I've been using Linux for nearly 20 years. I do everything I can to spread the open source word on every possible occasion. I've written countless articles extolling the value of Linux on both the server and the desktop. But every so often I run into an issue that I feel needs to be pointed out to the Linux community and the countless developers that make Linux possible. I feel this is a necessary evil, in order to help Linux grow and become the best possible platform on the market.
Will the Linux market share even reach 5%? Should we consider Chrome OS a successful example of Linux on the desktop? I ask these questions and discuss the recent revelation that data tracking for Linux usage isn’t always that accurate.
If this work is being done behind the scene, for now, Matthias Kirschner, president of the Free Software Foundation Europe (FSFE), explained that “it was agreed that the final decision will be made by the city council members after they receive a calculation of the costs.”
The Google Pixelbook is the latest in a line of flagship Chrome OS laptops that are extremely nice and extremely expensive. If it ran anything other than Chrome OS, it would be a top-tier laptop, but it does run Chrome OS, so for $1,000, it's kind of a hard sell.
Boy, is it a sharp piece of hardware. It's wrapped in aluminum, like previous Chromebook Pixels. The palm rest is covered in a rubbery silicon pad, which feels fantastic to rest your wrists on while typing. It also serves as a great gripping point when you fold the laptop into its various modes. Hopefully this surface can stand up to the wear and tear of a laptop palm rest.
The back has a top glass panel, just like the Pixel Phones, which serves to let wireless signals in and out. The screen has a glass cover, too, along with the trackpad. The Google Hardware division is clearly working hard to make its products look like a cohesive family, and you can tell the basis for the Pixelbook's back design is the white-and-silver Google Pixel. Just like the phone, the laptop has a silver-colored metal body with a contrasting, white-colored glass back. The only problem is that the silver/white color scheme only matches last year's Google Pixel. This year, a silver body is not an option on the Pixel 2. So close, Google!
Microsoft was not interested in giving away any secrets, of course, but I found there was a whole different system called Linux that was famous for revealing every detail of how its software operated.
At the time, Linux was often described in the general press as being for geeks only, but all the people who seemed to know something about it said Linux just took a bit of learning-by-experience – you didn't have to be an IT expert. In my archives I've saved an article from 2007 in PC Magazine by Neil Randall titled "Linux – you can do it!" That's the one that really gave me hope.
Lenovo chose to unwrap the limited-edition anniversary version of its most famous laptop on the ThinkPad’s 25th birthday
The traditional local area network is connected with an Ethernet switch and Cat cables. The basic components of an Ethernetwork are network interface cards (NICs), cables, and switches. NICs and switches have little status lights that tell you if there is a connection, and the speed of the connection. Each computer needs an NIC, which connects to a switch via an Ethernet cable. Figure 1 shows a simple LAN: two computers connected via a switch, and a wireless access point routed into the wired LAN.
File systems usually stay low, both at the operating system level and in tech discussions. Red Hat’s recent deprecation of the Btrfs file system from its platform ignited some interest in the role of file systems in containerized environments.
As Linux distributions container-based operations microservices, they come across new file-system related challenges. Linux vendors, including Red Hat, SUSE and Canonical, are major players in the container space. In addition to their traditional OSes, these companies have also built container as service platforms to handle containerized workloads and microservices. Following the footsteps of CoreOS’s Container Linux, Red Hat has created Project Atomic; Canonical came out with Ubuntu Core and SUSE released SUSE CaaS Platform and Kubic.
I'm announcing the release of the 4.13.5 kernel.
All users of the 4.13 kernel series must upgrade.
The updated 4.13.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.13.y and can be browsed at the normal kernel.org git web browser: http://git.kernel.org/?p=linux/kernel/git/stable/linux-st...
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, announced that 15 new organizations have joined the Foundation as Silver members. Linux Foundation members help support development of the greatest shared technology resources in history, while accelerating their own innovation through open source leadership and participation.
A collection of stability fixes from the development branch, including two minor CVEs. Thanks to all who sent in patches!
If you take a look at the conformant vulkan list, you might see entry 220.
The open-source, unofficial Radeon Vulkan driver "RADV" developed independent of AMD by the community and contributors at Google and Red Hat is now considered a conformant driver.
I've just wrapped up trying out nine different Linux distributions on AMD's EPYC in the form of the EPYC 7601 housed in the TYAN Transport SX TN70A-B8026. Like our initial testing with Ubuntu on EPYC, the other modern Linux distributions all played nicely with AMD's re-entry into the server market with their Zen-based offerings. But as with any new CPU platform, the out-of-the-box performance can vary greatly depending upon the Linux operating system being used. Here are benchmarks including Fedora, Ubuntu, CentOS, openSUSE, Debian, Clear Linux and Antergos.
2017 has been an interesting year for processors with AMD's long awaited introduction of the Zen-based Ryzen / Threadripper / EPYC processors, Intel's Core X-Series processors for high-end desktops, the Xeon Scalable processor family introduction, and now the launch of Coffee Lake as a "Kaby Lake Refresh" step before the Cannonlake desktop processors expected in 2018. While another 14nm CPU, Coffee Lake is interesting is that Intel has now upped their desktop core counts in response to Ryzen. With the Core i7 series is now six cores plus Hyper Threading, compared to 4 cores plus HT with previous i7 models. The Core i5 CPUs are also now six core but sans Hyper Threading and there is also the just-published Core i5 8400 Linux benchmarks. This article serves as our first look at the Coffee Lake Core i7 CPUs in the form of the 8700K.
Last week I published the Radeon RX Vega Performance With Mesa 17.3-dev + LLVM 6 + drm-next-4.15-dc article offering a fresh look at the RX Vega 56/64 Linux performance using the new AMDGPU DC code that's likely to be merged in Linux 4.15. As well, the latest Mesa 17.3-dev Git code built against LLVM 6.0 SVN while all compared to the latest NVIDIA driver. Out of that article came some premium requests to see a larger comparison, so here that is.
Today marks the embargo expiry for reviews on Intel's new Coffeelake desktop processors. While a CPU refresh may not normally be too exciting, thanks to the pressure from AMD with their Ryzen processors pushing core counts higher, Intel is now upping the core counts in their desktop CPUs. Today we will be featuring Linux benchmarks of the Core i5 8400 and Core i7 8700K while this article is focusing on the i5-8400: a six-core Core i5!
Synapse is a free and open source quick launcher application with which you can easily start applications and access files using the Zeitgeist engine – kinda reminiscent of Ulauncher and Gnome Pie.
Tilda is a highly configurable and feature-rich Gtk based drop down terminal emulator for Linux and Unix operating systems. It’s similar to Tilix terminal emulator but doesn’t offer horizontally or vertically split and there are tons of customization’s you can make.
Exaile Music Player is a lightweight but powerful python-based music player with music management capabilities. It features an extensive plugin support, the ability to automatically fetch song lyrics and album art, stream online radio, and perform advanced track tagging.
You must know by now that none of Adobe’s products are available for the GNU/Linux platform but that has not stopped open source enthusiast all around the world from being just as productive as Windows and Mac users.
This is because the open source community is filled with a series of alternatives worthy of their articles in their own right and that is why it is with pleasure that I introduce to you, Natron.
Today we bring you another Electron app whose developers are bent on being unique. Having being termed the terminal emulator for the 21st century, its GitHub page deems Upterm as “an IDE in the world of terminals”.
Upterm (previously called Black Screen), is an open-source Electron-based terminal emulator with a plethora of features that easily make it an IDE compared to other terminal apps in the market especially thanks to its interactive shell.
One important aspect of any Internet of Things setup is being able to collect and visualize data for analysis. Seeing trends in sensor readings over time can be useful for identifying problems, and for coming up with new ways to use the data.
We wanted an easy solution for this for the c-base IoT setup. Since the c-base backstory is that of a crashed space station, using space technology for this made sense.
