, ELC 2017 had several presentations on reducing footprint, including Rob Landley’s Tutorial: Building the Simplest Possible Linux System.
Like Bird, Opdenacker bemoaned the lack of progress, but said there are plenty of ways for embedded Linux developers to reduce footprint. These range from using newer technologies such as musl, toybox, and Clang to revisiting other approaches that developers sometimes overlook.
In his talk, Opdenacker explained that the traditional motivator for shrinking the kernel was to speed boot time or copy a Linux image from low-capacity storage. In today’s IoT world, this has been joined with meeting the requirement for very small endpoints with limited resources. These aren’t the only reasons, however. “Some want to run Linux as a bootloader so they don’t have to re-create bootloader drivers, and some want to run to the whole system in internal RAM or cache,” said Opdenacker. “A small kernel can also reduce the attack surface to improve security.”
If we've learned anything in the technology business in the last 25 years, it would be to never underestimate the Linux kernel. Why, then, have so many networking companies been so eager to bypass the Linux kernel -- or more specifically, the Linux kernel networking stack? What could be so wrong with the networking packet arteries in the Linux kernel that motivates so many of us to bypass them?
There are two main reasons. First, the kernel networking stack is too slow -- and the problem is only getting worse with the adoption of higher speed networking in servers and switches (10GbE, 25GbE, and 40GbE today, and rising to 50GbE and 100GbE in the near future). Second, handling networking outside the kernel allows for plugging in new technology without the need to change core Linux kernel code.
In order to get Mesa 17.1 out on time, branching is happening today for this next quarterly update to Mesa.
Mesa 17.1 is another significant update with it bringing a number of Vulkan updates to ANV and RADV, more OpenGL extensions, the GLSL/TGSI on-disk shader cache, the RadeonSI shader cache, performance improvements, and various other work. I'll provide a feature overview this weekend of the new material for Mesa 17.1.
With the DRM driver features settled for Linux 4.12, I was curious about the size of these Direct Rendering Manager drivers.
Quick summary: They managed to squeeze out enough voter participation and yes-votes to approve the changes to the membership agreement. The voting for the four new board seats were carried out of the five participants, but due to the by-laws mandating that not more than two board members be from the same organization/company, that clause was hit. As usual, Intel has heavy participation by X.Org developers. The newly-elected members include Daniel Vetter, Martin Peres, Rob Clark, and Taylor Campbell. Others sitting on the board who have terms expiring next year are ALex Deucher, Egbert Eich, Keith Packard, and Bryce Harrington.
One of the immediate requests that usually comes in with each new Ubuntu release is a comparison of the Linux gaming performance when trying out the different desktop options. From yesterday's Ubuntu 17.04 release, here are Steam Linux gaming tests with Budgie, GNOME Shell, KDE Plasma 5, MATE, Unity 7, and Xfce4 when using an AMD Polaris graphics card on the RadeonSI driver stack.
A new version of Pithos, a native Pandora Radio client for Linux, is now available to download, and includes MPRIS tracklist and playlist support.
Wireshark, the open-source and cross-platform network protocol analyzer designed for network analysis, troubleshooting, development and education purposes, was updated today, April 13, 2017, to version 2.2.6.
Wireshark remains the world's most popular network protocol analyzer and scanner software, used by millions of network administrators and hackers around the world, and Wireshark 2.2.6 is the sixth maintenance update to the stable series of the application, bringing more fixes for recently discovered security flaws.
GitHub's Andrea Liliana Griffiths is pleased to announce the release of Atom 1.16 as the latest stable version of the popular, multi-platform, and open-source hackable text editor, along with the Beta of Atom 1.17.
Atom 1.16 has entered Beta a little over a month ago when Atom 1.15 launched with its improvements to duplicate selections with multiple lines, the ability to retain tabs of deleted files, always visible cursors, better handling of minified files, and several other optimizations and bug fixes.
The Wine development release 2.6 is now available.
For those excited by yesterday's Wine 2.6 release with D3D CSMT as the long-awaited command-stream multi-threading to boost game performance, don't get your hopes too high with this release.
Today I took a look at 'Asura' [GOG, Steam] a brand new hack 'n' slash title that's inspired by Indian mythology. It's interesting to see a game inspired by Indian mythology, as it's not something often explored in games.
Contraption Maker [Steam, Humble Store, Official Site] came to Linux with the Humble Indie Bundle 14 back in 2015. I was gifted a copy some time ago (thanks oldrocker99!) and finally found some time to play it.
Steam has been on Linux for a few years. Since it landed many video games, including mainstream titles from big-name publishers, have found themselves on Linux. This is all great for the average consumer, as one of the biggest deterrents to switching to Linux is gaming support.
However, some in the Linux community don’t like Steam. They see the commercial-gaming platform as a detriment to their software freedom, as it brings a lot of DRM. As a result of this, many people who love video games on Linux have had to go without. This list offers five good alternatives to Steam?
Tribal Pass is essentially an endless runner split into different levels, where you control a group of people rather than a single person. This group can be split up and merged back together with a click of the mouse. So if you come across bridges over a river, you may need to split them up to cross it. If there's an animal that might kill you, split up to get around it and so on.
The developers of the beautiful action platformer Rise & Shine [Steam] have posted on Steam to note that the Linux version is ready, it's just waiting on final approval from the publisher.
Testing it on Arch was flawless and it's actually not bad at all. I warn you, it will suck endless hours of you life away. It's also difficult, some puzzles are insanely hard to figure out and many user-reviews have been seriously suggesting you go look up some guides. They aren't wrong, I've been stuck plenty of times well testing it.
Qt 5.9 is moving closer to release so the release schedule planning around Qt 5.10 is now happening.
blackPanther OS is a Hungarian Linux distro. It takes out many features from other famous distros like GUI from fedora, drivers from Ubuntu and many others. The website of blackPanther OS states that:- “The blackPanther OS development started in 2002 by Charles K. Barcza. The First public version was 1.0 (Codename: Shadow) in 2003. Since then, the development is continuous, every year a new version is released. The last stable version, v16.1.2 has become available in Aug. of 2016. (The v16.2 is a special, non-free release, and v17.1 still under development) It was among the 5 top popular distributions January of 2010 on distrowatch.”
Three days ago, I decided to abandon my efforts to rescue my PCLOS KDE4 install, which was destroyed by a connection disruption while updating. I lost my connection for over a week and, when my ISP finally solved the problem, my desktop was so messed up that I gave up on it and decided to give PCLOS KDE5 a chance.
I must confess that I am not a real fan of Plasma 5. However, as KDE4 is going the way of the dodo, I thought that it was better to take the leap and see how this beautiful Linux distro works with KDE's new desktop.
Andrew Colin Kissa and the development team behind the Baruwa Enterprise Edition (popularly known as BaruwaOS) commercial operating system based on Red Hat Enterprise Linux announced the release of BaruwaOS 6.9.
Red Hat, Inc. (RHT), the world's leading provider of open source solutions, today announced the general availability of Red Hat OpenShift Container Platform 3.5, the latest version of Red Hat’s enterprise-grade, Kubernetes-native container application platform. While enabling enterprises like Swiss Railways, Produban and Pioneer to actively embrace cloud-native applications in mission-critical roles, Red Hat OpenShift Container Platform 3.5 also helps enterprises retain existing IT investments through expanded support for traditional business applications. This dual application support is provided by new security enhancements as well as several innovations emerging from the Kubernetes upstream community.
