OpenStack is the dominant solution in the IaaS space, fueled by the need for reliable, scalable and interoperable private cloud infrastructure to accommodate cloud native applications. Through OpenStack’s open APIs, tenants can easily deploy elaborate virtual (overlay) networks, integrate with a variety of storage backends, even leverage modern hypervisor-like machine containers (LXD) for bare metal performance. Although the tooling allows a full fledged OpenStack deployment on just a single machine, the intrinsic efficiencies that OpenStack’s design promises, materialize at a certain scale — typically at least 12 servers.
In this article series, we have been discussing the Understanding OPNFV book. Previously, we provided an introduction to network functions virtualization (NFV), discussed the role of OPNFV in network transformation, and looked at how OPNFV integrates and enhances upstream projects. We continue our series with in-depth insight into the OPNFV DevOps toolchain, hardware labs, continuous integration (CI) pipeline, and deployment tools (installers) from chapters 6 and 7 of the book.
Last week at our annual user conference, Node.js Interactive, we announced several new members to the Node.js Foundation. One of the members that joined is Chef. Chef works with more than a thousand companies around the world to deliver their vision of digital transformation.
We sat down with the team at Chef to talk about how Node.js fits within the DevOps movement, why they joined the Node.js Foundation, and also about a new offering from the group called Habitat Builder.
There have been several blog posts going around about why one would use Docker with R. In this post I’ll try to add a DevOps point of view and explain how containerizing R is used in the context of the OpenCPU system for building and deploying R servers.
Docker Inc. the company behind the open-source Docker container technology doesn't just build docker, it also used the same technology to power its own services.
Greg Kroah-Hartman has released stable kernels 4.13.8, 4.9.57, 4.4.93, and 3.18.76. All of them contain important fixes and users should upgrade.
We intend to target a 4.13 kernel for the Ubuntu 17.10 release. A 4.13.4 based kernel is available for testing from the artful-proposed pocket of the Ubuntu archive.
Mesa 17.2.3 is now available.
In this release we have:
The Vulkan drivers ANV and RADV have multiple small fixes.
The EGL code has improved handling of the new wl_dmabuf codepath.
SWR no longer crashes when checking environment variables.
Other gallium drivers have also seen updates - freedreno, nouveau and radeonsi. The gallivm module, used by llvmpipe et al. has gained little endian PPC64 fixes.
Mesa 17.2.3 is now available as the latest bi-weekly update for this current stable driver series.
libinput 1.9 is now available. As expected, not a lot of changes since the rc2: a few test fixes, a fix to stop excessive logging and an extra assert so we fail early in case of a bug.
Peter Hutterer has today released libinput 1.9.0 as the latest version of this library used by both Wayland and X11 systems for unified input handling.
The long ongoing work to implement an OpenGL/GLSL shader cache for the Intel Mesa driver has been revised once more with 32 new patches hitting the mailing list today.
With Ubuntu 17.10 set to ship tomorrow that features just not an upgraded Linux kernel and Mesa 3D stack but also transitions from Unity 7 + X.Org to GNOME Shell + Wayland, here are some comparison gaming benchmarks on a few different AMD Radeon graphics cards.
Ubuntu 17.04 shipped six months ago with Linux 4.10 and Mesa 17.0.7 as the main graphics components for open-source driver users while now with Ubuntu 17.10 is the Linux 4.13 kernel and Mesa 17.2.2. The six months of improvements to Mesa alone are massive for Intel and Radeon users with the RADV/ANV Vulkan drivers maturing much over this time (17.10 still doesn't ship with the Vulkan drivers, but are just a sudo apt install mesa-vulkan-drivers away) as well as many performance improvements and new extensions for the growing number of bundled OpenGL drivers. If you read Phoronix daily, you should already be well versed on the many Mesa accomplishments over this time span.
Earlier this week we looked at the EPYC 7251 Linux performance as AMD's lowest-cost server CPU from this latest generation of Zen-based processors. That eight core / sixteen thread CPU packed a nice amount of performance considering its hitting the $500 price point, but if you are looking for a single socket system and have $750 USD to lay out on a CPU, the AMD EPYC 7351P packs in even more value.
Are you a system administrator, Linux power user, or someone who just spends a lot of time at the command line? Chances are your choice of terminal emulator says something about you. Do you prefer something lightweight? Full of features and customizable options? Or do you just use the default that ships with your distribution?
If you're not familiar with terminal emulator clients, essentially they are graphical applications that give you shell access to your machine. By using a text-mode interface to your computer, you can unleash the true power of Linux and the many applications that provide fast, efficient, and customizable control over its every function, not to mention many utilities that system administrators and developers rely on for their day-to-day work. To get to the shell from your system's graphical interface, you need a terminal emulator.
Narabu is a new intraframe video codec, from the Japanese verb narabu, which means to line up or be parallel.
Let me first state straight up that Narabu isn't where I hoped it would be at this stage; the encoder isn't fast enough, and I have to turn my attention to other projects for a while. Nevertheless, I think it is interesting as a research project in its own right, and I don't think it should stop me from trying to write up a small series. :-)
Mailutils version 3.3 is available for download. See the NEWS file, for information about changes in this version.
Rubik’s Cube game needs no introduction, right? It is a 3-D combination puzzle game invented by Ernà â Rubik, a Hungarian sculptor and professor of architecture, in 1974. It is one of the best puzzle game invented so far to enhance the problem-solving skills of the kids and adults. If you’re one Rubik’s Cube lover, you don’t need to buy it online or from a shop. You can play it right from the Terminal. A fellow Developer has created an utility called “NRubik”. It is an N-Curses based, virtual Rubik’s Cube written in Python. If you’re a hardcore CLI user who lives on Terminal all day, NRubik will certainly make your time useful.
To everyone's surprise, Oracle announced today the final release of the VirtualBox 5.2 open-source and cross-platform virtualization software for all supported platforms, including GNU/Linux, macOS, Windows, and Solaris.
VirtualBox 5.2 is a massive update bringing a revamped and more modern graphical user interface (GUI) based on recent Qt5 technologies, as well as powerful new features that will help you with all of your virtualization tasks. One of these new features is the ability to finally export and store virtual machines into the cloud.
Oracle has made it possible to export VMs to its Oracle Cloud (OPC) public cloud service, allowing users to easily deploy virtual machines across multiple VirtualBox installations. Imagine you no longer have to export a VM to an external drive to import it on another computer, just download it from the Oracle Cloud.
On the look out for a new roguelike? Xenomarine [Official Site], a hardcore, sci-fi dungeon crawling roguelike is heading to Steam on October 25th with Linux support.
Note: It's currently in-development, so it will be in Early Access.
We've had it confirmed to us directly today from Aspyr Media that observer [Steam, Official Site] is going to release for Linux next week on October 24th.
A random shot in the dark of mine, but it seems to the developer of JASEM [Steam, Official Site], the self-described 'insanely hard' twin-stick shooter could see Linux support.
