Many VPS providers offer similar plans, with SSD Storage, X amount of RAM, Y Number of Cores, and Z Bandwidth. However, others offer things like “Cloud RAM” Which is RAM borrowed from other machines etc. The primary focus will be on “SSD VPS” Solutions, not “Cloud” based solutions. The reasoning for this, is while it’s awesome that some providers do offer services like that, I don’t find it a true comparison to include technologies that some companies offer, others do not – I wouldn’t compare a Honda Civic to an Offroad Dune Buggy for example, because while both are motorized vehicles, both can get you to the grocery store, and both are ‘cars’ for all intents and purposes, the Dune Buggy was designed for features that the Civic was not.
At the Cloud Foundry Summit in Santa Clara, Calif., the Cloud Foundry Foundation officially rolled out its Cloud Foundry Certified Developer (CFCD) program. Why should you care? Because more than half of the Fortune 500 have turned to Cloud Foundry for their cloud application development.
The container-based Shippable continuous integration platform has been a popular tool for developers and the company behind the DevOps software is now aiming the product squarely at the enterprise as well.
The newly released Shippable Server offers the same features as the existing software but with additional security and software features.
Jerome Glisse at Red Hat continues working on Heterogeneous Memory Management for the mainline Linux kernel and hopefully will be merged soon. He's now extended HMM with cache-coherent device memory support.
Heterogeneous Memory Management is focused on allowing a process address space to be mirrored and allowing system memory to be transparently used by any device process. HMM for Linux has been sought after by NVIDIA and other companies as there are big implications for OpenCL, Vulkan, and related areas.
AMD -- AMD has just released a new AMDGPU-PRO 17.10 driver. While another 17.10 series driver release for this hybrid stack may not seem exciting without a large version bump, there are some noteworthy changes to this release.
Even though AMD already did an AMDGPU-PRO Driver 17.10 release, they've done another one with the same name. Confusing as ever, but this newer driver has some useful fixes.
Curious about the Corsair NVMe SSD performance with not having reviewed a Corsair SSD in quite some time, I decided to run some benchmarks on this MP400 240GB model compared to some other SSDs I had available for testing this week: Samsung 950 PRO 256GB NVMe, Crucial MX500 525GB SATA 3.0 SSD, and an Intel Optane 16GB M.2 SSD acting as a standalone driver. This is to give some rough idea for the performance expectations of the Force MP500 under Linux.
We all edit videos sometime in our life. It can be your Granny’s video or Mom’s special recipe video or your artist awesome line that you need to upload to youtube. On Linux, we have an awesome video editor which is fairly easy to use and is very much powerful. The editor I am talking about is Avidemux.
Chuck Lever has announced that the fedfs-utils project, which created utilities for the Federated Filesystem, will no longer be developed.
Upstream fedfs-utils has not been under active development for two years or more, and there is a scant user base. I'd like to propose making 0.10 the final major release of fedfs-utils.
Looking for more features than what the default Gnome terminal provides? Let me introduce you to Tilix, a GTK3 tiling terminal emulator for Linux. If you haven’t heard of Tilix, you may recognize it by its old name, Terminix (there was a name change due to trademark infringement). But whatever we call it, this terminal emulator has some great features that even the casual user will find useful.
I have a peeve. OK, more than one. But for this article just one, and that is using "IP" as a shortcut for "IP address". They are not the same. IP = Internet Protocol. You're not managing Internet Protocols, you're managing Internet Protocol addresses. If you're creating, managing, and deleting Internet Protocols, then you are an uber guru doing something entirely different.
Looks like game porter Ethan Lee is a busy bee, as he teased out some shots of Wonder Boy: The Dragon's Trap [Steam, Official Site] running on Linux.
Bad news RPG fans, as Topware has delayed the Linux release of Two Worlds II as they are having 'huge problems' with it.
Jelly in the sky [Steam] is an amusing looking physics powered 2d artillery game and the developer is looking to bring it to Linux.
Steam Direct, the self-publishing option to get games on Steam has launched. Valve have also said they gave the greenlight to many of the 3,400 games that were still left in Greenlight when it closed.
Developers will pay a recoupable $100 fee to get their game onto Steam, that's $100 per-game, not $100 to register with Valve. Once they earn $1,000 with the title, they can claim it back.
The Last Hope - Abandoned is a great scenario. It is designed and executed with baby-smooth balance. There's just enough of everything to keep you engaged and motivated, without being over the top. The focus isn't on a turkey shoot, or you trying to outrun a million zombies. The focus is on cunning and intelligence, and the game excels in delivering the right kind of atmosphere. All the triggers work well, everything is timed perfectly, there are no bugs. The decor is of high quality, including music, narration and ambient events. And there are also a couple of side quests, if you want to explore beyond the strict narrative.
We have released version 2.8.0 of our Qt application introspection tool GammaRay. GammaRay allows you to observe behavior and data structures of Qt code inside your program live at runtime.
As of today, I’m working with Blue Systems on the Calamares Installer Framework. Not a KDE project, but an independent, Qt-based, Free Software project used by Linux distro’s like Manjaro and Netrunner (which in turn ship KDE Plasma Desktop images). As a FreeBSD person, it feels a little weird to be writing Linux installers, but I have a secret hobby project for Calamares, too: adding ZFS install support and maybe even getting it to work as a FreeBSD installer. But that’s hobby, outside of the regular maintainence work I’ll be doing.
