I've been using Linux Mint for years now as my main desktop. And, every year that goes by, it keeps improving. With Linux Mint 18.2, the free, open-source desktop has only gotten better.
Once more, Mint's Cinnamon interface with its classic windows, icons, menus, pointers (WIMP) interface is simple and easy to use even if you've never touched Linux in your life. Cinnamon 3.4.3's look and feel has a crisp, clean appearance with easy to read fonts and colors that you can easily adjust to your heart's content.
Your Linux distribution of choice probably allows you to use it in a “live” environment, meaning it runs entirely off the disc or USB drive and doesn’t actually need to be installed to your computer’s hard drive. Just use the Linux desktop normally and get a feel for it. You can even install software, and it’ll remain installed in the live system until you reboot.
Fedora’s Live CD interface, like most Linux distributions, lets you choose to run the operating system from your bootable media or install it to your hard drive.
Even if you don’t want to use Linux as your everyday operating system, having this Linux live DVD or USB drive around can be useful. You can insert it into any computer and boot Linux whenever you want. Use it to troubleshoot Windows problems, recover files from a corrupted system, scan an infected system for malware, or provide a secure environment for online banking and other important tasks.
Linux is a tried-and-true, open source operating system released in 1991 for computers, but its use has expanded to underpin systems for cars, phones, web-servers and, more recently, networking gear.
It’s longevity, maturity and security make it one of the most trusted OSes available today, meaning it is ideal for commercial network devices as well as enterprises that want to use it and its peripherals to customize their own network and data center infrastructure.
How can we make a workload easier on cloud? In a previous article we presented the lay of the land for HPC workload management in an OpenStack environment. A substantial part of the work done to date focuses on automating the creation of a software-defined workload management environment – SLURM-as-a-Service.
SLURM is only one narrow (but widely used) use case in a broad ecosystem of multi-node scientific application clusters: let’s not over-specialize. It raises the question of what is needed to make a generally useful, flexible system for creating Cluster-as-a-Service?
In the world where everyone wants to be in the cloud because it’s the cool place to be; a movement to design applications specifically to run in a cloud environment was somewhat natural and inevitable.
I started thinking back over the past 15 years of my career. The practices that were being put in place by companies in readiness for the Enterprise Java era were based on solid foundations and years of experience of operating production systems. I had left my University degree armed with knowledge of EJB, rpc, early agile methodologies and little beyond the theory of how mission critical systems were constructed. Developers just cared about development, operations/sys admins sat in another part of the office and unless an issue came up during the initial handover period there would be minimal communication. I remember the time when I bought J2EE without EJB and it felt completely revolutionary.
The American consumer goods testing publications Consumer Reports has removed its "recommended" designation from four Microsoft laptops because of poor reliability compared to most other brands.
25 per cent of users will notice borkage within two years
This laptop is not meant to be opened or repaired; you can’t get inside without inflicting a lot of damage.
The CPU, RAM, and onboard storage are soldered to the motherboard, making upgrades a no-go.
The headphone jack, while modular, can only be accessed by removing the heat sink, fan, display, and motherboard.
The battery is difficult and dangerous to replace, giving the device a limited lifespan.
Cyber security vendor Kaspersky Lab has dropped its anti-trust actions against Microsoft after the latter agreed to make changes to address the concerns the former had raised in its plaints to Russian, German and European Commission authorities.
AWS is now a member of the open-source effort that is building Kubernetes, but that doesn't necessarily mean that Amazon will launch its own Kubernetes service.
For those thinking of switching to the new multi-queue block layer, a.k.a. blk-mq, be forewarned that there are still some regressions outstanding.
Long story short, if moving to the multi-queue block layer there are throughput and latency problems still outstanding, which can come up with any of the blk-mq I/O schedulers and many of the commonly used file-systems.
The long-awaited Heterogeneous Memory Management (HMM) work for the Linux kernel may be a step closer to mainlining now that Nouveau patches are in the works for this functionality as part of a seemingly new compute effort for this open-source NVIDIA driver.
Unfortunately, no Linux results to share today... At first AMD wasn't planning on sending Phoronix any Threadripper samples but then on Monday following the Ryzen Linux issue incident I was told that we would indeed be getting Threadripper and Epyc samples. Still waiting on them, but as soon as they arrive, I will be going benchmark crazy. Stay tuned.
For those that haven't been following the development of Sway, it's an i3-compatible Wayland compositor that works with existing i3 configuration files and continues supporting the latest Wayland functionality.
A Phoronix reader allowed me to access his Radeon Vega Frontier Edition system when checking on the ROCm OpenCL benchmark and uploaded the data to OpenBenchmarking.org.
The box I had remote access to had the Radeon Vega Frontier Edition accelerator with AMD Ryzen 5 1600 + Gigabyte AB350M-D3H motherboard, 12GB RAM, and Samsung 960 EVO SSD. The system was using Ubuntu 16.04 LTS x86_64 and was using ROCm 1.6 with its 4.11-compute-rocm-rel kernel.
There are many different tools and applications to help enhance speed and productivity in GNU/Linux.
One of the greatest things about the operating system is its flexibility; granted it can sometimes come with a cost of complexity – Thankfully Albert is simple to install and even easier to use!
ââ¬â¹Adobe Reader has been known to be among the best PDF viewers and readers on most PC platforms. The free version of Adobe reader provides features such as; viewing and reading of documents, adding annotations to documents and provides printing functionalities. The Adobe Acrobat PRO which is a paid version provides additional features such as PDF editing, conversion, and signing of PDFs.
Today’s Atom 1.19 release offers improved performance and responsiveness via major architectural updates and an upgrade to Electron 1.6.9.
GitHub's Atom developer Ian Olsen is pleased to announce the promotion of the Atom 1.19 open-source hackable text editor to the stable channel for all supported platforms, including GNU/Linux, macOS, and Microsoft Windows.
It's been almost two months since Atom 1.19 entered Beta stages of development, along with the promotion of Atom 1.18 to the stable channel, which introduced Git and GitHub integration straight into the heart of the editor, and the biggest new change is improvements to responsiveness and memory usage by implementing a native C++ text buffer.
Based on the Chromium 60 open-source web browser, Opera 47 is now ready to conquer your Linux, Mac, or Windows desktop with its numerous enhancements and new features, starting with the ability to export all of your bookmarks to a single HTML file that you can import on another Opera instance, or a different web browser.
If you are going to download the app for Android, make sure that it runs on Android version 4.1 and later. The latest update can be downloaded from the Google Play Store in the device. The update was released in May 2017 to cater to the needs of Android users.