Another open source game engine has been advancing recently, this time it's openage [Official Site, GitHub], the game engine for playing games like Age of Empires, Age of Empires II (HD) and Star Wars: Galactic Battlegrounds.
Only a day after the main release, Riskers [Steam], the game inspired by classic GTA and Hotline Miami has officially released for Linux.
I think it’s useful to have a list of projects fundraisers in GNOME or at least GNOME-related. Ideally it would be nice to have that list on the gnome.org website, it looks to me an obvious thing to do, but after a discussion on the GNOME foundation-list, it seems unlikely to happen anytime soon.
So I’ve created this wiki page in the meantime. It explains the difference with donations made to the GNOME Foundation, and provides a list of individual projects fundraisers.
Linux distributions have already gained recognition of its users and with every year new products appear in the market. Many of them focus on the certain tasks, so you can’t create a single list of the best ones. Here we have chosen several fields of Linux use and those distributions that have all chances to take the initial positions in their niche in 2017.
Organizations rolling out the IoT usually aren’t prepared for the additional complexity. With the IoT, data volumes grow exponentially, infrastructure management gets more complicated and the security vulnerabilities increase disproportionately. Nevertheless, IT departments are expected to handle all these changes competently without proportional increases in budget or other resources.
Dirk-Peter van Leeuwen, senior vice president & general manager at Redhat, Asia Pacific, joined us to discuss the company’s footprint across Asia and the recent launch of their new Open Innovation Institute in Singapore. We discuss how Asian companies are in different phases of digital transformation from culture to innovation and adjusting against digital disruption.
It’s Artful Aardvark arrival day today (no, really!) and to mark the occasion we’ve made our first video in 3 years!
Prime your eyeballs and pop in some earbuds as we (try to) bring you up to speed on what’s new in Ubuntu 17.10.
At a smidgen over 3 minutes long we think our video is perfect for watching on your commute; when you’re bleary eyed in bed; or when you get the tl;dr feels thinking about our fuller, longer, and far wordier Ubuntu 17.10 review (due out shortly).
While there's no official announcement published at the moment of writing, Canonical released the final ISO images of the Ubuntu 17.10 (Artful Aardvark) operating systems and its derivatives.
Abandoning their convergence dream earlier this year and with that the sun-setting of the Unity desktop environment and Mir display server, Ubuntu 17.10 is shipping today with its new GNOME-powered desktop backed by Wayland.
Codenamed "Artful Aardvark", Ubuntu 17.10 continues Ubuntu's proud tradition of integrating the latest and greatest open source technology into a high-quality, easy-to-use Linux distribution. As always, the team has been hard at work through this cycle, introducing new features and fixing bugs.
Under the hood, there have been updates to many core packages, including a new 4.13-based kernel, glibc 2.26, gcc 7.2, and much more.
Ubuntu Desktop has had a major overhaul, with the switch from Unity as our default desktop to GNOME3 and gnome-shell. Along with that, there are the usual incremental improvements, with newer versions of GTK and Qt, and updates to major packages like Firefox and LibreOffice.
Ubunt 17.10 has been released. Check out the new features in Ubuntu 17.10 and see how to upgrade to Ubuntu 17.10.
Canonical releases a new version of the popular Ubuntu operating system every six months. Quite frankly, most of those updates are kind of boring, with incremental changes from one build to the next. But Ubuntu 17.10 launches on October 19th, and it’s actually kind of a big deal.
Ubuntu Budgie is a more recent officially recognized flavor of the popular and free Ubuntu operating system, and today it has been updated to version 17.10 as part of the Ubuntu 17.10 (Artful Aardvark) release.
The Xubuntu 17.10 operating system has been released today as part of the Ubuntu 17.10 (Artful Aardvark) release, bringing a refreshed Xfce desktop experience, up-to-date components, and many other improvements.
Kubuntu 17.10 has been released, featuring the beautiful Plasma 5.10 desktop from KDE.
Codenamed “Artful Aardvark”, Kubuntu 17.10 continues our proud tradition of integrating the latest and greatest open source technologies into a high-quality, easy-to-use Linux distribution.
The team has been hard at work through this cycle, introducing new features and fixing bugs.
The “Voladd 3D Printer” features a Linux-driven BeagleBone SBC that connects to a cloud-based sharing site, plus a unique cartridge and cooling system.
San Sebastián, Spain based Voladd has won Kickstarter funding for a Voladd 3D printer that runs Debian Linux on a BeagleBone Black single board computer. Like several other Linux-based printers we’ve seen (see farther below) the Voladd connects to a cloud service, and does not require an attached computer. The printer stands out with its mobile app remote control, as well as a streamlined cloud interface that lets you download one of thousands of free designs in 25 categories and share designs and printer access with others. Kickstarter pricing starts with early bird packages of 499 Euros ($591), with shipments due in December.
Advantech has expanded its line of fanless, barebone EPC computers with a 43mm high “EPC-T1232” system based on a Skylake U-series thin Mini-ITX board.
In August, Advantech launched its Linux-ready AIMB-232 thin Mini-ITX SBC featuring 6th Gen “Skylake” U-Series CPUs. Now it has followed up with an EPC-T1232 barebone computer based on the SBC, or specifically, the AIMB-T12325W-00Y0E model. Like the SBC, the EPC-T1232 has a low profile, measuring 250 x 210 x 43mm.
Alongside the Galaxy S8/S8+, Samsung also introduced DeX to the world this past February. DeX is Samsung's vision for the future of desktop computing, and while it still has a way to go before it's truly useful or practical for everyone, Linux on Galaxy is a new app that Samsung hopes will make DeX more appealing to developers.
Samsung announced Linux on Galaxy at its developer conference on October 18, and although the app is still in a trial phase, it already sounds pretty impressive.
When Samsung launched the Galaxy S8 smartphone earlier this year, the company also introduced a new system that allows you to connect your phone to an external display, mouse, and keyboard and use your phone like a desktop.
Up until now that’s meant when you use the Samsung DeX docking station you can run Android apps in a desktop-like environment. But soon you’ll be able to run a full-fledged Linux operating system.
It's not quite the same as your typical Ubuntu or Debian install. Linux on Galaxy launches through an app, and it's using the same kernel as Android itself in order to maintain performance. And it almost goes without saying that you'll really want a DeX setup, since most Linux apps are expecting a large screen, mouse and keyboard.
While Samsung Galaxy smartphones may not be as open or free spirited as the proposed Librem 5 smartphone, there is a new alternative for those wanting to run a traditional Linux distribution on their Samsung Galaxy smartphone.
Samsung has announced through their DeX smartphone that they will begin supporting traditional GNU/Linux operating systems on Galaxy devices, complementing Android.
