A new open source Raspberry Pi tablet has this week been launched via Kickstarter called the Diskio Pi, thanks to developer Guillaume Debray based in France.
The Diskio Pi has been specifically designed to provide a versatile open source tablet which is compatible with Raspberry Pi hardware and Odroid to provide users with a scalable touch terminal. Watch the demonstration video below to learn more about the Diskio Pi tablet which you build yourself to your exact specifications.
The Radeon Vega Frontier Edition has begun shipping today as the Vega-based compute card geared to go up against the Titan Xp and P100 accelerators for compute/workstation workloads. This is the first Vega GPU card to market, but will come at a hefty cost.
While Vulkan is most often talked about for being a high-performance graphics API, it also has integrated compute capabilities -- and in fact, may be the future of OpenCL -- and is quite capable for GPGPU computing. There are countless Vulkan graphics tutorials and code samples out there, but for those interested in just Vulkan for compute, a Phoronix reader pointed me to a new simple/easy project.
The AMDGPU DRM driver updates queued for Linux 4.13 include Vega bug fixes, initial support for Raven Ridge APUs (Zen cores + Vega graphics), KIQ support for compute rings, MEC queue management rework, SR-IOV improvements, a variety of bug fixes, some new module parameters for controlling GCN 1.0/1.1 AMDGPU/Radeon DRM driver selection behavior, and more. A secondary set of work includes sempahore support using sync objects, optimizing the buffer object list ioctl, and other changes. There are lots of internal code changes, Vega fixes, and other technical work, but not too much for end-users to get excited about on AMDGPU for the Linux 4.13 front.
After carrying out the P-State/CPUFreq governor comparison with a focus on OpenGL and Vulkan Linux games, next I ran some fresh numbers seeing how well modern OpenGL/Vulkan Linux games are scaling across multiple CPU cores.
For games sporting both a Vulkan and OpenGL renderer, I tested them while adjusting the HT/core count via the motherboard BIOS of the MSI C236A WORKSTATION board used for testing. The CPU was the Intel Xeon E3-1280 v5 and it was tested in its stock configuration of 8 threads (4 cores + HT), 4 cores, 3 cores, 2 cores, and then finally a single CPU core. Each time the various OpenGL/Vulkan Linux games were run with the OpenGL and Vulkan renderers, all automated via the Phoronix Test Suite benchmarking software.
The next time you come across a laptop or PC, pay attention to the operating system. Chances are it won’t be open source because closed-source platforms, like Windows and macOS, have captured the biggest portion of the PC client OS market.
Open-source OS programs like Linux constitute just a tiny bit of the market share, and with good reason – they still have a lot of catching up to do if they wish to compete with the likes of macOS and Windows as far as looks, feel, and functionality are concerned.
With a huge code cleanup effort, complete plugin development documentation, and numerous bug fixes, Parole Media Player 0.9.2 paves the way for future development.
A new version of KeePassXC, the community-driven fork of password manager KeePassX is out, and it unlocks a boatload of new features. Janek Bevendorff, announcing the release of KeePassXC 2.2.0, says the update has “lots of new features and bug fixes in a well-rounded release.”
I usually refrain from feeding the marketing and hype related to upcoming titles. But hey, the latest Feral radar shows this kind of weird hint at a new game for Linux and Mac, and for once I got a theory that does not seem too far-fetched.
Valve developer Samuel Pitoiset appears quite motivated to see Dawn of War 3 running well under Linux with the RadeonSI driver stack.
After completing bindless texture support for RadeonSI Gallium3D as needed by this recent Feral Linux game port for the OpenGL version of this game, Pitoiset has been working on reducing the driver's overhead over a few patch series. Most of this driver overhead reduction work has been around the OpenGL KHR_no_error extension for being able to eliminate some GL error checking in favor of less CPU work but the possible side effect of undefined behavior should any OpenGL errors happen.
Introversion Software, creators of Prison Architect, Darwinia and plenty more have added experimental Linux support to Scanner Sombre [Steam, Official Site], their latest title.
Buried at the end of their VR mode beta announcement, was a note that Linux support has been added in experimental form. You need to opt-in to the beta to access it.
World of One [Steam, Official Site] is a cleverly designed and rather creepy puzzle platformer that you should consider taking a look at.
KDE users keen wanting to get a taste of GNOME Shell’s Activities Overview can now do so thanks to a new project. qOverview is a dashboard “inspired by” GNOME’s Activities.
Search results in the GNOME Shell overview may soon look a little neater. Improvements to the look and layout of the GNOME Shell search list is being worked on as part of this year’s Google Summer of Code. The updated design, to be based off of a GNOME design team mockup from 2015...