CentOS Community Container Pipeline empowers running a container registry (currently at https://registry.centos.org) to facilitate upstream and distro components to be delivered in a format suitable to be consumed by container tool chains on CentOS Linux.It enables upstream projects to build, test and deliver latest and safest container images, everytime and effortlessly (or with minimal efforts).
Pairwise (a.k.a. all-pairs) testing is an effective test case generation technique that is based on the observation that most faults are caused by interactions of at most two factors! Pairwise-generated test suites cover all combinations of two therefore are much smaller than exhaustive ones yet still very effective in finding defects. This technique has been pioneered by Microsoft in testing their products. For an example please see their GitHub repo!
Red Hat is expanding the application workload reach of Kubernetes in the latest version of its OpenShift Container Platform.
The latest version, 3.5, is said to offer expanded support for traditional applications along with new security enhancements and more Kubernetes capabilities.
IBM partnered with Red Hat to retain its dominance in the hybrid cloud
Earlier in this series, we looked at the market expectations for International Business Machines’ (IBM) soon-to-be-announced fiscal 1Q17 results. Sticking to its strategy to grow Strategic Imperatives, IBM announced a cloud partnership with Red Hat (RHT) in late March 2017. Red Hat is an open source solutions provider.
Under the deal, IBM will develop private clouds for its customers with the aid of Red Hat technology. In particular, IBM will use Red Hat Ceph Storage and Red Hat OpenStack Platform and offerings. Red Hat got access to Ceph software through its acquisition of Inktank in 2014.
Like each month, here comes a report about the work of paid contributors to Debian LTS.
Kubuntu 17.04 was also released today as part of the Ubuntu 17.04 (Zesty Zapus) operating system, and since it's an official flavor, we're gonna take a quick look at its new features.
Kubuntu 17.04 debuts with the latest, new generation KDE Plasma 5.9 desktop environment customized with some of the goodies coming to the KDE Plasma 5.10 release next month, such as the Folder View instead of the Desktop widget that was used in all previous Kubuntu releases.
Ubuntu Budgie 17.04 launched today as an official flavor of the popular Ubuntu Linux operating system as part of the Ubuntu 17.04 (Zesty Zapus) operating system release.
Until today, Ubuntu Budgie was known and distributed as budgie-remix, so this is its first official release as an Ubuntu flavor endorsed by Canonical. Because of this, the Ubuntu Budgie team had a lot of work on their hands during the past six months to remove everything related to the old budgie-remix name, as well as to made other necessary changes.
Ubuntu GNOME 17.04 was released today alongside the other Ubuntu 17.04 flavors, but for those wondering what's happening to Ubuntu GNOME now that Ubuntu 18.04 will use GNOME with Unity being dropped, the Ubuntu GNOME flavor is winding down.
Ubuntu creator Mark Shuttleworth will once again be the CEO of Canonical as the company reduces its staff and narrows its focus to profitable projects.
Canonical CEO Jane Silber announced her departure yesterday, seven years after then-CEO Shuttleworth asked her to take over the company's top spot. She previously served as Canonical's chief operating officer.
“When I joined we would go and visit customers and companies and the first half hour or hour of every meeting was us explaining open source to them. Explaining why it wasn’t scary, explaining that it was a good thing and what the licenses meant. Not even talking about Ubuntu, but talking about open source in general.
“Now there is none of that, everyone knows what it is and it has become such a defacto default standard way of both developing and consuming software.”
Shuttleworth will return to the post he vacated in 2010 in favour of a more hands-on role. The news will see Jane Silber, who has steered the ship for the past seven years, step down in which she says she will "take some time to recharge and then seek new challenges".
The world works in mysterious ways, and, sometimes, things will turn out in your favor. It's no secret anymore that Ubuntu GNOME, the official flavor of Ubuntu featuring the GNOME desktop environment, will become the main Ubuntu edition.
We reported earlier this week that Ubuntu GNOME is becoming the main Ubuntu flavor, but, today, the Ubuntu GNOME team also confirmed the change in the release announcement for Ubuntu GNOME 17.04 (Zesty Zapus), saying that their project will no longer be a separate flavor starting with the release of Ubuntu 18.04 LTS next year.
Canonical announced the release of Ubuntu Server 17.04 (Zesty Zapus), the latest and most advanced version of the popular operating system, supporting the newest LXD, Kubernetes, Docker, and Snappy technologies.
If you read enough Phoronix, you know that Mesa and the Linux kernel's DRM graphics drivers continue advancing at a remarkable pace, especially in recent times. Thus if you were an Ubuntu 16.10 user but planning to upgrade to Ubuntu 17.04, here are some benchmark results showing the performance improvements you can expect with the Radeon/AMDGPU DRM and RadeonSI Gallium3D driver. Plus there are also some results when using the Oibaf PPA on Ubuntu 17.04 to show what more performance can be tapped by switching to Mesa 17.1-dev.
Canonical, through Marco Ceppi, was pleased to announce the general availability of Kubernetes 1.6 open-source container orchestration to the Ubuntu 16.04 LTS (Xenial Xerus) operating system.
Wiley Werewolf. Hardy Heron. Saucy Salamander. There’s no doubt about it: Ubuntu has the best release names in the business. (Sorry, Android.) Ever since 2004, each new version of the Linux-based OS has come with an alliterative code name, comprised of one adjective and one animal. Now, 12 years after the fun started, Canonical has finally reached the end of the alphabet, releasing Ubuntu version 17.04 Zesty Zapus.
The eagle-eyed among you will have spotted that 17 versions isn’t enough to cover every letter of the alphabet, but the first three releases weren’t in alphabetical order. The first, version 4.10, was named Warty Warthog, followed by versions 5.04 (Hoary Hedgehog) and 5.10 (Breezy Badger). It wasn’t until Ubuntu 6.06 Dapper Drake that the pattern was properly established.
Along with the release of the Ubuntu 17.04 and Ubuntu GNOME 17.04 operating systems, the Ubuntu Kylin 17.04 official flavor launched as well today, April 13, 2017.
As part of today's massive Ubuntu 17.04 (Zesty Zapus) release, the Xubuntu 17.04 official flavor landed for fans of the lightweight Xfce desktop environment with more optimizations and the latest GNU/Linux technologies.
Aetina’s Nano-ITX “ACE-N620” carrier board for Nvidia’s Linux-driven Jetson TX2 and TX1 modules offers optional mini-PCIe expansion cards from Innodisk.
Aetina’s Nano-ITX form-factor ACE-N620 carrier board offers some more development options for Nvidia’s Jetson TX2 COM, as well as its earlier, pin-compatible Jetson TX1. Already, Connect Tech has released three carrier boards for the Jetson TX2 and TX1, and Auvidea is prepping a J140 carrier for the Nvidia Tegra-based modules.
The Raspberry Pi computer can be used in all kinds of settings and for a variety of purposes. It obviously has a place in education for helping students with learning programming and maker skills in the classroom and the hackspace, and it has plenty of industrial applications in the workplace and in factories. I'm going to introduce five projects you might want to build in your own home.
The NanoPi K2 is like an Odroid-C2 with WiFi and BT 4.0. The $40, open spec SBC offers a quad- A53, 1.5GHz Amlogic S905, 4x USB, GbE, and a 40-pin bus.