The Beelink S1 is a small, silent mini PC released in August 2017 retailing for around 300 dollars (250 euros). It’s produced by Shenzhen AZW Technology Co Ltd, a Chinese company that focuses on Android smart TV boxes, Intel mini PCs, and home cloud TV boxes.
The S1 ships with an activated copy of Windows 10. But what makes this mini PC interesting? For starters, it purports to run Ubuntu. Combined with a quad core Celeron CPU, dual monitor support (HDMI and VGA), 4K video, expansion options, together with a raft of other features, the machine looks a mouthwatering prospect compared to many other mini PCs.
Aaeon’s “PICO-KBU1” SBC is built on Intel 7th Gen U-series CPUs with up to 16GB DDR4, dual GbE ports, and M.2 B-key and E-Key expansion.
The PICO-KBU1 SBC is equipped with Intel’s dual-core, 15W TDP 7th Gen U-series CPUs from the latest Kaby Lake generation. Other 100 x 72mm Pico-ITX boards that run Kaby Lake U-Series processors include Axiomtek’s PICO512. As usual with Aaeon, no OS support is listed.
It has been ages that I haven’t updated the MegaUpdate package for Kobo. Now that a new and seemingly rather bug-free and quick firmware release (4.6.9995) has been released, I finally took the time to update the whole package to the latest releases of all the included items. The update includes all my favorite patches and features: Kobo Start Menu, koreader, coolreader, pbchess, ssh access, custom dictionaries, and some side-loaded fonts.
Version 17.01.4 of the LEDE router distribution is available with a number of important fixes. "While this release includes fixes for the bugs in the WPA Protocol disclosed earlier this week, these fixes do not fix the problem on the client-side. You still need to update all your client devices. As some client devices might never receive an update, an optional AP-side workaround was introduced in hostapd to complicate these attacks, slowing them down."
Samsung used its developer conference to formally announce Bixby 2.0, and while the core Bixby experience will remain the same for those using the assistant on the Galaxy S8, Note 8, etc., there are some big under-the-hood changes that aim to make Bixby even smarter and more powerful than it currently is.
Samsung's annual developer conference at Moscone West in San Francisco doesn't always get a lot of public attention; in past years, it has often focused on things like Tizen app development. But at this year's conference, the company focused on launching a new platform for connected devices in the home, the car, and elsewhere—or, at least, a collection of previously existent platforms that are getting updated and combined into a new one.
That’s been a tough pill for many fans of the prior Nexus phones to swallow, as they frequently offered a lot of specs and performance for a lot less money than other smartphones. You could realistically get a great Nexus phone for under $500 without having to give up the traits that make them great: clean software, fast performance, and timely updates.
Enter Motorola’s new Moto X4 Android One smartphone. While not technically a Nexus phone, it shares many of the same qualities that made the Nexus line so loved. Clean build of Android? Check. Promise of fast updates and years of software support? Check. Reasonable cost? Check.
The $399 X4 won’t appeal to everyone. It’s not meant to compete with the Pixel or other premium phone in terms of features or performance, and its biggest limitation is that it’s only available on Google’s own Project Fi network. (Though it comes unlocked and works with other networks, the only way to buy this flavor of X4 is to be a Fi customer.) But if you’ve been holding on to that aging Nexus 5X hoping something would come along and pick up its mantle, the Moto X4 Android One version is it.
Let’s imagine that you are a company with a very successful if nuanced product. Graphics accelerator chips, for example.
Hypothetically speaking, imagine that you find an interesting use for your chip in a rising market defined by a burgeoning technology. If you need an example, just use deep learning AI software.
Now, let’s say this proves to be a massive windfall for your company, raising its stock prices tenfold in just three short years.
What do you do with this fortunate turn of events?
Do you start designing your own AI chips based on your original design and remain one of the top competitors in this new market, or do you go open source and give your chip architecture designs to the public?
The Open Source Initiative€® (OSI), the internationally recognized home of the open source software movement working to raise awareness and adoption of open source software, announced today the generous sponsorship of Cumulus Networks. Cumulus joins OSI's growing community of corporations that recognize the importance of not only investing in open source software projects and development, but also building a diverse ecosystem that promotes collaboration, enables innovation, and ensures quality.
Cumulus Networks has a strong tradition of internally-driven development of original open source software, including most notably, contributions to the Linux kernel that complete the data center feature set for Linux such as Virtual Routing and Forwarding (VRF), MPLS, MLAG infrastructure, multicast routing features, etc. Cumulus' most recent open source effort is FRRouting, co-developed by a group of contributing companies in the open networking space, to enhance routing protocols. Cumulus Networks has also been a key driving member of the Open Network Install Environment (ONIE) with contributions to the Open Compute Project, Prescriptive Topology Manager--which simplifies the deployment of large L3 networks--and ifupdown2, a rewrite of Debian's tool for configuring networks that greatly simplifies large, complicated networking configurations.
There's never been a better opportunity for the world to start untangling itself from the giant Silicon Valley data harvesters than now. Last week, we revealed a plan to embed open-source chat into three quarters of the world's IMAP servers.
And this may be an important development. Maybe.
Google, Yahoo!, Apple and Microsoft handle around half the world's email, some 2.5 billion users, while open-source IMAP servers handle the rest, around 2.5-3 billion. Of these the Dovecot open-source server, part of the German business Open Xchange, is installed on 75 per cent of boxes. Quietly drop IM into the mix, and you've given the world a reason to leave WhatsApp.
Looking back over the past decade, history has certainly demonstrated that trying to predict the pace and nature of technology development is a near impossible task, writes Quentin Barnard, lead architect at redPanda Software. While analysts, business leaders and policymakers have certainly made wise predictions, businesses and individuals have to remain agile, responsive and open-minded to a wide possibility of outcomes and developments. It is also helpful, however, to reflect on key trends that have emerged in recent times — and to use this information to prepare for the years ahead. For software developers and development houses, several prominent themes emerged in 2017.
The Apache Software Foundation (ASF), the all-volunteer developers, stewards, and incubators of more than 350 Open Source projects and initiatives, announced today the five-year anniversary of Apache€® OpenOfficeTM, the leading Open Source office document productivity suite.
As you may have noticed, we recently re-licensed mgmt from the AGPL (Affero General Public License) to the regular GPL. This is a post explaining the decision and which hopefully includes some insights at the intersection of technology and legal issues.
Trust the community. Opening a feedback platform to anyone on campus seems risky, but in hindsight I'd do it again in a heartbeat. The responses we received were very constructive; in fact, I rarely received negative and unproductive remarks. When people learned about our honest efforts at improving the community, they responded with kindness and support. By giving the community a voice—by really democratizing the effort—we achieved a surprising amount of campus-wide buy-in in a short period of time.
Transparency is best. By keeping as many of our efforts as public as possible, we demonstrated that we were truly listening to our customers and understanding the effects of the outdated technology policies and decisions that were keeping them from doing their best work. I've always been a proponent of the idea that everyone is an agent of innovation; we just needed a tool that allowed everyone to make suggestions.