The KDE community showcased today on their social media channels a new, alternative application launcher for KDE Plasma 5 desktop environments, Simple Menu.
Simple Menu hit the KDE Store recently, and it would appear to be an intuitive and minimal application launcher widget that can easily replace the default one of your KDE Plasma 5 desktops. It's interface resemblance the look and feel of the fullscreen Application Dashboard, giving users easier access to their favorite apps.
A minor release is out fixing a couple crashes in the titler and Affine transition as well as improving a Windows rendering issue. Note that all focus and energy are still on the timeline refactoring due for 17.08. Soon we will provide an AppImage version for testing, stay tuned.
While it feels just like yesterday when the big Krita 3.0 drawing program update was released with its port to Qt5, Krita 4.0 is already under development.
It’s still early days, and we have to say this up-front: these builds are not ready for daily work. We mean it, you might luck out, but you might also seriously lose work. Please test, and please report issues on bugs.kde.org! (But check whether your issue has already been reported…) That said…
Marble Virtual Globe is an open-source globe that allows users to explore a 3D model of Earth, Mars, Venus, and the Moon, with a wide-variety of maps ranging from political to topographic. This year we will be focusing on its Android version, Marble Maps, and in my case, I am tasked with tidying up the UI, adding features and making sure it's all up to Material Design standards!
Git is a version control system with which you can keep track of changes made to files even as you work with several people on the same directory (or project).
It is probably no news to you that it is primarily used as a version control mechanism for open-source code and is the backbone of the most referenced website in our articles, GitHub.
Prior to the release of Debian 8 in early 2015, the Debian project held a debate over which implementation of init software should be used in future versions of the distribution. Of the contenders (Upstart, SysV and systemd), systemd came out on top, which resulted in Debian using the same init software as most other mainstream Linux distributions. Some people were unhappy with the transition from the previous init implementation (SysV) to the newer systemd software. This discontent gave rise to the Devuan GNU+Linux project, which forked Debian with the purpose of removing dependencies on systemd.
Devuan 1.0.0 is essentially a fork of Debian 8 with SysV as the default init software. The Devuan distribution is offered as either a stand alone distribution or as an upgrade for recent versions of Debian - specifically for Debian 7 Wheezy and Debian 8 Jessie. I decided to try out the migration process from Debian 8 to Devuan and then explore what it was like to run a fresh, new installation of Devuan.
Based on Slackware and Salix, Slackel calls itself a "Hellenic Linux distribution." Befitting its Greek origin, the distribution comes with a number of Greek localization packages pre-installed. In addition, it provides more software pre-installed than the latest Openbox release of Salix and provides newer packages by including software from Slackware's -current development branch.
According to the Slackel website, the distribution is available in three editions (KDE, Openbox, and Fluxbox), but the images for KDE and Fluxbox are older. Only the Openbox image has a new release, so images based on the other desktops currently ship with older packages. For this review, I downloaded the 1.3 GB Slackel 7.0 64-bit Live Openbox image and gave it a test drive.
Mashing traditional LXDE functionality with the added tweaks from Razor-Qt is a big step in a better direction for this lightweight desktop environment. If you want eye-popping visual displays, you will not find them in the LXQt edition. Try out the other desktop options Rosa offers instead.
The Rosa distro's custom software is a big differentiator that sets Rosa apart from other purveyors of Linux.
I think if I will start to talk that Fedora 26 is coming and that there will be DNF-2.x as default packager, I am not providing any new information. But If I will say that DNF made a huge progress not only from point of presence of new features, enhanced stability and over all user experience, probably it would be something to attract people’s attention. The latest releases have provided the spirit with following highlights.
We the Fedora Respins-SIG are happy to announce new F25-20170614 Updated Lives. (with Kernel 4.11.4).
The Debian stretch release is going to happen soon (on 2017-06-17) and since our latest Grml release is based on a very recent version of Debian stretch I’m taking this as opportunity to announce it also here. So by the end of May we released a new stable release of Grml (the Debian based live system focusing on system administrator’s needs), known as version 2017.05 with codename Freedatensuppe.
So appearantly vim in Stretch comes with some new defaults, most notably the mouse is now enabled and there is incremental search, which I find… challenging.
The Debian Project welcomes and encourages participation by everyone.
The days of the boring Ubuntu releases are over.
The release of Ubuntu 17.10 was going to be the final iteration to include the ousted Unity desktop interface. Instead of following the pattern Ubuntu has held since it attempted to bring convergence to the Linux desktop, Canonical is going to jettison its in-house desktop earlier than originally scheduled. That means the next release of Ubuntu will be the first in years to bring about some major change. That change comes by way of the one-two punch of GNOME Shell and Wayland. You read that correctly...where Ubuntu had been pushing hard for Unity 8/Mir, they've scrapped them both and are going with an environment already proven to work well.
A few years ago, Canonical and Dell launched the XPS 13 Developer Edition, which, you guessed it, was aimed at developers. Several years later, Canonical has expanded what it dubs Project Sputnik by adding five new laptops and an All-In-One to the roster of computers, all of which are aimed at developers.