OBS Studio [Official Site], the best way to livestream on Linux has a fresh release out and it's a bit of a big one.
For those into real-time tactics video games or titles themed around World War II, Sudden Strike 4 is launching today and Kalypso Media has made good on their word for day-one Linux support.
This latest installment in the Sudden Strike franchise has both single-player missions and multi-player action. Listed Linux requirements are a Radeon HD 7850 or GeForce GTX 660 series. Recommended, however, is a Radeon RX 470 or GeForce GTX 1050 Ti or better. SteamOS and (strangely) Ubuntu 15.10 are listed as the supported Linux operating systems; the Ubuntu 15.10 reference is odd considering it's not an LTS release and was EOL'ed a while ago, but presumably should work fine anyhow on newer Ubuntu Linux releases.
Sudden Strike 4 [Steam] is the first in the series to have Linux support, it releases later today with day-1 Linux support. Here's what I think so far.
Well, that didn't take long did it! The RPG GOKEN [Steam] is now available on Linux after user requests were made, the developers decided to do it.
Fictorum [Steam, Official Site] is an action RPG that features destructible environments and it seems it might be coming to Linux.
I'm going to be honest, I think Feral dropped the ball on this one quite badly. Total War: WARHAMMER just got a new DLC, 'Norsca', [Steam] which released for Windows. Sadly Linux & Mac gamers have to wait on it which wasn't communicated very well.
The DLC pack had a SteamOS icon during the pre-order phase and it still does have a SteamOS icon right now indicating it supports Linux (same with Mac). The problem is, that you would only have known it wasn't going to release on the same day if you went to the Steam store page for the DLC, expanded the full DLC description, scrolled right to the bottom (it's quite lengthy) and saw the one-liner about "Norsca coming soon to macOS and Linux".
A few days back I wrote about an open-source Vulkan renderer coming for Doom 3, yes, the classic id Software video game. That Vulkan renderer for the id Tech 4 engine is now available.
Dustin Land of id Software has been working on the "vkNeo" project in his spare/personal time as a Vulkan renderer for Doom 3 BFG / idTech4, which was open-sourced a few years back. This is along the same lines as the vkQuake open-source port of the original Quake to running on Vulkan.
Personally, I've been testing out Sudden Strike 4 which releases with day-1 Linux support tomorrow. I'm going to be livestreaming a preview of it in about 10 minutes on our Twitch channel. So far, so good and I will have more thorough thoughts on it at release! Remember to keep an eye on the sidebar, as it list the next livestream and this page where you can see our schedule.
Astral Traveler [Official Site, Steam], what the developer is calling a 'runner style' racer, where you keep on going and going while dodge obstacles and shoot down enemies is release next month, with Linux support.
We have finally first binary snapshot (pre-alpha) available for Qt 5.10 via online installer. You can do clean installation by using online installer or add this under existing online installation by using its maintenance tool (detailed instructions here: https://wiki.qt.io/How_to_get_snapshot_via_online_installer). You will find Qt 5.10 under 'preview' node from installer UI.
It's considered pre-alpha quality so most of you will probably want to avoid it, but those wanting to easily test out the early Qt 5.10 state at least now have a binary package.
Jani Heikkinen of The Qt Company announced this morning a pre-alpha binary snapshot of Qt 5.10 using their online installer. Details or to grab it via this mailing list post.
Back in 2013, when I last wrote something on the topic, I suppose I was having to manage the transition of Kubuntu from KDE 3 to KDE 4 on another person’s computer, perhaps not having to encounter this yet on my own Debian system. This transition required me to confront the arguably dubious user interface design decisions made for KDE 4. I had to deal with things like the way the desktop background no longer behaved as it had done on most systems for many years, requiring things like the “folder view” widget to show desktop icons. Disappointingly, my most recent experience involved revisiting and replaying some of these annoyances.
This year's akademy held in Almeria, Spain was a great success.
We ( the neon team ) have decided to move to using snappy container format for KDE applications in KDE Neon. This will begin in the dev/unstable builds while we sort out the kinks and heavily test it. We still have some roadblocks to overcome, but hope to work with the snappy team to resolve them.
Some of the talks, initiatives, conversations, and workshops that inspired me at Akademy. Thanks so much for the e.V. for sponsoring me.
A new extension helps to integrate key features of KDE Connect with GNOME Shell. The Mconnect GNOME extension allows you to quickly peek at your phone’s power levels, locate it when mislaid, and even send text messages to your Google contacts. What is KDE Connect again? KDE Connect is the easy way to connect Android to Ubuntu.
The GNOME Shell 3.25.90 release is available today which serves as its v3.26 beta.
In his talk at the 2017 GUADEC in Manchester, Richard Brown presented a set of objections to the current trend of new packaging systems — mostly AppImage, Snap, and Flatpak — from the perspective of a Linux distribution integrator.
Red Hat released the latest incremental update of its OpenShift container platform on August 9, providing users with new capabilities taken from the upstream open-source Kubernetes 1.6 release.
OpenShift has largely become a Red Hat distribution of Kubernetes in recent years, providing organizations Red Hatwith an enterprise-grade container management and orchestration system. The previous OpenShift 3.5 update debuted on April 13 and was based on the Kubernetes 1.5 milestone.
If the majority of large enterprises need mature systems on which to run their businesses rather than the sex-drugs-and-rock’n’roll of technology’s bleeding edges, then SUSE and Red Hat, the producers of the two main distributions of OpenStack, are ready to tell you it is now very much fit for that purpose
GParted maintainer Curtis Gedak announced the release and immediate availability for download of GParted 0.29.0 open-source disk partitioning tool, as well as the corresponding GParted Live 0.29.0-1 distribution.
The Rhythmbox music player will look very different in Ubuntu 17.10, due for release later this year. But the changes on show aren’t because there’s been a new release. Instead, Ubuntu devs plan to make use of a new third-party plugin to give the player a dramatic new look and feel.
If you’re thinking July = holidays… think again! This month’s pick of the top snaps is all about productivity. Graphic design tools, web code editor, Go IDE, JSON configuration, blockchain wallet and Openstack… Ready for an active summer?
Canonical's James Donner published the August 10, 2017, weekly update of Ubuntu Security team's activities, which managed to triage 242 security vulnerability reports and post 13 USNs (Ubuntu Security Notices).
According to the report, a total of 242 public security vulnerability reports were triaged by the Ubuntu Security team, who managed to retain only 57 of them that affected various of the supported Ubuntu Linux releases, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus), and Ubuntu 14.04 LTS (Trusty Tahr).
A Berlin developer has launched the VoltaStream Zero, a hand-crafted and open-source integrated audio module in the same form as a Raspberry Pi Zero.