Iterate, iterate, iterate. Crowdsourcing our first-year IT initiatives helped us create the most flexible and customer-centric plan we possibly could. The pressure to move quickly and lay down a comprehensive strategic plan is very real; however, by delaying that work and focusing on the evolving set of data flowing from our community, we were actually able to better demonstrate our commitment to our customers. That helped us build critical reputational capital, which paid off when we did eventually present a long-term strategic plan—because people already knew we could achieve results. It also helped us recruit strong allies and learn who we could trust to advance more complicated initiatives.
New York 3D printing company MakerBot has launched MakerBot Labs, an experimental platform with open APIs, custom print modes, and an online resource-sharing site. The platform purportedly allows users to “push the limits” of 3D printing.
The topic of open source has been a touchy one for MakerBot over the past decade. The one-time 3D-printing darling was the subject of some serious smack talk among the maker community when it stopped disclosing machine design in 2012 — a departure from the company’s roots as in the open-source Rep-Rap community.
Announced this week, MakerBot Labs doesn’t mark a full return to those roots, but it does find the company carving out a niche for the DIY community that was once a driving force in its rapid growth.
“I understand the history,” CEO Nadav Goshen told TechCrunch during a phone call this week, “This is one step in the direction. It’s a step to understand that there are limitations to openness. Openness for us doesn’t mean we have to compromise on quality or ease of use. We’re trying to take responsibility for both.”
Want a fully functional laptop that works out of the box? There are plenty to choose from. Want a model that you can upgrade? That’s a bit tougher to find: some modern laptops don’t even let you replace the RAM.
Then there’s the Reform. It’s a new DIY, modular laptop that’s designed to be easy to upgrade and modify. The CAD designs will even be available if you want to 3D print your own parts rather than buying a kit.
You can’t buy a Reform computer yet. But developer Lukas Hartmann and designer Ana Dantes have developed a prototype and are soliciting feedback on the concept.
While artificial intelligence software has made huge strides recently, in many cases, it has only been automating things that humans already do well. If you want an AI to identify the Higgs boson in a spray of particles, for example, you have to train it on collisions that humans have already identified as containing a Higgs. If you want it to identify pictures of cats, you have to train it on a database of photos in which the cats have already been identified.
Theoretical biologist Philipp Mitteröcker is intrigued by the puzzle of dangerous human childbirth. Unlike other species, human babies are often too big for the birth canal, leading to dangerous—and possibly fatal—obstructed labor. Last year, Mitteröcker and his colleagues published a mathematical model that showed how the mixture of evolutionary pressures acting on humans would inevitably lead to an ongoing risk of obstructed labor in our species.
The model also suggested that C-sections are changing the rules of the game by increasing the likelihood that large babies and their mothers survive childbirth and pass on genes that promote this head/pelvis mismatch. The model predicted that we'd see an increasing risk of obstructed labor (and need for C-sections) over generations—but there was no real-world evidence of that happening.
Modern American history has never seen as full-scale an effort to sabotage a valid law as we have with President Trump and the Affordable Care Act — a law whose legality has been upheld twice by the US Supreme Court.
The president has a legal obligation, under Article II of the US Constitution, to “take Care that the laws be faithfully executed.” That means he must make sure that our laws are implemented in good faith and that he uses his executive discretion reasonably toward that end.
The bottles were getting emptier: That was the first sign that something awful was happening.
Since 1989, scientists from the Entomological Society Krefeld had been collecting insects in the nature reserves and protected areas of western Germany. They set up malaise traps—large tents that funnel any incoming insect upward through a cone of fabric and into a bottle of alcohol. These traps are used by entomologists to collect specimens of local insects, for research or education. “But over the years, [the Krefeld team] realized that the bottles were getting emptier and emptier,” says Caspar Hallmann, from Radboud University.
By analyzing the Krefeld data—1,503 traps, and 27 years of work—Hallmann and his colleagues have shown that most of the flying insects in this part of Germany are flying no more. Between 1989 and 2016, the average weight of insects that were caught between May and October fell by an astonishing 77 percent. Over the same period, the weight of insects caught in the height of summer, when these creatures should be at their buzziest, fell by 82 percent.
Naturopaths and other gurus of “alternative medicine” love to tout the benefits of traditional herbal medicines. For instance, Aviva Romm—a Yale-educated doctor who publicly defended Gwyneth Paltrow’s lifestyle site Goop then later called it a “caricature of everything alternative health for women”—sells her own line of unproven herbal remedies. Billionaire Susan Samueli—who donated $200 million dollars alongside her husband so the University of California, Irvine, could open an “integrative” medicine program—promotes homeopathy, naturopathy, and runs an active consulting practice versed in Chinese herbs.
Herbal remedies are often seen as harmless, soothing treatments that tap into the ancient wisdom of traditional healing. While that may be the case for some, there are also those that cause cancer—and sometimes it’s nearly impossible to tell one from the other.
The WPA2 security protocol has been a mandatory requirement for all devices using the Wi-Fi protocol since 2006, which translates into billions of laptops, mobiles and routers. The weakness identified by Mathy Vanhoef, a digital security researcher at the Catholic University of Leuven (KUL) in Belgium, lies in the way devices running WPA2 encrypt information.
No software is perfect. Bugs are inevitable now and then. But experts say that software standards that impact millions of devices are too often developed behind closed doors, making it difficult for the broader security community to assess potential flaws and vulnerabilities early on. They can lack full documentation even months or years after their release.
Security experts say the bug has been present since 2012 and found specifically in the Infineon’s Trusted Platform Module used on a large number of business-class HP, Lenovo and Fijitsu computers, Google Chromebooks as well as routers and IoT devices.
This results in cyber criminals computing the private part of an RSA key and affects chips manufactured from 2012 onwards, which are now commonplace in the industry.
Yubico estimates that approximately 2% of YubiKey customers utilize the functionality affected by this issue. We have addressed this issue in all shipments of YubiKey 4, YubiKey 4 Nano, and YubiKey 4C, since June 6, 2017.
A secretive internal database used by Microsoft to track bugs in its software was compromised by hackers [sic] in 2013.
Microsoft Corp’s secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking [sic] group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.
The flaw in the WPA2 wireless protocol revealed recently has a critical impact on Android phones running version 6.0 of the mobile operating system and Linux devices, a security researcher says.
But given the millions of routers and other IoT devices that will likely never see a fix, the true cost of Krack could play out for years.
WPA2 protocol used by vast majority of wifi connections has been broken by Belgian researchers, highlighting potential for internet traffic to be exposed
Smartwatches bought for children who do not necessarily need them can be hacked [sic], according to a warning out of Norway and its local Consumer Council (NCC).
The Norwegian Consumer Council (NCC) revealed that several brands of children’s smartwatch, have such poor security controls that hackers [sic] could easily follow their movements and eavesdrop on conversations.