So this year i’m a GSoC student again :), but this time not on Polari, but on gnome-shell.
Even though the projects are different, they still rely on the same technology (GJS) so it’s definitely easier for me to understand the code at first sight than it was last year.
Ubuntu Kylin is an open-source Linux distribution based on Ubuntu since 2013, mainly developed by a Chinese team alongside dozens of Linux developers all over the world. It contains the basic features you would expect from Ubuntu, plus features a desktop environment and applications. As far as we know, Ubuntu Kylin is one of the most suitable Linux distributions for users who are farmiliar with Microsoft Windows, including its desktop environment, office suite and various applications.
Arne Exton is pleased to announce the availability of a new update for its Arch Linux-based ArchEX GNU/Linux distribution, build 170626, which comes with the latest LXQt desktop environment and other open source technologies.
A new release of Manjaro Linux (17.0.2) has been announced. Of course, because Manjaro is a "rolling release" distribution model, this is actually just a roll-up of the updates since the last Manjaro release.
So if you are already running Manjaro you don't need to reinstall, you just have to make sure that you have all the latest updates installed.
Two years ago when openSUSE decided to move the base of openSUSE Leap to SUSE Linux Enterprise (SLE), they were entering uncharted territory. SLE is a tightly controlled enterprise ship that runs on mission critical systems. On the other hand openSUSE has been a community-driven project that, despite sponsorship from SUSE, is relatively independent.
It became clear, though, that moving to SLE source code would solve many problems for both members of the SUSE family. SLE would get a platform from where it can borrow the latest fully tested packages, and openSUSE Leap would get enterprise grade code base to move into CentOS and Ubuntu territory. SLE and openSUSE created a symbiotic relationship in which they were pulling content from each other.
WiPro said it plans to use the Red Hat product as the basis for a cloud application platform. The service is targeted at providing developers and IT teams with a process for migrating applications across public, private, and hybrid cloud deployments. Legacy applications can also continue to coexist alongside the migrated cloud-native and container-based applications.
In an open organization, culture is critical. In my previous column, I explained how and why we’re on a journey at Red Hat to scale our open culture into the future. Today, I want to share the findings of the first phase of our "Scaling Our Culture For The Future" project, where we decided to gather and analyze some data, and at the same time, engage every Red Hatter in a company-wide conversation about our culture.
Red Hat executive Irshad Raihan recently spoke to me about a software package -- Red Hat Hyper-Converged Infrastructure (HCI) -- that the company put together to address the needs of enterprises using hyperconverged systems. This package is made up of previously available Red Hat products.
Fedora represented the theme of this year’s LinuxFest NorthWest, The Mechanics of Freedom, with the Fedora Security Lab and diceware passphrases. LinuxFest NorthWest is an annual Open Source event in Bellingham, Washington. There is something for everyone from novices to professionals featuring presentations and exhibits on F/OSS topics, Linux distributions and applications.
With the release of stretch we are pleased to open the doors for stretch-backports and jessie-backports-sloppy. \o/
Earlier today, I uploaded debhelper version 10.5.1 to unstable.
MATE developer Martin Wimpress has shared that they are talking to Mir developers about how Mir could be used as a Wayland compositor.
When Canonical jettisoned its over-egged ambitions of building a ‘convergent’ platform spanning mobile, desktop and IoT devices most of us assumed that it signalled the end of the road for Mir, its home-grown display server technology. Sure, Mark Shuttleworth himself that Canonical would continue to invest in Mir and, sure, he also claimed...
Canonical, the company behind the popular Ubuntu Linux operating system, today announced that their Snappy-enabled Ubuntu Core OS is now available for Raspberry Pi Compute Module 3 (CM3).
Recently Calibre 3.0 was released which enables users to read books in the browser! Note that Raspbian's repositories have not yet been updated yet (as of this writing).
eBooks are a great way for teachers, librarians, and others to share books, classroom materials, or other documents with students—provided you have ready and reliable access to broadband. But even if you have low or no connectivity, there's an easy solution: Create an eBook server with the open source Calibre eBook management software running on a Raspberry Pi 3. Here's how I did it—and you can, too.
Broadcom developer Eric Anholt has shared another weekly update concerning his summer 2017 hacking on the VC4 open-source driver stack that is most notably used by the Raspberry Pi.
Comebacks are a very hard nut to crack. Expectations run high -- fans and loyalists who have waited years for their beloved brand or team or product to come back are mostly met with disappointment when the second coming cannot match up to past success. That is always the risk for the brand Nokia, which is making a comeback in the phone market using Android via the Finnish company HMD Global. The first Nokia smartphone that HMD Global has launched in India is Nokia 3. And expectations from it are running very high.