This tutorial shows you how to install multiple Linux distributions on one USB. This way, you can enjoy more than one live Linux distros on a single USB key.
The Wine Staging release 2.18 is now available.
Wine Staging 2.18 is out and as usual it comes with a good bunch of fixes I'm sure many of you will appreciate.
Building off last week's Wine 2.18 release is the newest Wine-Staging build with various extra patches added in, including work that benefits those running Windows games on Linux.
Here we are again to take a look at some awesome deals going on, we might have your next purchase here.
Now this is some fun news! The Cyanide & Happiness Adventure Game [Kickstarter] is officially heading to Linux as their Kickstarter stretch goal has been hit.
In the mood for some classic gaming? GOG have release eight SNK NEO GEO classics, all but one support Linux.
These are on top of the classic games they already have that support Linux, so it's great to see our collection with GOG become a little more complete.
Vikings - Wolves of Midgard [Steam] released for Linux recently and here are my thoughts on this new RPG from Games Farm and Kalypso Media Digital.
Fell Seal: Arbiter's Mark [Kickstarter, Official Site] is a new turn-based tactical RPG from 6EyesStudio with hand-drawn environments and a mature story. They plan to fully support Linux and they even have a demo ready.
I used to love Road Rash, it was an incredibly fun game on the Sega Megadrive and now the spiritual successor, Road Redemption [Steam, Official Site], is officially available.
The action game is a video game genre that focuses on physical challenges, including hand–eye coordination, anticipation, and reaction time. It is one of the hardest gaming genres to define. Given the popularity and longevity of the action game genre, developers have tinkered with the formula extensively. The genre is therefore fairly wide as it encompasses platform games, fighting games and shooter games. Sometimes real-time strategy games are also included in the genre. Many action games share similar design mechanics.
Ready to face the Dealer again? Hand of Fate 2 [Steam, Official Site] releases on November 7th it's now been announced. After a little confusion, it will still support Linux.
H-Hour: World's Elite [Steam], a tactical, team-based multiplayer military shooter looks like it's heading to Linux.
Thanks to SteamDB, we know they are at least working on it. Two days ago, a content depot for a Linux version popped up which is a good sign.
I gave in and purchased a personal copy of Space Pirates And Zombies 2 [Steam] to test out the Linux beta, turns out in runs rather well. It runs so well in fact, that the developers have decided to put the SteamOS icon on the store page to show off Linux support.
Gallium Nine does something interesting that few other Linux programs do — it re-implements a technology from Windows. In this case Gallium Nine is an open-source implementation of DirectX 9. As a result it matches Windows in DX9 performance and allows you to play DirectX 9 games at as performance as close to native as possible.
It’s really hard to beat the performance that Gallium Nine offers, which makes it kind of odd that support for Gallium Nine isn’t included by default in Wine. The Wine developers went as far as to reject it. You need to install a specially-configured version of Wine with additional patches to enable it.
It has been several years since last seeing an update to the Amarok open-source music player, but it looks like it may be alive and ticking after all, at least with one developer working towards a KF5/Qt5 port.
Amarok is among the many KDE/Qt aligned media players from Juk, Cantata, Babe, Elisa, and others, but Amarok really hasn't been updated in quite a while. A Phoronix reader pointed out that a developer is indeed working on a port to using KDE Frameworks 5 and Qt5 and posted some initial patches back in September.
So here comes another minor release for KStars v2.8.5 just less than two weeks after 2.8.4 was released. KStars v2.8.5 is available for Windows, MacOS, and Linux.
I am very happy to announce that Qt 5.9.2 is released today. It contains all the latest bug fixes and improvements from Qt 5.9 branch. Among multiple other improvements, Qt 5.9.2 also contains all the bug fixes released with Qt 5.6.3 earlier. We have also included the new Qt Creator 4.4.1 in the Qt 5.9.2 offline installer packages.
As a patch release Qt 5.9.2 does not add any new functionality, focus is in bug fixes and performance improvements. Compared to Qt 5.9.1 the new Qt 5.9.2 contains XYZ bug fixes and the total amount of changes since Qt 5.9.1 is ZZZ. For details of the most important changes, please check the Change files of Qt 5.9.2.
Over the past two years we’ve been laying the ground work towards the first goal of a simple and beautiful mail client. By now we have the first few releases out, and the closer we get to our goal, the less clear becomes what the next goal on our roadmap is.
Convergence plays a role at different levels of the whole software stack. In this, more technical article, I’ll look at different layers of the software stack, from boot/kernel and middleware to UI controls and overall layout and input methods. After reading this article, you’ll understand how Plasma allows to use the same software on a range of devices, which parts are different, and where code sharing makes sense, and thus happens.
Keep in mind that Convergence, at least for Plasma, doesn’t mean that we ship a lowest-common denominator UI so it “kind of” runs on all things computer, but that it provides a toolbox to build customized UIs that allow taking advantage of specific characteristics of a given target device.
KRunner, the framework, is the backend behind the ‘krunner’ UI, as well as being used for search operations within the Plasma shell. Backends (or ‘runners’) are written as plugins, which can come from a range of sources and loaded by both the plasmashell and krunner process.
Elisa is a music player designed to be simple and nice to use.
Last week, I have worked on focus handling and keyboard navigation. It is now possible to only use the keyboard to do everything possible with a mouse at the exception of filtering by ratings.
A very nice side effect of those modifications is that it is also quite easy to use with a touchscreen like the ones commonly found on laptops.
From day one when I started working on the Akonadi resource for Microsoft Exchange I have dreamed for it to be part of KDE PIM itself one day. This week that dream has finally come true.
At this year’s Akademy meeting the EWS resource was recognized to be valuable and I was invited by Daniel Vratil to merge it to the KDE PIM codebase. After some integration and cleanups followed by a review and more cleanups the resource has finally become part of KDE. Many thanks to Daniel and Laurent Montel for all the great work they did in order for this to go smooth.
GNOME Shell provides core user interface functions for the GNOME 3 desktop, like switching to windows and launching applications. GNOME Shell takes advantage of the capabilities of modern graphics hardware and introduces innovative user interface concepts to provide a visually attractive and easy to use experience.
GNOME 3.26.1 is shaping up to be a decent point release as besides Mutter finally picking up the half-tiling mode improvements, GNOME Shell 3.26.1 also has its share of changes.
A late night announcement: the improved tiling patches (shown in a previous blog post) were merged in Mutter and and GTK+3, and will be available in GNOME 3.26.1 / GTK 3.22.23 (not yet released; should be available this week).
I’d like to thank Florian Muellner, Matthias Clasen, Jonas Adahl and AlexGS for all their support, time, code reviews and testing.
The first point release update to GNOME 3.26 is pretty much out (save for an official announcement). The first of many such releases, GNOME 3.26.1 brings with it bug fixes, performance tuning, and a few other minor tweaks.
SUSE Studio was launched in 2009 to make building images really easy. Nowadays, images are used everywhere – for public cloud you need images; container images are used to have small and movable workloads, and data center operators use golden images to start their workloads.
Today Red Hat Inc. announced its new solution supporting containerized applications and infrastructure in Red Hat OpenShift Container Platform clusters, Red Hat Container-Native Storage 3.6. The latest version of Container-Native Storage comes right after the announcement of the companies enterprise-grade Kubernetes container application platform, Red Hat OpenShift Container Platform 3.6. Red Hat states that the new Container-Native Storage will see a three-fold increase in persistent storage volumes per cluster.
Linux company Red Hat Inc. is bringing what it calls “versatile software-defined storage” to its OpenShift Container Platform.
The idea is to make it easier for those working with the platform to provision, manage, scale and upgrade their storage environments for container-based workloads. The new feature comes as part of Red Hat’s Container-Native Storage 3.6 release, a product that’s built atop the company’s Gluster Storage technology and integrated with the OpenShift Container platform.
Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced that Brinker International, Inc., a leader in casual dining, has deployed several Red Hat solutions to deliver a consistent digital guest experience. Built on Red Hat Enterprise Linux and Red Hat Gluster Storage and supported by Red Hat Satellite and Red Hat Insights, Brinker is aiming to transform the modern dining experience by unifying its digital platforms in a new, open source e-commerce environment.
Unfortunately, September was a poor month for me in terms of motivation and energy for F/LOSS work. I did some amount of Gitano work, merging a patch from Richard Ipsum for help text of the config command. I also submitted another patch to the STM32F103xx Rust repository, though it wasn't a particularly big thing. Otherwise I've been relatively quiet on the Rust/USB stuff and have otherwise kept away from projects.
The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.
MAAS 2.3 beta overhauls and improves the visibility of hardware test results and information.
ââ¬â¹So let us agree on this, Linux Mint is the best Linux desktop around. Linux Mint in 2017 is what Ubuntu used to be in 2008. With Cinnamon and MATE desktops, Linux Mint is simple and intuitive for new users and has gained widespread applause, appreciation, usage, and popularity.
This tutorial applies to Ubuntu MATE and any Debian-based GNU/Linux using MATE Desktop. Enjoy!
SiFive has taped out the first multi-core RISC-V based processor design, and the first to run Linux, featuring 4x 1.5GHz “U54” cores and a management core.
SiFive announced “early access” availability of the 64-bit, quad-core U54-MC Coreplex – the first Linux-ready application processor built around the open source RISC-V architecture. Fabricated with a TSMC’s 28nm HPC process, the real-time capable U54-MC Coreplex is the first multi-core RISC-V design, and the first to offer cache coherence. The processor is intended for AI, machine learning, networking, gateways and smart IoT devices. A development board is set to ship in Q1 2018.
Avalue’s “EPX-APLP” Pico-ITX SBC employs a dual-core Celeron N3350 with 8GB DDR3L, and offers DP++, HDMI, and LVDS, as well as SATA III and dual M.2 slots.
Advantech’s fanless, ruggedized UNO-2372G runs Linux or Windows on an Atom E3845, and offers 4x serial and 4x USB ports plus mini-PCIe and iDoor expansion.
Todd Weaver of Purism has provided an update on the planned Librem 5 smartphone hardware components and that with a development board they do have Debian booting.
Debian GNU/Linux unstable is now working with an iMX6 development board and can boot Wayland with GNOME. Their testing has been with the i.MX6 SoC paired with the Etnaviv graphics stack.
It’s starting to look like that Purism Librem 5 smartphone with a GNU/Linux operating system and hardware kill switches for the camera, mic, wireless features might actually happen.
While you can often predict the success or failure of a crowdfunding campaign based on its first few days, the Librem 5 project didn’t pick up a lot of steam right away… but now Purism has raised nearly two thirds of its $1.5 million goal.
Consumers don't care about privacy anymore, right? Wrong -- some actually do. True, we are systematically being conditioned to surrender our private information and rights nowadays, but some people are still fighting the good fight. In many ways, both the Linux and open source communities can be seen as the foundations of internet privacy.
Ever since Purism has launched its crowdfunding campaign for Librem 5 smartphone, the project has been getting overwhelming support from the Linux and open source community. In recent past, Purism announced partnerships with KDE and GNOME.
The Librem 5 crowdfunding campaign is aiming at a funding of $1.5 million. If you look at the current stats, the campaign has just crossed the $1 million mark.
In case you’re more interested in numbers, let me tell you that Librem 5 raised $100,000 in the first 100 hours. With 18 days to go, Librem 5 is expected to cross the funding goal easily.
Talking about Purism’s partnerships, GNOME will provide a reference platform, software developers, and sponsorships for GNOME/GTK development. “GNOME Foundation will be helping coordinate hackfests, and community involvement,” Purism CEO Todd Weaver told Fossbytes previously in an interview.
Hologram announces today the release of Nova, the world’s first open source modem for cellular IoT connectivity. The Nova toolkit includes the 4G LTE Cat-M ready Nova USB modem, an SDK for edge computing, and access to Hologram’s industry leading global cellular network.
One of the holy grails of free and open computing is a really great free/open phone; it's been tried many times before without much success, but a new crowdfunder from Purism (who make a pretty great free/open laptop) has just crossed the $1,000,000 mark and is on track to hit its target of $1.5M in the next 18 days.
At today's hardware event, Google has announced a surprise new product: Clips. It's a little standalone camera that changes how pictures are taken. The Clips device itself figures out when something exciting is happening—happy faces, good lighting, interesting framing—and, when it thinks the time is right, it records (silent) video captures.
[...]
As long as your phone has Wi-Fi Direct or Bluetooth, you can use it to sort through Clips' pictures and decide what to keep. Those phones are currently oddly limited; Google says it needs a device running Android 7.0 or better, but the company specifically lists only the Pixel, Samsung Galaxy S7, and Samsung Galaxy S8 as being compatible. A larger list of compatible handsets is presently unavailable.
Google said Pixel users have reported high satisfaction with their devices. Now, at the latest ‘Made By Google’ Event, they’ve come up with the new members of the family, Pixel 2 and Pixel 2 XL. The company has emphasized on the development of AI along with hardware to bring the next breakthrough device.fos
That's about it for the Pixel 2s. We saw two phones made by two manufacturers that give two distinctively different impressions when you see them. The Pixel 2 XL feels like a modern, capable smartphone, while the Pixel 2 feels like a phone that shouldn't exist.
EdgeX Foundry, which launched its open source project and community focused on building a framework for simplifying interoperability for IoT ecosystem players, is demonstrating announcing "Barcelona," its first major code release, at IoT Solutions World Congress in Barcelona, Spain.
EdgeX Foundry, the Linux Foundation’s open source industrial Internet of Things (IoT) group, is making its first major code release, dubbed Barcelona, available later this month. The new release promises to help take the complexity out of IoT by supporting certain key APIs as well as industrial protocols like Bluetooth Low Energy, MQTT (a low-energy machine-to-machine protocol), and simple network management protocol (SNPP).
Google Cloud and Barefoot Networks have created an open source project under P4.org called P4 Runtime, an API for enabling communication between control plane and forwarding plane in a more flexible manner.
Suitable for local or remote-control plane software, the P4 Runtime API is independent of the underlying forwarding plane type. It offers the ability to control a diversity of networking devices including fixed-function ASICs, FPGAs, NPUs, software switches, and Programmable ASICs.
We're pleased to present the eighth, but sadly, final episode of Shane Martin Coughlan's, "The Faces of Open Source Law", featuring Mike Dolan. We'd like to thank Shane for his great work in introducing the issues related to open source software and communities, as well as the people so deeply involved and committed to helping the movement succeed.
[...]
Mike commented that our setup was just as ramshackle as the actual show. Despite this we recorded one of the longer and most content-filled interviews of the season, providing a perfect end point to an experiment in connecting personalities to well-known names in the open source legal sphere.
Gmail has enjoyed phenomenal success, and regardless of which study you choose to look at for exact numbers, there's no doubt that Gmail is towards the top of the pack when it comes to market share. For certain circles, Gmail has become synonymous with email, or at least with webmail. Many appreciate its clean interface and the simple ability to access their inbox from anywhere.
But Gmail is far from the only name in the game when it comes to web-based email clients. In fact, there are a number of open source alternatives available for those who want more freedom, and occasionally, a completely different approach to managing their email without relying on a desktop client.
AT&T’s 10-gigabit symmetric passive optical network technology (XGS-PON) plans are set to receive some open source brains.
The carrier today released the first version of its Virtual Optical Line Termination Hardware Abstraction (VOLTHA) software into the Open Networking Foundation (ONF). The platform provides a software framework – or “brain” – behind the XGS-PON access network in the cloud.