Google hasn't shared the details of what that process entails. But the CDT's Hall, whom Google briefed on the details, says it will include a "cooling-off" period that will lock the account for a period of time while the user proves his or her identity via several other factors. That slowed-down, intensive check is designed to make the account-recovery process a far less appealing backdoor into victims' data.
Given how involved the NSA has been with remote and local exploitation of networks, systems, devices, and even individuals, many put two and two together and assumed the worst.
What compounded the matter was that some were pointing to a 2010-dated top secret NSA document leaked by whistleblower Edward Snowden, which detailed a hacking tool called BADDECISION, an "802.11 CNE tool" -- essentially an exploit designed to target wireless networks by using a man-in-the-middle attack within range of the network. It then uses a frame injection technique to redirect targets to one of the NSA's own servers, which acts as a "matchmaker" to supply the best malware for the target device to ensure it's compromised for the long-term. The slide said the hacking tool "works for WPA/WPA2," suggesting that BADDECISION could bypass the encryption.
Cue the conspiracy theories. No wonder some thought the hacking tool was an early NSA-only version of KRACK.
Open source software can help healthcare organizations remain flexible as they adopt new IT solutions, but if entities lack open source security measures it can lead to larger cybersecurity issues. A recent survey found that organizations in numerous industries might not be paying enough attention to potential open source risk factors.
Half of all code used in commercial and Internet of Things (IoT) software products is open source, but only 37 percent of organizations have an open source acquisition or usage policy, according to a recent Flexera report.
More than 400 commercial software suppliers and in-house software development teams were interviewed, with respondent roles including software developers, DevOps, IT, engineering, legal, and security.
Adobe has patched a zero-day vulnerability used by the BlackOasis APT to plant surveillance software developed by Gamma International.
On Monday, researchers from Kaspersky Lab revealed the new, previously unknown vulnerability, which has been actively used in the wild by advanced persistent threat (APT) group BlackOasis.
In August, four US Senators introduced a bill designed to improve Internet of Things (IoT) security. The IoT Cybersecurity Improvement Act of 2017 is a modest piece of legislation. It doesn't regulate the IoT market. It doesn't single out any industries for particular attention, or force any companies to do anything. It doesn't even modify the liability laws for embedded software. Companies can continue to sell IoT devices with whatever lousy security they want.
Red Hat JBoss Enterprise Application Platform (EAP) is a commonly used host for Restful webservices. A powerful but potentially dangerous feature of Restful webservices on JBoss EAP is the ability to accept any media type. If not configured to accept only a specific media type, JBoss EAP will dynamically process the request with the default provider matching the Content-Type HTTP Header which the client specifies. Some of the default providers where found to have vulnerabilities which have now been removed from JBoss EAP and it's upstream Restful webservice project, RESTEasy.
The latest in a long line of disastrous airstrikes by Saudi warplanes across Yemen, officials reported an airstrike on Tuesday night in the northern Jawf Province, destroying a single civilian home, killing six civilians and critically wounded another.
The civilians killed were an entire family. The slain included the parents and four of their daughters. The lone survivor, who was injured, was their only son. Saudi officials gave no indication why the house was destroyed.
For centuries, sinologists have struggled with the question of authentification of documents.
The Trump administration has declared a war on media leaks and called for the U.S. federal workforce and contractors to receive “anti-leak” training. The centerpiece of Trump’s anti-leak campaign, aside from early morning tweet-storms railing against leakers and media, is the National Insider Threat Taskforce.
The Insider Threat Program is not Trump-era creation. In then-secret testimony to Congress in 2012, Directorate of National Intelligence official Robert Litt touted the original Insider Threat Program as a highlight in administrative efforts to “sanction and deter” leaks. In the past, Insider Threat Program training has improperly included “WANTED”-style images of whistleblowers pictured alongside actual spies and mass murderers.
I have an aunt who lives in paradise – Paradise, California, that is. But in 2017 it has been anything but, as the communities surrounding Paradise have been evacuated on two separate occasions due to natural disasters and crumbling infrastructure. In February, torrential downpours caused the Oroville Dam to fail, washing out homes, businesses, memories and lives. And now they are dealing with devastating wildfires that have killed dozens, displaced thousands, and are being fought by firefighters, some of whom are only making minimum wage and working 70 straight hours.
The fires in California are just the latest natural disaster to inflict suffering on Americans, as the people in Puerto Rico, Florida and Texas can attest, following massive hurricanes over the summer.
Last week, a pipe owned by offshore oil and gas operator LLOG Exploration Company, LLC spilled up to 393,000 gallons of oil into the Gulf of Mexico, reminding many observers of the Deepwater Horizon explosion seven years ago that spewed approximately 210 million gallons of crude into familiar territory.
Now, a report from Bloomberg suggests that the LLOG spill could be the largest in the U.S. since the 2010 BP blowout, according to data from the U.S. Bureau of Safety and Environmental Enforcement (BSEE).
While at a much smaller scale than the nation's worst accidental oil spill, the Delta House floating production facility, located about 40 miles southeast of Venice, Louisiana, released between 7,950 to 9,350 barrels starting from Wednesday to Thursday due to a fractured pipeline.
The 30MW installation, situated 25km (15.5mi) from Peterhead in Aberdeenshire, Scotland, will demonstrate that offshore wind energy can be harvested in deep waters, miles away from land, where installing giant turbines was once impractical or impossible. At peak capacity, the wind farm will produce enough electricity to power 20,000 Scottish homes.
The installation, called Hywind Scotland, is also interesting because it was built by Statoil, a Norwegian mega-corporation known for offshore oil drilling. Statoil has pursued offshore wind projects in recent years, using the company’s experience building and managing infrastructure in difficult open sea conditions to its advantage.
Hywind Scotland began producing power in September, and today it starts delivering electricity to the Scottish grid. Now, all that's left is for Statoil and its partner company Masdar to install a 1MWh lithium-ion battery, charmingly called “Batwind,” on shore. Batwind will help the offshore system regulate power delivery and optimize output.
Brexit might not happen, Britain’s former spymaster has claimed.
Ex-MI6 chief Sir John Sawers made the bombshell casual remark at a public meeting in Parliament.
Brexit, he warned, could leave Britain “poorer and weaker” and cost us influence over sanctions on states like North Korea - “assuming it goes ahead”.
Sir John, who as ‘C’ was the public face of MI6 from 2009 to 2014, told a House of Lords EU Committee: “The vehicle through which we have conducted sanctions regimes for the last 20 or so years has been the EU.
Jeremy Corbyn has warned centre-left parties across Europe that they must follow his lead and abandon the neoliberal economics of the imagined “centre ground” if they want to start winning elections again.
The Labour leader was given a hero’s welcome at the Europe Together conference of centre-left parties in Brussels, where he was introduced as “the new Prime Minister of Britain” and received two standing ovations from a packed auditorium.