According to an Eclipse Community survey from 2014 and an annual Stackoverflow survey from 2016 Ubuntu was the most popular open source operating system among developers, trailing behind was Debian, Fedora and Linux Mint.
In their latest bi-weekly report, Canonical's Ubuntu Kernel team revealed the fact that they intend to target the Linux 4.13 kernel series for the upcoming Ubuntu 17.10 (Artful Aardvark) operating system.
As modern IT evolves, there have been many milestones along the way. Starting with bare metal servers, followed by virtualization, then cloud computing, and beyond. Each advancement has created both challenges and opportunities for IT professionals. Today the industry is focused on deploying solutions that will improve overall IT operations while reducing overhead. Orchestration and modeling solutions help these organizations to integrate, manage, and deploy flexible solutions faster and with more consistency. Canonical and IBM have partnered to help our mutual customers with advanced virtualisation solutions on the IBM z and LinuxONE platforms.
As you may know, LXD uses unprivileged containers by default. The difference between an unprivileged container and a privileged one is whether the root user in the container is the “real” root user (uid 0 at the kernel level).
The way unprivileged containers are created is by taking a set of normal UIDs and GIDs from the host, usually at least 65536 of each (to be POSIX compliant) and mapping those into the container.
The significant thing with Mir 0.26.3 is that we are making this version available across the latest releases of Ubuntu as well as 17.10 (Artful Ardvark). That is: Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.10 (Yakkety Yak) and, last but not least, Ubuntu 16.04LTS (Xenial Xerus).
With Canonical divesting in Mir from the desktop and abandoning their mobile phone/tablet ambitions, we might not see Mir v1.0 ever reached as was anticipated to happen for the Ubuntu 17.10 cycle. However, Mir is still being maintained for IoT use-cases and today is a new point release.
We've found an Ambiance Telegram theme that helps integrate the popular messaging service's desktop client with the Ubuntu desktop.
This blog is to provide a status update from the Ubuntu Kernel Team. There will also be highlights provided for any interesting subjects the team may be working on. If you would like to reach the kernel team, you can find us at the #ubuntu-kernel channel on FreeNode. Alternatively, you can mail the Ubuntu Kernel Team mailing list at: kernel-team@lists.ubuntu.com
More than a month after Canonical's Simon Fels announced that he's working on bringing Snappy's Snapd daemon to the Debian-based Raspbian operating system for Raspberry Pi SBCs, the developer updated Snapd to version 2.26.4.
Snapd 2.26.4 is the latest stable and most advanced version of the Snappy daemon that allows the installation and manipulation of Snap packages, the universal binary format created by Canonical for its Ubuntu Linux OS and other supported GNU/Linux distributions, and it's available for Raspbian Jessie too.
This is a review for Lubuntu 17.04, the ultra-lightweight and energy-saving desktop OS which is complete and user friendly. It features daily desktop apps including full multimedia support (MP3/WEBM) and provides more than 70000 software packages on official repo, instantly ready to use for desktop PC and laptop users. You can run Lubuntu mainly to revive old computers or to replace any resource-hungry OS. It's amazing to see a full-power desktop OS as lightweight as Lubuntu on 2017! Finally, I hope this review helps you to choose Lubuntu for all your computers.
I want everyone to know how easy to use elementary OS is. This is not what's-new-review, rather, this is an intro to elementary OS Loki 0.4.1 for new users. You'll find elementary OS is a just-work, ready-to-use OS as a free replacement for Windows and Mac OS X. This review introduces you to its AppCenter, calendar, email client, file manager, System Settings, and see how easy daily tasks are done with them. I believe you'll be interested, so I also mentioned how to support elementary development below. Finally, elementary is a very beautiful OS and with just-work features it becomes wonderful. Enjoy it!
The gorgeous elementary OS Loki 0.4.1 has been released few days ago. This is an update to 0.4 version from 2016. Here are the download links (official + torrent) and the checksum. For your information, elementary OS doesn't support 32 bit.
So today, I will attempt to run this Chinese Debian-based distro, and see what it can offer. In the past, it has shown some really nice results, the most notable being a very colorful and unique desktop setup, markedly different from most so-called Western systems, and with a touch of appeal and aesthetic one notch above the rest. Shall we?
Variscite announced a new “DART-6UL-5G” COM model, featuring an on-board WiFi/BT module with dual-band, 2.4GHz/5GHz 802.11ac/a/b/g/n support.
Earlier this year Variscite launched a faster, 696MHz v1.2 upgrade to its 50 x 25mm DART-6UL computer-on-module, which includes the option of NXP’s power-efficient i.MX6 ULL SoC in addition to the i.MX6 UL. Now, the company has upped the ante with a DART-6UL-5G model that boasts an on-board, “certified” wireless module that integrates Bluetooth along with dual-band, 2.4GHz/5GHz 802.11ac/a/b/g/n WiFi.
Raspberry Pi Foundation's Alex Bate is informing the Raspberry Pi community today about the launch of a new audiovisual project called Waves, which makes it possible to print out sound waves with your favorite SBC.