Rampant imitation is making it easier to write up these new hacker board releases. Just cut and paste an existing feature table, add and subtract a few features, and you’re done. In the case of the FriendlyElec (FriendlyARM) NanoPi K2, it’s even easier than usual. The board has the same processor, 85 x 56mm footprint, and almost an identical feature set and layout as Hardkernel’s Odroid-C2, which means it is also very similar to the Raspberry Pi 3. The NanoPi K2 and Odroid-C2 even opened with the same $40 price, although the latter now sells for $46.
One of my favorite manufacturers of high-quality, reasonably priced, Linux-friendly audio equipment is Schiit Audio. I recently noticed they have a new gizmo at the low end of their product line, the Fulla 2, and I decided to purchase it. Basically, this is a DAC and headphone amplifier all in one unit, meaning it covers Step 2 and a part of Step 3 as I mentioned previously, and also adds some interesting additional features. I start with the DAC+headphones part. To get it going, you plug the USB cable into a laptop's USB2 or USB3 port and the other end into the Fulla 2's "USB Power and Data Input" port, set up your music player to send output to that device, plug in your headphones, and away you go.
The example uses a Raspberry Pi connected to an evaluation board. A cheap Sigrok-based logic analyzer let him troubleshoot and debug. If you think FPGA development is expensive, think again. The board used here is well under $50 and the software is free. An iCEStick is even cheaper, and would probably work here, too. You are likely to have the other bits, but even if you need to buy a Pi and the logic analyzer, the whole thing is way under $100.
Great news for our photography lovers as the Candy Camera app has finally hit the Tizen Store. I say finally, as this is one of the most requested camera apps for the Tizen platform. It has already been a success on Android and iOS for selfies and now JP Brothers Inc. have made it compatible with Tizen Smartphones. Candy Camera has many great features and below I will describe some highlighted features-
Open Source Software (OSS) is particularly vulnerable to fragmentation because, unlike proprietary software like Apple’s iOS, anyone is free to use and modify the source code without permission (provided they abide by the terms of the OSS license). Without strong centralized governance mechanisms, different implementers can take the code in many different directions to the point where different versions of the software are no longer compatible. If governance mechanisms do not provide incentives for OSS collaborators to maintain compatibility (i.e. stick to standard interface specifications), then software written to run on top of an open source operating system will not work across different versions of the operating system. If Android, like Symbian or UNIX before it, splits into many different non-compatible versions, app developers will be disincentivized from writing Android applications because the time and expense of maintaining multiple different versions of the same app will become cost prohibitive. Remaining developers, facing a fragmented Android platform, may avoid incorporating new Android features present on only a fraction of Android devices. This risk will be magnified if developers start to see the underlying platform as unpredictable going forward and could lead to death spiral, where the platform becomes less useful over time, and begins to shed users, which further disincentives app developers from developing applications for the platform. Given that an operating system without software is relatively useless, a world where many different versions of non-compatible Android is available is not better for competition or consumers.
Sales of Android devices in urban China accounted for 86.4% of all mobile devices sold in the region during the three months ending February 2017, according to Kantar Worldpanel.
The research firm found that sales of Android devices had risen 9.3% year-on-year, up from 77.1% for the same period in 2016. The market share of iOS devices fell sharply to 13.2%, a drop of 8.9% year-on-year.
The Fast Data Project (FD.io) is a networking open source project whose scope includes software-based packet processing, fast Input/Output (IO), and universal data plane management across bare metal, hypervisor, and container environments.
FD.io, which was open-sourced by the Linux Foundation in February 2016, was garnering quite a lot of attention at the recent Open Networking Summit (ONS) 2017 in Santa Clara, California.
Users choose for themselves which instance they want to join and select from a host of privacy and anti-harassment settings. Oh, and the character limit is 500, not 140. In essence, Mastodon is an experiment in whether individually moderated communities can make a social network like Twitter more civil.
A worldwide enthusiastic representative FLOSS as Stormy is, have public encouraged contributors to share experiences about their communities around the world. So I decided to post about it since I usually have the support of two great communities such as GNOME and Fedora to do Linux events in my local community. Following the suggested structure, here are some experiences that I can make you know. Hope you do not mind to check every single link I pointed out to the words throughout this post because it has more posts of the job we do in Lima, Peru.
Drew Conry-Murray, writing in Packet Pushers, looked into the Free Range Router (FRR), a new open source router offering that is looking to challenge Cisco and Juniper. FRR isn't new; it came about as a result of a split within the Quagga open source community. Contributors such as Cumulus Networks, Big Switch and 6WIND, frustrated by the slow pace of Quagga's development, decided to form their own community, offering FRR as an alternative. The open source router, currently in version 2.0, is designed to run on Linux and Unix operating systems and offers support for a variety of routing protocol daemons, including intermediate system to system, Border Gateway Protocol and Open Shortest Path First.
The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration, today announces that the API Strategy & Practice Conference has become a Linux Foundation event and will be jointly produced with the Open API Initiative (OAI), a Linux Foundation project. Linux Foundation events are where the world’s leading technologists meet, collaborate and innovate. APIStrat 2017 will take place October 31 – November 2 in Portland, OR.
ApacheCon North America is only a few weeks away and will be happening May 16-18, 2017, in Miami. It’s particularly exciting this year because ApacheCon is going to be a little different. For one thing, there is a series of mini-conferences running in and around ApacheCon that you will not want to miss.
We spoke with Mark Thomas, Apache Tomcat committer and Senior Principal Software Engineer at Pivotal, about one of these mini-conferences, TomcatCon, to get a feel for what participants can expect from this event. TomcatCon offers a range of presentations to help users expand their Tomcat knowledge in areas such as networking, security, performance, and deployment, and it provides users and developers with the opportunity to discuss the current Tomcat roadmap and help inform future development. Here’s what Mark said about the conference.
MariaDB’s first annual user conference in New York City found MariaDB CEO Michael Howard in a confident mood. I decided to push issues, like whether “the revenge of relational databases” favors the incumbents, and see if I could find any cracks. I didn’t get those, but I got some spicy/illuminating responses. I also learned why MariaDB thinks its “open source mandate” will carry the day.
Christian “Cloph” Lohmaier has been LibreOffice’s release manager for quite a long time. We asked him some questions, to not only get better knowledge about his daily activities, but find out his opinions about The Document Foundation and LibreOffice.
Larry Garfield, a long-time, veteran contributor to Drupal was ejected from the community, allegedly not for breaking the Code of Conduct, but, to quote your own post on the matter, because “he holds views that are in opposition with the values of the Drupal project."
[...]
Our concerns do not make us pro-Larry — we do not endorse his beliefs or his personal life — but we are passionately committed to openness, transparency, due process, fairness, inclusivity, diversity, having personal lives that are none of Drupal’s business, and professionalism in tech; and we are vehemently opposed to discrimination, harassment, intimidation, bullying, doxxing, secret trials, and digging up information on member’s personal lives.
[...]
IT infrastructures at government administrations all over Europe are largely based on proprietary, closed software from Microsoft. With digital systems constantly growing in size as well as importance, countries are becoming increasingly dependent on this single American corporation. Investigate Europe, an international group of journalists, has investigated the current situation and the consequences of this vendor lock-in. The results, they say, are alarming.