Continental centre-left leaders are looking to Mr Corbyn’s Labour as a model to reinvigorate their movement. Across Europe from France to Germany, Austria to Netherlands, and Spain to Greece, once powerful social-democratic parties have been reduced to a shadow of their former selves – with Labour a notable exception.
Of course, when it comes to Jeremy Corbyn and his supporters, we’ve come to expect nothing but stupid smears from Freedland. This is the man who has played a leading role in whipping up hysteria over the wave of antisemitism that has supposedly swept over the Labour Party since Corbyn’s election as leader. Freedland’s Guardian comment piece on last month’s party conference (“Labour’s denial of antisemitism in its ranks leaves the party in a dark place”) was a typical exercise in political dishonesty which has been thoroughly demolished by Jamie Stern-Weiner (“Labour Conference or Nuremberg Rally?). Now, not content with slandering the left as Jew-haters, he wants to portray us as potential murderers too.
Since federal courts first enjoined President Donald Trump’s Muslim travel ban, lawyers for his administration have been at pains to insist that anti-Muslim animus is not a driving force of policymaking in his government.
But an internal White House document, obtained exclusively by Crooked Media, suggests that the reach of Islamophobia among Trump administration aides and advisers stretches far beyond the four corners of the travel ban, into the budget-writing process, where the White House’s full agenda comes together. The document also reflects the extent to which White House policymaking process, conducted in the shadow of the media circus around Trump himself—from family planning to federal hiring to nutritional assistance—is defined by ideological extremism, and tempered by incompetence.
Policymakers in Trump’s White House argue that the U.S. should refrain from influencing curricula and “other touchier-feelier programs” at foreign institutions that receive federal funds to educate young girls—except in “muslim countries, where we need to do a check of the curricula at the schools we’re supporting to weed out jihadism.”
A state lawmaker in Michigan wants to prevent cities and towns from using any government funding to provide Internet service. Michigan Rep. Michele Hoitenga, a Republican from Manton, last week submitted a bill that says cities and towns "shall not use any federal, state, or local funds or loans to pay for the cost of providing qualified Internet service."
President Trump is on track to repeat some of the greatest scandals of his predecessors, but with far less tact and competence. The investigation into possible collusion between the Trump campaign and Russia is looking more and more like a possible Watergate, the deaths of four American soldiers in Niger is increasingly being referred to as Trump’s Benghazi, and the damage inflicted on Puerto Rico by Hurricane Maria and the president’s subsequent botched response is clearly his Hurricane Katrina.
Trump failed to properly stock the island territory with adequate supplies and personnel and then dragged his feet sending more after the hurricane struck. He failed to immediately waive the Jones Act, causing a bottleneck that choked off relief to the island, because he was more worried about the business interests of shipping conglomerates than suffering Americans.
This has gone on for a while, but in the last year especially, the complaints about "bad" speech online have gotten louder and louder. While we have serious concerns with the idea so-called "hate speech" should be illegal -- in large part because any such laws are almost inevitably used against those the government wishes to silence -- that doesn't mean that we condone and support speech designed to intimidate, harass or abuse people. We recognize that some speech can, indeed, create negative outcomes, and even chill the speech of others. However, we're increasingly concerned that people think the only possible way to respond to such speech is through outright censorship (often to the point of requiring online services, like Facebook and Twitter to silence any speech that is deemed "bad").
As we've discussed before, we believe that there are alternatives. Sometimes that involves counterspeech -- including a wide spectrum of ideas from making jokes, to community shaming, to simple point-for-point factual refutation. But that's on the community side. On the platform side -- for some reason -- many people seem to think there are only two options: censorship or free for all. That's simply not true, and focusing on just those two solutions (neither of which tend to be that effective) shows a real failure of imagination, and often leads to unproductive conversations.
Like seemingly every other government on the planet, the UK government wants internet companies like Google and Facebook to do more. Everyone has an axe to grind, whether it's not enough censorship, or the wrong kind of censorship, or the innate desire to hold companies accountable for the actions of their users. The voluntary moderation efforts made by these platforms always fall short of politicians' ideals. These legislators believe -- without evidence -- that perfectly moderated services are just a couple of button pushes away.
Because the things governments complain about are actually the words and deeds of users -- rather than the companies themselves -- pushes for "more" have limited effect. This doesn't make governments happy. This is a "problem" that needs "solving," apparently. And officials in the UK think they have an answer. They'll just arbitrarily redefine services until they're more easily pushed around.
Company updates rules on hate speech, revenge porn and violent groups to counter perceptions social network is not doing enough to protect users
Fried, who was the first woman engineer to appear on the cover of Wired Magazine, discovered that her account had been terminated when she tried to login and got a cryptic error message. After contacting the company and privately messaging Facebook's CTO, Fried still has not been told why she was banned.
Facebook banned our founder Ladyada. Nothing public, just trying to log in and manage our company page. We reached out to the people including the CTO, no reply, so that’s that.
Eight candidates are running for four seats on Dayton’s seven-member school board.
Dayton Public Schools is facing criticism for trying to steer tonight’s school board candidate forum away from “bashing” of Superintendent Rhonda Corr, current school board members or fellow candidates.
DPS spokeswoman Marsha Bonhart sent an email Sunday night to the eight candidates running for four seats on the school board. It was a follow-up on earlier communications about the Dayton Education Council candidate forum scheduled for 6 to 8 p.m. today at DPS’ Ponitz Career Technology Center.
Plus, a Mississippi school will not longer require students to read the classic novel, "To Kill a Mockingbird." The book was recently pulled after complaints about the language, which includes racial slurs, but should it have been?
Matt Ridley’s fine recent Times column was hardly the first to raise the alarm about the pseudo-Soviet intolerance of the left emerging from university campuses. Yet he began with arresting statistics: ‘38 per cent of Britons and 70 per cent of Germans think the government should be able to prevent speech that is offensive to minorities.’ Given that any populace can be subdivided into a veritably infinite number of minorities, with equally infinite sensitivities, the perceived bruising of which we only encourage, pretty soon none of us may be allowed to say an ever-loving thing.
We won’t rehash the whole trigger warning/safe spaces nonsense. But I am baffled by what seems a broad millennial distrust in, if not militant opposition to, freedom of speech — now disastrously disparaged as a dastardly ploy of the far right, which has happily co-opted the battle cry. Let’s not let Milo Yiannopoulos own it.
Governments today are targeting our basic freedom of expression on the internet. It seems like the only way to squash civil unrest is by cutting off the country from internet access. Government censorship in China has prompted a sizeable number of the Chinese population to switch to Virtual Private Networks. It is unclear for how long this cat and mouse game will go on. The same can be said for cryptocurrencies. The Chinese government is tightening the screw on cryptocurrencies. The only way they will be allowed to operate in the Chinese mainland is through government regulations and licensing. Given the nature of a majority of cryptocurrencies today, it is no secret that a number will fail to meet the requirements to be licensed.