Created by Northwestern University in Illinois students Eunice Lee, Matthew Zhang, and Bomani McClendon, the Waves project is capable of recording people’s spoken responses to personal questions, printing them as sound waveforms on a receipt paper.
Google is helping smartphones better recognize images without requiring massive power consumption, thanks to a new set of models the company released today. Called MobileNets, the pre-trained image recognition models let developers pick between a set of models that vary in size and accuracy to best suit what their application needs.
It's been a half-year since the last release of the Cairo 2D graphics library, but that changed this week with the new Cairo 1.15.6 snapshot.
This year marks the 10th anniversary of OW2, and the organization is celebrating during its annual conference, on June 26-27, in Paris, France. OSI GM Patrick Masson sat down with Cedric Thomas, CEO of OW2 to learn more about the foundation, it’s accomplishments over the past 10 years, and what’s in store for the anniversary celebration.
The Open Source Initiative (OSI) Affiliate Membership Program is an international who’s who of open source projects, advocates, and communities: Creative Commons, Drupal Association, Linux Foundation, Mozilla Foundation, Open Source Matters (the foundation supporting Joomla), Python Software Foundation, Wikimedia Foundation, Wordpress Foundation and many more. Open source enthusiasts outside Europe may not be as familiar with another OSI Affiliate Member, OW2, however its impact on open source development and adoption across the EU has been significant.
As phones get bigger and bigger, putting all the controls at the top of the display—Desktop OS style—becomes less and less ergonomic. Phones like the Galaxy S8 Plus have displays that are about six inches tall, so there is no way most people can reach the top of the display one-handed. It's with this in mind that Google is totally rethinking the Chrome mobile design with a new layout that puts all the controls—even the address bar—at the bottom of the screen.
Mozilla launched Firefox 54 web browser the other day for all supported platforms and dubbed it as "the best Firefox ever." The release was made available for download from the browser's official website for Linux, Mac, and Windows OSes.
The biggest new feature of Firefox 54, the one that makes it "the best Firefox ever," is support for multiple content processes (also known as e10s-multi). In other words, Firefox 54 is the first release of the web browser to use multiple operating system processes for rendering web page content, making it faster and more reliable.
After several FreeNAS Release Candidates, FreeNAS 11.0 was released today. This version brings new virtualization and object storage features to the World’s Most Popular Open Source Storage Operating System. FreeNAS 11.0 adds bhyve virtual machines to its popular SAN/NAS, jails, and plugins, letting you use host web-scale VMs on your FreeNAS box. It also gives users S3-compatible object storage services, which turns your FreeNAS box into an S3-compatible server, letting you avoid reliance on the cloud. Click here to view what’s new with FreeNAS 11.0.
FreeNAS 11.0 is now officially available, the network attached storage (NAS) centered operating system powered by FreeBSD.
FreeNAS 11.0 features Bhyve virtualization support from FreeBSD, new hardware support via the FreeBSD 11-STABLE updates, plugin support, and performance improvements (up to around 20% faster than FreeNAS 9.10).
This time I would like to go a little bit further and extend the server with a network of virtual machines, where each machine can be reached by the name of the subdomain it should represent.
With proprietary software, it's easy for a developer to know where he or she stands. Unless you or the company for which you're working owns the copyright to the code, it's off limits -- end of story. There's usually not even any temptation to use the code, because the source code is usually not available.
Moving into open source opens up a whole new world that can make things a lot easier. Suddenly, you're not constantly having to reinvent the wheel by writing code for processes where there's code already written and waiting at the ready. In some circumstances, you can even use open source code inside a proprietary project.
Since the end of last year Glibc has offered a tunables framework that could be exposed via the --enable-tunables switch at compile-time while now it's being enabled by default.
My project proposal was to create a plugin providing good support for Rust in KDevelop. I intend to deliver on that project, but I do not think at its current state RLS provides good support. That may change in the future and I've shown a proof of concept that KDevelop can interact with a language server. Right now, I think I can do better.
The annual Stack Overflow developer surveys often include lots of bad news. "People still use PHP," for example, is a recurring and distressing theme. "Perl exists" is another.
It was decided that using sql is unreasonable because of the large amount of data. Therefore, the method of storing the Postgresql json data was chosen, which makes it possible to flexibly approach the filling of the database and handle large amounts of data.
Impact mapping is a technique for building shared understanding between leaders and project teams. Delivered in an engaging workshop format, impact mapping is the perfect way to initiate a work stream in a way that encourages innovation. Gojko Adzic first documented the technique in a 2011 brochure; it's an excellent guide for individuals who want to facilitate the workshop. This article aims to complement Adzic's original text with a guide for leaders who want to sponsor impact mapping initiatives but may not facilitate the workshops themselves. In particular, I'll provide a succinct overview of impact mapping as a practice, and then offer guidance on ways leaders can use impact mapping to establish experimentation as an expected behavior during project delivery.
Lewis and his team trained their bots on a database of more than 5000 text conversations between people playing a two-player game in which they had to decide how to divvy up a number of items. These included balls, hats and books and were worth a different number of points to different players. The aim was to score more points than your opponent by making a deal that meant you ended up with the items of highest value to you.
Michigan Attorney General Bill Schuette charged five public officials with involuntary manslaughter on Wednesday in connection to the ongoing Flint water crisis. Those charged include the state’s director of Health and Human Services, Nick Lyon.