The Helsinki metropolitan transportation authority, Helsinki Region Transport HSL, has released a new version of its Journey Planner. The service is exceptional among similar trip planners worldwide in that it is based on open-source code. Thus the ongoing development of the Journey Planner can be a collaborative activity joined by developers, the general public, and other cities' transportation authorities. Among others, New York's Metropolitan Transportation Authority MTA is testing the source code.
We've just written about widespread frustration at the slow pace of the shift to open access publishing of academic papers, and about how some major funding organizations are trying to address that. Open access aims to make entire publications publicly available, and that is meeting considerable resistance from traditional publishers who derive their healthy profits from charging for subscriptions. Rather than continue to tackle publishers head-on, an interesting new project seeks instead to liberate only a particular part of each article, albeit an important one. The new Initiative for Open Citations (I4OC) seeks to promote the unrestricted availability of the list of citations that form a key part of most academic articles...
When Ultimaker, a manufacturer of open-source 3D printers headquartered in Amsterdam with an office in Boston, announced recently the global availability of the next generation of its 3D-printing product line, it promised professionals unprecedented freedom of design. Open-source 3D printing has become popular, particularly in the desktop printing market, according to John Kawola, U.S. President of Ultimaker.
Facebook developers have put out their latest release of HHVM to empower this PHP interpreter as well as what powers their Hack programming language.
HHVM 3.19 is the new release this week and it ships with some interesting experimental features. First up, there is a "Retranslate All" feature to re-translate all profiled code into optimized translations after it hits a specified number of requests. This re-translate all can be used for getting better performance, quicker warmups, and more. This experimental feature will likely go on by default in HHVM 3.20.
While Intel's Beignet is a terrific project especially when it comes to being a leading open-source OpenCL implementation that works with OpenCL 2.0 on GPUs (something that can't be said for Radeon with its open-source OpenCL stack consistently lacking and Nouveau not really being usable either), the sad part of it is that Beignet is consistently slow in supporting new versions of LLVM.
Though salaries overall remained flat, most tech pros (61 percent) reported receiving a salary increase in 2016 and 9 percent reported a decrease, according to the survey. Increased compensation is the most common motivator employers provided to tech pros in 2016 (18 percent), followed by flexible work location and ability to telecommute (14 percent) and more interesting and challenging assignments (12 percent), according to the survey.
Gathering operational data about a system is common practice, particularly metrics that indicate system load and performance such as CPU and memory usage. This data has been used for years to help teams who support a system learn when an outage is happening or imminent. When things become slow, a code profiler might be enabled in order to determine which part of the system is causing a bottleneck, for example a slow-running database query.
I’ve observed a recent trend that combines the meticulousness of this traditional operational monitoring with a much broader view of the quality of a system. While operational data is an essential part of supporting a system, it is also valuable to gather data that helps provide a picture of whether the system as a whole is behaving as expected. I define “QA in production” as an approach where teams pay closer attention to the behaviour of their production systems in order to improve the overall quality of the function these systems serve.
For many programmers, the attractions of working from home are obvious. I’m one of them—I wrote the code for this analysis—and I know all too well the intense concentration required to engineer good solutions to complex problems, as well as the productivity-wrecking frustration of being interrupted mid-flow. Working from home, assuming one can maintain a certain discipline, offers a tranquility seldom found in an office.
LLVM contributor Mikhail Zolotukhin has issued a report about the continued evolution of LLVM and its impact on the compiler's performance.
He's found that in the past few months LLVM is getting faster, which is a good sign as the months prior to that LLVM was getting slower.
The promised update block is now in effect.
By adding an extra, in-person step to the process of obtaining a vaccination waiver (which allowed a child to forego the necessary vaccinations), Michigan quickly and significantly boosted its vaccination rate, as Kaiser Health News reports.
Although no ancient civilization probably ever pulled off the logistical feat of intentionally salting a conquered people’s lands, our modern ones may be doing it unintentionally. Those friendly snowplows (and your sidewalk-shoveling neighbors) are spreading an astounding volume of salt, and it has to go somewhere once it melts.
Tobacco companies, and people complicit in their business, are responsible for the deaths of six million people a year, equivalent to the number of Jewish people killed in the Holocaust. Per year. You'd think that they'd be on the decline, what with everyone knowing how dangerous their products are. You'd be wrong. Tobacco companies have developed insidious tactics to stay relevant.
“If Flint could pay that rate, their annual household cost would be less than 75 cents per year,” said Peggy Case, president of the Michigan Citizens for Water Conservation, which opposes Nestle’s bid.
Global health matters are entering into the Group of Twenty (G20) agenda under the German presidency of the group, which started in December 2016. The first-ever G20 Health Ministers’ meeting is scheduled to take place in May, before the regular G20 meeting in July. This week, a professor from the Graduate Institute of Geneva explained how health has become part of the G20 agenda.
[...]
Answering a question about the best outcome for health of the G20, Kickbusch said on a declaration level it would be a strong commitment for the SDGs and universal coverage. On a practical level, she added, it would be desirable that the action plan that might emerge actually commits to financing the establishment of IHR capacities in developing countries.
There are so many issues related to legalization of marijuana in Canada, I scarcely know where to start. I’ve never used the stuff and I especially hate smoking anything. It’s just stupid and unhealthy to take into lungs random chemical products subjected to high temperatures.
Nevertheless Canadians like most other humans to some extent enjoy or value marijuana either for “recreation” or medical benefits. Perhaps the best place to look for reason in all this is to consider why marijuana was made illegal in the first place. After all, alcohol and tobacco are almost certainly more harmful but legal.
[...]
Eventually, farmers could benefit from marijuana as they used to. As a child I used a rope made of hemp in a swing in the maple trees in my yard. Hemp is a valuable fibre from the plant. I’m sure farmers could produce marijuana in quantity if not quality compared to the greenhouse operations I’ve seen on the news. I’d sure prefer Canadian farmers grew and profited from marijuana rather than tobacco especially if non-smoked products were manufactured. I see nothing wrong with people having some pleasure from their meals rather than sucking tar into their lungs.
In a few months, publicly trusted certificate authorities will have to start honoring a special Domain Name System (DNS) record that allows domain owners to specify who is allowed to issue SSL certificates for their domains.
The Certification Authority Authorization (CAA) DNS record became a standard in 2013 but didn't have much of a real-world impact because certificate authorities (CAs) were under no obligation to conform to them.
The record allows a domain owner to list the CAs that are allowed to issue SSL/TLS certificates for that domain. The reason for this is to limit cases of unauthorized certificate issuance, which can be accidental or intentional, if a CA is compromised or has a rogue employee.
The programming blunder – CVE-2016-10229 – exposes machines and gizmos to attacks via UDP network traffic: any software receiving data using the system call recv() with the MSG_PEEK flag set on a vulnerable kernel opens up the box to potential hijacking. The hacker would have to craft packets to trigger a second checksum operation on the incoming information, which can lead to the execution of malicious code within the kernel, effectively as root, we're warned.
An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops.
The flaw was discovered by researchers from security consultancy DefenseCode and is located in a feature that retrieves preview images for videos hosted on Vimeo. Such videos can be added to product listings in Magento.
The DefenseCode researchers determined that if the image URL points to a different file, for example a PHP script, Magento will download the file in order to validate it. If the file is not an image, the platform will return a "Disallowed file type" error, but won't actually remove it from the server.
A new trove of alleged surveillance tools and exploits from the National Security Agency's elite hacking team have been released by the Shadow Brokers' hacking group.
