In the tech world, innovation and new systems are great, but nothing moves unless the network can handle it. This truth makes networking very important for businesses, because a company can only be as agile as its network. Part of that agility comes from making the network easy to use. Open-source tech is coming to the rescue.
“The truth is, there’s a lot of work that goes into making the network invisible and ubiquitous for people,” said Ed Warnicke (pictured), distinguished consulting engineer at Cisco Systems Inc. “In particular, one of the challenges that we see arising as the world moves more cloud native, as the microservices get smaller, as the … the shift happens toward serverless, as Kubernetes [container orchestration management] is coming on with containers is that the network is really becoming the runtime, and that runtime has the need to scale and perform like it never has before.”
Warnicke delivered a lighting keynote talk titled, Bridging the Divide: Brining Network and DevOps People Together to Build a Unified Cloud Native Future. Warnicke started off his talk by outlining the shift in networking over the last decade from bare metal server needs to virtual machines.
With Virtual Machines, networking vendors built overlay network topologies and approaches that have enabled virtual networking
Based on data from the experiences of 1,500 Sumo Logic customers, the report gives other organizations a set of frameworks, best practices and hard stats to guide their migration to the cloud. It shows how developers build modern applications across each tier of the application architecture.
"Today's enterprises are striving to deliver high-performance, highly scalable and always-on digital services. These services are built on modern architectures -- an application stack with new tiers, technologies and microservices -- typically running on cloud platforms like AWS, Azure and Google Cloud Platform," said Kalyan Ramanathan, vice president of product marketing for Sumo Logic.
IBM (NYSE: IBM) today unveiled the IBM LinuxONE Emperor II, the next generation of its family of Linux-only enterprise systems, which delivers new capabilities aimed at helping organizations achieve very high levels of security and data privacy assurance while rapidly addressing unpredictable data and transaction growth.
IBM mainframes are alive, well, and being designed to make the most of Linux.
it involves creating a VM object and allocating hardware resources, such as memory, virtual network adapters and virtual CPUs. As simple as the creation process might be, however, the OS that will eventually be installed onto the VM requires some consideration. For example, the VM will need to be provisioned with enough memory to run the OS. In some cases, there may be additional considerations that need to be made beyond meeting the minimum hardware requirements of the OS. This can be especially true for a Linux VM.
Today’s topics include Linus Torvalds wanting hackers to join Linux before turning to the “dark side”; an Apache Struts vulnerability being the potential cause of the Equifax breach; ScanMyPhotos.com offering free photo digitizing to Texas and Florida residents; and Google’s appeal of its $2.9 billion EU antitrust fine.
At the Open Source Summit in Los Angeles on Sept. 11, Linux founder Linus Torvalds said one way to improve security is to get hackers to join Linux before they attack us. He also said the concept of absolute security in Linux doesn't exist.
"Even if we do a perfect job … let's be honest, there will always [be] bugs,"Torvalds said. There are a lot of security checks to help identify vulnerabilities in the Linux kernel. Therefore, as a technical person he is impressed by the ingenuity of the people who attack Linux code.
Open source software isn’t only growing. It’s actually accelerating exponentially in terms of its influence on technology and in society.
Last March we held a TODO Group track at Open Source Leadership Summit focused entirely on sharing best practices for businesses managing and building out open source programs. More than a dozen open source program leads and other leaders from companies shared their tips and best practices at the event.
Furthermore in the last year or so, we have seen companies like AWS build out an open source program via @AWSOpen and even companies like VMWare hired their first Chief Open Source Officer. We’ve had many organizations approach TODO Group members asking for advice on how to get started with an open source program.
Open Source Summit 2017 is going on these days. Linux and Open Source biggies from across the globe have flocked to LA to attend this event.
I'm announcing the release of the 4.13.2 kernel.
All users of the 4.13 kernel series must upgrade.
The updated 4.13.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.13.y and can be browsed at the normal kernel.org git web browser: http://git.kernel.org/?p=linux/kernel/git/stable/linux-st...
For those running Ubuntu/Debian and wanting a kernel with the very latest AMDGPU DRM support along with the very bleeding edge DC display code patches, I've done a fresh spin today in preparation for my latest RadeonSI/RADV Vega benchmarking.
The Cairo 2D vector graphics library used by GTK, Firefox, WebKit, and many other programs finally has an OpenGL ES 3.0 back-end merged.
Cairo supports many different backends from OpenGL to DirectFB to outputting as SVG/PDF/PostScript files as well as Skia, Direct2D, OpenVG, and other less notable code paths. Finally, OpenGL ES 3.0 is now supported by mainline Cairo.
GitHub, in collaboration with Facebook, are pleased to announce the launch of Atom-IDE - a set of optional packages to bring IDE-like functionality to Atom.
The start of this journey includes smarter context-aware auto-completion as well as a host of code navigation features such as an outline view, go to definition, find all references as well as other useful functions such as hover-to-reveal information, errors and warnings (diagnostics) and document formatting.
Our initial release includes packages for TypeScript, Flow, JavaScript, Java, C# and PHP that utilize the power of language servers to provide deep syntactical analysis of your code and projects. The language server protocol is being adopted by a number of organizations including Microsoft, Eclipse, Sourcegraph, Palantir, Red Hat, Facebook and now GitHub too!
Github has announced Atom IDE, an add-on that transforms the Atom text editor into a full IDE using language servers to provide syntactical analysis of code.
An updated version of MPV, the popular open-source media player, is available to download.
Sublime Text 3 has been officially released! I know; it feels like you’ve been using the beta builds for what feels like an eternity — but, at long last, a new stable release of the text editor is now available to download.
Sublime Text is one of best text editors around, there’s no doubt about that. Making this tool even better, its developers have just pushed the latest and much-awaited Sublime Text 3.0 release with new features.
There are some animation applications available but Synfig made its way trough crowd-funding and it's been successful. It is powerful, free, open-source vector-based 2D animation software package, developed from the scratch for producing feature-film quality 2D animation with fewer resources and people, it is released under the GNU General Public License. Synfig stores its animations in its own XML file format, often compressed with gzip. These files use the filename extension .sif (uncompressed), .sifz (compressed) or .sfg (zip container format). The files store vector graphics data, embed or reference external bitmap images, and also a revision history of the project. It can render to video formats such as AVI, Theora and MPEG, as well as animated graphics formats such as MNG and GIF. It can also render to a sequence of numbered image files, using formats such as PNG, BMP, PPM and OpenEXR.
Temps is a simple, free and open-source smart weather application, designed to stay on the desktop as a widget. It is cross-platform available for Linux, Windows and Mac. It is built using Electron, Menubar, Chart.js, and OpenWeatherMap technologies.
It does work with most of the desktops and lets you touch it visually. Basically it stays on the desktop as a widget and display current weather in any location around the world. It displays forecast for the following four days with current day.
Since this is a non-profit project, developer is not able to offer unlimited access to weather information that means you can signup to OpenWeatherMap API and create a free key for yourself.
Check out the Wiki page for code samples and an overview of how it works. To try it out now before 2.2 is released, check out the dev branch on GitHub. Regarding the release status, functions are stable now but we are waiting for possible changes to the other components of PiCluster.
The Linux version previously sat at 1.64 since December 2016, so this update is a pretty big one for us. Both in terms of the time it took to come out and what’s changed. We’re now at Arma 1.70, but we are still lagging behind the Windows version, so you might have trouble finding people to play with online.
Albion Online's "Joseph" update has been given a release date of September 27th and it does sound like a pretty good one.
This big update adds a bunch of notable features, my favourite of which is an Arena battle mode. This is where two teams of 5 battle for control points. If your team wins, you will gain Arena Sigils, which can be redeemed for vanity item rewards.
Want to help people and buy games? The Hurricane Relief Bundle on itch will help you do just that. It has a few Linux games in it too. I think ideas like this are great, I couldn't imagine the stress and heartache from having my house destroyed by such furious weather.
There's quite a few games in it, some of which I've never heard of. However, there is a few goodies in there to be aware of. It has Automata Empire, Gunmetal Arcadia Zero, Maia and plenty of others.
For those eagerly awaiting RUINER [Official Site], prepare to wait a little longer. It was announced quite quietly on Steam that the Linux version is delayed.
Valve pushed out a new Steam beta overnight and it's a bit heavier on the feature side.
First up, Steam should now have lower CPU usage and battery impact when Steam is running in the background. The background changes they made though to lower the impact were not mentioned.
The developer of HIVE: Altenum Wars [Steam, Official Site] has said it will "definitely" come to Linux, just not right away it seems.
Hive comes from Spanish developer, Catness Game Studios, with HIVE being their first game together. It's only made by three people too, considering how it looks from the trailer that's damn impressive.
Aspyr has brought over the latest update and DLC over Linux-side. There are many new improvements as well as a new civilization to try out.
This is a weird one, after blogging for a while about porting Banished to Linux (and Mac), the developer seems to have given up on it.