Despite the similar form to the Raspberry Pi Zero, the VoltaStream Zero from PolyVector is an entirely different platform, thanks to its in-built Texas Instruments (TI) digital audio converters (DACs). Their inclusion partially explains the VoltaStream Zero's price, which starts at €50 ($52) compared with the Raspberry Pi Zero's $5.
GNU/Linux developer Arne Exton on Thursday announced the release and general availability of a new stable build of his Ubuntu-based RaspEX Linux operating system for Raspberry Pi 3 and 2 single-board computers.
Aaeon’s 10.1-inch “ACP-1106” and 7-inch “ACP-1076” multi-touch panel PCs offer extended temperature, shock, vibration, ingress, and surge protection.
Aaeon has updated its ACP line of multi-touch infotainment panel PCs, which include its Bay Trail Intel Atom based ACP-1104, with two new models that run on Intel’s Apollo Lake SoCs. The 10.1-inch, 1280 x 800 ACP-1106 and 7-inch, 1024 x 600 ACP-1076 are designed for high-EMI panel PC systems, kiosks, and smart factory HMI systems in applications such as product line management, smart city power grids, and other data-driven service management tasks, says Aaeon.
What ever happened to the Essential phone? I've been asking myself that question for weeks. Andy Rubin, the founder of Android, went public with a new smartphone company in May to great fanfare, and its first product, the Essential phone, looked like a slim-bezel wonder with a quirky front camera placement that cut into the screen. The body was titanium and ceramic, the specs were high-end with a Snapdragon 835, and it was yet another phone with a wacky modular accessory system. Rubin himself promised that the device would be released by June 30, but that date came and went without a peep from Essential. Then July passed. Now it's August.
That was the case of 23-year-old Mackenzie Burnett, product manager at container infrastructure software organisation CoreOS, and 24-year-old Dan Gillespie, software engineer also at CoreOS.
Burnett graduated from the University of Maryland, College Park in 2015 with a double degree in International Relations and Government & Politics.
If there’s one technical expression likely to induce nausea in most industry watchers it is (arguably) digital (or user) experience.
Sometime even written as User eXperience (UX), this term is thankfully absent from TechTarget’s Computer Glossary pages, yet still, it exists.
[...]
Despite the initial UX fluffiness, Liferay is admirably open source and the firm has now introduced a dedicated Liferay Developer Relations team, a new Liferay Community website and a new Liferay Community instant-chat vehicle to make it easier for the open source community to engage.
Created by Mashape, Kong acts as a management layer for all your APIs. It sits between the microservices that contain the API agents and the load balancer that routes requests across all APIs. Powered by Nginx, Kong excels at distributing API tasks, whether on premises or in the cloud. It can be set up in a single or multi-data center environment and is compatible with any modern infrastructure stack.
Based on plug-ins, Kong is easy to extend and has ready-made plug-ins for many popular services. For example, it can be used to manage and invoke Amazon Web Services Lambda functions, and monitoring data can be sent to a monitoring tool, like Datadog, or a logging service, like Loggly.
DLT Solutions and Hortonworks have teamed up to expand the adoption of open source-based analytics platforms designed to help federal agencies and other public sector institutions perform data analysis and management operations.
When I started my first company, money was tight. We had a small office and a couple of computers, but not much else. I'd done all my cost planning without even thinking about business licenses and software costs. I know it was a mistake, but it can be easy to treat these sorts of things as an afterthought.
“Open source culture” is something many of us who work with the open source community, either directly or indirectly, believe we have a handle on. There’s a general presumption that it should center around the concept of sharing ideas, and contribute to a broader ideal of building better software.
I work daily with content management tools and support documentation writers whose preferred markup language is AsciiDoc. It has a simple syntax, but enough features to keep even a hardcore documentation nerd happy. AsciiDoc allows you to write documentation in a more natural way and mark it up cleanly for presentation on the web or as a PDF. This got me thinking, "Wouldn't it be handy to be able to maintain a website purely with AsciiDoc?"
After some googling and chatting with colleagues, I found Hugo, a publishing platform that can transform articles written in Markdown or AsciiDoc into usable content for the web. It is a very feature-rich platform, with a rich language for working with templates and theming, and it's a lot of fun to work with.
One big advantage to me is that Hugo doesn't require a database to support a blog site with plenty of functionality. The pages are rendered in HTML, so sites are blazingly fast and very easy to maintain. It even comes with its own server, so I can test my site while I work on it. As long as your server can deliver HTML, you're good to go.
Business software company Docker Inc. is raising fresh funds, valuing the company at $1.3 billion, according to people familiar with the matter.
The latest influx of $75 million, which is expected to close by the end of the month, will help fuel Docker’s newest push to win business customers and finally monetize its free open-source tools popular with developers worldwide. Part of the funding will go toward building a sales and marketing team for corporate clients, one of the people said, asking not to be identified discussing private matters. The valuation would represent a marginal increase from the $1 billion it was ascribed when it last raised money in 2015.
Initial enablement of the ARMv8.3-A architecture changes are now in place for the LLVM compiler infrastructure.
The ARMv8.3-A update to the ARMv8 architecture include features pertaining to pointer authentication, nested virtualization, advanced SIMD complex number support, improved JavaScript type conversion support, changes to the memory consistency model, and an ID mechanism support for larger system-visible caches.
The second release candidate has been tagged for the upcoming LLVM 5.0 release.
Hans Wennborg wrote that there are still "a bunch of open release blockers", but many patches have been merged since 5.0 RC1 so he is hoping for some fresh testing.
My children were both early talkers and they interact fluently with others. I notice other things. When they’ve spent too much time on the phone, they are more bad tempered with each other and irascible with me. They show less interest in non-screen based toys and games. And when I try to take the screen away from them, they behave – there’s no other way to put this – like addicts, screaming, grabbing for it and dissolving into meltdown.
It’s not that my views of tech have changed too much — it’s that they’ve changed very gradually. Teasing out and explaining any one particular change is tricky when it happened invisibly over the course of 10+ years.
I think a better framework for this is to consider how my relationship to tech has changed. It’s gone through three pretty distinct phases, each of which has strongly colored how I feel and talk about technology.
For those drawn by the performance of AMD's Ryzen processors for its performance/value and thinking about building a Kodi/HTPC media box for the living room, a Steam Linux gaming PC / DIY Steam Box, or just want a small form factor PC, Gigabyte's AB350N-GAMING WiFi is a mini-ITX motherboard that plays fine with Linux and offers a lot of functionality for its small size.