The group Friday appeared to release tools designed to target Windows PCs and servers, along with presentations and files purporting to detail the agency's methods of carrying out clandestine surveillance.
More than 1.5 million people have fled the East African nation, creating Africa's largest refugee crisis.
Australia is sleep-walking into a confrontation with China. Wars can happen suddenly in an atmosphere of mistrust and provocation, especially if a minor power, like Australia, abandons its independence for an "alliance" with an unstable superpower.
The United States is at a critical moment. Having exported its all-powerful manufacturing base, run down its industry and reduced millions of its once-hopeful people to poverty, principal American power today is brute force. When Donald Trump launched his missile attack on Syria - following his bombing of a mosque and a school - he was having dinner in Florida with the President of China, Xi Jinping.
For backstory, Congress passed The Government Accountability Act of 1996 that required annual audit on government department budgets. This bill was passed to resolve the previous accounting mistakes made in 1991. Surprisingly, the DoD is still unable to implement the measures over 20 years later. Looking at the Federal Discretionary Spending of the Fiscal Year (FY) 2015, the DOD was allocated $600 billion of the $1.1 trillion budget. The rest of the budget was split between $70 billion for education, $63 billion for housing and community development, $66 billion for Medicare and Health care, $65 billion for Veterans, $39 million for energy, $26 billion for transportation, and finally $41 billion for International affairs. With the exception of DoD, all the other departments have reported their budgets since the bill was passed.
The Washington Post suggests that people in Seattle and San Francisco “should be worried” about being hit by a ballistic missile from North Korea, citing an analyst who described such an event, a bit cryptically, as “a looming threat but not a current threat.”
If the concern is that the saber-rattling between Kim Jong-Un and Donald Trump could indeed have dire consequences, it’s hard to see how such stories help, or maps that show ranges for North Korea’s missiles far greater than any actually tested missiles have gone, or the conflation of nuclear and non-nuclear weaponry. But we’re equally ill-served by a failure to interrogate US policy on the Korean peninsula, and corporate media’s reduction of North Korea to caricature in the time-honored method reserved for official enemies.
Fulfilling Donald Trump’s campaign promise to “bomb the shit” out of ISIS, the Pentagon dropped the “mother of all bombs” — one of its largest non-nuclear munitions — for the first time on Thursday, in Afghanistan. The 21,600 pound weapon was developed over a decade ago, but was never used due to concerns of possible massive civilian casualties.
The Pentagon said it used the weapon on an ISIS-affiliated group hiding in a tunnel complex in the Nangarhar province. The group, according to the Pentagon, is made up of former members of the Taliban.
The Massive Ordnance Air Blast Bomb (MOAB), nicknamed the “mother of all bombs,” has a mile-long blast radius.
[...]
“We were going after a target, I would say, in a similar manner,” said Garlasco. “But the concern there was that once the weapon was put forward as an option, we reviewed it, did a collateral damage estimate, and well let’s just say the collateral damage was impressive. It was decided that the civilian harm greatly outweighed the military gain.”
Garlasco said the strike would have been in a “high-collateral region.” And he said that to his knowledge that was the only time the use of the MOAB was ever suggested.
The word “encouraged” is doing a lot of work here. The CIA, along with Saudi Arabia, assisted and funded the mujahideen and other foreign fighters to fight the Soviets and Soviet-aligned Afghans throughout the 1980s, resulting in a prolonged, brutal war, and spawning thousands of radical jihadists for years to come. That Friedman would use this as an example of how the US should wage war in Syria—and presumably drag the war on and spawn similar extremism—would be considered absurd on its face if it weren’t coming from a Very Serious Person at the New York Times.
[...]
“Everyone”? Everyone is bad, Friedman’s pseudo–tough guy argument goes, so let’s be just as bad by explicitly using ISIS in a weapon against Iran, Russia and Hezbollah.
[...]
In a political climate where Americans are being arrested for merely sending out pro-ISIS tweets, and dozens are swept up in dubious FBI entrapment plots, it’s notable that one of the most influential columnists in the United States can call for arming the designated terrorist organization so long as he frames it as “just asking questions” and does so to the end of killing Evil Iranians. (Friedman is not the only establishment figure to suggest that the US goal in Syria should be to prolong the bloodbath indefinitely—but usually this ghoulish argument isn’t offered so blatantly.)
[...]
Perhaps, one can imagine, they would be less so if Western columnists weren’t casually cheerleading for using the extremist group as a bludgeon against America’s enemies.
President Trump’s hasty decision to attack Syria may have lightened political pressure at home but Russia’s retaliation – suspending a key “deconfliction agreement” – left Secretary of State Tillerson as supplicant at the Kremlin, reports Gilbert Doctorow.
Now that President Trump is bashing Russia, not resetting relations, the mainstream U.S. media has gone from pushing “Russia-gate” conspiracies to decrying doubts about U.S. government anti-Russia claims, notes Nat Parry.
CIA Director Mike Pompeo called Julian Assange and his associates “demons” and accused WikiLeaks of siding with the world’s dictators and endangering the security of the “free world” with the help of states like Russia.
Speaking at an event organized by the Center for Strategic and International Studies (CSIS) in Washington, DC on Thursday, the former Kansas congressman went on the warpath against the whistleblower website, accusing its editor Julian Assange of being on the “wrong side of history” and seeking to harm America, freedom and democracy.
“It’s time to call out WikiLeaks for what it really is, a non-state hostile intelligence service, often abetted by state actors like Russia,” Pompeo told the audience.
In February, after Donald Trump tweeted that the U.S. media were the “enemy of the people,” the targets of his insult exploded with indignation, devoting wall-to-wall media coverage to what they depicted as a grave assault on press freedoms more befitting of a tyranny. By stark and disturbing contrast, the media reaction yesterday was far more muted, even welcoming, when Trump’s CIA Director, Michael Pompeo, actually and explicitly vowed to target freedoms of speech and press in a blistering, threatening speech he delivered to the D.C. think tank Center for Strategic and International Studies.
What made Pompeo’s overt threats of repression so palatable to many was that they were not directed at CNN, the New York Times or other beloved-in-D.C. outlets, but rather at WikiLeaks, more marginalized publishers of information, and various leakers and whistleblowers, including Chelsea Manning and Edward Snowden.
Humans must reduce net greenhouse gases emissions to zero “well before 2040” in order to ensure global warming does not go above 1.5 degrees Celsius by the end of the century, scientists have warned after carrying out a study using a sophisticated new computer model.
Although these are heady days for pavement-pounding urbanists, a record 2.6% of American employees now go to their jobs without ever leaving their houses.
I’ve received many, many recollections of indignities large and small suffered by United passengers. The unifying thread to all of them is a seeming disregard on the airline’s part to how its customers are treated and whether the passengers would ever use the carrier again.
In a world where the airlines record-smashing profits comes from a small number of increasingly luxurious first-class seats, the entire focus of the industry is on figuring out how to convince just a few marginal customers to spend more for one of those profit-centers instead of deadheading in coach.
[..]
The airlines can't control how badly you want to get somewhere, but they have total control over how awful getting there can be.
It is modern feudalism, happening in a slow motion crash as we watch, aware of what is coming down, but at first unwilling and likely now unable to stop it.