Astral Traveler [Steam, Official Site], the brand new runner-style racer from Dragon Slumber and Brainoid that released with day-1 Linux support. Here’s my review.
Hot Lava is the brainchild of Mark Laprairie, created something of a “passion project” before being hired by Klei Entertainment.
Nearing fruition the game still lacks a release date, but both early access beta and demos are seeing enthusiastic feedback.
In Hot Lava you play as a childhood toy, making your way through each environment with a combination of jumping, climbing, swinging, running and bouncing.
Each level is a throwback to the familiar stomping grounds of the typical childhood, as seen through the lens of a kid’s imagination. Oh, and the floor is lava.
Enlightenment 0.22 is now available in alpha form with a variety of improvements, including continued progress on Wayland.
The Enlightenment X window manager / Wayland compositor has continued getting better particularly over the last few years and the upcoming E22 release will be no different. The Enlightenment 0.22 Alpha that's out today has "greatly improved" Wayland support as one of the leading features, which has continued to get better since E20.
Today, the KDE project launched the Beta version of its upcoming Plasma 5.11 desktop environment for personal computers, giving the KDE community the first glimpse of what to expect from the final release later this fall.
Thursday, 14 Sep 2017. Today KDE publishes a testing release of this autumn's Plasma feature release, KDE Plasma 5.11, to be released in mid-October 2017. Plasma 5.11 will bring a redesigned settings app, improved notifications, a more powerful task manager. Plasma 5.11 will be the first release to contain the new “Vault”, a system to allow the user to encrypt and open sets of documents in a secure and user-friendly way, making Plasma an excellent choice for people dealing with private and confidential information.
The beta is now available of the upcoming KDE Plasma 5.11. There have been many changes baking for the Plasma 5.11 milestone.
Plasma 5.11 is rolling out a new system settings design, notification history, task manager improvements, Plasma Vault for making it easy to deal with file encryption, app launcher menu improvements, and better Wayland support.
I have decided to try to publish a short or not too short blog post each week some development happen in Elisa Git repository. I am inspired amongst others by the current posts about development of Kube.
[...]
I am still working on the notifications and a small progress has been made for the integration of visualizations when playing music.
This year the Randa KDE meeting it’s all about Accessibility: a big effort has been concentrated around two very intertwined things: keyboard navigation and screen reader support.
Accessibility in KDE and Qt is constantly improving. Sometimes a change of scenery helps focusing and brings up productivity. Mix that with a bunch of great people and good things will start happening. It has been possible to create accessible Qt applications on Linux for a while, but of course not everything will just work out of the box untested. A while back Mario asked me to join this year’s Randa Meeting where KDE people discuss and fix issues. It turns out that was a great idea. I haven’t been able to focus much on applications and user experience lately, but with this backdrop it works
Few weeks ago I attended QtCon Brasil, an event organised by Brazilian members in the KDE Community who wanted to have an outreach event to the local technology community about Qt and beyond. It was great.
The news is out! KDE and Purism are working together on a Free software smartphone featuring Plasma Mobile. Purism is running a crowdfunding campaign right now, and if that succeeds, with the help of KDE, the plan is to deliver a smartphone based on Plasma Mobile in January 2019.
KDE Plasma Mobile is coming to the Purism Librem 5. Purism and KDE have today announced a partnership that will see both projects work together to bring Plasma Mobile to the Librem 5 handset with the pooling of resources, developers and expertise.
Purism, Todd's company, produces the Librem computers, laptops with components that, where possible, are guaranteed to be respectful of the user's privacy. Their covers sport two hardware kill-switches, for example. One shuts off the camera. The other closes down WiFi and Bluetooth.
And, although not all components are open hardware, Purism is perfectly transparent about this, recognizes it's not ideal, and aims to replace them when it becomes possible. Purism's ultimate aim is to achieve what they call Purism Purist state, in which every single chip and board is totally free and open, with all the schematics published under a free licence.
When people think of Linux-based operating systems, they often imagine people typing in a terminal or coding in a basement while drinking Mountain Dew -- yeah, those stupid old stereotypes still exists, sadly. While that is surely part of the user base, other users choose an open source operating system for nothing more than using their computer as a tool. In other words, some folks use Ubuntu, Fedora, or other distros just to get normal stuff done -- word processing, web surfing, and more. No terminal. No coding. No religious-like experiences.
GNOME 3.26 has been officially released — hurrah! If you’ve been waiting on the official nod to pull the string of your celebratory party popper, that’s your cue!
I am incredibly excited for GNOME 3.26, and it’s been hard to wait for it. I openly admit this fact. This release saw serious, important improvements all over the places, new features landed, some others didn’t, thousands of bugs were fixed all across the platform, and I’d like to share my personal highlights for this release.
The new Q4OS 1.8.8 stable release updates core system packages and implements improvements. Q4OS Orion 1.8.8 is based on Debian 8.9 Jessie and Trinity R14.0.4 desktop environment, it's the maintenance release of the Q4OS 1.8 'Orion' series, and is built on and updates the previous version. Google Chrome, the default Live CD web browser, has been upgraded to its most recent version 61.0.3163.79. Other improvements include polished GTK3 themes, new first boot Systemd configuration script, and more.
The GNOME Project has finally released GNOME 3.26, which is the latest version of the most popular Linux desktop environment. After six months of development, this version, codenamed Manchester, has been released. “We are happy and proud to announce GNOME 3.26, the latest major release of GNOME, “Manchester”, just a few weeks after we celebrated the 20th birthday of GNOME at GUADEC,” the release announcement said.
Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today shared that enterprises in APAC countries such as Australia, China, India and Singapore have adopted Red Hat Ansible Tower, its enterprise-grade, agentless automation platform.
Linux has always done well in the server room.
As we know, Linux is particularly good at uptime, running multiple processes at once and configuration changes can be executed while systems are live and running. Linux is also eminently controllable and so well suited to the management backend… the list goes on and it’s a long one.
For those waiting on the CentOS rebuild of Red Hat Enterprise Linux 7.4, it's now available.
Red Hat Enterprise Linux 7.4 was released last month by Red Hat with USB Guard support, various security improvements, some performance improvements, and a variety of other updates. For those riding off CentOS, the equivalent 7.4 update is now available.
We've all been there. You're starting a new job, and you don't even know where the bathroom is, much less all the tools and processes necessary to get that job done. Onboarding in an open organization can be even trickier because of its unstructured environment and open culture. It may be up to you to define your role, and priorities can change quickly. Finding an "onboarding buddy" (or "onboarding peer") can make the transition into your job much less painful.
Hans de Goede's latest assignment at Red Hat is working to improve Linux laptop battery life.
Among the improvements he is targeting is to enable more runtime power management tunables and one of
While Fedora 27 did away with alpha releases, now it's time for the beta but it is yet another release setback by at least one delay.
Fedora 27 was supposed to ship next week but is now being pushed back another week as the developers deemed it not suitable for shipping yet due to outstanding bugs.
The Fedora 27 Beta is now expected to slip by one week to 26 September.
NEC Display Solutions Europe on Sept. 13, announced a collaboration with Canonical, the company behind Ubuntu Core and Screenly, the leading digital signage software solution for Raspberry Pi. This is one of several partnerships NEC has made with digital signage software companies leveraging Raspberry Pi as part of their digital signage solution. The joint collaboration facilitates an innovative digital signage solution which uses NEC’s P and V Series 40–55 inch large format displays and modular Raspberry Pi Compute Module 3 (CM3) to deliver high impact visual content in an integrated package for professional AV applications.
We’ll focus today on our advanced user base. We, of course, try to keep our default user experience as comprehensible as possible for the wider public, but we want as well to think about our more technical users by fine tuning the experience… and all of this, obviously, while changing our default session to use GNOME Shell. For more background on our current transition to GNOME Shell in artful, you can refer back to our decisions regarding our default session experience as discussed in my blog post.
The mascot motif still has to share screen space with the tired familiar orange and purple color gradient, which, as it has been since 2014, is layered with ‘origami’ folds.
Notably, this is the first Ubuntu wallpaper to feature a mascot since 2008. Ubuntu 8.10 ‘Intrepid Ibex’ shipped a textured wallpaper with an abstract ibex artwork (though more commonly seen as a “coffee stain”).
MultiTech has launched a rugged, Linux-driven “MultiConnect Conduit AP” LoRa access point with 8x LoRa uplinks, LTE, and optional mDot and xDot end points.
MultiTech’s MultiConnect Conduit AP supports the increasingly popular, long distance, low-power LoRA RF technology and LoRaWAN Low Power Wide Area Network (LPWAN) specification. The Linux-powered Conduit AP is designed to be mounted on walls or ceilings to extend LoRaWAN connectivity in IoT networks within “commercial buildings like hotels, convention centers, offices and retail facilities,” says MultiTech.
Laird unveiled a Linux-based “Open Platform” for telematics and in-car connectivity with WiFi, BLE, and NFC, and optional GPS/Glonass, LTE, and 802.11p.