There are certain things you can usually count on in a OnePlus phone: great performance, an awesome price, and a touch of originality. But with the OnePlus 5, you’re only getting the first two parts of the three-part equation.
The OnePlus 5 is packed with the latest components on the inside, but its display is nothing special. It’s still a good deal cheaper than other premium phones, but even at a starting price of $479, it’s not quite a killer bargain. And its design, while nice-looking, is derivative of both previous OnePlus phones as well as Apple’s aging iPhone 7 Plus.
This time around, OnePlus’s new flagship isn’t about being different. It’s about fitting in. Indeed, OnePlus’s marketing slogan may be “Never Settle,” but it feels like we’re doing an awful lot of settling with the OnePlus 5.
Sony will break from tradition among Japanese tech peers by making its artificial intelligence software freely available, as the company seeks to expand its presence in the field through outside collaboration with other businesses and research institutions.
The Japanese electronics company has developed AI independently since the 1990s but has decided to open-source its deep learning software known as a neural network library. The software, which learns by mimicking the neural networks in human brains, can be used in products.
Sony's software can be used for face and voice recognition based on deep learning abilities. The technology has been applied to predict the contract price of real estate transactions, for instance, and it is expected to be used in the development of home appliances and robots by third parties.
There’s an open source insurgence happening in the networking industry.
Increasing demands on the network to scale to unprecedented levels and at the same time become more customized to specific use cases has led to the emergence of open source projects to support them.
GitHub wants to help more people become open source contributors with a new initiative called Open Source Friday. As the name implies, the program encourages companies to set aside time at the end of the week for their employees to work on open source projects.
It’s designed to bolster the ranks of open source contributors at a time when many businesses rely on freely available projects for mission-critical applications. Open Source Friday isn’t just about getting businesses to offer their employees’ time as a form of charity, it’s also a way to improve key business infrastructure, according to Mike McQuaid, a senior software engineer at GitHub.
Open source software is developed by hobbyists and professionals alike. In fact, 65% of respondents to this year's GitHub open source survey who make contributions to open source projects do so as part of their job. However, the survey indicates that employers often lack a clear policy on employee contributions. A new project from GitHub aims to increase contributions to open source projects and to educate employers on why it's important.
Open source software has completely transformed the opportunities for software development. Now, Canonical is launching a new effort to bring these principles to programmable software defined radios and industrial equipment. Developers will be able to experiment with different wireless protocols for efficiency, security, or new architectures. It also threatens to disrupt the business model of wireless carrier providers. TheServerSide caught up with Maarten Ectors, VP of IoT for Canonical to find out what this revolution means for developers.
May 7, 2017. First Sunday of the month, a group of Peruvian students get started the GNOME Peru Challenge 2017-1 with goal setting in the semester: Fix a GNOME app bug.
We organised an FSFE information booth on Linuxwochen Wien from 4 to 6 of May and at Veganmania at the MQ in Vienna from 24 to 27 May. Like every year it went very well and especially at Veganmania we could reach many people not yet familiar with free software. Since during the Veganmania there was a Wikipedia event in Vienna at the same time we even encountered some people from all over the world. For example an FSF activist from Boston in the US.
We had re-stocked our leaflets with new versions of some well received handouts we had in the past and we put the new leaflets on free software programs for specific tasks from the Munich group to good use.
Content Management Systems like WordPress are a great way to create and host websites, blogs, and other forums. But often you need an ungodly amount of RAM in your server to handle the incoming traffic.
BardCanvas is an open source content management system that’s been built from the ground up with optimization in mind.
TrueOS and Lumina Desktop developer Tim Moore announced the release and immediate availability of Lumina Desktop 1.3.0, a significant update of the open-source desktop environment that's used by default in TrueOS.
IPsec is a protocol which works directly at layer 3. It uses its configuration to determine which network flows should be sent encrypted on the wire. Once IPsec is correctly configured, selected network flows are transparently encrypted and applications do not need to modify anything to benefit from secured traffic.
A new version of the Lumina desktop environment is available to download. Lumina 1.3.0 features many big changes, a new media player app, and more.
Over the last 12 to 18 months, as we were preparing for the Guile 2.2 release, I was growing increasingly dissatisfied at not having a good concurrency story in Guile.
I wanted to be able to spawn a million threads on a core, to support highly-concurrent I/O servers, and Guile's POSIX threads are just not the answer. I needed something different, and this article is about the search for and the implementation of that thing.
[...]