Welcome to the Third World
The Washington Post editorial page is, of course, famous for absurdly claiming, in an editorial defending NAFTA, that Mexico’s GDP had quadrupled between 1987 and 2007. (According to the IMF, Mexico’s GDP increased by 83 percent over this period.) Incredibly, the paper still has not corrected this egregious error in its online version.
This is why it is difficult to share the concern of Fred Hiatt, the editorial page editor, that we will see increasingly dishonest public debates (Washington Post, 4/9/17). Hiatt and his team at the editorial page have no qualms at all about making up nonsense when pushing their positions. While I’m a big fan of facts and data in public debate, the Post‘s editorial page editor is about the last person in the world who should be complaining about dishonest arguments.
[...]
Okay, so yesterday we had too few workers and today we have too many because of automation. These arguments are complete opposites. The one unifying theme is that the Post is worried that we are being too generous to the poor and middle class.
It appears that its aim was to create a commercial that would tap into the target demographic’s concerns for intrusive advertising and invasion of their privacy. In turn, this would grab the attention of digital and traditional media who would write about those issues at length and generate tens of millions of dollars of free media and bucket loads of engagement. In that vein, Burger King’s campaign is a stunning success. It even managed to get around Google’s hasty block from letting the ad trigger Google Homes by releasing an alternate version during the prime-time slot it bought.
More than a third of teachers say their students have cited false information found online, according to a poll by the NASUWT teaching union.
[...]
Others expressed frustration over students refusing to believe news they had seen on Facebook and other social sites was not true, even when the problem was explained to them.
That seems to be what’s happening with our media, especially outlets like the New York Times, who are stuck in a loop of denial some six months after the election. Each day it seems they find fellow party members something Trump to direct their hate at.
As I pointed out back in July of 2015, U.S. Senator Bernie Senator (“I”-VT) is not the independent left politician many progressives claim he is. He’s a Democratic Party company man.
That was been clear from his long Congressional record of voting with the neoliberal, dollar-drenched Democrats and accepting their seniority-based committee assignments. It was clear when he came out to Iowa City in December of 2014 to give a speech so focused on the terrible Republicans that a professor had to remind him that corporate and imperial Democrats are a problem too. It was clear when he decided to the run for the U.S. presidency as a Democrat and promised to back the Democrats’ eventual nominee (Hillary Clinton).
The email encourages faculty members to make no distinction between words and physical violence. The professors discuss a ‘disturbing… pattern of harm’ in the speakers thus far invited. They describe how students have been left ‘in distress’ at having to listen to such ‘painful’ ideas. These talks have caused ‘damage’, and any who have had the courage to rebut the speakers’ arguments have experienced ‘injury’ as a result. If students really are as delicate as this assessment implies, it’s a good job the US government hasn’t reinstated conscription.
China's internet censors have consistently blocked content related to a nationwide police operation targeting rights lawyers since it was launched in on July 9, 2015 (709), a Canada-based investigation has revealed.
Researchers at CitizenLab at the Munk School of Global Affairs, University of Toronto found "detailed evidence" that tweets and photos posted to to the popular smartphone chat app WeChat and the Twitter-like platform Sina Weibo were censored with "forbidden" keywords.
Technology and social media advances empower the public in China, but they also empower the censors.
“The art of censorship is becoming more and more sophisticated,” explained Fang Wang, senior duty editor and head of video content at FTChinese.com, speaking at the International Journalism Festival in Italy last week (5 April).
“The mouse and cat game is still ongoing and social media plays a key role in it.”
Wang joined the FT Chinese team about seven years ago. At the festival, she gave insights into how the advancement of technology since then has been used by the Chinese government to control the information accessible in the country.
The three people concerned are only able to voice their criticisms of the monarchy and government because they live outside the country -- it would obviously be far too risky to do the same inside it. So this latest move is effectively an attempt to forbid Thai citizens from accessing "forbidden" material that lies beyond the Thai government's direct control, and which has proved impossible to block using technical means. It will doubtless be just as futile.
The state considers every citizen rational enough to make serious, life-affecting decisions like who to vote for (at 18), who to marry (at 21), what career to choose, investments to make etc. but, cross the threshold and enter a cinema theatre and the citizen turns into a bumbling idiot, unable to discern what to watch or not, to be lent a helping hand by the Pahlaj Nihalani-fied Central Board of Film Certification (CBFC).
Global Voices Advocacy's Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights around the world.
Protesters in Venezuela have been mobilizing almost daily and in large numbers since the Supreme Court of Justice temporarily nullified the National Assembly on March 30, a move that many described as a “self-inflicted” coup. The change sparked international outrage.
Although the court reversed course days later and reinstated the National Assembly, public unrest has continued, forcing public officials to confront the economic and political crisis that has been ongoing since 2014. Alongside political turmoil and rising rates of violent crime, the global drop in the price of oil, the country’s main export, has left Venezuela with staggering inflation rates for more than three years. Inflation has not fallen below 50 percent since 2014. It exceeded 100 percent in 2015, and reached 800 percent at the end of 2016. President Nicolas Maduro has repeatedly blamed the United States for the downturn in the oil market.
This spring, the Open Campus Initiative was formed to explore the limits of free speech on Harvard's campus by inviting controversial speakers across the ideological spectrum, starting with Jordan B. Peterson. In response to Peterson’s statements on gender nonconformity and reports of harassment from his previous lectures, many students took issue with his invitation, echoing the backlash to Harvard Financial Analyst Club's invitation of Martin Shkreli this February. Although we have qualms with the mission statement of OCI and disagree with Peterson’s statements, we nonetheless recognize OCI’s potential value and the difference in the two groups’ purposes and processes.
The sign is meant to present Harvard as a welcoming place: a home to students from all different identities. The inspiring message pulls on the heartstrings of students passing through Harvard Yard as they walk to class. You almost believe it. You almost believe that a school which promotes such a message would never allow anything to make a student here feel otherwise.
The creation of the Open Campus Initiative has shown us where Harvard students’ values lie. It recently formed with the intention of bringing controversial speakers to Harvard as a way to promote free speech. By inviting these speakers, students are meant to engage in dialogue with people who have opposing viewpoints as a way to understand their opinions and bridge the partisan gaps between polarized groups in order to foster greater community. However, by allowing odious speakers on campus, Harvard is not promoting freedom of speech; it’s promoting hate speech.
The new organization brought controversial professor Jordan Peterson to campus Monday, despite backlash from other student groups.
On Monday evening, new student organization the Harvard College Open Campus Initiative hosted its first event on campus. They hosted Dr. Jordan Peterson, a professor at the University of Toronto who has recently come under fire for a video series decrying political correctness, in an event titled “Mask of Compassion: Postmodernism & Neomarxism in Modern Times.”
The group, which consists of a small number of students who have come together to promote free speech on campus by bringing controversial speakers, is itself nonpartisan but has scheduled more conservative speakers so far, as it believes that these are the perspectives which are not adequately represented on campus.
In an unusual broadcasting flub this week, Iran's official state media network cut off the live video feed of a reporter in mid-sentence when she mentioned the name of presidential hopeful Hamid Baghaei, one of the more controversial politicians who has filed to run for president next month.
Baghaei served as vice president to former president Mahmoud Ahmadinejad. Both represent a frequently contested hardline political position, and both men now have registered to run for president in Iran's May 2017 elections.