Linux is finding its way into car systems that move beyond in-vehicle infotainment (IVI) and into telematics and connectivity. On the low end, we’ve seen products like the recent, Raspberry Pi Zero W based AutoPi OBD-II dongle. This week at the inaugural Mobile World Congress Americas show in San Francisco, Laird is showing off a higher-end, OEM-focused “modular and scalable telematics platform” based on an open Linux platform.
ASUSTOR has announced the official release of the Linux Center, allowing owners to run the native Linux system straight from their NAS drives. As well as giving access to operating system specific applications, the company claims that this “effectively turns the NAS into a computer with unlimited possibilities.”
Samsung launched a total of three new wearables- The Gear Sport, Gear Fit2 Pro and the Gear Icon X(2018) a couple of weeks back at IFA 2017, Berlin. Out of the three, the Gear Sport happens to be the most interesting and impressive wearable device to us as it is currently the only wearable device to run on Tizen 3.0. Tizen 3.0 brings in a lot of new capabilities to the Gear S3 but at the same time, developing apps for a new version of OS and a new device comes with its own set of problems.
What may seem like a small change is enormous when the size of the company is considered. According to a spokesperson’s estimate, there are an average of 30 MyDevices in use per store, and approximately 1,800 Target stores. That’s 54,000 pieces of merchandise Apple won’t be upgrading. It also points to the growing irrelevance of the iPod line, which Apple stopped including in its quarterly sales reports in 2015.
In the market for ride sharing services, Uber and Lyft are fierce competitors, the world of open-source however is another story. At the Open Source Summit here on Sept. 13, the Cloud Native Computing Foundation (CNCF) announced that it had accepted two new projects, Envoy from Lyft and Jaeger from Uber.
Coke and Pepsi, Gimbels and Macy's, Apple and Microsoft -- these were all great business rivals. Today, we have Lyft and Uber fighting tooth and nail over the new ride-sharing market. While they may be bitter rivals on the highways, the pair can agree on one thing: Open source is the best way to develop software.
At The Linux Foundation's Open Source Summit in Los Angeles, both companies appeared -- but not at the same time -- to announce they were launching two new cloud-native, open-source software projects with the Cloud Native Computing Foundation (CNCF).
Ride-hailing companies Lyft Inc. and Uber Technologies Inc. are embracing the open-source software movement.
The two megastartups have both donated technologies developed in-house to the Cloud Native Computing Federation, which is best known for hosting the Kubernetes container orchestrator project.
Just recently, Reddit announced its plans to stop sharing its main website’s open source code base. The website gave a number of reasons, which weren’t welcomed by the open source community. So, we’ve decided to prepare a list of some free and open source Reddit alternatives that you can give a try. Some of these aren’t much popular, but we thought it’s a good time to spread the world and tell you about these options.
Networking makes the modern connected world possible. Yet as networking has become more important, new technologies must rise to shoulder the burden. Businesses at all levels are discovering that open-source networking can provide the solutions they need.
“I can confidently say that open-source networking, not just networking but open-source networking, is now mainstream,” said Arpit Joshipura (pictured), general manager of networking and orchestration at The Linux Foundation.
I worked with Red Hat until the end of last year and am now at Falanx in the UK – a firm building possibly the fastest and most intelligent security platform to ever emerge from the open source community.
Wipro Limited said today that it will partner with an open source project Hyperledger to design and develop open source-based blockchain solutions for enterprise-grade blockchain deployments.
Hyperledger is a global open source collaborative effort created to advance cross-industry blockchain technologies across sectors such as finance, banking, Internet of Things, supply chain, manufacturing and technology.
“We are excited to welcome Wipro to the Hyperledger community. Wipro brings industry-acknowledged blockchain advisory and consulting capabilities, coupled with industry solutions for specific use cases and a strong partner ecosystem to help client businesses innovate on blockchain. We look forward to Wipro’s active contribution in the Hyperledger community to share insights on blockchain use cases, technology frameworks, tools and standards, and thought leadership,” said Brian Behlendorf, Executive Director, Hyperledger in a statement.
Comcast claims to have saved tens of millions of dollars through avoiding the need for truck rolls, by using a machine learning program that can predict with 90% accuracy whether or not it will need to send a technician to a customer’s home to fix connectivity problems. Every operator would love to reduce truck rolls. Estimates of the average costs vary, but tend to be somewhere between $50 and $100 per truck roll. Even if a company is using the most efficient vehicles possible, those costs are increasing as fuel and labour costs rise. Every operator is well aware that they end up sending people out on the road more often than is really needed, because many problems could be…
Nearly all of today's software packages run on a monthly subscription model. It doesn't sound like much upfront, but if you spend $10 a month here and another $20 there, all of a sudden you're forking over a bunch of money each month for programs you're no longer sure that you even need.
If you're a solopreneur or a small business, you don't want the costs of effective software to eat too much into the bottom line. At the same time, you definitely need the right tools to get the job done.
This is where free, open-source software can come to the rescue. Not every icon may have the same type of excessive attention to detail and polish as paid software, but when it comes to getting the job done, these free tools can be just as effective. Here are a few of our favorite options.
Cloudera, Inc. (NYSE: CLDR), the modern platform for machine learning and analytics, optimized for the cloud, announced it has joined the Eclipse Foundation as a Solutions member and will participate in the Eclipse IoT Working Group. In this capacity, Cloudera collaborates with industry leaders such as Bosch, Eurotech, Red Hat and Samsung Electronics to support the development of Eclipse IoT Open Testbeds. This new initiative showcases how open source software, open standards, and commercial solutions can be used to create real-world, industry-specific IoT (Internet of Things) solutions.
Oracle announced this week it would turn over Java Enterprise Edition to the Eclipse Foundation, a nonprofit corporation formed in 2004 and an outgrowth of a software project originally created by IBM in 2001. The company said its decision resulted from consultations with IBM and Red Hat, the other key contributors to the Java EE platform.
Oracle has named the Eclipse Foundation as the new host for Java Enterprise Edition, but said the platform won’t get to keep its name.
The decision to make Java EE - which is already developed in open source - fully open was announced last month, with Oracle’s David Delabassee saying it was in a bid to make it “more agile and responsive”.
Since last month's announcement by Oracle that they were essentially looking to offload Java EE to a new foundation, that new steward has now been named.
So Java Enterprise Edition has a new home.
Yesterday Oracle announced it's turning control of the platform over to the nonprofit Eclipse Foundation. On the surface, this makes a lot of sense, as the foundation's namesake project is the most widely used Java IDE. The announcement came just a month after Oracle said it was considering moving control of the platform to an open source foundation.
All of the details have yet to be ironed-out, but in a blog Oracle's David Delabassee said that Oracle-led Java EE and related GlassFish technologies, including RIs, TCKs, and associated project documentation, will be re-licensed to the foundation, presumably under the Eclipse Public License. In addition, the project will be rebranded with a not yet determined new name.
In a blog post on the venerable Aquarium blog (started by the Glassfish team at Sun a decade or so ago) Oracle has announced that it has selected the Eclipse Foundation as the new home for Java EE. They will relicense and rename it and invent a new standards process. It looks like the MicroProfile rebellion was successful as this has all been negotiated with Red Hat and IBM as well.
I don’t see this move as “dumping” Java EE. Moving a project to an open source Foundation is complex and expensive and Oracle should be congratulated on finally committing to this move. Java EE has already been uploaded to GitHub, but that’s not sufficient as the default Github Governance is isolation mediated via pull requests.
Eclipse is an extremely good choice of host. It has evolved excellent governance that recognises both the primacy of technical contribution and the inevitability of corporate politics and keeps both in balance. It’s ideally suited to the complexities and politics of Java EE, having hosted multiple large projects and survived de-investment by its founder IBM. Under the smart and firm leadership of Mike Milinkovich, Eclipse is the perfect home for Java EE (or whatever Oracle will want us to call it).
Oracle has always been a little more pragmatic about the role of open-source software in the tech industry than a company like Microsoft, which fought the very concept tooth and nail for years. Still, now that both companies have joined the foundation at the heart of one of the most important open-source projects in enterprise tech at the moment, it’s another sign the center of gravity has shifted.
Oracle joined the Cloud Native Computing Foundation and released Kubernetes on Oracle Linux and its own Kubernetes cloud installer.
As the excitement around software containers reaches fever pitch, database software giant Oracle Corp. is throwing its weight behind the cause.
The company said Wednesday it’s signing up as a platinum member of the Cloud Native Computing Foundation, the organization leading the development of the Kubernetes container orchestrator tool. In addition, the company has just made Kubernetes available on its Oracle Linux platform, and will also open-source a Terraform Kubernetes Installer for its cloud infrastructure.