Jones’ wildly popular supplements, sold on his Infowars.com site, are nothing more than humdrum vitamin blends that have little-to-no data supporting touted health benefits—basically the same as the vitamins found in any pharmacy or health store, according to independent lab testing. But there are two key differences: the far-right talk show hosts’ supplements are far more expensive and they tend to be weaker than garden-variety supplements. Reminiscent of the extensively watered-down treatments used by homeopaths, Jones’ supplements were often diluted such that even if those vitamin and herbal blends did offer some health benefits, the doses would likely be too small to be effective.
That’s all according to an independent lab analysis performed on several of the supplements by Labdoor, a San Francisco-based lab that tests dietary supplements. The analysis was done at the behest of BuzzFeed News, which reported the results late Wednesday.
Researchers used the latest gene editing technology to deactivate 25 remnants of ancient viruses, called porcine endogenous retroviruses (PERVs), that had embedded in the DNA of a pig cell line. Pig genomes are rife with lurking PERVs, which threaten to emerge and infect humans. But with a genome wiped of active viruses, the researchers produced 37 piglets that are PERV-free. The creation of those clean little porkers, reported Thursday in Science, is progress toward using pigs as human organ donors, the researchers say.
“Our study highlighted the value of PERV inactivation to prevent cross-species viral transmission and demonstrated the successful production of PERV-inactivated animals to address the safety concern in clinical xenotransplantation,” the authors concluded.
Since its creation by Congress 25 years ago, NOAA's Hawaiian Islands Humpback Whale National Marine Sanctuary has been vital to the protection of humpback whales, being the only place in the United States where these majestic cetaceans reproduce. Scientists estimate that up to 12,000 whales—more than half of the North Pacific humpback population—return to Hawaiian waters from November through May to breed, calve, and nurse their young. No one knows exactly how long humpback whales have been mating and reproducing in the islands' warm, shallow waters, but narrative reports from whalers document seeing them as early as the 1840s.
Bill Burr had advised users to change their password every 90 days and to muddle up words by adding capital letters, numbers and symbols - so, for example, "protected" might become "pr0t3cT3d4!".
The problem, he believes, is that the theory came unstuck in practice.
Mr Burr now acknowledges that his 2003 manual was "barking up the wrong tree".
At Defcon in Las Vegas last month, word rapidly spread that two speakers—members of Salesforce's internal "red team"—had been fired by a senior executive from Salesforce "as they left the stage." Those two speakers, who presented under their Twitter handles, were Josh "FuzzyNop" Schwartz, Salesforce's director of offensive security, and John Cramb, a senior offensive security engineer.
The Pacer court document service used by more than a million journalists and lawyers has raked in more than $1 billion since it was established in 1995, but a new report questions whether its administrators have put enough of that windfall into securing the system. Hanging in the balance is the reliability of a service that's crucial for the smooth functioning of the entire US federal court system.
Until Wednesday, Pacer suffered from a vulnerability that made it possible for hackers to charge download and search-query fees to other users, as long as those users visited a booby-trapped webpage while logged in to a Pacer website. Officials with the non-profit known as the Free Law Project also speculate that the same flaw—known as a cross-site request forgery—may also have allowed hackers to file court documents on behalf of unsuspecting attorneys who happened to be logged in to Pacer. If the speculation is correct, the flaw had the potential to severely disrupt or complicate ongoing court cases. Pacer administrators, however, have told Free Law the fraudulent filing hack wasn't possible.
Even if the hypothesis is wrong, the flaw still made it possible for hackers to cause Pacer users to be billed for services they never requested. The users would have a hard time figuring out why they were being charged for downloads and searches they never made. Even when the users changed passwords, their accounts could still rack up fraudulent charges whenever they were simultaneously logged in to the hacked or malicious site and one of the Pacer sites.
When I first set out to start my company, I received some backlash from a former colleague that cybersecurity was not “interesting anymore.” I disagreed, which I’m sure most people now do. As technology evolves, there will always be new ways (and new groups) to hack into systems, whether it’s for fun, profit or for national security reasons. That’s why it’s no surprise that within the past few years, cybersecurity has been a top concern for businesses. According to a recent report, cybercrime damages will cost the world $6 trillion annually by 2021, up from $3 trillion just a year ago, proving that enterprises literally cannot afford to forgo strong cybersecurity measures.
A new way to run the internet would scupper ransomware and hacking, but its authoritarian backers could control everything we do online
Adversarial attacks are an increasingly worrisome threat to the performance of artificial intelligence applications. If an attacker can introduce nearly invisible alterations to image, video, speech, and other data for the purpose of fooling AI-powered classification tools, it will be difficult to trust this otherwise sophisticated technology to do its job effectively.
Imagine how such attacks could undermine AI-powered autonomous vehicles ability to recognize obstacles, content filters’ effectiveness in blocking disturbing images, or in access systems’ ability to deter unauthorized entry.
It’s sure to win favor among hawks of both parties, while distracting the media and public from his domestic woes—but foreign powers are not backing down.
Gina Miller has done more for the independence and supremacy of the UK parliament than any parliamentarian one can think of. It was her (and others’) legal case that led the Supreme Court holding that it was for parliament and not the executive to make the Article 50 decision.
And now, this horrific story at The Guardian: “Gina Miller afraid to leave her home after threats of acid attacks”
Wisconsin’s plan to treat Foxconn to $3 billion in tax breaks in exchange for a $10 billion factory is looking less and less like a good deal for the state. In a report issued this week, Wisconsin’s Legislative Fiscal Bureau said that the state wouldn’t break even on its investment until 2043 — and that’s in an absolute best-case scenario.
Oddly, in an age of global cosmopolitanism, “corporate social responsibility” campaigns, and technocratic regulations, we haven’t evolved out of medieval labor practices like enslavement and child labor. But could technology hold the key to cleaning up the global supply chain?
The suit revolves around the June 2016 vote to increase the size of the board’s voting directors from eight to 11 seats, with Kalanick having the sole right to designate those seats. Benchmark says it never would have voted to allow for those extra seats had it known about Kalanick’s "gross mismanagement and other misconduct at Uber.”
Travis Kalanick, the recently removed CEO of Uber, has been sued by a group of investors that has accused him of "gross mismanagement and misconduct" during his tenure.
Benchmark Capital Partners, which currently holds 13 percent of the company’s stock and about 20 percent of its voting power on the board of directors, filed the lawsuit against Kalanick and Uber on Thursday. (The case was first reported by Axios.)
The complaint (which was filed in Delaware Court of Chancery as it involves two companies incorporated in the state) outlines in one fell swoop the myriad complaints that have befallen Uber during Kalanick's time as CEO. These include reports on sexual harassment, Greyball, the questionable acquisition of Otto (and the resulting in the still ongoing lawsuit from Waymo that followed), and other widely reported missteps.