In AT&T’s latest effort to virtualize the last mile of connectivity between its fiber network and customers’ homes or businesses, the operator released open-source software it calls the “brain” for XGS-PON access technology.
Subutai is an open-source project and platform that lets anyone share, barter or rent computer resources to create clouds from the edge rather than centralized locations. Available devices can attach to these clouds hovering on the edge. We started calling it Social Cloud Computing, but technically, Subutai is a dynamic p2p multi-cloud made possible thanks to Lightweight Linux Containers and software-defined networking. Think Amazon's Virtual Private Cloud, but running on your computers and the computers of social contacts who share their computer resources with you. Or, think AirBnB on computers for the people's cloud.
Massive ice sheets with layers built up over millions of years blanket most of Greenland and Antarctica. As a result of climate change, these ice sheets have begun to melt and shrink. Scientists believe this trend is likely to continue and will contribute to sea level rise for decades to come.
Open source software attracts an ever-growing list of advocates. It can save organisations a lot of money while still providing a superior service to that available from proprietary vendors.
Read on for a rundown of the key benefits open source software has over commercial products
Open Jam is all about open source games and open game development. Whereas some jams require participants to submit source code for their games, not all of them require that code to be open source licensed. Open Jam encourages you to use open source tools and assets and to link them in your submission. Once voting has concluded, the top three games will be featured at All Things Open.
The ARCS model is an instructional design method developed by John Keller that focuses on motivation. ARCS is based on a research into best practices and successful teachers and gives you tactics on how to evaluate your lessons in order to build motivation right into them.
For Firefox 57, mozilla decided to overhaul much of their browser. The changes are large and massive, and in some ways revolutionary. It's no surprise, therefore, that some of the changes break compatibility with older things.
To ensure that your cloud-based skills are known, refresh your resume and update your profile on Dice.com so you’re matched with an employer who will be glad to have found someone with the most in-demand skills in today’s tech market.
At its Oracle OpenWorld conference this week in San Francisco, the company announced its new Blockchain Cloud Service. The distributed ledger cloud platform aims to help enterprises make various transactions more secure, using blockchain technology. The new service — which is fully managed by Oracle — is part of Oracle’s Cloud Platform.
The PostgreSQL Global Development Group today announced the release of PostgreSQL 10, the latest version of the world's most advanced open source database.
A critical feature of modern workloads is the ability to distribute data across many nodes for faster access, management, and analysis, which is also known as a "divide and conquer" strategy. The PostgreSQL 10 release includes significant enhancements to effectively implement the divide and conquer strategy, including native logical replication, declarative table partitioning, and improved query parallelism.
Version 10 of the PostgreSQL database management system has been released.
Version 10.4 of FreeBSD has landed, with the headline feature being support for eMMC.
For those of you still short of your best after nocturnal chemical exertions, eMMC – aka Embedded Multimedia Card – packs some flash memory and a controller into a single package. That arrangement is handy for manufacturers of personal electronics.
LibertyBSD 6.1 is now available as a deblobbed version of OpenBSD.
LibertyBSD is a downstream of OpenBSD that focuses on only distributing free software. OpenBSD ships with non-free, binary-only firmware like Linux, but LibertyBSD strips away those binary-only bits, similar to the Linux-libre downstream kernel.
GNU Health 3.2.4 patchset has been released !
Videos from the recent GNU Tools Cauldron 2017 are now available online where matters from the GCC compiler to glibc and compiler diagnostics were discussed.
The GNU Tools Cauldron 2017 took place from 8 to 10 September in Prague. Videos from the event are now online while the slides are sadly not yet available, but are said to be coming soon
The 2017 GNU Tools Cauldron was held September 8 to 10 in Prague. Videos from the sessions are now available. The sessions cover ongoing work with GCC, the GDB debugger, the GNU C Library, and more.
We've just written about a troubling move by Elsevier to create its own, watered-down version of Wikipedia in the field of science. If you are wondering what other plans it has for the academic world, here's a post from Elsevier’s Vice President, Policy and Communications, Gemma Hersh, that offers some clues. She's "responsible for developing and refreshing policies in areas related to open access, open data, text mining and others," and in "Working towards a transition to open access", Hersh meditates upon the two main kinds of open access, "gold" and "green".
With its promise to someday 3D print viable human organs for transplantation, bioprinting is one of the most exciting additive technologies out there. Its biggest drawback? Cost. Many popular 3D bioprinters cost upward of $200,000, if they’re even on sale at all.
As we come into this year’s Node.js Interactive conference it’s a good time to reflect on the State of Node.js, and by any reasonable measure the state of Node.js is very strong. Every day there are more than 8.8 million Node instances online, that number has grown by 800,000 in the last nine months alone. Every week there are more than 3 billion downloads of npm packages. The number of Node.js contributors has grown from 1,100 contributors last year to more than 1,500 contributors today. To date there have been a total of 444 releases, and we have 39,672 stars on Github. This is an enviable position for any technology and a testament to the value of Node.js and the dedication of the Node.js community.
Veteran GCC contributor and SUSE developer Jan Hubicka has begun working on some Zen tuning within the GNU Compiler Collection for benefiting the Ryzen / Threadripper / Epyc processors.
While GCC has already had the "znver1" scheduler model and some tuning for this new CPU microarchitecture, tuning a complicated compiler stack is a virtually never-ending process, just as the LLVM/Clang znver1 support continues to be refined too. AMD has long partnered with SUSE for compiler engineering excellence from working on GCC HSA code to the initial x86_64 bring-up and much more over the years. Given Hubicka now working on Zen tuning, this looks to be the latest involvement.
The PyPy team is proud to release both PyPy3.5 v5.9 (a beta-quality interpreter for Python 3.5 syntax) and PyPy2.7 v5.9 (an interpreter supporting Python 2.7 syntax).
PyPy, the self-hosting alternative Python interpreter, is up to version 5.9 for its Python 2 and Python 3 language support.
PyPy 5.9 brings support for Numpy and Pandas with its Python 2.7 implementation, greater compatibility in conjunction with Cython 0.27.1, an optimized JSON parser, updated CFFI, improvements to the C API compatibility layer, and other updates.
Assuring the quality of medicines all the way to the consumer is a key component of the global antimicrobial resistance action plan now beginning to be implemented around the world, a panel of experts said during the recent United Nations General Assembly.
There are a number of reasons why patients develop resistance to antimicrobials, said Ramanan Laxminarayan, director and senior fellow, Center for Disease Dynamics Economics & Policy (CDDEP), the moderator of the panel. Examples are that people do not take the full course of treatment, or that they buy substandard medicines over the counter from local shops.
In the question and answer period, Inoue reported on WHO efforts, saying for instance that since WHO launched its global surveillance and monitoring system for substandard or falsified medicines in 2012, they have gathered more than 1,500 reports of such medicine from more than 100 countries. So there is now some data on clusters of medicines or categories of medicines most prone to such issues.
In the six months since pharmaceutical giant Merck KGaA reformulated a thyroid hormone replacement drug distributed in France, patients there have filed dozens of lawsuits. Hundreds of thousands signed a petition to reverse the change, and around 9,000 reported illnesses and side-effects, some dramatic. They complain of hair loss, cramps, weight gain, extreme fatigue, headaches, diarrhea, dizziness, memory loss, and heart palpitations.
The outcry has created a political and media blitz. Rumors and conspiracy theories have flown, including that Merck switched production of the drug to a plant in China to cut costs. (The drug, which has no competition in France, is produced in Europe.)
Google has made a couple of notable moves on the security front this week: One, it has patched flaws in a DNS software package known as Dnsmasq; and two, it said it would start requiring encryption for 45 top-level domains (TLDs) that it controls as a registrar.