At the Open Source Summit, held in Los Angeles, USA, it was announced that Oracle have joined the Cloud Native Computing Foundation (CNCF) as a Platinum member. Oracle have also released two technologies for installing Kubernetes on Oracle Cloud Infrastructure: "Kubernetes on Oracle Linux", an integration of Kubernetes into the Oracle Container Service; and an open source HashiCorp Terraform Kubernetes Installer for the Oracle Bare Metal Cloud. This news follows from the July release of three open source container tools by Oracle, which included a Rust-based alternative container runtime that implements the OCI-runtime specification
If you’re missing the hands-on nature of modular synths, you can hook up your MIDI controller and map to any parameter or simply use your mouse to perform. A DAW-compatible version is coming soon. The original download comes with eight modules to whet your appetite and if you’re thirsty for more, you can download extra modules for free from the VCV website. Who knows, you may end up with a studio like Deadmau5.
Every day in every way, Microsoft and Linux are getting closer. Maybe MS-Linux isn't a joke after all? While Julia Liuson, Microsoft's corporate VP of developer tools and services, was singing Linux and open source's praises at a keynote speech at The Linux Foundation's Open Source Summit North America in Los Angeles, the Windows Server's developers were putting the last touches on Linux containers in the next release of Windows Server 2016.
With this week DragonFlyBSD seeing HAMMER2 support added to the installer in preparation for this file-system being an option in the next DragonFly release due out in a few weeks, I've been testing out the state of this HAMMER file-system successor as well as running some benchmarks.
The US government wants you to use its software, and if you're into manure, so much the better.
The Idaho National Laboratory (INL), part of the US Department of Energy, last week released a new round of open-source projects in the hope that the public will take its research and run with it.
Known for its MOOSE physics modeling software and a companion project for continuous integration and testing called CIVET, INL last year brought Paul Berg over from Amazon to serve as the lab's senior R&D software licensing manager. His remit is to oversee the handling of open-source projects.
When Berg spoke to The Register earlier this year, he said the lab was preparing to make a number of its projects available to the public. And now the floodgates have opened.
Publicly financed software should be open source, more than 30 signatories of an open letter are proclaiming, calling for others to sign the letter.
According to a press release from the European Digital Rights initiative (EDRi), the 31 organisations and 469 people who signed the open letter want legislation requiring that publicly financed software developed for the public sector be made publicly available under a free and open source software licence.
“If it is public money, it should be public code as well,” it says.
“We need software that guarantees freedom of choice, access, and competition. We need software that helps public administrations regain full control of their critical digital infrastructure, allowing them to become and remain independent from a handful of companies,” the release says.
Today, 22 organizations are publishing an open letter in which they call for lawmakers to advance legislation requiring publicly financed software developed for the public sector be made available under a Free and Open Source Software license. The initial signatories include CCC, EDRi, Free Software Foundation Europe, KDE, Open Knowledge Foundation Germany, Open Source Business Alliance, Open Source Initiative, The Document Foundation, Wikimedia Germany, as well as several others; they ask individuals and other organization to sign the open letter. The open letter will be sent to candidates for the German Parliament election and, during the coming months, until the 2019 EU parliament elections, to other representatives of the EU and EU member states.
Open source software imparts a number of benefits, including decreasing product development time, distributing development across a community and attracting developers to your organization. However, some organizations shy away from it due to perceived risks and disadvantages around intellectual property.
[...]
That's a situation in which we might open source an implementation and file for a patent at the same time. In scoping the patent and the license terms, the open source community gets access to the software but the patent retains value.
As it turns out, maintaining good open source code is difficult. Just ask James Coglan, who disgorged a litany of reasons why releasing code can take forever. Oh, and without much hope of empathy in return. Or ask Isaac Schlueter, CEO of npm, who agonized over the burden of maintaining code for entitled downstream users who "don't love me."
As people, we want to be recognized for the good work we do. Open source, however, often tends to maximize negative feedback loops, contributing to developer burnout, as Schlueter highlighted.
Hackathons are an accepted method of giving community support to digital development projects. The community invites developers to join an event which offers an encouraging atmosphere, some useful resources, and the opportunity to work on useful projects. Most hackathons choose the projects they will support, based on stated criteria.
Hackathons fit the spirit of a community in which people take an attitude of cooperation and respect towards each other. The software that accords with this spirit is free (libre) software, free as in freedom. Free software carries a license that gives its users (including programmers) freedom to cooperate. Thus, hackathons make sense within the free software community. Hardware design projects also can and ought to be free.
0.7.0 is the second public release of dbKoda and our first post-MVP release. With the MVP (Minimal Viable Product) we definitely nailed the “M” criteria, and in this release we’ve pushing harder on the “V” side of the equation.
Southbank Software recently released its initial offering of dbKoda version 0.6.0, an open source MongoDB development tool packaged with JavaScript, React and Electron. As shown below, dbKoda’s graghical user interface features a connection manager and a feature-rich code editor for working with MongoDB databases.
Scientific misconduct motivated Yoshihiro Sato’s three additional retractions last month; his institution doesn’t respond.
Innovation, fetishized by Silicon Valley companies and celebrated by business boosters, no longer provides the economic jolt it once did.
In order to maintain Moore's Law – by which transistor density doubles every two years or so – it now takes 18 times as many scientists as it did in the 1970s.
That means each researcher's output today is 18 times less effective in terms of generating economic value than it was several decades ago.
On an annual basis, research productivity is declining at a rate of about 6.8 per cent per year in the semiconductor industry. In other words, we're running out of ideas. That's the conclusion of economic researchers from Stanford University and the Massachusetts Institute of Technology.
“This practice is not only vandalism; it is illegal, and carries with it a possible prison sentence. If anyone sees anyone attempting to move stones please warn them of this and message us. Or try and get their registration number and message it to us.”
Motherboard vendors have begun pushing out BIOS updates for Ryzen motherboards using the AMD AGESA 1.0.0.6b revision and it's reported that it does resolve the "Performance Marginality Problem" affecting early Ryzen Linux customers.
While newer Ryzen CPUs are running great on Linux without the performance marginality problem as described by AMD, since yesterday I have begun receiving unconfirmed reports from Phoronix readers that the recent AGESA 1.0.0.6b revision does address the issue via this software update.
Apple says it makes the "most durable devices," but an iPhone 6 design flaw and the ensuing court proceeding shows you can legally expect it to last for just one year.
The iPhone maker is in talks to provide about $3 billion in capital for Bain Capital’s bid for the unit, adding to financial support from Dell Inc., Seagate Technology Plc and SK Hynix Inc., according to people familiar with the matter. That support convinced Toshiba to sign a memorandum of understanding with Bain and work toward a final agreement this month, said the people, asking not to be identified because the matter isn’t public. Apple plans to take an equity stake alongside Bain, they said. If the agreement is completed, it may exceed Apple’s largest deal ever, the $3 billion acquisition of Beats Electronics LLC.
There are subjects one should avoid while eating. This is one of them.
Crews in London are working to unblock a section of the city's sewer system. The culprit, a stomach-churning, 130-ton mass of sanitary products and cooking fat. You might call it disgusting. Water company officials call it a fatberg.
In a weekend statement, Thames Water announced the fatberg's existence. According to the private utility company, the"rock-solid" blockage had formed under the city's Whitechapel neighborhood. Weighing roughly the same as 11 double-decker buses, the fatberg is one of the largest to form in the London sewer system.
THE GRAY CLAPBOARD house on the two-lane road in a western suburb of Boston looked, in the fall of 1974, the way you would expect a comfortable old Massachusetts house full of children to look. It was rambling and tall, made out of a house and a barn butted together. There were other barns out back, down a long gravel drive that stretched to a grove of trees: small sheds and one big building, 200 feet on the long side, painted an iconic barnyard red. There was a milk cow, a few horses, a couple of pigs, and chickens: white laying hens, some in a chalet-shaped coop and some skittering underfoot between the trees.
Acting Department of Homeland Security secretary Elaine Duke announced the ban of Kaspersky Lab software from federal government networks. The agencies have an unspecified timeline to rid their machines of the software, which DHS declared may pose a security risk.
The US Department of Homeland Security has ordered all government agencies to stop using products from Kaspersky Labs, with a deadline of 90 days to implement plans to discontinue the use and to remove software from information systems.
In a binding directive, acting homeland security secretary Elaine Duke ordered that federal civilian agencies identify Kaspersky Lab software on their networks. After 90 days, unless otherwise directed, they must remove the software, on the grounds that the company has connections to the Russian government and its software poses a security risk.
Equifax last week disclosed a historic breach involving Social Security numbers and other sensitive data on as many as 143 million Americans. The company said the breach also impacted an undisclosed number of people in Canada and the United Kingdom. But the official list of victim countries may not yet be complete: According to information obtained by KrebsOnSecurity, Equifax can safely add Argentina — if not also other Latin American nations where it does business — to the list as well.
[...]
It took almost no time for them to discover that an online portal designed to let Equifax employees in Argentina manage credit report disputes from consumers in that country was wide open, protected by perhaps the most easy-to-guess password combination ever: “admin/admin.”