It’s only a matter of time before other countries follow this Chinese trend, if they are not doing it already. Such a situation will influence people to migrate to VPN services and overcome government-imposed discipline and rein over the internet. Since the general public can’t tell whether a VPN service is made up of sub-standard encryption codes at face value, they are compelled to abide by government restrictions.
A few years ago, Verizon and AT&T were busted for covertly modifying wireless user data packets in order to track users around the internet. Verizon used the technology to track browsing behavior for two years before the practice was even discovered by security researchers. It took another six months of public shaming before Verizon was even willing to offer opt out tools. And while the FCC ultimately gave Verizon a $1.3 million wrist slap, it highlighted how we don't really understand the privacy implications of what mobile carriers are up to, much less have real standards in place to protect us from abuse in the modern mobile era.
While notably different in scope and application, these same companies were again caught this week collecting and selling user information without user consent or working opt out tools.
The Supreme Court has granted the government's request for review of Second Circuit Appeals Court's decision finding Microsoft did not have to turn over communications stored overseas in response to US-issued warrants.
The Communications Security Establishment (CSE) rarely goes into detail about its activities — both offensive and defensive — and much of what is known about the agency's activities have come from leaked documents obtained by U.S. National Security Agency whistleblower Edward Snowden and published in recent years.
At the end of May 2018, the new General Data Protection Regulation (GDPR) will come into effect in Europe. It creates a whole set of new responsibilities that are causing concern for businesses across the EU. It has effects outside Europe as well, because it will control the way businesses located in Europe can share data across borders, both within their company and with other companies.
While businesses are complaining about the new bureaucratic burden the Regulation creates, some privacy activists think it offers an absolute minimum level of protection in the emerging meshed society. This is not necessarily because of the way obviously confidential information is stored and used.
It seems obvious why we should be concerned about big chunks of personal data, but why should we care about protecting small details such as our date of birth, parents’ names, postal code and so on? Why does it matter when we’re asked for them by someone with no need to know them?
On 13 October 2017, the Estonian Presidency of the Council of the EU and Europol held a workshop attended by 35 EU policy-makers and law enforcement officials, to address the increasing problem of non-crime attribution associated with the widespread use of Carrier Grade Network Address Translation (CGN) technologies by companies that provide access to the internet. The workshop was supported by experts from Europol’s partners: Proximus, CISCO, ISOC, the IPv6 Company, and the European Commission.
An exception is work from Privacy International (PI), in the form of a response to an inquiry about AI carried out by a specialist group within the UK’s Parliament. Although the word “privacy” occurs nine times in the 77-page document published by the committee, the references are depressingly superficial, and there is no attempt to explore the complex privacy issues that AI raises. Privacy International’s submission is more concrete. It singles out four specific problems for privacy that the widespread use of AI will bring: [...]
A team of security-focused researchers from the University of Washington has demonstrated just how deeply even someone with modest resources can exploit mobile advertising networks. An advertising-savvy spy, they've shown, can spend just a grand to track a target's location with disturbing precision, learn details [...]
Smartphone users are becoming aware that their phone number and location isn’t private when they use the internet on their data plans thanks to the selling of your mobile advertising id (MAID). According to Wired’s Andy Greenberg, it only costs $1,000 to track someone online. When you visit a website on your smartphone, both the site itself and advertisers on the site can view your mobile IP address which they can then tie to your mobike advertising id. Since the IP address is given by your telecom from the cell tower, your IP address when you’re using 4G or 3G will always be tied back to your billing information. [...]
The report will be sent to the European Parliament, the Council, the Article 29 Working Party of Data Protection Authorities and to the U.S. authorities. The Commission will work with the U.S. authorities on the follow-up of its recommendations in the coming months. The Commission will continue to closely monitor the functioning of Privacy Shield framework, including the U.S. authorities' compliance with their commitments.
Officials from across the United States Government, the European Commission, and EU data protection authorities gathered in Washington D.C. to conduct the first annual review on 18 and 19 September 2017.
The report reflects the Commission’s findings on the implementation and enforcement of the EU-U.S. Privacy Shield framework in its first year of operation.
Two delegates from the U.S. Commission on International Religious Freedom (USCIRF) paid a visit to American Pastor Andrew Brunson in Turkey last week, almost a year to the day when he was detained by the authorities over allegations of terrorism and espionage.
USCIRF Vice Chairwomen Sandra Jolley and Kristina Arriaga went to Kiriklar Prison in Izmir, Turkey last week to visit Brunson, who has been imprisoned since Oct. 7, 2016 over his alleged links to the U.S.-based Islamic cleric Fethullah Gülen, who is being blamed for organizing a 2016 attempt to overthrow the Turkish government.
"The government of Turkey has fabricated charges against Pastor Brunson, largely based on purported 'secret testimony.' He should be released immediately." Arriaga contended.
An eight-year-old boy endured unimaginable abuse before his death including being forced to eat cat litter and being bound and gagged, a court heard.
Gabriel Fernandez's mother Pearl and her boyfriend Isauro Aguirre allegedly tortured the child in the months leading up to his death in 2013.
Gabriel was sprayed with pepper spray, forced to eat cat faeces and regularly gagged, bound and beaten, according to testimony from Gabriel's older brother Ezequiel, who was 12 when his brother was killed.
The connection between Breitbart, a far-right website, and the white nationalist movement was hardly a secret. Steve Bannon, who served as Executive Chairman of the publication before and after serving as Trump’s chief strategist, called Breitbart “the platform for the alt-right,” a euphemism for white nationalists and their sympathizers. These extreme, bigoted viewpoints are frequently reflected in the site’s writing, which has included anti-immigrant screeds, sensationalized reporting of “black crime,” and other fringe viewpoints and conspiracy theories.
But a recent exposé published by BuzzFeed News revealed in stunning detail Breitbart’s deep connection and collaboration with white nationalists.
The Intercept has obtained a leaked asset forfeiture guide for seizures performed by ICE. (It has, unfortunately, chosen not to share the original document. Then again, the last non-Snowden leak it published appears to have helped out the document's source.)
For those familiar with the process of civil asset forfeiture, the contents of the guide are mostly unsurprising. Despite the document dating back to 2010, ICE did confirm the version seen by The Intercept is its most recent guidance. ICE is allowed to seize property without bringing charges or securing convictions -- something still permitted by federal law (your state laws may vary) and greatly encouraged by the new head of the DOJ, Jeff Sessions.
Two aviation security officers involved in the April incident in which a 69-year-old doctor was violently removed from a United Airlines flight have been fired. The doctor, David Dao, suffered a broken nose, the loss of two teeth, and a concussion in an event that went viral on the Internet after it was captured by passengers' mobile phones.