Recent Decision Would Allow Foreign Governments to Wiretap Americans on U.S. Soil
Washington, D.C. – The Electronic Frontier Foundation (EFF) urged an appeals court today to review a dangerous decision by a three-judge panel that would allow foreign governments to spy on Americans on U.S. soil—just as long as they use technology instead of human agents.
In Kidane v. Ethiopia, an American living in Maryland had his family computer infiltrated by the Ethiopian government. Agents sent an infected email that made its way to Mr. Kidane, and the attached Microsoft Word document carried a malicious computer program called FinSpy that’s sold only to governments. The spyware took control of the machine, making copies of every keystroke and Skype call, and sending them back to Ethiopia as part of its crackdown on critics.
A new set of documents purportedly lifted from the U.S. National Security Agency suggests that American spies have burrowed deep into the Middle East's financial network, apparently compromising the Dubai office of the anti-money laundering and financial services firm EastNets. The company said Friday that the documents were dated and denied that any customer data had been affected.
TheShadowBrokers, which startled the security experts last year by releasing some of the NSA's hacking tools, has recently resumed pouring secrets into the public domain. In a first for TheShadowBrokers, the data includes PowerPoint slides and purported target lists, suggesting that the group has access to a broader range of data than previously known.
I’m soon going to be moving to Charter Communications territory, but I don’t trust Charter and don’t want it to keep records of all the websites that I visit. The natural solution is to use a VPN, and the natural first choice is Private Internet Access, since it’s a huge financial supporter of GNOME, and I haven’t heard anybody complain about problems with using it. This will be a short review of my experience.
Instead, viewers will be forced to watch the on-demand episode and all of the ads, even though consumers thought they saved the show on their DVR.
The story of Dina Ali Lasloom is the story of a struggle that feels as insurmountable as it does desperately urgent. This is a story of religious theocracy meeting royal patriarchy. It is the story of Saudi womanhood, denied.
Twenty-four-year-old Dina left Saudi Arabia full of hope. Most 24-year-old women the world over dream of the usual things young women do at that age: how to live the full, independent, and exciting life that lies ahead of them. But Dina just wanted to be. Have you ever felt utter, total, and overwhelming helplessness? For Saudi women, such a feeling is a matter of law. They feel it every day. In Saudi Arabia, they are the permanent legal wards of the men in their lives. Powerlessness is a state of being for Saudi women, who lack the lawful agency to study, marry, divorce, work, or travel without formal permission from their father, brother, husband, or son. It is enforced by the system. And the system is a total and absolute religious monarchy.
The AFB also called upon the Trump administration to cut off US military help to Pakistan. "How long will USA continue to serve these jackals, who don't care two hoots about the lives of freedom loving American and Baloch people? Or for that matter Afghan and Indian lives--, but only care about the greenbacks."
Two young Algerians, a girl and a boy, recently lived through a nightmare. Following a simple kiss and a hand on the shoulder, the couple found themselves under arrest.
Last year the House of Commons passed a resolution stating that "Christians, Yazidis and other ethnic and religious minorities in Iraq and Syria are suffering genocide", though this stance has not been adopted by the British Government.
In several Western European countries, some politicians want to force imams to deliver sermons only in the official language: In Germany, imams should preach in German; it Italy, in Italian; in Britain, in English; in France, in French.
To justify this requirement, two rationales are cited. Some say it will function as a counterterrorism strategy. Others say it will promote the social integration of Muslims. A few appeal to both lines of reasoning.
Social media has irrevocably changed the nature of friendship, in that we now split our time between virtual relationships and real ones. Now a big new study adds to the growing body of research on the fallout of our socializing online: The more we use Facebook, the less happy we feel.
From the moment we awake, the first thing we’re tempted to do is “tap on that little blue icon,” Holly B. Shakya, who studies public health at the University of San Diego and led the new study, told the Harvard Business Review. “What impact does it have on you?”
To this end, Kissinger suggested to Rumsfeld that the White House not issue a statement at all. In Kissinger’s view, a formal statement would have lent credence to the article’s accusations and create the impression that the Ford Administration faced “a scandal of major proportions.” Kissinger wanted to make it clear that any abuses “anti-dated the current Administration” and wouldn’t be continuing under President Ford. The problems which were coming to light were categorically the fault of someone no longer in power, and thus the current Administration should be blameless. This strategy would be brought up again in the ensuing fallout.
A Dutch and Spanish couple who have lived in Britain all their adult lives have told of their “devastation” after the Home Office refused their post-referendum application to have their two London-born children recognised as permanent residents of the country.
Jan-Dinant Schreuder and Monica Obiols, both 49, found themselves in a “bureaucratic nightmare” when they were told their 15-year-old son and 12-year-old daughter had to provide more evidence that they lived permanently with their parents.
“What evidence are they supposed to have? They don’t have council tax bills or proof of where they live. They are children,” said Obiols. “They have gone to school here all their lives, English is their mother tongue. I was just so shocked when we got the refusal letters.”
Taser -- manufacturer of law enforcement's favorite electronic battle weapon and the "I'm not a doctor but I play one in courtroom proceedings" creator of arrestee-specific medical condition "excited delirium" -- is branching out and (sort of) rebranding.
It's not like Taser doesn't have the less-lethal market sewn up. Its titular device is in the latter stages of genericide -- a catch-all term for any sort of stun gun. It's been busy building a new market: law enforcement body cameras. Under the name Axon, Taser has introduced a number of body-worn cameras, some of them with more advanced feature sets that tie their activation to weapon deployment by officers.
Now, Axon is hoping to increase its dominance of the body camera market. Its latest move is to offer free cameras and footage storage to any law enforcement agency that requests it. The pay-nothing-now offer lasts for a year. Once the offer expires, agencies are free to look elsewhere for cameras.
Unlike most of my peers, my favorite time of day as a child was bedtime. Well, at least it was when my maternal grandmother — who visited my family every other year from the time I was born to the time I left for college — was in town. >From the minute she arrived at the airport, I would latch onto her like a tiny barnacle, pestering her with questions from sunup until she finally fell asleep at night, no doubt exhausted by a five-year-old girl with a seemingly unquenchable curiosity about everything.
There was one question to which, however, she never said no. “Ajji?” I’d ask her, my voice high and ever so slightly petulant as she brushed my hair and got me in my pajamas, “Can you tell me a story?”
And she always did. Her repository of stories was seemingly endless, and she had a natural talent for making these tales accessible to a kindergartener without glossing over any moral nuances or situational complexities addressed therein. She drew upon her knowledge of Hindu epics to feed me bite-sized excerpts; exciting tales of kings at battle or goddesses who harnessed their rage to destroy evil.
On the morning of March 14th, 2011, military forces from the Gulf Cooperation Council (GCC) crossed the 16-mile causeway from Saudi Arabia to Bahrain to crush a popular uprising that had arisen there against the Bahraini monarchy. The military intervention was the first salvo in a series of counterrevolutions launched against the Arab Spring uprisings, pitting largely unarmed democracy activists against the repressive force of local security forces and militaries. Six years later, many of the Bahraini civil society leaders whose protests briefly captured the world’s imagination languish in prison, their brief democratic moment snuffed out with the help of regional powers.
Under Barack Obama, the United States stood by quietly while its GCC allies suppressed the Bahraini revolution. Since taking office, the Trump administration has signaled it will strengthen U.S.-Bahrain ties, recently lifting human rights restrictions on arms sales to its government to clear the path for a multi-billion dollar sale of F-16s. Such measures are likely to be taken by the regime as a green-light to escalate repression, while dimming hopes for the release of the estimated 4,000 political prisoners still held in Bahraini prisons, some analysts say.