Last Thursday, Equifax reported a data breach that affects 143 million US customers, about 44% of the population. It's an extremely serious breach; hackers got access to full names, Social Security numbers, birth dates, addresses, driver's license numbers -- exactly the sort of information criminals can use to impersonate victims to banks, credit card companies, insurance companies, and other businesses vulnerable to fraud.
Many sites posted guides to protecting yourself now that it's happened. But if you want to prevent this kind of thing from happening again, your only solution is government regulation (as unlikely as that may be at the moment).
The market can't fix this. Markets work because buyers choose between sellers, and sellers compete for buyers. In case you didn't notice, you're not Equifax's customer. You're its product.
The security perils inherent in Internet of Things (IoT) devices are painfully obvious at this point in 2017, but why are there so many security issues? At a session during the Open Source Summit here Marti Bolivar, senior software engineer at Linaro detailed what he described as "anti-patterns" that ultimately lead to negative security outcomes.
Bolivar started his session by defining what security in IoT is really all about, by pulling a quote from security engineer Ross Anderson.
“Secret” documents from the Reagan administration show how the U.S. embedded “political action,” i.e., the manipulation of foreign governments, in ostensibly well-meaning organizations, reports Robert Parry.
Soon came the hearing loss, and the speech problems, symptoms both similar and altogether different from others among at least 21 US victims in an astonishing international mystery still unfolding in Cuba. The top US diplomat has called them “health attacks”.
New details learned by the Associated Press indicate at least some of the incidents were confined to specific rooms or even parts of rooms with laser-like specificity, baffling US officials who say the facts and the physics don’t add up.
“None of this has a reasonable explanation,” said Fulton Armstrong, a former CIA official who served in Havana long before America re-opened an embassy there. “It’s just mystery after mystery after mystery.”
The Senate voted Wednesday by nearly two-to-one against an amendment from Sen. Rand Paul, R-Ky., to the defense authorization bill. The amendment would have ended the current Authorization for Use of Military Force within six months and forced Congress to vote on authorizing wars beyond that.
The authorization, which was passed in the immediate aftermath of the 9/11 attacks, is the legal justification for many U.S. military engagements abroad, as part of what has been called the “global war on terror.” The expansively interpreted law authorized military attacks against those responsible for 9/11 and “associated forces.”
The failed vote came after Paul took to the floor on Monday, vowing to block other Senate actions until his amendment was allowed.
UN Secretary General António Guterres called Myanmar’s persecution of the Rohingya people “ethnic cleansing,” saying there’s no better word to describe the now 380,000 people forced to flee a violent military campaign—this after decades of discrimination and repression in Myanmar, where Rohingya are denied citizenship and rights, despite having been in the country for centuries. Rohingya militants killed 12 security personnel at a police post in late August; the government’s response has been a brutal scorched earth campaign, burning villages and attacking civilians, while denying human rights organizations access to the region.
Fourteen years ago, when America prepared for its ill-conceived invasion of Iraq and encountered loud resistance from France and Germany, backed up by Russia, it became possible to wonder whether U.S. global hegemony could last. The disaster that the Iraqi adventure quickly became within a year of George W. Bush declaring “mission accomplished” rolled on and progressively diminished the enthusiasm of allies and others hitherto on the U.S. bandwagon for each new project to re-engineer troublesome nations, to overthrow autocrats and usher in an age of “liberal democracy” across the globe.
Still, the doubts were discussed sotto voce. Governments tended to conform to what the Russians colorfully call “giving someone the finger in your pocket.” Observers spoke their piece privately against the violations of international law and simple decency that the United States was perpetrating — and against the swathe of chaos that followed American intervention across the Greater Middle East. But such persons were on the fringes of political life and drew little attention.
What has happened over the past couple of years is that doubts about the competence of the United States to lead the world have been compounded by doubts about the ability of the United States to govern itself. The dysfunction of the federal government has come out of the closet as an issue and is talked about fairly regularly even by commentators and publications that are quintessentially representative of the Establishment.
[...]
Some of us have called this the new McCarthyism, because the most salient aspect of groupthink is the ongoing hysteria over alleged Russian “meddling” in U.S. domestic politics. The denunciations of “stooges of Putin” and the blacklisting from both mass and professional media of those known to deliver unconventional, heterodox views on Russia and other issues of international affairs is reminiscent of what went on during the witch hunt for Communists in government and in the media during the early 1950s.
However, no one is being hounded from office today. There are no show trials, as yet, for treasonous collusion with Russia. So, it would be safer to speak of an atmosphere of intimidation that stifles free debate on the key security issues facing the American public. Absence of debate equates to a dumbing-down of our political elites as intellectual skills atrophy and results in poor formulation of policy. The whole necessarily undermines America’s soft power and standing in the world.
Groupthink in America today did not come from nowhere. Debilitating conformism was always part of our DNA, as is the case in a great many countries, though its emergence has been episodic and in varying degrees of severity. The present acute manifestation in the United States goes back to the mass paranoia which followed the 9/11 terrorist attacks when the George W. Bush administration introduced the Patriot Act, gutting our civil rights in exchange for the promise of security.
The wonky words infrastructure and resilience have circulated widely of late, particularly since Hurricanes Harvey and Irma struck paralyzing, costly blows in two of America’s fastest-growing states.
Resilience is a property traditionally defined as the ability to bounce back. A host of engineers and urban planners have long warned this trait is sorely lacking in America’s brittle infrastructure.
Many such experts say the disasters in the sprawling suburban and petro-industrial landscape around Houston and along the crowded coasts of Florida reinforce the urgent idea that resilient infrastructure is needed more than ever, particularly as human-driven climate change helps drive extreme weather.
The challenge in prompting change — broadening the classic definition of “infrastructure,” and investing in initiatives aimed at adapting to a turbulent planet — is heightened by partisan divisions over climate policy and development.
On Monday night MPs voted, in principle, in favour of the greatest shift in power from legislature to executive in modern British constitutional history.
The vote was for the “second reading” of the European Union (Withdrawal) Bill. A second reading vote in parliament is when there is a vote on the merits of a bill. Next will be a committee stage, when the measure is examined clause by clause and amendments are considered, and then a “third reading”. The same process is then followed in the House of Lords. So there is some time yet before the bill receives royal assent and becomes an act.
[...]
Even with these safeguards, however, the law-making powers are extraordinarily wide. In a way their purpose is to place Prime Minister Theresa May in effectively the position she would have been in had she won the expected large majority at the general election. The legislative work needed for Brexit will be insulated from the inconveniences of hard parliamentary scrutiny.
That some legislation is required is beyond argument. There cannot be Brexit without substantial domestic legislative activity. And the government is right to place as much EU law into domestic law as possible, to provide continuity and certainty over the exit date. There is no serious objection to that, even though it ironically becomes the greatest single incorporation of EU law into domestic law. This is just one of the paradoxes of Brexit.
But the problem with the discretions proposed for ministers to make, change and abolish law goes further than what is necessary. These so-called “Henry VIII clauses” (which is a little unfair on the old king, under whom parliament became significantly more important as part of the English polity) are assaults on parliamentary democracy. They can be justified, perhaps, when they are essential. But they are never good or welcome in themselves.
With the Withdrawal Bill passing the “second reading” vote (see my FT post here) and the Brexit negotiation talks now passed their third round, Brexit is now firmly in (what can be called) its “process” phase.
Until the second reading vote, it was open to the UK government to start again with a Bill with less wide-ranging scope. But now the government is committed to this approach.
Catalonia will stop sending weekly financial accounts to Madrid, defying a demand by Spain’s central government that the region prove it is not using public money to promote an independence drive.
The decision follows a series of moves to block a Catalan referendum on self-rule, planned for Oct. 1, which Prime Minister Mariano Rajoy’s government has declared illegal.
In a letter dated Sept. 13, Catalan Deputy Governor Oriol Junqueras told Spanish Budget Minister Cristobal Montoro the region would no longer comply with the obligation to submit its accounts every week.
The crown prince, Sheikh Mohammed bin Zayed al-Nahyan, arrived in New York last December in the transition period before Trump was sworn into office for a meeting with several top Trump officials, including Michael Flynn, the president's son-in-law, Jared Kushner, and his top strategist Steve Bannon, sources said.
Since the Charlottesville attack a month ago, a review of commentary in the six top broadsheet newspapers—the Wall Street Journal, New York Times, USA Today, LA Times, San Jose Mercury News and Washington Post—found virtually equal amounts of condemnation of fascists and anti-fascist protesters.
Between August 12 and September 12, these papers ran 28 op-eds or editorials condemning the anti-fascist movement known as antifa, or calling on politicians to do so, and 27 condemning neo-Nazis and white supremacists, or calling on politicians—namely Donald Trump—to do so.
Do you really know if that pro-Trump meme or far-right tweet is from a real person, or just an unmanned string of code that was purchased for pennies?
Although bots—automated accounts on social media—are certainly not a new phenomenon, they have a renewed political significance. Part of the Russian government’s well-documented interference in the 2016 U.S. election included pushing deliberately divisive messages through social platforms.