However, the state governor backed Mr Lyon, calling him a "strong leader".
Republican governor Rick Snyder has not been charged, despite the alleged involvement of his cabinet in suppressing information. Schuette said his team had attempted to interview the governor, without success.
A federal judge ruled Wednesday that the environmental review for the Dakota Access pipeline was, in part, inadequate and must be reconsidered, handing tribal opponents of the 1,170-mile pipeline project a key legal victory.
But U.S. District Court Judge James Boasberg did not order pipeline operators to stop the oil that is already flowing through the project, saying he would need to consider that request in light of Wednesday's judgement.
CherryBlossom provides a means of monitoring the Internet activity of and performing software exploits on Targets of interest. In particular, CherryBlossom is focused on compromising wireless networking devices, such as wireless routers and access points (APs), to achieve these goals. Such Wi-Fi devices are commonly used as part of the Internet infrastructure in private homes, public spaces (bars, hotels or airports), small and medium sized companies as well as enterprise offices. Therefore these devices are the ideal spot for "Man-In-The-Middle" attacks, as they can easily monitor, control and manipulate the Internet traffic of connected users. By altering the data stream between the user and Internet services, the infected device can inject malicious content into the stream to exploit vulnerabilities in applications or the operating system on the computer of the targeted user.
Microsoft has released new security updates for older versions of Windows as it warns of potential cyber-attacks by government organisations.
Anyone who registered the domain gained a means of pushing malicious apps to the millions of devices that have the app.
The attack began on the same day Microsoft released an extremely rare security update for Windows XP and Windows Vista, warning of WannaCry-style attacks in the future using one of 16 different critical vulnerabilities.
Data security breaches happen daily, in too many places at once to keep count. But what constitutes a huge breach versus a small one? CSO compiled a list of 15 of the biggest or most significant breaches of the 21st century.
This list is based not necessarily on the number of records compromised, but on how much risk or damage the breach caused for companies, insurers and users or account holders. In some cases, passwords and other information were well protected by encryption, so a password reset eliminated the bulk of the risk.
Lamb privately reported the breach to University officials, the report notes. But he learned this March that the critical Drupal vulnerability had been fixed only on the HTTPS version of the site. What's more, the same mother lode of sensitive documents remained as well. The findings meant that the center was operating outside the scope of both the University and the Georgia Secretary of State for years.
Coredumps are a feature of Linux and other Unix systems to analyze crashing software. If a software crashes, for example due to an invalid memory access, the operating system can save the current content of the application's memory to a file. By default it is simply called core.
While this is useful for debugging purposes it can produce a security risk. If a web application crashes the coredump may simply end up in the web server's root folder. Given that its file name is known an attacker can simply download it via an URL of the form http://example.org/core. As coredumps contain an application's memory they may expose secret information. A very typical example would be passwords.
Of these, 42%, or nearly 970,000, provide "guest" access, meaning anyone can access data shared via the SMB file-sharing protocol without needing to provide authentication.
Professional tweeter Donald Trump, with nudges from his retinue of advisers, is once again proving himself a crass amateur when it comes to international diplomacy.
Foreign minister Javad Zarif says Saudis are 'actively engaged' in promoting terror groups
In other words, as drones continue to develop new and potentially exciting capabilities, so terrorists will eagerly embrace them -- just like everyone else.
The federal law that is commonly used to prosecute leakers marks its 100th birthday on June 15,2017.
Signed into law on June 15, 1917, the Espionage Act 18 U.S.C. €§ 792 et seq., was Congress’s response to a fear that public criticism of U.S. participation in World War I would impede the conscript of soldiers to support the war effort and concerns about U.S. citizens undermining the war effort by spying for foreign governments. Although some parts of the law were repealed, many remain in effect 100 years later.
With nearly 40 million people in Britain living in areas with illegal levels of air pollution, and more than 2,000 schools and nurseries close to roads with damaging levels of diesel fumes, today’s first ever National Clean Air Day is a timely and welcome reminder of the scale of the problem of illegal air quality in the UK.
The situation has gone from bad to worse on this Conservative government’s watch, and has escalated into what the Commons’ cross party environment, food and rural affairs committee is now calling a “public health emergency”.
Yet it seems at every stage the government has had to be held over a barrel in order to take action.
Pune-based Persistent Systems recently broke away from traditional practices by including several freelancers and consultants in a team that worked on a short-term project [...]
This corresponds to 6.6% of Finnish economic output, and 5.5% of total employment in Finland. It is calculated that the direct and the indirect effect of every euro invested in Finnish universities produces, on average, 5.26 euros in return. These are lower-bound estimates, and the report says the real impact is likely larger.
The political chaos in the U.K. has set off some fantasizing on the other side of the English Channel: what if Britain suddenly said “nix it” on Brexit, and wanted to stay in the EU?
The German finance minister and veteran statesman, Wolfgang Schäuble, was among the first to give public voice to what is a private, if absurdly far-fetched, hope among many pro-Europeans. “The British government has said we will stay with the Brexit,” Schäuble said in an interview with Bloomberg News. “We take the decision as a matter of respect. But if they wanted to change their decision, of course they would find open doors.”