In Guile we were able to create a solid-seeming abstraction for fibers by composing other basic building blocks from the Scheme toolkit. Guile users can take an abstraction that's implemented in terms of an event loop (any event loop) and layer fibers on top in a way that feels "real". We were able to do this because we have prompts (delimited continuation) and parameters (dynamic binding), and we were able to compose the two. Actually getting it all to work required fixing a few bugs.
In Fibers, we just use delimited continuations to implement coroutines, and then our fibers are coroutines. If we had coroutines as a primitive, that would work just as well. As it is, each suspension of a fiber will allocate a new continuation. Perhaps this is unimportant, given the average continuation size, but it would be comforting in a way to be able to re-use the allocation from the previous suspension (if any). Other languages with coroutine primitives might have an advantage here, though delimited dynamic binding is still relatively uncommon.
This month, the FSFE is starting a project to facilitate automation in the software toolchain. We're looking for the best practices for free and open source software development that facilitates use and increases the level of automation possible.
When you create a new project on Github, Gitlab, Gitea or many other websites for software development, you're asked for a default license file to be included in the software repository. These files end up looking rather similar, in many cases to the point of being identical, which is a good thing. When things look similar, it's easier for a computer to understand them and find commonalities between them.
Social media giants Facebook, Google's YouTube, Twitter and Microsoft said on Monday they were forming a global working group to combine their efforts to remove terrorist content from their platforms.
Anyone who’s seen a Frankenstein movie knows there can be grim consequences to making unauthorized alterations to someone else’s design.
Still, many makers insist they don’t really own a product unless they’ve customized it. A paint job might suffice for some, but the popularity of 3-D printers allows even amateurs to make elaborate modifications easily and inexpensively.
When Brendan Eich created JavaScript in 1995, he intended to do Scheme in the browser. Scheme, being a dialect of Lisp, is a functional programming language. Things changed when Eich was told that the new language should be the scripting language companion to Java. Eich eventually settled on a language that has a C-style syntax (as does Java), yet has first-class functions. Java technically did not have first-class functions until version 8, however you could simulate first-class functions using anonymous classes. Those first-class functions are what makes functional programming possible in JavaScript.
JavaScript is a multi-paradigm language that allows you to freely mix and match object-oriented, procedural, and functional paradigms. Recently there has been a growing trend toward functional programming. In frameworks such as Angular and React, you'll actually get a performance boost by using immutable data structures. Immutability is a core tenet of functional programming. It, along with pure functions, makes it easier to reason about and debug your programs. Replacing procedural loops with functions can increase the readability of your program and make it more elegant. Overall, there are many advantages to functional programming.
I recently published a paper with Sayamindu Dasgupta that provides evidence in support of the idea that kids can learn to code more quickly when they are programming in their own language.
Millions of young people from around the world are learning to code. Often, during their learning experiences, these youth are using visual block-based programming languages like Scratch, App Inventor, and Code.org Studio. In block-based programming languages, coders manipulate visual, snap-together blocks that represent code constructs instead of textual symbols and commands that are found in more traditional programming languages.
Last month I blogged about Fidonet. This month I can report that I'm back in FidoNet. While I was 2:2449/413 back then, my new node number is now 2:2452/413@fidonet. The old network 2:2449 is still listed in the Fidonet nodelist, but no longer active, but maybe I can revive that network at a later time. Who knows.
The change will be implemented during the upcoming school year, 2017-2018.
In Turkey, the curriculum for state-run schools is set by the national government.
Super Mario World, Starfox and Yoshi's Island are set to be re-released later this year as part of a new classic SNES console.
The original Super Nintendo Entertainment System, launched in 1990, sold 50 million units worldwide.
The SNES Classic follows the NES Classic, which went on sale late last year but abruptly discontinued in April - much to the frustration of fans.
The lies came fast and furious on the Sunday shows this weekend, as Republican lawmakers and their surrogates reckoned with a tough truth: The only way to sell the Senate’s cruel and deeply unpopular health-care bill is to absolutely misrepresent what is in it.
[...]
Donald Trump isn’t a rogue Republican; he is making the party over in his image.
Martin Shkreli appeared in a New York federal court Monday for the start of his securities fraud trial—and was quickly declared guilty of price gouging by potential jurors.
One obvious target is the smart meters that are being installed in every home by the end of 2020, to automate meter readings. The Capita-run body set up to handle the data, the DCC, is being treated as critical national infrastructure and the company’s chief technology officer insists the data is safe.
Fears have been raised that Britain’s largest ever warship could be vulnerable to cyber attacks after it emerged it appears to be running the outdated Microsoft Windows XP.