A blockchain-based cloud storage technology called Filecoin has already raised $52 million from investors. The company is poised to raise millions more on Thursday when it begins selling units of its bitcoin-like cryptocurrency to a larger set of wealthy investors.
Amazon paid just €16.5m (€£15m) in tax on European revenues of €21.6bn (€£19.5bn) reported through Luxembourg in 2016.
The figures, published in Amazon’s latest annual accounts for its European online retail business, are likely to reignite the debate about US tech companies using complex crossborder arrangements to minimise the tax they pay across the continent.
Separately, Amazon UK Services – the company’s warehouse and logistics operation that employs almost two-thirds of its 24,000 UK staff – more than halved its declared UK corporation tax bill from €£15.8m to €£7.4m year-on-year in 2016.
The cut came despite turnover at the UK business, which handles the packing and delivery of parcels and functions such as customer service, rising from €£946m to €£1.46bn.
The Times does a good report on the (obvious?) point that once EU law eases to have effect, remedies under EU law such as “Francovich” damages (for UK’s failure to properly implement EU law) are no longer are available.
I understand people can have reasonable differences of opinion on trade deals like the Trans-Pacific Partnership (TPP), but why is it that the proponents have to insist, with zero evidence, that not doing the deal was an economic disaster? Yes, I know the political argument, which seemed to arise late in the game, that US standing in the world has collapsed because we didn’t follow through on the TPP. But let’s just stick with the economics.
Politico (8/7/17) ran a lengthy piece saying that the US pullout from the TPP undermined the hopes for a revival of rural America. It cited as evidence a report from the United States International Trade Commission that projected the deal would have increased agricultural output by 0.5 percent when fully phased in, 15 years from now. Seriously, folks, a 0.5 percent increase in output is going to save rural America? That’s three months of normal growth; who are you trying to fool?
The piece uses the term “conspiracy” or “conspiracies” 45 times, but somehow—in all the hand-wringing over their dangerous effects—omits the two most pernicious and consequential conspiracy theories of modern times: that Saddam Hussein had a hand in 9/11 and that Iraq had Weapons of Mass Destruction. Fake Moon landings and healing crystals may be easier to deride, but their actual effect on politics, globally and domestically, is thus far (thankfully) fairly trivial. The same can’t be said for the dual conspiracies that Iraq was working with Al Qaeda to knock down the Twin Towers and was—despite all evidence to the contrary—building an active nuclear, chemical and biological weapons program.
President Donald Trump’s White House is being put in the awkward position of having to choose sides between major donors and its own senior staffers. On Wednesday night, a right-wing, pro-Israel lobby group funded largely by the Adelson family — which also gave millions to Trump’s presidential campaign and inauguration — launched a broadside attack against National Security Adviser Lt. Gen. H. R. McMaster.
The Zionist Organization of America announced Monday that it was undertaking a review of McMaster’s record on Israel, according to an “exclusive” story in the right-wing website, Breitbart. On Wednesday, the group released a statement calling for McMaster to be reassigned from the National Security Council because, according to the ZOA, he “purged from the NSC those officials who were carrying out President Trump’s policies of combating Iranian and radical Islamist transnational threats.”
Almost all posts on social media include depictions of real people. And most social media websites include advertising. Does this combination mean that nearly everyone featured on social media can sue for infringement of their right of publicity? That would be disruptive. Fortunately, a new ruling [PDF] by the California Court of Appeal confirms that more is needed for a right of publicity claim. This is a big win for free expression online.
The decision comes in a case called Cross v. Facebook. The case was brought by a country-rap artist who performs under the stage name Mikel Knight. He promotes his music using “street teams” that sell CDs out of vans. After these vans were involved in several accidents (causing two deaths), Knight was accused of pushing his sales teams too hard and creating an unsafe environment. Some Facebook users created a page called ‘Families Against Mikel Knight’ where ex-street team members and others could comment on Knight’s operation.
[...]
This is the right result. Courts had previously held, for example, that a magazine article does not give rise to a right of publicity claim just because it is placed next to an advertisement. There is no reason to have a different, less protective, rule for the Internet.
Since it found that Knight had not pleaded a viable right of publicity claim, the appellate court did not decide whether his claim was also barred by CDA 230 or the First Amendment. But even though it did not reach these issues, the ruling places an important limit on the right of publicity and is a victory for online speech.
Free speech can make for some strange bedfellows at times, and the ACLU certainly has a history of defending the free speech rights of people from across the political spectrum (and out to the extremes). The ACLU's willingness to defend just about anyone's free speech rights sometimes confuses people who incorrectly think that free speech should only be protected for people you agree with. The most famous example of the ACLU's willingness to protect the free speech rights of those that they themselves likely disagree with is the famous case in which it defended the right of the KKK to march in Skokie, Illinois. But the ACLU may have just filed a new case that people can point to -- as they seem to have collected plaintiffs from different extremes of the political spectrum, all suing over the DC Metro's refusal to accept their controversial ads. In this case, the ACLU is representing "I just want to seem so controversial" Milo Yiannopoulos's company Milo Worldwide, as well as PETA (you know who they are) and Carafem (a healthcare organization that helps women get birth control and abortions). Oh, and themselves.
Poets are a big deal in Iran, and Forugh Farrokhzad was one of the biggest. In the 1960s, her modern, highly personal work won wide acclaim and brought her the poetry equivalent of rock stardom — she cut records, made films, and even today is known popularly by her first name.
Without free speech people stop thinking, losing out on all but a narrowing band of ideas. Open discussion, debate, and argument are the core of democracy. Bad ideas are defeated by good ideas. Fascism seeks to close off all ideas except its own.
Yet all of these most basic concepts of free speech in our nation are under threat, and too many of them are under threat from the left. I never thought I would write that last phrase, just as I never thought I’d need to explain five bad arguments the Left is using to restrict speech from the Right.
[...]
The arrival in 2017 of neo-nazis, alt-right, white supremacists, racists, and the many flavors of ‘phobes is sadly nothing new. The current poster children for hate, Richard Spencer, Milo Yiannopoulos, Ann Coulter, and Charles Murray, are no one new either (Coulter’s first book came out in 1998; Murray published his loathed book on welfare in 1984 and both have spoken publicly ever since.) What does seem to be new is that their opposition — the antifa, the anti-fascists — is now aggressively embracing many of the same tools once used to try and stop the anti-war movement, feminists, and other progressive groups in the past. The justification is Everything Is Different since November’s election, and the old rules not only don’t apply, but that wishy-washy democratic ideals of free speech are now a threat to democracy.