Dnsmasq, an open-source package, is widely installed in desktop Linux distributions (like Ubuntu), home routers and IoT devices, and provides functionality for serving DNS, DHCP, router advertisements and network boot. Google discovered seven distinct issues within the kit: three potential remote code executions, one information leak, and three denial of service vulnerabilities affecting the latest version at the project git server as of September 5.
Last month, the Securities and Exchange Commission revealed a 2016 breach of a test system that allowed an unknown party to get access to unpublished corporate information in the SEC's Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system. The breach potentially allowed the bad actors to profit from trades based on the information. SEC Chairman Jay Clayton revealed the extent of that breach in a policy statement on the importance of the commission's cyber-security mission. But just a few months before the SEC discovered the initial breach last year, as Reuters reports, members of the SEC's own internal digital forensics and security team wrote a letter bemoaning the lack of support they received from the agency's Office of Information Technology and SEC leadership.
Given recent and massive stories about data security breaches by some very, very large players in the technology and financial spaces, we have developed a mantra that you should have on repeat in your head any time you read stories about a breach: however big the breach is reported to be initially, it's always bigger. We formulated that 12 years ago and it has continually held true. We saw it with Equifax. We saw it with Deloitte. And you will also likely recall that 2013 and 2014 were not banner years for data security at a little company called Yahoo. Hacks of Yahoo's email platform were reported initially to be in the hundreds of thousands in terms of the number of accounts compromised. As Verizon began negotiating the purchase of Yahoo, that number crept into the hundreds of millions. Eventually, Yahoo settled on a billion compromised accounts resulting from the hacks.
“You’re really only required to notify people and say, ‘So sorry, so sad,’” Barton said. “It seems to me you might pay more attention to security if you had to pay everybody who got hacked [sic] a couple thousand bucks or something.”
The data breach that took place in August 2013, already put a dent in Yahoo’s reputation. Last year, the company disclosed that around 1 billion user accounts were affected due to the Yahoo data breach.
Google just released a new open source community for developing innovative security tools called Forseti Security. Forseti is now open to all users of the Google Cloud Platform. Google recently shared more about the creation and the idea behind Forseti. Here are some of the highlights.
Hackers working for the Russian government stole NSA plans and documents on cyber defense off a contractor’s personal computer, according to a report from the Wall Street Journal.
The article quotes sources familiar with the matter, who say that a contractor removed “highly classified material” from the NSA’s network and put it on his home computer. Hackers working for the Russian government were then able to ID the files, thanks to the contractor’s use of Russian-made antivirus software from Kaspersky Labs.
[...]
The WSJ report doesn’t explain how the attack was attributed to the Russian government, nor how Kaspersky was linked to the hack. Attributing blame for hacking operations is difficult at best, and the lack of public scrutiny of this hack (compared to public attacks like WannaCry) means that attribution to the Russian government is far from certain.
Mariano added a new encrypted APFS volume to a container, set a password and hint, and unmounted and remounted the container in order to force a password prompt for demonstration purposes. Then, he clicked the "Show Hint" button, which revealed the full password in plain text rather than the hint.
“Gun rights” advocates insist that pretty much any gun control violates the design of the Constitution’s Framers and thus can’t be enacted no matter how many innocent people die.
Some on the Right, as well as some on the Left, even claim that the Founders, as revolutionaries themselves, wanted an armed population so the people could rebel against the Republic, which the U.S. Constitution created. But the Constitution’s Framers in 1787 and the authors of the Bill of Rights in the First Congress in 1789 had no such intent.
Arguably other individuals disconnected from the drafting of those documents may have harbored such radical attitudes (at least rhetorically), but the authors didn’t. In fact, their intent was the opposite.
The goal of the Second Amendment was to promote state militias for the maintenance of order at a time of political unrest, potential slave revolts and simmering hostilities with both European powers and Native Americans on the frontiers. Indeed, the amendment’s defined purpose was to achieve state “security” against disruptions to the country’s new republican form of government.
For decades, the U.S. mainstream media has shied away from a clear-eyed view of the Vietnam War, not wanting to offend the war’s apologists, a residue of which tainted the recent PBS series, as John Pilger told Dennis J Bernstein.
After former Fox News host Bill O'Reilly—ousted from his nightly show earlier this year following allegations of sexual harassment—described the blood-soaked massacre at a Las Vegas music festival on Sunday night that left 59 people dead and hundreds wounded as "the price of freedom," the good people of the nation had a simple response: No, you heartless and mindless idiot.
"Once again," O'Reilly wrote on his personal blog Monday, "the big downside of American freedom is on gruesome display." Later, he argued that mass murder at the hands of people with automatic assault rifles is simply "the price of freedom" because "violent nuts are allowed to roam free until they do damage, no matter how threatening they are."
Though a classic construction of right-wing demagoguery, that thinking is betrayed by serious academic research which shows that when strict gun control laws are put in place, these kinds of attacks are incredibly rare compared to what the United States—hostage as it is to the nation's gun industry lobby and the NRA—has been forced to experience in recent decades.
One night in 2013, I sat in my living room, gaze fixed on the television. A teenage girl the same age as my own daughter had been murdered. In our neighborhood (and the neighborhood of the then-president, too). So many questions ran through my head: "How, what, why?" Yes -- lots and lots of "why?"
Her mother sobbed and moaned uncontrollably on the TV. Her family crowded around to bring strength to her, but at that moment, nothing could. I knew this scene. I knew the sound of it. I knew what it meant and I was terrified of it.
This chart shows that there’s a fairly strong relationship between the rate of gun-related deaths (murders, suicides, accidents) and the percentage of households that own guns: the fewer households with guns, the fewer gun deaths. This is encouraging because it suggests that efforts to reduce the heavy toll of gun deaths could work: If the statistical correlation holds, you wouldn’t have to eliminate all guns—a probably impossible goal—you would just have to reduce their number in order to significantly reduce the carnage. In other words, if Kentucky reduced household gun ownership by about two-fifths (just eyeballing it), it might look more like Delaware, with roughly two-thirds the rate of gun deaths.
The Red Cross’ anemic response to Hurricane Harvey left officials in several Texas counties seething, emails obtained by ProPublica show. In some cases, the Red Cross simply failed to show up as it promised it would.
In DeWitt, a county of 20,000 where Harvey ripped apart the roof of a hotel, Emergency Management Coordinator Cyndi Smith upbraided a Red Cross official in a Sept. 9 email:
A federal judge has ordered the Interior Department to reinstate an Obama-era regulation aimed at restricting harmful methane emissions from oil and gas production on federal lands.
The order by a judge in San Francisco comes as Interior is moving to delay the rule until 2019, saying it is too burdensome to industry. Interior tried earlier to postpone part of the rule set to take effect next year.
The UK new car market declined for a sixth consecutive month in September, with 426,170 new units registered, according to figures released today by the Society of Motor Manufacturers and Traders (SMMT). Registrations fell by -9.3% in this key month, as economic and political uncertainty, and confusion over air quality plans led to a fall in consumer confidence.
FBI AGENTS ARE devoting substantial resources to a multistate hunt for two baby piglets that the bureau believes are named Lucy and Ethel. The two piglets were removed over the summer from the Circle Four Farm in Utah by animal rights activists who had entered the Smithfield Foods-owned factory farm to film the brutal, torturous conditions in which the pigs are bred in order to be slaughtered.
While filming the conditions at the Smithfield facility, activists saw the two ailing baby piglets laying on the ground, visibly ill and near death, surrounded by the rotting corpses of dead piglets. “One was swollen and barely able to stand; the other had been trampled and was covered in blood,” said Wayne Hsiung of Direct Action Everywhere (DxE), which filmed the facility and performed the rescue. Due to various illnesses, he said, the piglets were unable to eat or digest food and were thus a fraction of the normal weight for piglets their age.