French President Emmanuel Macron, asked about Schäuble’s remark, said Tuesday: “The door is obviously still open.” Macron’s statement was all the more significant because he was standing next to Prime Minister Theresa May at a joint news conference in Paris. “As long as the decision to organize this exit is not completed, it’s possible to come back on it,” Macron said.
When Thomas Piketty and his team undertook their landmark study of wealth inequality in the world, they had to rely on the self-reported income of the super rich to see just how income was distributed -- by definition, they couldn't directly measure the unreported income hidden in tax havens (though they did estimate it, with what was eventually shown to be pretty good precision).
Large-scale tax-haven breaches -- Mossack-Foseca in Panama, the HSBC files from Switzerland -- have provided researchers with a source of direct data on the scale of tax-evasion, and thus the true estimated wealth of the super-rich.
Theresa May’s new Police and Fire Minister, Nick Hurd, was among the 72 Tory MPs – who are also residential landlords – that voted against a motion to make homes “fit for human habitation.”
Many people have been reposting articles about the debate in Parliament last January in light of today’s tragedy at Grenfell Tower.
Labour submitted an amendment to the Government’s Housing and Planning Bill designed to ensure all rental properties were “fit for human habitation.”
Axios reported that one of the aides, who remained anonymous, said, “We aren’t stupid,” when asked why the Republicans weren't releasing the bill prior to a vote. The statement points to anticipation that the bill will be poorly received by the Democrats and the media.
Why it matters: Democratic senators are already slamming Republicans for the secrecy of their bill writing process, and this isn't going to help. Republicans are sure to release the bill at some point, but it's unclear when — and they want to vote on it in the next three weeks, before the July 4 recess.
The Prime Minister has plunged from a +10 net rating in April to -34 in today’s YouGov polling, which found 29% of people favourable and 63% unfavourable.
Over the same period, the Labour leader has improved from -14 to a neutral rating, with 46% of people viewing him favourably and the same viewing him unfavourably.
Jeremy Corbyn has called for empty “luxury” homes owned by foreign investors to be used to help those left homeless by the Grenfell Tower fire.
The Labour leader said the Government should “requisition” nearby expensive properties to ensure residents were housed locally.
His radical plan came as MPs met for the first time to discuss the blaze that left 17 people dead, with scores missing and many left in a critical condition in hospital.
Speaking during an emergency meeting in the House of Commons with Fire and Policing Minister Nick Hurd, Corbyn said that he was “very angry” that so many people had lost their lives in the blaze in the west London tower block.
Hurd described the Grenfell Tower fire as a “national tragedy” and said a full search was “unlikely to be feasible for some time”.
Both Theresa May and Jeremy Corbyn visited Grenfell Tower this morning, to see the devastation caused by the high-rise fire had caused.
Police have confirmed the tragedy has claimed the lives of at least 17 people, with many more unaccounted for as firefighters perform a fingertim search through the building for victims.
Mrs May and Mr Corbyn have both issued statements offering condolences to those affected and the families of those who died and are missing.
And Mrs May announced a judge-led inquiry into the causes of the blaze, and the lessons that can be learned.
Credit has poured in for Jeremy Corbyn’s statesmanlike response to the Grenfell Tower disaster which has claimed at least 17 lives and left hundreds of people homeless.
The Labour leader was pictured at the scene today hugging victims of the tragedy and meeting with local resident at St Clement’s Church in west London.
Prime Minister Theresa May spoke with emergency service crews but reportedly refused to meet any survivors of the tragedy and blocked media access.
The other day a friend almost told me off when I said I don’t exclude even an election win for Corbyn, but I certainly exclude the possibility that the Tories are going to romp home.
He was not the only person with this view. Once again, the great majority of observers throughout the world, but also politicians, proved completely wrong in their forecasts. Having succeeded in controlling the totality of public life, political correctness has fallen victim to its own success, reaching the point where it deceives itself, mistaking its own pronouncements for reality.
There is nothing accidental about this. It is a systematic, not a random error and this is why it is constantly being repeated. It was seen in the referenda in the Netherlands and Britain, in the elections in the US and France, in the Spanish Socialist Party, and now again in Britain.
Theresa May and Jeremy Corbyn made separate visits to Grenfell Tower in west London on Thursday after a fire in the building killed at least 17 people and left dozens more in hospital.
The prime minister spoke to police officers and emergency services at the bottom of the tower block on Thursday morning, during a visit that was kept private. She did not speak to the media or appear to speak to survivors of the incident. Armed police were at the scene.
Shortly afterwards, the Labour leader arrived later at St Clement's Church and was surrounded by a crowd of local residents who flocked around him as he got out of his car.
Theresa May personal ratings have plummeted while Jeremy Corbyn's popularity has surged since the General Election, according to the latest poll.
The Prime Minister's net favourability score has fallen from +10 in April to -34 , which is the level the Labour leader was on in November last year.
Sinn Féin President Gerry Adams warned British Prime Minister Theresa May on Thursday that any agreement between the Tories and the Democratic Unionist Party (DUP) would be in breach of the Good Friday Agreement.