As HMS Queen Elizabeth left its dockyard for the first time to begin sea trials, it was revealed the €£3.5billion aircraft carrier is apparently using the same software that left the NHS exposed.
Security company Kaspersky Lab has urged victims of ransomware not to pay when they are caught with their files encrypted by an attack. In a report on the ransomware scourge, the company said paying up would make one a bigger target the next time around.
On Tuesday, a new, worldwide ransomware outbreak took off, infecting targets in Ukraine, France, Spain, and elsewhere. The hackers hit everything from international law firms to media companies. The ransom note demands victims send bitcoin to a predefined address and contact the hacker via email to allegedly have their files decrypted.
Serious distributions try to protect their repositories cryptographically against tampering and transmission errors. Arch Linux, Debian, Fedora, openSUSE, and Ubuntu all take different, complex, but conceptually similar approaches.
Many distributions develop, test, build, and distribute their software via a heterogeneous zoo of servers, mirrors, and workstations that make central management and protection of the end product almost impossible. In terms of personnel, distributions also depend on the collaboration of a severely limited number of international helpers. This technical and human diversity creates a massive door for external and internal attackers who seek to infect popular distribution packages with malware. During updates, then, hundreds of thousands of Linux machines download and install poisoned software with root privileges. The damage could hardly be greater.
The danger is less abstract than some might think. Repeatedly in the past, projects have had to take down one or more servers after hacker attacks. The motivation of (at least) all the major distributions to protect themselves from planted packages is correspondingly large and boils down to two actions: one simple and one cryptographic.
Microsoft recently patched a critical vulnerability in its ubiquitous built-in antivirus engine. The vulnerability could have allowed attackers to execute malicious code by luring users to a booby-trapped website or attaching a booby-trapped file to an e-mail or instant message.
I think there are many of us in security who keep waiting for demand to appear for more security. We keep watching and waiting, any day now everyone will see why this matters! It's not going to happen though. We do need security more and more each day. The way everything is heading, things aren't looking great. I'd like to think we won't have to wait for the security equivalent of a river catching on fire, but I'm pretty sure that's what it will take.
"This new Firebox Feed data allows us to feel the pulse of the latest network attacks and malware trends in order to identify patterns that influence the constantly evolving threat landscape," said Corey Nachreiner, chief technology officer at WatchGuard Technologies. "The Q1 report findings continue to reinforce the importance and effectiveness of basic security policies, layered defenses and advanced malware prevention. We urge readers to examine the report's key takeways and best practices, and bring them to the forefront of information security efforts within their organizations."
On May 30, the US Missile Defense Agency (MDA) and the United States Air Force successfully tested the Homeland Missile Defense System, shooting down an intercontinental ballistic missile in the first "live fire" test of the system's Ground-based Midcourse Defense (GMD) element. The GMD consists of a land-based, fire-control system and interceptor missiles designed to strike ICBMs in flight outside the atmosphere. The interceptor missile was launched from Vandenberg Air Force Base in California, and it destroyed an "ICBM-class target" launched from the Kwajalein Atoll in the Marshall Islands. The ICBM was tracked by multiple radars, including the Sea-Based X-Band Radar, a giant radome mounted aboard a "semi-submersible" platform that resembles a giant self-propelled oil rig.
"The intercept of a complex, threat-representative ICBM target is an incredible accomplishment for the GMD system and a critical milestone for this program," said MDA Director Vice Adm. Jim Syring in an official statement. "This system is vitally important to the defense of our homeland, and this test demonstrates that we have a capable, credible deterrent against a very real threat."
Today Julian reaches precisely five years of incarceration in the Ecuadorean Embassy and I am on the train down to London for events to mark the anniversary. Given that two days ago I couldn’t make it to my balcony, I feel quite chuffed with my powers of recovery.
Yesterday I wrote that Corbyn’s advance has removed the “unelectable policies” excuse from New Labour and they have now to decide whether they are actually socialist or have adopted neo-liberalism out of belief.
Some critics of the Paris Agreement on climate change probably think they could have done a better job with the agreement's details. Recently, a group of people taking a system dynamics course at MIT’s Sloan School of Management got the chance to take a whack at it.
This last one's not so nasty for EU citizens. But it's a nasty reminder for our former Prime Minister.
Back in 2016, David Cameron tried and failed to stop child benefit being sent from EU citizens who live in the UK to their children who live abroad.
He wanted it in his offer to voters to remain in the EU. But he had to water it down, and Britain then voted for Brexit anyway.
Now the document makes clear EU citizens can carry on sending child benefit abroad, even though Britain voted Leave.
The small print of the proposed new “settled status” reveals it will be taken away if someone is “absent from the UK for more than two years, unless they have strong ties here”.