You're going to hear a lot about initial coin offerings (ICOs) in the coming months. As investors have poured more and more money into newly created virtual currencies, they have created a gold-rush mentality. In recent months, some ICOs have raised tens of millions of dollars, and in early October the cryptocurrency market as a whole was worth about $140 billion.
On Tuesday, Donald Trump followed up his sadistic attacks on the people of Puerto Rico with a comment out of the blue regarding the territory’s $73 billion debt: “… we’re going to have to wipe that out.” Whether or not Trump can be taken any more seriously on that than he can on any other issue, Hurricane Maria did reveal in the starkest possible way that forgiveness of Puerto Rico’s debt is a moral necessity.
The economic vulnerability that set the island up for an unnatural disaster unprecedented in U.S. history was a hybrid between mainland hedge-fund managers’ greed and the island colony’s political powerlessness. Writing more than a year before Maria, legal scholar Natasha Lycia Ora Bannan argued,
For bondholders sitting on Puerto Rican debt, Hurricane Maria may have come just when they needed it, just as a yearslong battle over the fate of the island’s financial future was beginning to turn against them. Or, depending on how the politics shake out, they could see their entire bet go south.
Ahead of Maria, the federally appointed fiscal oversight board now in control of Puerto Rico’s finances had developed a plan that would wipe out 79 percent of the island’s annual debt payments, taking a massive chunk out of the payday hedge funds had been hoping to land from the island.
In the wake of the storm, that fight could go one of two ways: Advocates for Puerto Rico are making the case that the devastation means that 79 percent should be ratcheted up all the way to a full debt cancellation. The hedge funds, meanwhile, see an opening to attack the oversight board and reclaim ownership of the process.
While Congress focuses on the size and shape of the relief package, the battle over the much larger debt — at least $74 billion — is being overshadowed. As hedge funds attempt to undermine the board’s legitimacy in the courts, resentment toward the board from a different end of the political spectrum has made the body unpopular for entirely different reasons: It’s colonial and undemocratic. The difference between the two? The left wants debt relief for Puerto Ricans. Many bondholders want the opposite.
As President Trump begins a barn-storming tour to tout his tax plan, we’ve released a short video rebutting some of the most common Republican myths about corporate tax cuts.
Trump has claimed that we’ll “see a rocket ship” once his tax plan is adopted — that’s just how much he wants us to believe the economy will take off.
But as predicted, the plan he and congressional Republican leaders released on September 27 would primarily benefit the wealthy and big corporations. For the rest of us, it would be a dud.
You know the old joke: How do you make a killing on Wall Street and never risk a loss? Easy—use other people’s money. Jamie Dimon and his underlings at JPMorgan Chase have perfected this dark art at America’s largest bank, which boasts a balance sheet one-eighth the size of the entire US economy.
After JPMorgan’s deceitful activities in the housing market helped trigger the 2008 financial crash that cost millions of Americans their jobs, homes, and life savings, punishment was in order. Among a vast array of misconduct, JPMorgan engaged in the routine use of “robo-signing,” which allowed bank employees to automatically sign hundreds, even thousands, of foreclosure documents per day without verifying their contents. But in the United States, white-collar criminals rarely go to prison; instead, they negotiate settlements. Thus, on February 9, 2012, US Attorney General Eric Holder announced the National Mortgage Settlement, which fined JPMorgan Chase and four other mega-banks a total of $25 billion.
The European Commission on Wednesday stepped up its campaign to force big American technology companies to pay more taxes on Wednesday. It ruled that Luxembourg had violated EU rules by allowing the bulk of Amazon's European profits to go untaxed, and it announced it was taking Ireland to court for failing to collect higher taxes from Apple, after Ireland ignored a similar ruling from the EC last year. If the EC wins the battle, Apple could owe €13 billion ($15 billion), while Amazon could owe an extra €250 million ($290 million).
The EU's competition commissioner, Margrethe Vestager, says that she's just trying to create a level playing field by preventing big multinational companies from getting sweetheart deals not available to most companies. But critics say Vestager is meddling in the internal tax policy decisions of democratic nations—and some have also insinuated that she has been singling out American multinationals for extra scrutiny.
Facebook previously has acknowledged that about one quarter of the 3,000 Russian-bought ads were targeted to specific geographic locations, without detailing the locations. The company said of the ads that were geographically targeted "more ran in 2015 than 2016." In all, Facebook estimates the entire Russian effort was seen by 10 million people.
Since 2011, Facebook has asked the Federal Election Commission for blanket exemptions from political advertising disclosure rules -- transparency that could have helped it avoid the current crisis over Russian ad spending ahead of the 2016 U.S. election.
Tenants of the Baltimore-area apartment complexes owned by Jared Kushner’s real-estate company have brought a class-action lawsuit against the firm’s property management arm over its aggressive pursuit of tenants for allegedly unpaid rent.
The lawsuit, filed Wednesday in Circuit Court for Baltimore City, alleges that the management company and related corporate entities have been improperly inflating payments owed by tenants by charging them late fees that are often unfounded and court fees that are not actually approved by any court. This, the lawsuit charges, sets in motion a vicious cycle in which tenants’ rent payments are partly assessed toward the fees instead of the actual rent owed, thus deeming the tenant once again “late” on his or her rent payment, leading to yet more late fees and court fees. Making matters worse, the 5 percent late fees are frequently assessed on principal that includes allegedly unpaid fees, not just the rent itself. Tenants are pressured to pay the snowballing bills with immediate threat of eviction, the suit alleges.
For consumers, there are two main options under federal bankruptcy law: Chapter 7, which wipes away most debts, or Chapter 13, which usually requires five years of payments before debts are forgiven. In most of the country, people choose Chapter 7. But two overlapping groups — debtors in the South and black debtors — disproportionately file under Chapter 13. About half of Chapter 13 cases are dismissed, usually because debtors failed to make their payments. This can leave them worse off than before they filed because they’ve paid court costs and attorney fees while falling further behind on their debts. Detailed Findings | Related Story | Download the Data
Novasha Miller pushed through the revolving doors of the black glass tower on Jefferson Avenue last December and felt a rush of déjà vu. The building, conspicuous in Memphis’ modest skyline along the Mississippi River, looms over its neighbors. Then she remembered: Years ago, as a teenager, she’d accompanied her mother inside.
When the Department of Homeland Security notified 21 states that Russian actors had targeted their elections systems in the months leading up to the 2016 presidential election, the impacted states rolled out a series of defiant statements. “Oregon’s security measures thwarted Russian government attempts to access the Secretary of State computer network during the 2016 general election,” chest-thumped Oregon Secretary of State Dennis Richardson.
The Florida secretary of state’s office, which oversees elections, was triumphant: “Florida was unsuccessfully targeted by hackers last year.”
A post-surgical convalescence has held me captive to the 24/7 news cycle more than usual so I’ve been far too immersed than is healthy in the concurrent sagas of Donald Trump versus the National Football League and the United States Commonwealth of Puerto Rico. Hence a couple of thoughts about aspects of Trump’s life and worldview that may help connect some dots:
Things have taken a much more sinister turn in Catalonia, without sufficient notice being paid internationally. The leader of the Catalan regional police force has been formally arraigned for sedition by the Spanish attorney general, for refusal to comply enthusiastically with the beating up of old women. That carries a minimum jail sentence of four years. It is the first step towards major imprisonment of Catalan leaders. It is also extremely significant that this first step is aimed at decapitating the only disciplined and armed force under some measure of Catalan government control. What does that tell you about Rajoy’s next move?
This extreme action against Major Trapero is precisely in line with last night’s ultra hardline address by a man with the comic opera name of Felipe Juan Pablo Alfonso de Todos los Santos de Borbón y Grecia. It is hard to take seriously anyone named after a whiskey, but we live in such a strange world that this unelected, far right and immensely corrupt, inbred buffoon could spout about democracy and accuse anyone who did not bow the knee to him of disloyalty and sedition. That precisely prefigures the legal action taken against Major Trapero. It can only be a precursor to a Spanish attempt to impose physical control on Catalonia and imprison its leaders. Having rejected both dialogue and mediation, I see no other direction Rajoy will take.