If there's been a good right of publicity law enacted, we've yet to see it. Ostensibly enacted to prevent celebrities' likenesses, words, etc. being used in way they wouldn't approve of, the laws are usually deployed by dead celebrities' families to censor speech. Most of the censorship activity focuses on commercial use of dead public figures, implying endorsements from beyond the grave. But the laws have also been abused to shut down biographical projects and, in one notable case, was used by a deposed and jailed dictator who though Activision should have paid him something for using his likeness in a Call of Duty game.
A key Chinese regulator has issued a notice demanding broadcasters distribute programs that promote "core socialist values", and "forcefully oppose" content that celebrates money worship, hedonism, radical individualism and feudal thought.
They must also "actively propagate core socialist values, and create an ever-more healthy environment for the mainstream public opinion", it added.
The United Nations (UN) Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression David Kaye has released a new report, which gives an overview of the problems for freedom of expression and opinion in the Telecommunications and Internet Access Sector. The report also provides general recommendations for states and private actors on topics such as digital access, net neutrality, government access to user data, and freedom of expression.
How much does it take to cross the line into defamation? Far, far more than the plaintiff in this case would have hoped.
It started as so many defamation cases do: with the president of a property association drawing the criticism of other residents. Anthony Milazzo -- winner of the condo association's presidential election (and local dentist) -- was accused of many things by residents on a self-appointed watchdog's blog. As Eric Goldman points out, the blog's owners were rather proud of the site's ability to spread criticism and harvest outraged responses.
Last week, I presented at the always excellent Personal Democracy Forum event in NY, talking publicly for the first time about the lawsuit that's been filed against us. Specifically, what I chose to talk about is the real chilling effects that such a lawsuit can have -- and has already had on us. We've written about SLAPP defamation suits for many, many years. But it's (unfortunately) different (and much, much worse) to experience it yourself. You can see the video here, which got more emotional than I had expected it to be.
In response to FOIA lawsuits, the Office of the Director of National Intelligence turned over two (!) stacks of FISC documents pertaining to Section 702 surveillance. One document [PDF] (from an ACLU lawsuit) reveals a tech company (whose name is redacted) refused to hand over (or provide access to) communications requested with a Section 702 order. This order was issued in 2014, so it's a post-Snowden challenge. The end result -- determined with almost zero participation from the tech company -- is an order from Judge Rosemary Collyer demanding the tech company produce the records.
Discussed along the way to this conclusion are several things, including the NSA's problems with the Section 215 collection. There are also discussions about the adequacy of the NSA's minimization processes, meant to protect the privacy of US persons caught in the agency's internet dragnet. Unfortunately, we're not able to see much of this discussion, thanks to the opinion being heavily-redacted.
Germany has joined an increasing number of countries looking to introduce anti-encryption laws.
Speaking on Wednesday, German interior minister Thomas de Maizière said the government was preparing a new law that would give the authorities the right to decipher and read private encrypted messages, specifically citing encrypted messaging apps such as WhatsApp and Signal.
Such services were allowing criminals and terrorists to evade surveillance, de Maizière said, adding: "We can't allow there to be areas that are practically outside the law."
He did not specify how the encryption breaking would be achieved, but did note that among the options under consideration was forcing phone operators to install software on phones that would effectively bypass encrypted apps by granting access to the phone itself.
That stance reflects a very similar one taken earlier this week by Australian prime minister Malcolm Turnbull, who told Parliament: "The privacy of a terrorist can never be more important than public safety – never."
Microsoft may not have to respond to government demands for US persons' data held overseas, but it looks like everyone else (specifically, Google) will have to keep trawling their foreign data stores for US law enforcement.
The Second Circuit Appeals Court ruled US government warrants don't apply to overseas data. Courts outside of the Second Circuit are finding this ruling doesn't apply to Google's foreign data storage. The most obvious reason for this is other circuits aren't bound by this decision. The less obvious reason has to do with how Google stores its data.
For some time, political authorities are trying to question the technical and legal protections guaranteed by encryption tools. To oppose these dangerous proposals, the Observatoire des Libertés et du Numérique (Freedoms and Digital Observatory)1 publishes its position on the defence of the right to encryption, a tool indispensable to protect freedoms in the digital age.
Warrant? Hah! Did John Wayne ever get a warrant? Fourth Amendment, you say? We don’t need no stinking amendments around here. We’re Geek Squad and we’re on the side of THE LAW, so if we find anything illegal on your computer and hand it to the FBI, you have no right to complain, pilgrim, and we deserve a reward!
The FBI seems to agree with the “deserve a reward” statement, because they have been giving Geek Squad employees $500 or $1000 rewards for finding porn on repair customers’ computers.
Last Tuesday, in the wake of the latest terror atrocity to strike Britain, the former head of MI5 Dame Stella Rimington recalled just how primitive intelligence gathering used to be. Addressing a conference of security officials in west London – four miles from London Bridge where the terror attack had taken place three days earlier – Rimington recounted an anecdote about how her spy training in the 1970s involved infiltrating a local pub to eavesdrop on targets.
Over the four decades since then, intelligence gathering within Britain’s security services has evolved beyond comparison. Eking out a lead is no longer an issue – instead extraordinary volumes of information are relentlessly harvested electronically. The worry, according to experts, is whether they are acquiring too much.