As part of an ongoing legal battle to get the New York City Police Department to track money police have grabbed in cash forfeitures, an attorney for the city told a Manhattan judge on October 17 that part of the reason the NYPD can't comply with such requests is that the department's evidence database has no backup. If the database servers that power NYPD's Property and Evidence Tracking System (PETS)—designed and installed by Capgemini under a $25.5 million contract between 2009 and 2012—were to fail, all data on stored evidence would simply cease to exist.
In a new lawsuit, three former Tesla workers claim that they were routinely harassed and subjected to racial epithets during their time at the Fremont, California, factory.
The men, who are all African-American, allege that shortly after they began work in 2015, their co-workers and superiors began taunting them and called them "n****r" on a regular basis.
Another day, another pair of court losses for President Trump’s outrageous and illegal Muslim Ban.
Yesterday, federal courts in Maryland and Hawaii rejected the latest iteration of the ban the president promised as a candidate and has been trying to put in place ever since. Just like its predecessors, Muslim Ban 3.0 violates the Constitution, federal statutes, and our bedrock values of religious neutrality and tolerance.
The Home Office has issued a visa and apologised to the wife of a Royal Navy pilot left stranded in the US while her husband serves in the UK.
Marianne Rawlins, 34, has been granted a UK visa to join her husband, Lt Simon Rawlins, after the UK Visa and Immigration department initially ruled her application was not straightforward and required extra information.
The American said she had been sleeping on friends’ couches and spent thousands of dollars on rental accommodation and business costs in the US after she packed up her life and belongings in the expectation of joining him.
The Home Office announced on Thursday evening that it had approved her visa application and apologised for the disruption. Mrs Rawlins said: “I am pleased that our ordeal has come to an end and am hopeful this process will help other families in the future.”
For years, the FCC's "Form 477" data collection program has required that ISPs provide data on where they provide broadband service. Said data then helps determine the pace of broadband deployment and level of competition in key markets, informing FCC policy and broadband subsidy application. Unfortunately, this data collection process relies heavily on census block data, which doesn't always clarify which specific addresses in these large segments can actually get service. This has proven handy for ISPs looking to obfuscate their refusal to upgrade broadband networks in many areas.
The Federal Communications Commission (FCC) is allowing more time for the public to weigh in on the Sinclair Broadcast Group’s proposed takeover of Tribune Media.
In a healthy, competitive market, cable providers would respond to the growing threat of streaming video competition by lowering prices, improving their historically awful customer service, and giving consumers more flexible cable bundles.
But because these same cable operators enjoy a growing monopoly over the uncompetitive broadband market -- they don't have to do that. Instead, they've found that the easiest response to added competition on the TV front is to impose a relentless array of rate hikes on captive broadband customers. There's a myriad of ways they accomplish this, ranging from misleading hidden fees that jack up the advertised price (something they're being sued for), to usage caps and overage fees (which let them not only charge more money for the same service, but hamstring streaming competitors via tricks like zero rating).
Charter Communications last week sued a workers' union, alleging that its members have repeatedly sabotaged Charter's network in New York City during a strike that began in March.
"On over 125 occasions, Charter cables, including both coaxial and fiber optic cables in both secured and unsecured locations at sites throughout New York City, have been deliberately cut or damaged, thereby denying thousands of subscribers access to cable, Internet, and voice service and interfering with their ability to contact emergency services, and forcing Charter to devote hundreds of thousands of dollars and hundreds of man-hours to investigating and repairing its property," Charter alleged in its complaint filed in the New York State Supreme Court.
When we last checked in on the state of Denuvo copy protection in PC games, the latest version of the best-in-class DRM provider had provided about a month's worth of usable piracy prevention for survival-horror title 2Dark. Fast forward to the current holiday season, and major Denuvo releases are being publicly cracked within a day of their launch. We're certainly a long way away from the days when major cracking groups were publicly musing that Denuvo-style DRM might soon become unbeatable.
This week's release of South Park: The Fractured but Whole is the latest to see its protections broken less than 24 hours after its release, but it's not alone. Middle Earth: Shadow of War was broken within a day last week, and last month saw cracks for Total War: Warhammer 2 and FIFA 18 the very same day as their public release. Then there's The Evil Within 2, which reportedly used Denuvo in prerelease review copies but then launched without that protection last week, effectively ceding the game to immediate potential piracy.
eSports, the once fledgling video game competition industry, has undergone several milestones in rapid succession as it grows into a true entertainment player. Once relegated to online streaming broadcasts, mostly run out of a few Asian and Pacific Island countries, eSports is now regularly broadcast on American television, including by ESPN. From there, it was a fairly natural progression for universities to take notice and begin organizing school eSports teams, as well as offering scholarships for eAthletes.
As much more attention has been brought to copyright trolls and the unethical manner in which they operate, it was inevitable that the tactics of the trolls would begin to shift. For some of us, it was immediately obvious what a PR problem these trolling operations faced. It all comes down to the "settlements" offered in a copyright troll's letters. The amounts, while designed to look small compared with the threat of a lawsuit, still tend to be quite high. Certainly the amounts make no sense when compared with the costs of simply viewing a movie or television show, which is the natural standard that lay person is likely to set. For that reason, some trolls, such as RightsCorp, have already started down the path of lowering settlement offers to levels that are more likely to cause the accused to simply pay up. Also, the fact that these letters, with all of their threatening language, even refer to the offers as "settlements" rings much closer to extra-judicial extortion than anything resembling justice.
Well, it seems that one copyright troll is attempting to correct against both of these concerns. Rights Enforcement, contracted by the studio behind the movie The Hitman's Bodyguard, is sending out letters to those it claims pirated the film with a much-reduced amount of money requested. And these requests are being called "fines" as opposed to "settlements."
On May 18th, 2012, attorneys for Oracle and Google were battling over nine lines of code in a hearing before Judge William H. Alsup of the northern district of California. The first jury trial in Oracle v. Google, the fight over whether Google had hijacked code from Oracle for its Android system, was wrapping up.
Together with a group of scholars active in copyright issues, Professor Martin Senftleben (Vrije Universiteit Amsterdam) has published a Recommendation on measures to safeguard fundamental rights and the open internet in the framework of the EU copyright reform.
Copyright holders have now asked Google to remove more than 3,000,000,000 allegedly infringing links from its search engine results since it began publishing records. A new milestone for sure, but not one celebrated anywhere. While Google sees it as confirmation that the DMCA process is working, copyright holders still have plenty of work to do.
Google has been ordered to delist all of them them, while four ISPs have been told to block user access, like ISPs do in this country. Those ISPs are Free, Numericable, Bouygues Telecom, and Orange. While the Google name is thrown around casually, also-rans like Bing don't get a look in.
Google and several French ISPs are being asked by the movie industry to take action against four 'pirate' sites. Among them is a massively successful clone of Zone-Telechargement, France's largest pirate site before it was shut down in 2016. While the ISPs are being asked to block access to the platforms, Google is required to delist them from search results.