The Queen is to receive an 8% increase in income from public funds, after the Crown Estate's profits rose by €£24m. The Sovereign Grant, which pays for the salaries of her household, official travel and upkeep of palaces, is to increase by more than €£6m in 2018/19. It comes as accounts revealed the Queen's official net expenditure last year increased by €£2m, to almost €£42m.
If we cannot dislodge him from the White House anytime soon, maybe we can start to deflate the outsized role he plays in our national psychology. This is a baby step in that direction.
Rhodes' comments dovetail with many other reports over the past two years spotlighting how Russia has been honing its social-media propaganda skills. Last year, Time published a massive report in which senior intelligence officials talked about how Russians pretending to be American voters infiltrated social media groups, spread conspiracy stories via Facebook accounts for fictional media outlets, and bought Facebook ads to spread fake news.
The U.S. Treasury’s common sense regulatory initiative, "A Financial System That Creates Economic Opportunities Banks and Credit Unions," includes a cybersecurity initiative that would have financial regulatory agencies standardize cyber security regulations. It also includes using a "common lexicon" to aid in that effort.
Lexicons are dictionaries of words. In cyberspace, lexicons are also dictionaries of data components. Data, more so than the words in the regulation, needs standards, particularly for identifying financial market participants in order for regulators’ words to be transformed into computer languages.
For anyone with a long and abiding hatred of the UK’s Conservative party, these are heady days indeed. I turn on my laptop each morning with eager anticipation, as it becomes increasingly obvious that things only get worse for the Tories with each passing day.
The Tories have been in a freefall since Theresa May, enjoying a 20-point lead in the opinion polls, called a snap election in the hope– now doused with the equivalent of freshly melted water from an Arctic iceberg– of extending her party’s majority in parliament to historically unprecedented heights. Labour, under Jeremy Corbyn, was expected to suffer a defeat so bad that its chances of being hammered into non-survivable oblivion were rated as pretty good by its own (so-called) supporters.
Within days of May calling the election, however, the opinion polls started to tilt in Labour’s favour, and they stayed that way until election day. Corbyn, derided in the rightwing tabloids as an out of touch commie cultist, came across on the campaign trail as an undogmatic but principled figure with bucket loads of the so-called common touch. Nothing seemed to fluster him.
The ad exodus from YouTube has died down since its peak in March, but YouTube continues to update its guidelines to reassure advertisers and, in some ways, its creators. In a blog post, YouTube outlined more specific definitions of hate speech and what kinds of incendiary content wouldn't be eligible for monetization.
We've written two separate stories about the Titan Note -- a small recording/transcription device that was originally sold via a crowdfunding project at IndieGogo. It was an interesting device, that immediately generated a fair bit of press -- though that included some reasonable skepticism about whether or not the product could really do what it claimed it could do (especially since many other larger companies couldn't seem to produce similar voice recognition capabilities, despite putting tremendous resources towards it). I still backed the project hoping that maybe it was legit. The good press still beat out the few skeptical posts and the campaign initially raised over $1 million dollars. However, soon after the project closed, IndieGogo canceled the campaign (perhaps due to a group of online skeptics contacting them) and refunded everyone's money, saying that that Titan Note had violated its terms. We reported on this not because of the project being canceled, but because in discussing the cancellation, the Verge also noted that Titan Note had sent a bogus DMCA notice over its skeptical story -- and writing about censorious DMCA takedowns is pretty common around here.
Of all the wonderful gifts the internet has bestowed upon humanity, there is perhaps none more precious to me than the now famous Crying Jordan meme. After Michael Jordan's tearful Hall of Fame induction speech, an image of him in tears took on the secondary purpose of being photoshopped onto anyone the internet wanted to portray as being sad or upset about pretty much anything. The creativity of some of the memes is nearly unmatched, leading to it becoming so popular that then President Obama brought it up when giving Jordan the Presidential Medal of Freedom. In other words, as far as internet memes go, the crying Jordan meme is nearly as prolific and celebrated as the basketball career of Jordan itself.
Just before the upcoming elections in September, the German government seems eager to push through legislation to rein in internet hate speech, fake news, and also legalise state hacks and police searches of computers and mobile phones against suspects of all kinds. Even at the United Nations and Organization for Security and Co-operation in Europe (OSCE) level the recent initiatives in Germany have resulted in some raised eyebrows. The draft hate speech law has also “made it to the alert list of the Council of Europe Platform to promote the protection of journalism.”
Many Echo owners end up buying multiple devices [...]