A year-long investigation by BBC Arabic and a Danish newspaper has uncovered evidence that the UK defence giant BAE Systems has made large-scale sales across the Middle East of sophisticated surveillance technology, including to many repressive governments.
These sales have also included decryption software which could be used against the UK and its allies.
While the sales are legal, human rights campaigners and cyber-security experts have expressed serious concerns these powerful tools could be used to spy on millions of people and thwart any signs of dissent.
The investigation began in the small Danish town of Norresundby, home to ETI, a company specialising in high-tech surveillance equipment.
"This government appears to have not learnt anything from past technology initiatives that were implemented on the run. In typical fashion, there appears to have been no serious consultation with experts and disregard for (or no understanding of) the complexities involved."
The chief executive officer, who started in February, told analysts that she wants shift Mattel away from being a vendor of Barbie dolls and Hot Wheels at physical stores and into a company centered on mobile technology and activities. The strategy will be funded in part by reducing the dividend 61 percent.
It isn't clear exactly what has the FTC investigators interested in Uber, which was reported earlier today by Recode. The site speculates that it could be the employees' use of "god view," a tool that was used by some Uber employees to track the locations of some politicians and celebrities.
Two Turkish men living in the United States have reportedly been arrested by U.S. marshals for their alleged role in assaulting protesters outside the Turkish Embassy last month in Washington, D.C.
Postal service PostNord has stopped delivering mail to a district in the Danish city of Odense, citing threats and harassment received by postal workers in that area.
In 2015, the Swedish police released a report describing 53 districts throughout the country as “vulnerable," and 15 listed as “especially vulnerable."
Swedish prosecutors have released documents related to the Scandinavian state’s attempts to extradite WikiLeaks founder Julian Assange. However, the papers have reportedly been fully redacted, with even the bullet points being blacked out.
US Senate Democrats today asked the Federal Communications Commission to protect consumers from ringless voicemails, which let robocallers leave voicemails without ringing your phone.
Europe’s 13-year battle to end mobile roaming fees — which finally comes to a close Thursday — had it all: from septuagenarians in leather and stilettos to 3 a.m. screaming matches.
For lower-ranked EU officials, as I was at the beginning of the project, ending roaming was a romantic crusade. It was EU policy you could believe in, benefit from, and sell to the masses.
Working from 2011 as the Commission’s digital spokesperson, I helped commission opinion polls for the EU that showed 94 percent of Europeans supported an end to roaming charges.
The Roam Like Home legislation effectively bans service providers from adding extra charges to mobile calls, text messages and downloads made on phones registered in one EU country and used in another.
It was brought in to prevent consumers receiving huge bills after downloading films or other data while travelling in Europe, but watchdog Which? has warned that differences in providers' tariffs could lead to unexpected costs.
For much of the last decade we've noted that Verizon received billions in tax breaks and subsidies for fiber optic networks that were only partially deployed. From New Jersey to Pennsylvania, from New York City to Philadelphia, newswires the last few years have been filled with complaints from consumers and governments who say the company didn't finish the job it was handsomely paid to complete, leaving a patchwork of spotty next-gen broadband availability, and entire cities filled with customers still paying an arm and a leg for circa 2002 DSL speeds.
If you’re one of the many people filing comments on the Federal Communications Commission plan to gut net neutrality rules, be aware that your e-mail address and any other information you submit could be made public.
Different representatives of indigenous people shared their views and concerns on the protection of the rights of indigenous people and local communities during a side event at the World Intellectual Property Organization this week. Speakers underlined the need of consultation of indigenous people during negotiations about their rights.
TRIPS Council meetings are held in closed-door sessions despite the apparent absence of sensitive issues on the agenda.
A Russian developer behind the popular Grand Theft Auto V modding tool Open IV said the project is being killed off in the wake of a cease-and-desist demand from game maker Take-Two. The tool has paved the way for all types of GTA modifications.
A writer has charged that rock legend Bob Dylan lifted sections of his Nobel Prize lecture from SparkNotes, the free online study guide aimed at students.
Dylan, the surprise winner of the Nobel Prize for Literature, last week delivered a long-awaited lecture that was a requirement to receive the eight million kronor ($923,000) prize from the Swedish Academy. Author Andrea Pitzer, analysing his lecture for the news site Slate, said she found striking similarities between Dylan’s quotations and the summary of Herman Melville’s classic novel Moby-Dick found on SparkNotes.
The European Court of Justice (ECJ) has ruled that The Pirate Bay can be held liable for copyright infringement, despite not storing infringing material.
Some of the "top ISPs" are in "very thorough" discussions with anti-piracy outfit Rightscorp over proposals to hijack the browsers of alleged pirates until a fine is paid. Rightscorp is presenting this as an opportunity for ISPs to avoid being sued as well as a way to generate profit for the company.
The Finnish Market Court made a ruling where they referred to the Tele2 decision in the European Supreme Court, and effectively said that indiscriminate copyright extortion letters violate human rights.
A few weeks ago, we joined the global open access community in celebrating that Diego Gomez had finally been cleared of criminal charges for sharing scientific research over the Internet without permission. Unfortunately, the fight is not over yet. The ruling has been appealed to the Tribunal de Bogota, a Colombian appellate court.