US President Donald Trump has said he is "fairly close" to a bipartisan deal to protect young undocumented migrants known as Dreamers.
Mr Trump told journalists at the White House that any agreement must include "massive border security".
The president said funding for his planned border wall was not part of the pact.
Mr Trump spoke a day after talks with top Democrats Nancy Pelosi and Chuck Schumer at the White House.
Two Democratic Party leaders dined with Trump last night and came away proclaiming Trump had agreed on a plan to save the Dreamers combined with increasing border security. As usual, making a deal with a man with no conscience is just an illusion. Trump denied the deal. A few minutes ago, he wrote, “No deal was made last night on DACA. Massive border security would have to be agreed to in exchange for consent.”
“This is a solicitation of assault. That is not protected by the First Amendment.”
Dozens of people who have tweeted about the conflict in Indian-administered Kashmir or shown sympathy for Kashmiri independence movements online may soon be censored on Twitter, at the request of the Indian government.
The US-based social media company sent notices to users explaining that the Indian government had reported certain tweets and Twitter accounts for violating Section 69A of India's Information Technology Act.
Section 69A of India's IT act allows the government to block online content and censor when it believes the ‘said’ content can threaten the security, sovereignty, integrity or defense of the country.
In case you missed it, Bergdorf had everyone talking when she was announced as the first openly transgender woman to be the face of a L’Oréal UK campaign. Many praised the company for its progressive campaign, which is supposedly centered upon diversity, but when Daily Mail published a Facebook post of Bergdorf’s—in which she took a commendable stand against white supremacists following last month’s horrific events in Charlottesville—the cosmetic company dropped her from the campaign as quickly as they signed her on.
SYRIZA MEP Stelios Kouloglou has filed a complaint with European Parliament President Antonio Tajani claiming that several sketches by Greek cartoonists will not be allowed to go on display in an exhibition that is being organized by the Greek politician and French MEP Patrick Le Hyaric, celebrating 60 years of the European Union.
According to Kouloglou, Greek cartoonists were censored, as 12 out of 28 their sketches were rejected because they allegedly violated European Union rules that prohibit Nazi-friendly or other offensive material appearing in EU exhibitions.
It's been almost a month since the "Boston Free Speech" rally drew tens of thousands of people to Boston Common.
Now, the free speech advocates who were met with roughly 40,000 counter-protestors are at it again.
"We are not announcing a date. We want to make sure we have a number of our ducks in a row," said John Medlar, the Fitchburg State student from Newton who has become a spokesman for Boston Free Speech.
China is gearing up for one of the most important meetings on its political calendar. Next month thousands of delegates from around the country will convene in Beijing for the 19th National Congress of the Chinese Communist Party. The meeting will culminate in the announcement of the new members of the country’s most important decision-making body, the Politburo Standing Committee — including a possible candidate to replace party leader Xi Jinping in 2022. Already China-watchers are speculating about the possibility that no one will be named — a signal that Xi is prepared to break with precedent and move toward a third term in office
The seventh edition of Myanmar’s pioneering Wathann Film Festival showcasing independent cinema wrapped up on Monday.
The festival jury presented five awards from nearly 30 competing films. The Best Documentary Award was most remarkable, however, as the winning film had not actually been shown at the festival.
The 21-minute documentary “A Simple Love Story” directed by Hnin Pa Pa Soe tells a love story between a transgender woman and a transgender man, challenging norms surrounding gender identity and love.
A recent debate between the publishing company Cambridge University Press (CUP) and the Chinese government over the censorship of academic journals has just come to an end. China generally attempts to maintain a strict censorship on what academic topics its students and citizens have access to, which is why CUP removed 300 articles about historical events that were sensitive to the Communist Party from the China Quarterly website, according to a Washington Post report. However, the publishing company restored the articles a few days later by request of the international academic community. This move by CUP is, in fact, an integral step in countering political censorship and informing the Chinese public.
When you hear the quite horrific stories of censorship and dangerous restrictions on expression at universities in the US, the UK and Europe, your first reaction might be to laugh at how infantile the nature of political discourse in the student world has become.
Cardiff Metropolitan University banned the use of the word "man" and related phrases, to encourage the adoption of "gender neutral" language. It is the equivalent of the "newspeak" about which Orwell warned: "Ambiguous euphemistic language used chiefly in political propaganda".
More than 80% of writers are concerned about censorship and ‘fake news’, according to the “alarming” findings of a study by PEN International.
Authors Paul Auster, Svetlana Alexievitch, Madeleine Thien and Andrei Kurkov will debate these issues along with more than 200 PEN members from across the world for the campaigning organisation’s 83rd congress in Lviv, Ukraine.
Of the 228 international writers surveyed by PEN International, more than 81% believe that ‘fake news’ and censorship have become increasing concerns over the course of the last year. Furthermore, around 87% believe that combating racism and xenophobia, born out of these factors, is central to their roles as writers.
The decision follows a series of police warnings, daily media stories and even a Madras High Court ruling calling on foreign companies to comply with Indian law so as to make it easier for local agencies to root out the menace.
Blue Whale first surfaced in 2013 in groups for suicidal teens on VKontakte. The game allegedly instructs participants to complete a series of tasks set by shadowy “curators.” It varies between the routine, such as listening to 'dark' songs or getting up in the middle of the night, to increasingly macabre and self-harming practices, allegedly culminating in the supervisor demanding the player to take their own life.
An investigative article sparked widespread interest four years ago, and ever since, heated public debate has raged whether it is a genuine phenomenon responsible for as many as 130 suicides, or a borderline urban myth or meme spread by a hungry media, gullible teens, and parents afraid of their children’s internet habits.
In all of the debate about the Stop Enabling Sex Traffickers Act (SESTA, S. 1693), there’s one question that’s received surprisingly little airplay: under SESTA, what would online platforms do in order to protect themselves from the increased liability for their users’ speech?
With the threat of overwhelming criminal and civil liability hanging over their heads, Internet platforms would likely turn to automated filtering of users’ speech in a big way. That’s bad news because when platforms rely too heavily on automated filtering, it almost always results in some voices being silenced. And the most marginalized voices in society can be the first to disappear.
Before services like Spotify and Netflix proliferated, people who wanted to listen to music or watch movies online, on demand, had few legal options. Instead, they would download copies of pirated media using file-sharing technology. In early 2004, close to 8 million people in the U.S. alone were estimated to have downloaded music through so-called peer-to-peer apps like LimeWire, eDonkey, Kazaa, and BitTorrent. While it’s difficult to measure exactly how much of the world’s internet traffic consists of people swapping files, at the time some estimates said it was approaching 40 percent. (It was closer to 11 percent by 2016, according to another estimate.)
With this much file sharing occurring online, it’s no surprise that the National Security Agency took notice. According to documents provided by NSA whistleblower Edward Snowden, the spy agency formed a research group dedicated to studying peer-to-peer, or P2P, internet traffic. NSA didn’t care about violations of copyright law, according to a 2005 article on one of the agency’s internal news sites, SIDtoday. It was trying to determine if it could find valuable intelligence by monitoring such activity.
“By searching our collection databases, it is clear that many targets are using popular file sharing applications,” a researcher from NSA’s File-Sharing Analysis and Vulnerability Assessment Pod wrote in a SIDtoday article. “But if they are merely sharing the latest release of their favorite pop star, this traffic is of dubious value (no offense to Britney Spears intended).”
The Trump administration has engaged in an unconstitutional practice of searching without a warrant the phones and laptops of Americans who are stopped at the border, a lawsuit filed on Wednesday alleged.
The border should not serve as a dragnet for law enforcement to pry into our personal and professional lives.
Warrantless searches of smartphones, laptops, and other electronic devices at the border are a major threat to privacy and civil liberties. Today, the ACLU, along with the Electronic Frontier Foundation and the ACLU of Massachusetts, filed a lawsuit challenging such searches as unconstitutional. The border should not serve as a dragnet for law enforcement to pry into our personal and professional lives.
We represent 10 U.S. citizens and one green card holder from a variety of backgrounds: a military veteran, journalists, students, an artist, an engineer, a limousine driver, and a business owner. All of them had their rights violated when border officials searched their smartphones or other electronic devices when they were returning from travel abroad. Officials also confiscated and held several of our clients’ devices for weeks or months.
None of our clients have been accused of any wrongdoing, nor have they been given any valid explanation for why this happened to them.
Now that California’s Broadband Privacy Bill, A.B. 375, is headed for a final vote in the California legislature, Comcast, Verizon, and all their allies are pulling out all the stops to try to convince state legislators to vote against the bill. Unfortunately, that includes telling legislators about made-up problems the bill will supposedly create, as well as tweeting out blatantly false statements and taking out online ads that spread lies about what A.B. 375 will really do. To set the record straight, here are three lies big Internet providers and their allies are spreading—and the truth about how A.B. 375 will protect your privacy and security online.