In late July, the San Francisco-based company, Lyft, sent an email to its drivers that read: “Email press@lyft.com if you’re ever contacted by a reporter. Speaking of Lyft in the news: We’re here to help if you get approached for an interview. Shoot a note to our communications team and they’ll make sure you’re prepared for any questions.”
The move is drawing rebuke from drivers, who in internet forums and elsewhere expressed fear of crackdowns on freedom of speech and questioned the company’s labor fairness.
China, on the other hand, has about 75 crore people using the Internet in a country which doesn’t allow the use of mainstream networking websites like Facebook, Twitter, and Google. In such a scenario, China, unlike the rest of the world – including India, is not dependent on American social media websites or search engines.
While much of the media obsesses over a pointless debate about whether “free speech” should protect an employee who abuses his co-workers with outrageous claims masquerading as “science” (the answer is no), there’s a serious assault on real science underway. Conservatives, including those in the Trump administration, are now trying to undermine the ability of scientists and activists to communicate ideas to the public. Climate change, unlike the supposed intellectual inferiority of women, is a genuine scientific finding with a strong consensus behind it. That’s likely why the right is increasingly looking to McCarthyite tactics to demonize and suppress information about it.
As you likely recall, last week the ACLU of West Virginia asked the federal court handling the very upset coal boss Bob Murray's defamation lawsuit against comedian John Oliver to allow it to file a hilarious amicus brief explaining (among other things) why it was perfectly legal to say "Eat shit, Bob." As we noted at the time, it is a very funny filing, but we weren't sure the court would allow it for a whole variety of reasons. And thus it's no surprise that Murray's lawyers are opposing the motion -- but we didn't expect that their opposition would be quite so ridiculous. There are lots of normal arguments they could make, including no need for an amicus brief at this point, or pointing out that the amicus arguments are likely to be simply duplicative of HBO/John Oliver's arguments, but... Murray's lawyers went a bit further. Apparently, they don't want the ACLU weighing in, because it has an opinion.
If you have ever wanted to use the wifi at a coffee shop or library, you have probably had to click through a screen to do it. This screen might have shown you the network’s Terms of Service and prompted you to click an “I agree” button. Depending on where you were, it might have asked you for information about yourself, like your email, social media accounts, room number (in a hotel), account number (in a library), or other identifying information. Sometimes you even have to watch a short video or ad before wifi access is granted.
These kinds of screens are called captive portals, and they interfere with wireless security without providing many user benefits.
[...]
For most networks, captive portals are an unnecessary barrier between users and a wireless connection. Instead of providing access benefits, they only make users less safe. As we collectively move away from captive portals in our businesses and public spaces, we can move toward more open, more privacy-protective wireless access.
The Supreme Court is going to take a look at the Fourth Amendment implications of warrantless access to historic cell site location information. The outlook for a Fourth Amendment win isn't particularly hopeful, given that there's no circuit split to be resolved. The lone holdout was the Fourth Circuit -- which originally had problems with the long-term collection of location information -- but that court reversed its earlier decision to align with other circuits which have addressed the issue.
That doesn't mean no one should try! Who knows what the court might decide, especially given the shifting telecommunications landscape. After all, it has managed to budge the 4th a wee bit now and then, even in decisions that were mostly punts or calls for the aggrieved to take it up with their Congressional reps.
The ACLU has filed a brief [PDF] on behalf of the appellants, pointing out what should be obvious: cell site location info isn't Just Another Third Party Record. It's a proxy tracking system for law enforcement, which can access this data without warrants. And it's only getting more precise every day.
A former head of MI5 has spoken out against curtailing use of encryption in messaging apps despite warning that Islamist terrorism will remain a threat for up to another 30 years.
Jonathan Evans said the terrorist threat to Britain was a “generational problem”, and suggested the Westminster Bridge attack in March may have had an energising effect on extremists.
Digital rights advocates asked the U.S. Supreme Court Thursday to review the case of an American convicted with evidence gathered under FISA Section 702 — warrantless National Security Agency surveillance authority meant to spy on foreign nationals.
Privacy and digital rights groups including the Electronic Frontier Foundation (EFF) filed a petition Thursday with the nation’s highest court seeking review of the case of Mohammed Mohamud, an American citizen who was charged in 2012 with planning to car-bomb a Christmas tree lighting ceremony in Portland, Oregon. Information used to prosecute Mohamud was gathered using Section 702 of the 2008 Foreign Intelligence Surveillance Amendments Act.
Just like the TitanPointe "long-lines building" in New York - an AT&T front where the NSA monitors huge volumes of communications that was exposed by The Intercept and a team of bloggers they worked with - this building in Birmingham, and similar ones in major cities anywhere and everywhere across the country, was not just there to reach out and touch someone.
The UK Home Office's ambiguous response to whether or not the Investigatory Powers Act gives the British government the authority to pressure or force people to work for GCHQ is troubling.
When Reg reader Simon Clubley pointed out the unclear wording of section 190 of the new law, it generated a lively debate among legal experts and security pros, covered by The Register back in May.
The law was ambiguously worded enough so that not even experts could discern whether or not the compulsion to assist in surveillance operations applied only to telecoms firms or whether it meant security experts could be press-ganged into assisting the UK's law enforcement and intel agencies.
If Facebook wins, and is allowed to roll out more features and services based on increasingly-accurate facial recognition of billions of people, we will be moving towards a world without outdoor anonymity, just as Rick Falkvinge predicted on this site four years ago. But it won’t just be Facebook, Google and Microsoft that are scanning and identifying us everywhere we go in the physical world. The FBI launched a $1 billion facial recognition project back in 2012, the US Customs and Border Protection is planning to apply facial recognition to all airline passengers, including US citizens, boarding flights exiting the country, and key figures on Donald Trump’s Homeland Security team have strong links to the facial recognition industry. The technology will soon be ubiquitous. Enjoy the possibility of public anonymity while you can.
This summer, the U.S. Department of Homeland Security (DHS) is expanding its program of subjecting U.S. and foreign citizens to facial recognition screening at international airports. This indiscriminate biometric surveillance program threatens the personal privacy of millions of travelers. DHS should end it.
The history of this program is a case study in mission creep. In 1996, Congress authorized automated tracking of foreign citizens as they enter and exit the U.S. In 2004, DHS began biometric screening of foreign citizens upon arrival. In 2016, DHS launched a pilot program of facial recognition screening of all travelers, U.S. and foreign citizens alike, on a daily international flight out of Atlanta’s Hartsfield-Jackson airport. In March 2017, President Trump’s revised travel ban ordered DHS to expedite the completion of biometric entry-exit screening of foreign citizens. Today, facial recognition screening is underway for all travelers on certain international flights out of two more pilot sites: Washington’s Dulles airport and Houston’s Bush airport. Later this summer, DHS will expand this program to five more international airports.