Probably because it's not powered by Bing
Last year, you might recall that AT&T came up with an ingenious idea: to charge broadband customers significantly more if they actually wanted to protect their own privacy. It basically worked like this: users ordering AT&T's broadband service could get the service for, say, $70 a month. But if that user wanted to opt out of AT&T's Internet Preferences snoopvertising program (which used deep packet inspection to study your movement around the Internet down to the second) users were forced to pay upwards of $800 more each year. With its decision, AT&T effectively made user privacy a premium service.
The nation's top-level intelligence office, the Director of National Intelligence, wants to find "the most accurate unconstrained face recognition algorithm."
In 2009, 22-year-old student Nicholas George was going through a checkpoint at Philadelphia International Airport when Transportation Security Administration agents pulled him aside. A search of his luggage turned up flashcards with English and Arabic words. George was handcuffed, detained for hours, and questioned by the FBI.
George had been singled out by behavior-detection officers—people trained in picking out gestures and facial expressions that supposedly betrayed malicious intentions—as part of a US program called Screening Passengers by Observation Technique or SPOT. But the officers were wrong in singling him out, and George was released without charge the same day.
A child porn indictment in California has led to a full-fledged examination of the FBI's use of "private searches." Private searches, performed by citizens, can be used to instigate investigations and obtain warrants. In this case, the private searches were performed by Best Buy Geek Squad members, who came across alleged child porn images while fixing the defendant's computer.
Private searches during computer repairs are normal. But they're not roughly analogous to searches performed with a warrant. Companies that repair electronic devices are legally required to report discovered child porn to law enforcement. What they're not supposed to do, however, is dig through devices they're repairing in hopes of finding something illegal.
It's not just the FBI that can't seem to turn in its privacy-related paperwork on time. The FBI has pushed forward with its biometric database rollout -- despite the database being inaccurate, heavily-populated with non-criminals, and without the statutorily-required Privacy Impact Assessment that's supposed to accompany it. As of 2014, it hadn't produced this PIA, one it had promised in 2012. And one that applied to a system that had been in the works since 2008.
The Australian Attorney General and a key Australian minister have published a memo detailing the demand they plan on presenting to the next Five Eyes surveillance alliance meeting, which will be held next week in Ottawa.
In more than 90 cities across the US, including New York, microphones placed strategically around high-crime areas pick up the sounds of gunfire and alert police to the shooting's location via dots on a city map.
On Monday, Zillow threatened to sue Kate Wagner, saying that that she was violating its terms of use, copyright law, and possibly the Computer Fraud and Abuse Act because she took images from the company's website without permission. However, on each of her posts, she acknowledged that the images came from Zillow and were posted under the fair use doctrine, as she was providing (often humorous) commentary on various architectural styles. Her website was featured on the design podcast 99% Invisible in October 2016.
There are few things I hate more than when tech platforms -- which have benefited from key rights provided to internet platforms and the public -- turn around and abuse the law to try to silence or kill off others. And the latest company to dive headfirst into this unfortunate pool of shame is Zillow, which is threatening to sue the person behind McMansionHell.com based on a number of different awful interpretations of the law that can be summed up as: "hey, you can't use our images to make fun of homes."
McMansion Hell is a Tumblr blog that highlights the absurdity of giant real estate properties and the ridiculous staging and photography that are omnipresent in their sales listings. The blog, started by 23-year-old Johns Hopkins graduate student Kate Wagner, began in July 2016 as a way to poke fun at pretentious architecture. It has since gone viral, but now she’s facing potential legal charges by real estate site Zillow for allegedly violating the site’s terms of service by reproducing the images on her blog.
A typical McMansion Hell blog post will have a professional photo of a home and / or its interior, along with captions scattered throughout by Wagner. She also adds information about the history and characteristics of various architecture styles, and uses photos from the likes of Zillow and Redfin to illustrate how so many real estate listings inaccurately use the terms.
Back at the end of March, the Department of Homeland [in]Security issued rules stating that all electronics larger than a smartphone should be checked instead of kept in a carry-on on flights into the US from 10 airports or on 9 airlines from mainly Muslim countries in the middle east and north Africa. This was following claims by US and UK intelligence that terrorists are smuggling explosive devices in various consumer items to 'target commercial aviation'.
Not only does this not pass the smell test -- anyone looking to bring down an aircraft with explosive devices won't care if they're in the cabin or the hold: boom is boom. The idea that items are going to go through some sort of super-secret screening is laughable, when red-team penetration tests find it trivial to get prohibited items onto aircraft (including via people with no ticket who bypass security screenings). And, of course, airports already require carry-on electronics to be x-rayed, and often swabbed for explosive residue. What's more, I remember seeing 'explosives smuggled on board' hysteria since Pan Am 103 almost 30 years ago, where Czech explosive Semtex was suspected to be in everything from fake muesli to electronics following the use of just 12 ounces (340g) to blast a 50cm hole in the 747's hold.