Timmerman said “rule of law” an amazing 12 times during his brief closing statement, and said “human rights” or “fundamental rights” precisely zero times. At no stage did Timmermans acknowledge that the Spanish Guardia Civil had viciously attacked peaceful civilians of all ages.
[...]
It was, in short, horrific. I am afraid to say that it left me in no doubt whatsoever that I have made the right choice in declining further to support membership of the EU.
Frustrated with a set of damning reports about his relationship with Secretary of State Rex Tillerson—including the nugget that Tillerson called him a “moron” (perhaps with an R-rated modifier)—the president offered a new suggestion on Twitter Thursday morning: Why not explore government censorship of the press?
Web-based cryptocurrency miners became a big thing recently when The Pirate Bay trialed one to generate extra revenue. Now, however, TorrentFreak has learned that Cloudflare has banned at least one torrent proxy site for deploying a miner on its platform. According to Cloudflare, unannounced miners are considered malware.
Asked by an audience member if she understood how end-to-end encryption actually worked, she said: “It’s so easy to be patronised in this business. We will do our best to understand it. We will take advice from other people. But I do feel that there is a sea of criticism for any of us who try and legislate in new areas, who will automatically be sneered at and laughed at for not getting it right. I don’t need to understand how encryption works to understand how it’s helping the criminals,” she went on. “I will engage with the security services to find the best way to combat that.”
He also had a history of mocking those who asked him to take down the nude photos that he had posted on his site. For example, this was posted to Brittain's site, and preserved by Adam Steinbaugh (Craig took down this and other posts after Steinbaugh wrote about them). What you see below is Craig literally responding "lol" to people freaked out that their naked photos were posted to his site without their knowledge or consent (while the image says "admin," Craig has publicly admitted he wrote and posted those responses).
We've discussed in the past the completely ridiculous attacks on Sci-Hub, a site that should be celebrated as an incredible repository of all the world's academic knowledge. It's an incredible and astounding achievement... and, instead of celebrating it, we have big publishers attacking it. Because copyright. And even though the purpose of copyright was supposedly to advance "learning" and Sci-Hub serves that purpose amazingly well, so many people have bought into the myth of copyrights must "exclude" usage, that we're in a time where one of the most amazing libraries in the world is being attacked. Sci-Hub lost its big case earlier this year, and almost immediately others piled on. Specifically, back in June, the American Chemical Society (ACS) jumped in with a similar "us too!" lawsuit, knowing full well that Sci-Hub would likely ignore it.
He said the idea to come up with a new name was informed by the negative connotations attracted by the current name.
It’s not just newspapers or internet giants like Twitter or Facebook; we are all in the communications business. We’re not the talking naked apes we once were. Now we are a species with interconnected tongues and brains, linked by clouds of computers and thinking machines. The same primate thumbs that enabled us to become toolmakers have now become our primary language devices. No thumbs means no phone, no communication.
[...]
Here at this newspaper, we have inherited new jobs. Every week we are forced to chase down Facebook errors and Nextdoor rumors and try to set the record straight. Why can’t Facebook’s billionaire Mark Zuckerberg do his own job?ââ¬ËMaybe because he’s already admitted he can’t control all his thinking machines. Google’s motto is “do no harm.” That sounds a lot like a tag line promoting last summer’s Planet of the Apes movie.
Home Secretary Amber Rudd is giving off the vibe the UK government may soon be wielding mandates and legislation, if not literal slings and arrows. The more Rudd (and other top UK politicians) argue for encryption backdoors they insist aren't backdoors, the more they're running into opposition from those expected to create the backdoors.
A challenge to GCHQ’s use of non-specific warrants to authorise the bulk hacking of smartphones, computers and networks in the UK is starting at the court of appeal.
The case, brought by the campaign group Privacy International (PI), is the latest twist in a protracted battle about both the legality of bulk surveillance and the primacy of civil courts over an intelligence tribunal that operates partly in secret.
In what raises questions of propriety and conflict of interest, executives who have worked or are working with the Unique Identification Authority of India (UIDAI) — the parent agency for Aadhaar — are launching companies or funding start-ups that offer Aadhaar-based services and products for a fee. Consider the case of Vivek Raghavan who is Chief Product Manager of UIDAI which he served as a volunteer between October 2010 and June 2013. Srikanth Nadhamuni was UIDAI’s Head of Technology from 2009 to 2012; Sanjay Jain was Chief Product Manager at UIDAI between 2010 and 2012. All three founded Khosla Labs in India in September 2012. Investor and entrepreneur Vinod Khosla is its chairman.
The European Court of Justice is going to look into the acceptability of US internet company's privacy practices under the so-called "Privacy Shield" framework that was put in place last year. As you may recall, for years, the EU and the US had a "safe harbor" agreement, under which tech companies underwent a fairly silly and almost entirely pointless process (I know, because we did it ourselves...) by which the companies effectively promised to live up to the EU's data protection rules, in order to move data from servers in the EU across the Atlantic to the US. It is important that companies be allowed to do this, because without it, the internet doesn't function all that well. But, because of NSA snooping, it became clear that what companies were promising couldn't match what was actually happening. And thus, the EU Court of Justice tossed out the framework, saying that it violated EU data protection rules.
A group of US House lawmakers are introducing new legislation that would impose restrictions on the National Security Agency's warrantless internet surveillance powers - a move that will likely trigger a standoff with the administration of US President Donald Trump. The bill from the House Judiciary Committee will be formally introduced on Thursday (5 October) and would revise the government's foreign surveillance provision, known as Section 702 of the Foreign Intelligence Surveillance Act (FISA), before it expires on 31 December.
Section 702 aims to gather data on foreign spies, terrorists and other foreign targets overseas and allows US intelligence agencies to collect emails and phone calls of foreigners abroad from American internet and telecom giants without a warrant. However, the collection also "incidentally" scoops up data of US citizens who communicate with a foreign target of surveillance.
A bipartisan group of lawmakers has introduced the first legislative proposal to restrict law enforcement’s access to data collected by the National Security Agency’s (NSA) warrantless internet surveillance program.
Marcy Wheeler has a fascinating post about NSA collection activities under Section 702 and Executive Order 12333. The rules governing the collections allow the NSA to gather communications when a targeted foreigner leaves the country, but are supposed to cease when this target returns to the United States. It's something that's easier said than done, even when the NSA engages in good faith efforts to abide by these restrictions.
Kevin Gallagher, the creator of “Free Barrett Brown,” sued the government in San Francisco federal court this past February after learning that the Dallas prosecutor’s office used a subpoena to quietly obtain the names and other personal information of individuals who made seemingly anonymous donations to the writer’s defense fund. Prosecutors investigating the criminal case against Mr. Brown said the subpoena was necessary to determine if the accused could afford to hire an attorney, but lawyers representing Mr. Gallagher and an anonymous donor argued that the government sought “completely irrelevant” information that was meant to intimidate and silence the journalist’s supporters.
President Donald Trump’s administration is facing strong backlash from civil rights groups after voting against a U.N. resolution that condemns using death penalty to punish “consensual same-sex relations.”
The U.N. Human Rights Council approved the measure on Friday with a 27-13 vote, with seven countries abstaining. The United States, led by Amb. Nikki Haley, voted for an amendment to the resolution that said the death penalty was not necessarily a human rights violation, and voted against amendments urging countries to stop using experimental drugs in executions.
A federal judge in San Francisco has denied the FBI’s attempt to dismiss a lawsuit brought by a local activist who raised money for Barrett Brown. Brown is a journalist who was released from prison last year.