It’s hard to overstate how huge video is on Facebook. The social network ranks second only to YouTube for internet video. Earlier this year, Facebook CEO Mark Zuckerberg called video a “megatrend” and described the platform’s “video-first” strategy. Outside of YouTube, Facebook has the most robust data on users’ viewing habits: it knows what kinds of videos people watch, how long they watch them, and why. Which is why it makes a lot of sense for Facebook to leverage this data and launch a slate of premium shows.
Chinese vendors are facing backlash for selling customized photos and videos featuring African children via Chinese online marketplace Taobao. As reported by Beijing Youth Daily, these photos and videos have recently become popular as a way to deliver messages for birthdays and other meaningful occasions. They can be purchased for as little as $1, similar to services offered on freelance marketplace Fiverr.
Amos Yee alleged that he was repeatedly robbed by a fellow inmate who has been incarcerated in the same prison as Yee, in a Facebook post today.
Yee alleged that the inmate, Emmanuel “Bubba” Reyes – described as a 6’4ââ¬Â³ tall, muscular black man who weighs over 113kg – robbed money Yee was given to purchase food from the prison kiosk, multiple times.
He also reported that Reyes, who was convicted under illegal weapons and assault charges, has made a habit of intimidating other prisoners and stealing their food and money, with one 72-year-old inmate being thrashed for refusing to hand over his food to Reyes.
And that was at the Canadian border. Down south, treatment of citizens and (especially) non-citizens is even worse. The CBP has a vast amount of power but very minimal oversight. The fact that they deal with non-citizens frequently tends to result in a "They're not Americans, so who cares?" attitude.
Data obtained by the American Immigration Council shine a light on the lack of accountability and transparency which afflicts the U.S. Border Patrol and its parent agency, U.S. Customs and Border Protection (CBP). The data, which the Immigration Council acquired through a Freedom of Information Act (FOIA) request, covers 809 complaints of alleged abuse lodged against Border Patrol agents between January 2009 and January 2012. These cases run the gamut of physical, sexual, and verbal abuse. Although it is not possible to determine which cases had merit and which did not, it is astonishing that, among those cases in which a formal decision was issued, 97 percent resulted in “No Action Taken.” On average, CBP took 122 days to arrive at a decision when one was made. Moreover, among all complaints, 40 percent were still “pending investigation” when the complaint data were provided to the Immigration Council.
According to the Wall Street Journal, Google has abruptly canceled a company-wide meeting, scheduled for Thursday afternoon, that was intended to address employee questions about the company's diversity policies.
Questions submitted by employees on the company's internal network "appeared externally this afternoon, and on some websites Googlers are now being named personally," Google CEO Sundar Pichai wrote in an email announcing the cancellation. "Googlers are writing in, concerned about their safety and worried they may be 'outed' publicly for asking a question in the Town Hall."
It's the latest PR headache for a company that has been caught in a no-win situation since a controversial internal memo written by mid-level Google engineer James Damore surfaced over the weekend.
Google canceled a companywide meeting about diversity just before it was set to begin Thursday, citing safety concerns after right-wing commentators published the names of certain employees.
It’s fine to question Damore's characterization of women. (As a female engineer in Silicon Valley, I endorse his suggestion to “treat people as individuals, not as just another member of their group.”) It’s okay to disagree with the proposed solutions. But the backlash was egregiously swift and brutal. Google representatives issued multiple statements denouncing the document. Past and present colleagues chimed in over the weekend with calls for the engineer to be ousted. Media outlets like TechCrunch, Gizmodo and Motherboard jumped on board to declare the memo an “Anti-Diversity Manifesto.” It appears that the ideological echo chamber extends beyond Google’s campus.
Silicon Valley has a very peculiar definition of diversity that requires proportional representation from every gender and race, all of whom must think exactly alike.
The alt-right supporters of James Damore, the fired Google engineer who authored the so-called “anti-diversity” memo, are planning nationwide protests on Google’s US campuses.
The first demonstrations are slated to happen on Aug. 19 at five locations: Mountain View, California, where Google is headquartered; New York City; Washington, DC; Austin, Texas; and Boston, Massachusetts. A website for organizing the details for #MarchOnGoogle says it plans to hold protests at “every Google office.” The website says demonstrators might exercise their right to free speech by protesting “in front of the homes of Google’s executive team.”
On Monday, Google fired an engineer named James Damore for circulating an anti-diversity manifesto that claimed Google was too blinded by left-wing political bias to see that its women engineers were limited by their inferior biology. His dismissal alarmed conservatives who are now calling Damore’s firing an assault on political speech.
Right wing publications say that firing Damore is Google’s “warning shot” across the bow of democracy in an attempt to instate totalitarianism, and that the whole debacle proves that the goal of the left, according to the National Review, is that “the white male must lose.”
How little has changed in the treatment of Black Americans since the uprising in Detroit in July 1967.
Watching the movie “Detroit” was like looking into a mirror reflecting the present. For me, the story didn’t show how things have improved since 1967, it demonstrated how much remains the same 50 years later.
The movie is about the killing of three unarmed teenagers at the Algiers Motel and the shooting and beating of other civilians by the police during the Detroit uprising in July 1967. It starts with an animated history lesson explaining how black Americans migrated from the South to the North and ended up restricted to a few overcrowded neighborhoods. This is the legacy of redlining and the exclusion of Blacks from home-buying assistance provided by the G.I. Bill — a legacy that still explains much of the gap in net worth that exists between white and Black families in America today. Detroit, and most of America, is as segregated today as it was in 1967.
The police in “Detroit” showed how casually they would resort to violence against Black people, the same behavior we witness time and time again in recent videos of police misconduct. The culture of policing portrayed in the movie can be seen in places like Ferguson, Chicago, Baltimore, and Madison County, Mississippi, where the ACLU of Mississippi has filed a lawsuit against the county sheriff for illegal use of force against Black “suspects.”
Why is IPv6 such a complicated mess compared to IPv4? Wouldn't it be better if it had just been IPv4 with more address bits? But it's not, oh boy, is it ever not. So I started asking around. Here's what I found.
So we've noted for a while how despite all the hype surrounding next-gen wireless and gigabit fiber builds like Google Fiber, vast swaths of this country are actually facing less broadband competition than ever before. That's in large part thanks to the nation's phone companies, which have effectively given up on upgrading their lagging DSL networks at any real scale. One net result is millions of customers paying an arm and a leg for sub 6 Mbps DSL service that doesn't even technically meet the FCC's new standard 25 Mbps definition of broadband.