Civil war was raging in Libya, and Col. Moammar Gadhafi was in hiding. Two thousand miles away, on the outskirts of a small village in the English countryside, British and American spies were monitoring the chaos, listening in on the Gadhafi regime’s phone calls.
The spies were part of a group known as Joint Service Signal Unit Digby, operating from within a nearly 100-year-old military base near the village of Ashby de la Launde in Lincolnshire, a county in England’s east midlands. About a three-hour drive north of London, it is a scantly populated area encompassing flat fields that stretch across the landscape. The British government says publicly that the Digby facility conducts “research into new communications systems.” A more truthful account is that it is an important part of the sprawling covert surveillance network maintained by British and American spy agencies, GCHQ and the National Security Agency.
Shortly after the November election, human rights groups joined California Senate President Pro Tem Kevin de León in introducing a comprehensive bill to protect data collected by the government from being used for mass deportations and religious registries. S.B. 54, known as the California Values Act, also included a sweeping measure requiring all state agencies to reevaluate their privacy policies and to only collect the minimum amount of data they need to offer services.
EFF was an early and strong supporter of the bill, generating more than 750 emails from our supporters. Over subsequent months, the bill was split into multiple pieces of legislation. The ban on using data to create religious registries was moved to S.B. 31, the California Religious Freedom Act, while the general protections morphed into a data privacy bill, S.B. 244, both authored by Sen. Ricardo Lara.
S.B. 54 became an important set of measures designed to deal exclusively with immigrant rights by limiting California law enforcement’s cooperation with U.S. Immigrations and Customs Enforcement and other immigration authorities. These provisions include stopping local law enforcement officials from inquiring about immigration status, keeping people in custody on immigrations “holds,” and using immigrations agents as interpreters—all measures that would help protect our immigrant family members, neighbors, coworkers, and friends from persecution.
Lawsuit on Behalf of 11 Travelers Challenges Unconstitutional Searches of Electronic Devices
Boston, Massachusetts—The Electronic Frontier Foundation (EFF) and the American Civil Liberties Union (ACLU) sued the Department of Homeland Security (DHS) today on behalf of 11 travelers whose smartphones and laptops were searched without warrants at the U.S. border.
The plaintiffs in the case are 10 U.S. citizens and one lawful permanent resident who hail from seven states and come from a variety of backgrounds. The lawsuit challenges the government’s fast-growing practice of searching travelers’ electronic devices without a warrant. It seeks to establish that the government must have a warrant based on probable cause to suspect a violation of immigration or customs laws before conducting such searches.
The plaintiffs include a military veteran, journalists, students, an artist, a NASA engineer, and a business owner. Several are Muslims or people of color. All were reentering the country from business or personal travel when border officers searched their devices. None were subsequently accused of any wrongdoing. Officers also confiscated and kept the devices of several plaintiffs for weeks or months—DHS has held one plaintiff’s device since January. EFF, ACLU, and the ACLU of Massachusetts are representing the 11 travelers.
Tens of thousands of Turkish citizens detained or dismissed from their jobs on the basis of downloading an encrypted messaging app have had their human rights breached, a legal opinion published in London has found.
The study, commissioned by opponents of the Turkish president, Recep Tayyip Erdoßan, argues that the arrest of 75,000 suspects primarily because they downloaded the ByLock app is arbitrary and illegal.
Privacy International, in partnership with 30+ national human rights organisations, has today written to national intelligence oversight bodies in over 40 countries seeking information on the intelligence sharing activities of their governments.
Countries may use secret intelligence sharing arrangements to circumvent international and domestic rules on direct surveillance. These arrangements can also lead to the exchange of information that can facilitate human rights abuses, particularly in countries with poor human rights records or weak rule of law.
National intelligence oversight bodies hold intelligence agencies accountable to the public by exercising scrutiny over the legality, propriety, effectiveness, and efficiency of the intelligence activities of their governments.
Want to market Nazi memorabilia, or recruit marchers for a far-right rally? Facebook’s self-service ad-buying platform had the right audience for you.
Until this week, when we asked Facebook about it, the world’s largest social network enabled advertisers to direct their pitches to the news feeds of almost 2,300 people who expressed interest in the topics of “Jew hater,” “How to burn jews,” or, “History of ‘why jews ruin the world.’”
To test if these ad categories were real, we paid $30 to target those groups with three “promoted posts” — in which a ProPublica article or post was displayed in their news feeds. Facebook approved all three ads within 15 minutes.
Open Rights Group has responded to the publication of the Data Protection Bill, which put the provisions of the General Data Protection Regulation into UK law.
The U.S. Department of Justice has come to the obvious conclusion that there’s no need to order Facebook to keep an investigation “secret” when it was never secret in the first place. While we applaud the government’s about-face, we question why they ever took such a ridiculous position in the first place.
Earlier this summer, Facebook brought a First Amendment challenge to gag orders accompanying several warrants in an investigation in Washington, D.C. that Facebook argued was “known to the public.” In an amicus brief joined by three other civil liberties organizations, EFF explained to the D.C. Court of Appeals that gag orders are subject to a stringent constitutional test that they can rarely meet. We noted that the timing and circumstances of the warrants were strikingly similar to the high-profile investigations of the protests surrounding President Trump’s inauguration on January 20 (known as J20). Given these facts, we argued that there was no way the First Amendment could allow gag orders preventing Facebook from informing its users that the government had obtained their data.
Until 1994, GCHQ, the British signals intelligence agency, didn't officially exist. Now, it has emerged out of the shadows to take a very public role at the heart of British cybersecurity. Public accountability for intelligence services is crucial to any democracy, but as the recent WannaCry ransomware attack showed, there are inevitable conflicts of interest between the role of intelligence services and network safety.
The past seven years have seen a dramatic change in profile for GCHQ. While the number of police officers has been cut by 14 per cent since 2010, according to the Home Office, GCHQ's staff numbers have grown by more than ten per cent in the same period. At the same time, it has been loaded with additional responsibilities, including the fight against distribution of child-abuse images on the dark web, money laundering and financial fraud. This was made official when, in February 2017, it assumed responsibility for making the UK "the safest place to do business online" through the National Cyber Security Centre (NCSC).
You have the right to remain silent. It's a key principle of the United States criminal justice system and many others that as the accused we can choose to not say anythingââ¬â¢to not reveal anythingââ¬â¢under questioning by the police or at trial. Generally, it's a right against self-incrimination. We can choose not to expose ourselves, to not disclose our thoughts and memories, and that refusal can't be used against us.
This seems pretty straightforward. It only takes seven words to encapsulate, anyhow. But technology is changing everything, including what and where the "self" even is. This is the starting point for an argument put forth by Silicon Genetics founder Andrew Conway and Electronic Frontier Foundation Chief Computer Scientist Peter Eckersley in a piece published this month in the Communications of the ACM. Simply, technology has enabledââ¬â¢if not forcedââ¬â¢us to project our most private interior selves into places that can be observed and recorded with few legal limits.
A document just published as part of the Edward Snowden leaks has revealed the NSA was actively monitoring file-sharing networks more than 12 years ago. Particular success was reported against both KaZaA and eDonkey, with the NSA managing to compromise the encryption on both while gaining access to sharers' computers and personal data including email addresses.
I do think wherever you are in the world, whoever you talk to, digital skills are growing in importance. It’s no surprise when you consider technology continues to transform our day-to-day lives, bringing accessibility and speed, and changing the way we relax, shop, interact, and learn. But don’t take my word for it.
In the last year alone, we’ve seen countless reports confirm this. The OECD suggests an “increasing use of digital technologies at work is raising the demand for new [digital] skills….” The White House tells us that “coursework in STEM, and specifically in areas such as computer science, will be especially relevant to work and citizenship in an increasingly AI-driven world.” And the UK Government Office for Science believes a million new people are forecasted to be required for specialist digital roles by 2023.
NSA agents successfully targeted “the entire business chain” connecting foreign cafes to the internet, bragged about an “all-out effort” to spy on liberated Iraq, and began systematically trying to break into virtual private networks, according to a set of internal agency news reports dating to the first half of 2005.
British spies, meanwhile, were made to begin providing new details about their informants via a system of “Intelligence Source Descriptors” created in response to intelligence failures in Iraq. Hungary and the Czech Republic pulled closer to the National Security Agency.
And future Intercept backer Pierre Omidyar visited NSA headquarters for an internal conference panel on “human networking” and open-source intelligence.
The repercussions from the failed military coup in Turkey on 15 July 2016 have impacted almost every part of Turkish society as President Erdoßan clamps down on perceived and actual opposition in a never ending cycle of raids, arrests and detentions.