Over the last few months, a battle has played out over what will happen to the 6,700 page "CIA Torture Report" that the Senate Intelligence Committee spent many years and approximately $40 million producing. The report apparently reveals all sorts of terrible details about how the CIA tortured people for little benefit (and great harm in other ways) and lied to Congress about it. While a heavily redacted executive summary was released, there is apparently significantly more in the full report. And if we, as a country, are to actually come to terms with what our nation did, this report should be made public and there should be a public discussion on our past failings.
My guess is Johnson's definition of "defenseless" doesn't cover sexting teens -- not if he's using Biblical authority to shore up his shaky legal assertions. Other supporters are equally as naive, claiming federal prosecutors won't use the law to prosecute sexting teens, blithely ignoring the fact that child porn laws have routinely been misused to do exactly that.
This is the road to hell legislators love to travel. And why not? It's routinely re-paved with good intentions and has lanes wide enough that even the most obtuse legislator can travel comfortably. When it comes to the nation's youth, nothing's too good for them. Our nation's lawmakers are ready to grant them them longer minimum sentences and more ways to avail themselves of one of our nation's oldest traditions: doing federal time on trumped-up charges. After all, you can't be for the children unless you're willing to damn the children. For their own good, of course.
It's funny what a little added competition can do. It's no surprise that with the rise of streaming alternatives from AT&T (DirecTV Now), Dish (Sling TV), Google (YouTube TV) and Sony (Playstation Vue) -- last quarter saw one of the biggest cord cutting spikes on record. MoffettNathanson analyst Craig Moffett has noted that 2016's 1.7% decline in traditional cable TV viewers was the biggest cord cutting acceleration on record. SNL Kagan agrees, noting that traditional pay TV providers lost around 1.9 million traditional cable subscribers. That was notably worse than the 1.1 million net subscriber loss seen last year.
The cable TV business is in trouble—in fact, it is "failing" as a business due to rising programming costs and consumers switching from traditional TV subscriptions to online video streaming, according to a cable lobbyist group.
"As a business, it is failing," said Matthew Polka, CEO of the American Cable Association (ACA). "It is very, very difficult for a cable operator in many cases to even break even on the cable side of the business, which is why broadband is so important, giving consumers more of a choice that we can't give them on cable [TV]."
Back in January, Wall Street chatter started to suggest that with Trump being much more friendly to M&As, some previously-unthinkable mergers were in store for the already uncompetitive telecom market. The most commonly discussed is a new merger between T-Mobile and Sprint (regulators blocked the first attempt in 2014 because it would have dramatically reduced competition). But another major rumor involves Verizon acquiring either Comcast or Charter Communications, something that Verizon executives have publicly tried to downplay, but evidence suggests remains high on the company's agenda all the same.
The Federal Communications Commission's plan to gut net neutrality rules and deregulate the Internet service market may hinge on the definition of the word "broadband."
In February 2015, the FCC's then-Democratic leadership led by Chairman Tom Wheeler classified broadband as "telecommunications," superseding the previous treatment of broadband as a less heavily regulated "information service." This was crucial in the rulemaking process because telecommunications providers are regulated as common carriers under Title II of the Communications Act, the authority used by the FCC to impose bans on blocking, throttling, and paid prioritization.
By now you likely know that Denuvo, the DRM once thought to be the end of piracy, is in what looks like a losing battle for relevance. The DRM's ability to keep piracy groups from cracking video games went from months to weeks to days over the span of a year or so, with its Version 3 roll-out defeated so quickly that I could barely keep up writing the post about its demise. Reactions among game developers has varied, with some developers refusing to use Denuvo entirely, while others silently patched it out of their games once those games have been cracked. From the perspective of the gamer, of course, this all appears to be every bit as silly as every other DRM that has ever been used. Denuvo tends to annoy legitimate game buyers at best, while the pirates, against whom it is meant to fight, appear to have defeated it completely.
While many copyright holders are filled with rage when they see their content showing up at The Pirate Bay, not all are. The developer of the indie adventure game 'Paradigm' decided to hand out free keys on the popular torrent site instead, realizing that not everyone can afford to buy it legally.
Three individuals believed to be behind a large illicit eBook portal have been arrested. Lul.to carried an estimated 200,000 titles, including eBooks, audiobooks, and newspapers, each downloadable for a small fee. It claimed to be the largest site of its type in the world. Bitcoin and a large quantity of cash have been seized.