As Ars reported previously, in April 2014 Brown took a plea deal admitting guilt on three charges: “transmitting a threat in interstate commerce," interfering with the execution of a search warrant, and being "accessory after the fact in the unauthorized access to a protected computer.” Brown was arrested in 2012 when he shared a link related to Anonymous’ hack of Stratfor.
During Brown’s incarceration, activist Kevin Gallagher solicited over $40,000 in donations on the WePay website. However, he soon found that the FBI had successfully subpoenaed WePay to obtain information about the myriad donors whose identities Gallagher had pledged to keep secret.
Copenhagen prosecutor Jakob Buch-Jepsen announced in a court hearing Wednesday that "images" of the torture, decapitation, and burning of a woman were found on a computer hard drive at RML Spacelab, the organization devoted to building a manned suborbital rocket led by Danish aerospace engineer Peter Madsen. The BBC reports that the images, "which we presume to be real," said Buch-Jepsen, were on a computer believed to belong to Madsen—the suspect in the death of journalist Kim Wall in an incident aboard his submarine the UC3 Nautilus.
Madsen, for his part, claimed the video was not his and that the computer the video was on was a computer that everyone in the lab had access to. But other evidence presented in this latest hearing on his case has prompted the judge overseeing the case to order he be held in custody another four months, as Buch-Jepsen told the court of the video and other evidence that have "strengthened" the case against Madsen since his last hearing on September 5.
The Supreme Court is setting aside a request to live stream its oral arguments. The attorney for Chief Justice John Roberts Jr. told members of Congress that live streaming even the audio portion of its oral arguments might impact the outcome.
"The Chief Justice appreciated and shares your ultimate goal of increasing public transparency and improving public understanding of the Supreme Court," Roberts' attorney, Jeffrey P. Minear, wrote (PDF) the four members of Congress seeking (PDF) to have the court's gerrymandering case live streamed in audio. "I am sure you are, however, familiar with the Justices' concerns surrounding the live broadcast or streaming of oral arguments, which could adversely affect the character and quality of the dialogue between the attorneys and Justices. Consequently, the Court is unable to accommodate your request."
Each day, California Gov. Jerry Brown releases a list of 30-40 bills that he's signed—and those that he’s vetoed. When all is said and done, California likely will add more than 800 new laws to the books this year.
And each day, EFF refreshes and refreshes the governor's press release page, watching for Brown to take action on the bills we fought to put on his desk. He has until Oct. 15 to sign, veto, or let bills pass without his signature.
Will he sign S.B. 345, a police transparency bill that even law enforcement supports? Will he agree that at-risk youth in juvenile halls and foster homes deserve access to digital tools, as proposed by A.B. 811? Will he finish the job of reforming California's gang databases and approve A.B. 90?
He could act on these bills any time over the next 10 days. If you live in California, tell the governor that today is a great day to strengthen our digital rights.
The Stranger's David Lewis snuck into the Northwest Forum, a s00per s33kr1t Nazi gathering in Seattle, and attended the speeches, including the keynote by reclusive white supremacist leader Dr Greg Johnson.
All in all, the Forum was a pretty dull affair, but Johnson did take the opportunity to describe his strategy for "secret agent" white nationalists to infiltrate the tech sector by paying "lip service to diversity," moving up the corporate ladder, and hire other mediocre white men who believe in racial superiority to fill the companies' vacancies.
A magistrate judge dismissed multiple claims brought by supporters of journalist Barrett Brown against a former assistant United States attorney, former special FBI agent, and the U.S. government. But the judge did not entirely dismiss the lawsuit and left the door open for one donor to amend his claim arguing an FBI subpoena chilled his First Amendment activity.
Brown was released from prison on November 29, 2016, after serving a prison sentence which stemmed from pleading guilty to threatening an FBI agent, obstructing justice, and being an accessory to a cyber attack. He spent two years in pretrial incarceration prior to his sentence in 2014.
Cadina Heath was the assistant U.S. Attorney in the Northern District of Texas. Robert Smith was a special FBI agent in the Dallas office. They drafted and served WePay with a subpoena that directed WePay to produce records on the crowdfunding campaign to raise money for Brown’s legal defense. It exposed the identities of donors, their sensitive financial information, and the amounts of their donations, and allegedly targeted their political speech.
Early in the morning on July 31, eight days before a highly contested election that would plunge the country into a crisis unlike any it had seen before, the man responsible for designing the electronic system to ensure a fair and accurate vote was found brutally murdered.
Authorities found the body of Chris Msando, the deputy IT manager of Kenya’s Independent Electoral and Boundaries Commission (IEBC), on the side of the road in a town called Kikuyu, about 12 miles northwest of Nairobi. Police also found the body of a 21-year-old woman next to him; both of their clothes had been removed. Early reports indicated that Msando’s arm had been chopped off, but a pathologist later clarified that he had suffered several cuts to his arm and other signs of torture. Officials said the cause for his death was strangulation. Kenya’s Directorate of Criminal Investigations continues the probe into his killing.
In Indiana, it's legal for adults to have consensual sex with minors aged 16 and 17. But it's illegal to sext those same minors, the Indiana Supreme Court ruled this week. The decision reinstated sexting charges against an adult who texted nude images of himself to a girl he knew was 16.
The state's highest court, ruling 5-0, noted that the charges against 40-year-old defendant Sameer Thakar, a high school teacher who has been removed from his post, are "inconsistent" when balanced against the state's laws on consensual sex. But state lawmakers, and not the Supreme Court, can rectify that if they want to, the court ruled.
If you've been paying attention, you may have noticed that Trump-appointed FCC boss Ajit Pai is viciously unpopular. There are dozens of reasons for this, ranging from his assault on net neutrality and broadband privacy rules, to his efforts to protect cable's set top box monopoly while fiddling with data measurement to downplay a lack of competition in the space. Pai's the type to gut broadband funding programs for the poor while professing to be a stalwart champion of bridging the digital divide -- a man whose self-professed dedication to transparency is notably absent in his policy making.
Wall Street predicts that cable giants like Comcast will soon be cashing in on the one-two punch of rubber stamp regulators and an ongoing lack of competition in the broadband space. Under the Obama administration, regulators turned a blind eye to the fact that cable giants like Comcast were taking advantage of a lack of competition to impose arbitrary and unnecessary usage caps and overage fees. Under the Trump administration that apathy has ballooned ten fold, with the looming assault on net neutrality only green lighting Comcast's ability to use those fees to raise rates and hamstring streaming competitors.
A father who livestreamed his son's birth on Facebook and then sued various media outlets that used his clips has been ordered to pay $120,000 in attorneys fees after losing his case.
US District Judge Lewis Kaplan ruled in February that TV stations broadcasting clips of the 45-minute livestream, published online by Kali Kanongataa, qualified as fair use. NBC used 30 seconds of the video on one of its morning shows, while ABC and Yahoo used 22 seconds of the video for a segment that was broadcast on Good Morning America and a Yahoo site that hosts ABC content. The father also sued COED Media Group.
Earlier this year, the entertainment and telecom industries' "six strikes" anti-piracy initiative died a quiet death after years of hype from the RIAA and MPAA about how it would revolutionize copyright enforcement (it didn't). The program involved ISPs using a rotating crop of "escalation measures" to temporarily block, throttle or otherwise harass accused pirates until they acknowledged receipt of laughably one-sided copyright educational materials. Offenders, accused entirely based on IP address as proof of guilt, were allowed to try and contest these accusations -- if they paid a $35 fee.
The MPAA has submitted a new list of “notorious websites” to the US Government. The list features a wide variety of pirate sites including The Pirate Bay, Gostream, and Rapidgator, and also mentions fully-loaded streaming boxes. For the first time, the overview also includes ad-networks, highlighting the Canadian company WWWPromoter as an example.