If you want to understand what's wrong with the American broadband industry, you need look no further than Tennessee. The state is consistently ranked as one of the least connected, least competitive broadband markets in the country, thanks in large part to Comcast and AT&T's stranglehold over politicians like Marsha Blackburn. Lawmakers like Blackburn have let Comcast and AT&T lobbyists quite literally write protectionist state laws for the better part of a decade with an unwavering, singular focus: protecting incumbent revenues from competition and market evolution.
The negative impact of this pay-to-play legislature is non-negotiable. One state-run study last year ranked Tennessee 40th in terms of overall broadband investment and availability (pdf), and found that 13% of households (or 834,545 Tennesseans) lack access to any high-speed broadband internet service whatsoever. The study found that the vast majority of Tennessee residents still get internet access through slower services like DSL, wireless or dial-up connections, either because that's all that's available, or because they couldn't afford faster options.
Like twenty other states, Tennessee long ago passed a state law hamstringing towns and cities looking to improve regional broadband networks. As a result, popular municipal broadband providers like Chattanooga's utility-run ISP, EPB, have been banned from expanding its up to 10 Gbps offerings into any more markets. Attempts to repeal the law earlier this year went nowhere after mammoth pressure from incumbent ISP lobbyists. When that didn't work, one lawmaker tried to pass a compromise bill that would have allowed EPB to expand into just one neighboring county.
So we've been talking a lot about new FCC boss Ajit Pai and his plan to not only kill net neutrality, but eliminate FCC oversight of broadband providers almost entirely. Reports recently surfaced indicating Pai has been busy meeting with large ISPs behind closed doors to discuss his plan to kill hard net neutrality rules and replace them with "voluntary commitments" from ISPs. This won't cause any problems, Pai and ISP lobbyists have argued in perfect unison, because the FTC will rush in to protect broadband consumers -- and net neutrality -- in the wake of the FCC's dismantling.
So if you've not been paying attention, broadband ISPs (with help from new FCC boss Ajit Pai) are slowly but surely working to eliminate oversight of one of the least-competitive sectors in American industry. It began with Pai killing off a number of FCC efforts piecemeal, including plans to beef up cable box competition, investigate zero rating, and FCC attempts to stop prison telco monopolies from ripping off inmate families. From there, Congress used the Congressional Review Act to kill FCC privacy protections for broadband consumers. Next up: reversing the FCC's 2015 Title II reclassification and gutting net neutrality.
Between this, cable's growing monopoly over broadband (including the rise in usage caps), the sunsetting of Comcast NBC merger conditions and a looming wave of new megamergers and sector consolidation, you should begin to notice there's a bit of a perfect storm brewing on the horizon when it comes to broadband and media competition, anti-competitive behavior, and oversight -- one that's not going to be particularly enjoyable for broadband consumers, or the numerous companies that compete and/or do business with the likes of AT&T, Comcast and Verizon.
Today Defective by Design granted Tim Berners-Lee the first ever Obedience Award, recognizing his work to help wealthy corporations add DRM (Digital Restrictions Management) to official Web standards. Inspired by the MIT Media Lab Disobedience Award, the Obedience Award highlights activity upholding the status quo despite an overwhelming ethical case against it. Today is the first opportunity for the addition of DRM to become final as per the formal process for setting Web standards.
As the director of the W3C (World Wide Web Consortium) Berners-Lee previously fought to advance Web users' rights, supporting net neutrality, privacy and universal access. Born in the UK, he was knighted by H.M. Queen Elizabeth in 2004 and awarded the Order of Merit in 2007. Most recently, he received the Association for Computing Machinery's A.M. Turing Prize.
Though he was previously critical of DRM, Berners-Lee decided not to take a stand against Netflix, Microsoft, Google, and Apple when they began developing a Web standard for streaming video DRM, instead encouraging them to do so within the W3C. These wealthy companies supply copious membership dues to the W3C.
The World Wide Web today stands at a crossroads, as its standards body, the World Wide Web Consortium (W3C), considers the demand of big content providers to provide them with the facility to be able to control user devices for ensuring that their content is not copied. This facility is called the Encrypted Media Extension (EME), which enables these companies to put digital rights management (DRM) into the user’s browser, whether the user wants it or not, and whether such restrictions are as per the user’s local national laws or not.
The World Wide Web Consortium (W3C) is considering to standardize a highly controversial proposal on Encrypted Media Extensions for the use of DRM technology (copyright restrictions) in modern web browsers.
Together with my colleague Lucy Anderson, I wrote the following letter to Vice-President Andrus Ansip and Commissioners Elà ¼bieta Bieà âkowska and Margrethe Vestager with a set of questions concerning the European Commission’s position and involvement into this work...
German Member of the European Parliament Julia Reda (previously) has published an open-letter signed by UK MEP Lucy Anderson, raising alarm at the fact that the W3C is on the brink of finalising a DRM standard for web video, which -- thanks to crazy laws protecting DRM -- will leave users at risk of unreported security vulnerabilities, and also prevent third parties from adapting browsers for the needs of disabled people, archivists, and the wider public.
The fashion designer has registered "Harper Beckham" with intellectual property {sic} authorities in Britain and Europe.
By now everyone should know that the IOC and USOC have completely perverted the concept of trademark law surrounding any mentioning of the Olympic Games. It's gotten so bad that the USOC has taken to threatening businesses that tweet out congratulatory messages to athletes, even when those businesses supported those athletes getting to the Olympics in the first place. The USOC seems to be under the impression that tweeting about the Olympics as a business is trademark infringement. It's not. It never was.
I will occasionally get a common question when discussing stories about trademark bullies: why do these bullies actually do this? The easy answer is, of course, because it works. And it works on many levels. For example, the primary targets in actual lawsuits can be bullied out of using names and terms for their businesses or brands, so it works on that level. But that's really just the tip of the iceberg. Where being a trademark bully really works is when it makes lawsuits unnecessary, because other businesses and people are so fearful of the bully tactic.
To see that in practice, one need only look at the brewery formerly named Mooselick Brewing Co., which is now rebranding itself as Granite Roots Brewing without putting up a fight against, you guessed it, Moosehead Breweries.
[...]
The warning shot by Moosehead Breweries was all it needed to fire -- so entrenched is its reputation for trademark bullying and its willingness to engage in costly lawsuits.
Yesterday, we wrote about reports that Arturo Di Modica, the artist behind the famous "Charging Bull" statue near Wall St., was claiming that the new "Fearless Girl" statue that was put up in front of the bull infringed on his copyrights. As we noted in our piece, the only possible claim we could see was a weak moral rights claim, under VARA -- the Visual Artists Rights Act of 1990. However, as we noted in an update to the post (with a helping hand from law professor James Grimmelmann) VARA shouldn't apply. If you read the actual law, it applies to works created after VARA went into effect or to works created before the law went into effect if the title to the artwork has not been transferred from the artist.
But, of course, the history here is that Di Modica dumped the statue in front of the NY Stock Exchange as a surprise in 1989, only to have it moved by the city and given a "temporary permit" in a nearby park that is continually renewed. 1989 is, obviously, prior to the enactment of VARA in 1990. And, Grimmelmann argues, Di Modica "transferred the title by accession when he installed it."