And it's not changing anytime soon. Verizon has all but frozen next-gen upgrades as it shifts its focus to gobbling up failed 90s internet brands to help it sling video advertisements at Millennials (poorly, we might add). But smaller telcos like Frontier, CenturyLink and Windstream have similarly been losing broadband customers hand over foot as they flee to faster cable competitors.
Last year, the FCC inquiry concluded that fixed line and mobile access were independently vital. However, under new Chairman Ajit "weed-whacker" Pai, the Republicans (natch) are arguing that a 10Mbps down and 1Mbps up via a cellular connection should count as "both" without the need for a fixed line.
This, of course, will delight the FCC at large, who would suddenly start meeting all sorts of targets they hadn't met before and look like the big I-am.
The move would change the FCC's definition of fast broadband from the current world-lagging 25Mbps/3Mbps to a pitiable 10Mbps/1Mbps.
A prisoners' rights group has accused Federal Communications Commission Chairman Ajit Pai of having a conflict of interest because he used to represent a prison phone company as a lawyer.
Under Pai's direction, the FCC dropped its court defense of rules capping the intrastate phone rates charged to prisoners. The decision helped prison phone companies—including Pai's former client, Securus Technologies—continue to charge high prices.
Pai "represented Securus as its attorney while employed as a partner with the law firm of Jenner & Block, LLP, immediately preceding his confirmation as FCC Commissioner in May 2012," Human Rights Defense Center Executive Director Paul Wright wrote in a filing with the commission yesterday.
As the Federal Communications Commission prepares to deregulate broadband providers and eliminate or weaken net neutrality rules, the commission has not yet made a ruling on a net neutrality complaint filed against Verizon more than a year ago.
There have been tens of thousands of "informal" net neutrality complaints filed since the rules took effect in 2015, but there has been only one formal complaint. Informal complaints can be filed for free but won't necessarily result in a ruling; formal complaints require a filing fee of $225 and kick off a court-like proceeding in which the parties appear before the FCC and file numerous documents to address legal issues.
[...]
The only formal net neutrality complaint was filed in July 2016 by a Verizon Wireless customer named Alex Nguyen, who alleged that the carrier has violated the rules with numerous actions that blocked third-party devices and applications from being used on its network. The complaint has its own docket, and Verizon has made several responses to the allegations, yet it has been so little-noticed that the people who wrote the FCC's proposal to repeal net neutrality rules seemingly forgot that it existed.
The hour-by-hour schedules of the heads of federal agencies and departments are not made publicly available as a matter of course. I’m requesting dozens of them via FOIA. The latest arrival is the calendar for the Chairman of the Federal Communications Commission, Ajit Pai, covering the first half of 2017.
A few months ago, we received confirmation of what many of us had feared: incoming Federal Communications Commission Chair Ajit Pai announced his plans to eliminate the clear, enforceable protections for net neutrality that the Commission had implemented in 2015.
Since then, people have stood up en masse in support of the open Internet. Over 18 million comments have been filed with the FCC—the majority of them opposing the Commission’s plan to roll back protections for net neutrality. (And it’s not too late! You still have one more week to file a comment of your own.)
Romag Fasteners v. Fossil is a rare infringement case that involves allegations of both patent and trademark infringement. The important aspect of the Federal Circuit’s decision here harmonizes the attorney fee requirements for trademark and patent cases.
A jury sided with Romag – finding that Fossil’s magnetic snaps infringed both the asserted patent and trademark (product design). (U.S. Patent No. 5,722,126 and U.S. Trademark Reg. No. 2,095,367).
The jury returned a verdict for Romag, finding that Fossil had engaged in patent and trademark infringement. The district court granted fees related to the patent portion of the case but denied fees on the trademark side. On appeal, the Federal Circuit has vacated that judgment.
Lanham Act and Patent Act provide identical language for awardinging reasonable attorney fees to the prevailing party in exceptional cases: “The court in exceptional cases may award reasonable attorney fees to the prevailing party.” 35 U.S.C. 285; 15 U.S.C. 1117(a). Based upon the identical language of the statutes, the appellate court here ruled that the Supreme Court’s Octane Fitness approach to fees in patent cases also applies in Trademark cases. The Second Circuit had previously (pre-Octane Fitness) required “evidence of fraud or bad faith.” Under Octane Fitness, that requirement is unduly strict and improper. All of the other Circuit courts who have considered the issue agree with the Federal Circuit that Octane Fitness applies to TM cases under Section 1117(a). Because the court applied the incorrect standard, this TM portion of the case was remanded to determine whether fees are appropriate.
There’s a bill in the California Assembly that we think would make postsecondary education more expensive for students. Not only that: we think that it would undermine students’ right to make fair uses of educational materials. To make matters worse, several states around the country appear to be considering similar measures.
S.B. 727 may seem benign. The bill’s purpose appears to be to give public colleges and universities more leeway in what types of course materials they assign to students and what types of pricing agreements they enter with the publishers of those materials. There’s a troubling provision, though, which says that institutions can assign texts that are “Delivered through a technology that is, or the license of which is, required to only be used within a course.” In other words, public colleges would be encouraged to assign materials that are locked down under arcane licensing agreements unfairly restricting how students can use them.
Being able to buy and sell used textbooks gives students an important lever with which to rein in unfair pricing tactics by publishers.
t
Warner/Chappell's DMCA takedown arm is so damn proactive it can kill YouTube videos containing as little as 0% of its IP.
Techdirt has just written about the amazing achievements of Sci-Hub, and how it now offers the vast majority of academic papers free online. One implication may be that traditional publishing, with high-cost journals hidden behind paywalls, is no longer viable. But as we noted, that doesn't mean that traditional publishers will disappear. For one thing, many are embracing open access, and finding it pretty profitable (some would say too profitable thanks to things like "double dipping".) But there's another way that academic publishers, particularly the biggest ones with deep pockets, can head off the threat to their profits from developments like Sci-Hub and open access: by diversifying.
Mike wrote about one example last year, when Elsevier bought the preprint service Social Science Research Network (SSRN), arguably the most popular repository of research in the fields of economics, law and the social sciences. Since SSRN deals in preprints, which can be freely downloaded, sites like Sci-Hub are no threat. Similarly, preprints are generally posted before submission to journals, and therefore can flourish whether or not those journals are open access.
The Archive has released 25,000 (count 'em!) digital versions of 78RPM records that were otherwise virtually unplayable and certainly otherwise unavailable.