Turkish authorities blame the 2016 coup on Fethullah Gülen, an old rival of Erdoßan currently exiled in the US, and have set about ‘purging’ Turkish society of his supporters ever since. While over 200 people are on trial for organising the coup, thousands more have been arrested on suspicion of being a member of the Gülen movement, which the Turkish government has named FETO (Fetullah Gülen Terrorist Organisation). The Turkish Ministry of Justice recently stated that 168,801 people have been detained and subject to “legal proceedings”, with a further 50,504 people arrested on a specific charge who are likely in pre-trial detention since the coup. Thousands more arrest warrants have been issued, including for judges and prosecutors. Amnesty International estimate an additional 100,000 people have been dismissed from their jobs, including doctors, police officers, teachers, academics and soldiers.
NSA agents successfully targeted “the entire business chain” connecting foreign cafes to the internet, bragged about an “all-out effort” to spy on liberated Iraq, and began systematically trying to break into virtual private networks, according to a set of internal agency news reports dating to the first half of 2005.
British spies, meanwhile, were made to begin providing new details about their informants via a system of “Intelligence Source Descriptors” created in response to intelligence failures in Iraq. Hungary and the Czech Republic pulled closer to the National Security Agency.
And future Intercept backer Pierre Omidyar visited NSA headquarters for an internal conference panel on “human networking” and open-source intelligence.
“A warm friendship connects the Ethiopian and American people,” U.S. Secretary of State Rex Tillerson announced earlier this year. “We remain committed to working with Ethiopia to foster liberty, democracy, economic growth, protection of human rights, and the rule of law.”
Indeed, the website for the U.S. Embassy in Ethiopia is marked by press releases touting U.S. aid for farmers and support for public health infrastructure in that East African nation. “Ethiopia remains among the most effective development partners, particularly in the areas of health care, education, and food security,” says the State Department.
Behind the scenes, however, Ethiopia and the U.S. are bound together by long-standing relationships built on far more than dairy processing equipment or health centers to treat people with HIV. Fifteen years ago, the U.S. began setting up very different centers, filled with technology that is not normally associated with the protection of human rights.
Russia likely interfered in last year’s U.S presidential election, according to former intelligence contractor Edward Snowden, but the American public deserves to see evidence of its involvement, he said in an interview published Wednesday.
“Everybody is currently pointing at the Russians,” Mr. Snowden, 33, told Germany’s Der Spiegel. “They probably did hack the systems of Hillary Clinton’s Democratic Party, but we should have proof of that.”
The U.S. Office of the Director of National Intelligence has concluded that Russia interfered in last year’s election race by using state-sponsored hackers and propagandists to target Mrs. Clinton’s campaign in an effort to hurt her odds of winning the White House.
Not everyone is sold on the benefits of Face ID, the facial-recognition system Apple unveiled Tuesday as a convenient biometric method for unlocking devices.
Introduced along with the iPhone X, the system uses the phone's front-facing camera to scan and register your facial structure for use as a password, eliminating the need to input a keypad password or scan a fingerprint. Using facial recognition to unlock a device isn't a new concept, and previous attempts have shown the technology can easily be tricked.
Edward Snowden, who knows something about cybersecurity and information privacy, criticized one feature of the new iPhone X on Tuesday, saying Apple's facial recognition software is "certain to be abused."
Snowden was referring to Apple's announcement on Tuesday that the new devices would collect "face data" as part of a scanning feature that allows users to unlock their phones and even pay for things by glancing at their screens.
The judicial year starts on 1st of September every year in Turkey. The judicial recess which starts 20th of July ends on 1st of September and so new judicial year starts but due to official holiday of Eid Al-Adha, this year official opening ceremony takes place on 5th of September.
According to the ceremony programme made pursuant to the new regulation, the president of the Union of Turkish Bars Association will not have the right to give speech at the opening ceremony which will be held in the Supreme Court (Yargñtay). The Union of Turkish Bars Association denounced the programme with a written statement and said “We do not attend (the ceremony) just to applaud”.
Voting in the United States is not a "use it or lose it" right.
This case challenges Ohio’s practice of ‘purging’ or removing people who vote infrequently from its voting rolls. Since this practice began in 1994, hundreds of thousands have been eliminated from voter registration lists. Under Ohio’s rules, registered voters who do not participate in an election in a two year period are sent a postcard from the Ohio Secretary of State’s office requesting a confirmation of address. If the voter does not respond to the notice or vote within the next two consecutive federal elections, i.e. four years, they are removed from the rolls without further notice.
Voting in the United States is not a ‘use it or lose it’ right. Ohio’s purge practice violates the 1993 National Voter Registration Act (NVRA) which explicitly prohibits removing voters solely because they did not vote in an election.
In a bipartisan vote, the House voted to rein in Attorney General Jeff Sessions’ resurrection of abusive forfeiture rules.
The U.S. House sent a strong message of rebuke to Attorney General Jeff Sessions on civil asset forfeiture last night. The House adopted three amendments offered to an appropriations bill that prohibit the Department of Justice from using funds to increase certain federal and local forfeiture practices.
Rep. Justin Amash (R-Mich.) summed up the problem with civil asset forfeiture in one sentence. “It is an unconstitutional practice that is used to violate the due process rights of innocent people,” he said from the House floor.
This bipartisan showing was in response to Attorney General Jeff Sessions’ July announcement to expand the use of civil forfeiture. Sessions’ action was a reversal of a 2015 Attorney General Eric Holder policy that prevented local law enforcement from using federal forfeiture laws to circumvent more restrictive state forfeiture laws.
California Appeals Court Urged to Allow Defense Review of DNA Matching Software
If a computer DNA matching program gives test results that implicate you in a crime, how do you know that the match is correct and not the result of a software bug? The Electronic Frontier Foundation (EFF) has urged a California appeals court to allow criminal defendants to review and evaluate the source code of forensic software programs used by the prosecution, in order to ensure that none of the wrong people end up behind bars, or worse, on death row.
In this case, a defendant was linked to a series of rapes by a DNA matching software program called TrueAllele. The defendant wants to examine how TrueAllele takes in a DNA sample and analyzes potential matches, as part of his challenge to the prosecution’s evidence. However, prosecutors and the manufacturers of TrueAllele’s software argue that the source code is a trade secret, and therefore should not be disclosed to anyone.
The Trump administration plans to stop accepting refugee applications from children with U.S.-based parents from three violence-riddled Central American countries — El Salvador, Honduras and Guatemala — according to the summary of a presentation the State Department made recently to refugee organizations.
The decision to end the Central American Minors program, which began in 2014 and is the only refugee program aimed at helping people from that region, could put hundreds of families split between two countries in a delicate situation.
Mozilla is hosting a free panel at the Internet Archive in San Francisco on Monday, September 18. Hear top experts discuss why net neutrality matters and what we can do to protect it
Every major new industry of the last 100 years — from the automobile and aircraft businesses to semiconductors, personal computers, software, biotech, mobile telephony and Internet e-commerce — was launched on the back of an IP-protected innovation. It’s time higher education developed a curriculum to ensure that the same thing happens in the next 100 years.
Provisions on digital trade are quietly being squared away in both of the two major trade negotiations currently underway—the North American Free Trade Agreement (NAFTA) renegotiation and the Regional Comprehensive Economic Partnership (RCEP) trade talks. But due to the worst-ever standards of transparency in both of these negotiations, we don’t know which provisions are on the table, which have been agreed, and which remain unresolved. The risk is that important and contentious digital issues—such as rules on copyright or software source code—might become bargaining chips in negotiation over broader economic issues including wages, manufacturing and dispute resolution, and that we would be none the wiser until after the deals have been done.
The danger of such bad compromises being made is especially acute because both of the deals are in trouble. Last month President Donald Trump targeted the NAFTA which includes Canada and Mexico, describing it in a tweet as "the worst trade deal ever made," which his administration "may have to terminate." At the conclusion of the 2nd round of talks held last week in Mexico, the prospects of agreement being concluded anytime soon seem unlikely. Even as a third round of talks is scheduled for Ottawa from September 23-27, 2017, concern about the agreement's future has prompted Mexico to step up efforts to boost commerce with Asia, South America and Europe.
Civil rights movement anthem “We Shall Overcome” has been ruled to be in the public domain, with the Southern District of New York deciding that 1960 and 1963 applications for a copyright in the song were significantly flawed
The Monkey Selfie dispute, otherwise known as the case of the Black Macaque, is back for a final episode. As the parties have reached a settlement earlier this week, this episode marks the end of your favorite copyright saga. But you should not be too quick to celebrate the end of the 'Monkey Selfie buzz' as the settlement might not have actually settled anything... or has it?
There is no shortage of press coverage on the topic; however, if you feel you need to refresh your memory see previous IPKat posts: here and here. Otherwise, just remember the following: the crux of the dispute lays in this deceptively simple question: who is the legal author of a selfie taken by a monkey with a camera left unattended by its owner?
It has attracted strong criticism (IPW, Copyright, 9 March 2017) from, among others, Mozilla, European Digital Rights initiative (EDRi) and German Member of the European Parliament Julia Reda, of the Greens/European Free Alliance. The European Publishers’ Council (EPC), however, has been among those stakeholders lobbying hard for the ancillary right.