The move to Linux wasn't plain sailing, by any stretch of the imagination. If you wanted to use fairly new hardware in the early days, you had to first ensure that there were any drivers for Linux, then learn how to compile and install them. If they were not quite my friends, lsmod and modprobe became at least close companions. I taught myself to compile a kernel and tweak the options to make use of (sometimes disastrous) new, "EXPERIMENTAL" features as they came out. Early on, I learned the lesson that you should always keep at least one kernel in your LILO list that you were sure booted fully. I cursed NVidia and grew horrified by SCSI. I flirted with early journalling filesystem options and tried to work out whether the different preempt parameters made any noticeable difference to my user experience or not. I began to accept that printers would never print—and then they started to. I discovered that the Bluetooth stack suddenly started to connect to things.
Over the years, using Linux moved from being an uphill struggle to something that just worked. I moved my mother-in-law and then my father over to Linux so I could help administer their machines. And then I moved them off Linux so they could no longer ask me to help administer their machines.
Today is Cyber Monday, y’all! It’s basically Black Friday, but instead of shopping at brick and mortar retailers, you shop online instead. Oh yeah, it’s a Monday rather than a Friday too. For some people, today is the ultimate shopping day as you can score some amazing deals without leaving your house -- no savage fistfights at Walmart or Target.
Before you head over to Amazon or Newegg to score some new technology devices, can I make a suggestion? Consider a Linux-powered desktop or laptop from System76. These are computers that come with an Ubuntu-based operating system pre-installed. Today only, for Cyber Monday, the company is giving some rare discounts on most of its computers.
After years of pushing toward total domination, Linux finally did it. It is running on all 500 of the TOP500 supercomputers in the world, and who knows how many more after that. That’s even more impressive than Intel’s domination of the list, with 92 percent of the processors in the top 500.
So, how did Linux get here? How did this upstart operating system created by a college student from Finland 26 years ago steamroll Unix, a creation of Bell Labs and supported by giants like IBM and Sun Microsystems and HP, Microsoft’s Windows, and other Unix derivatives?
We discuss Canonical's recent outreach to the greater community with the future of Mir and the potential of Ubuntu Unity for 18.04.
While when releasing Linux 4.14 Linus Torvalds mentioned 4.15-rc1 might be delayed due to his US holiday travels, Linux 4.15-rc1 has been released on time to conclude the two week merge window process.
Linus Torvalds, creator of Linux, has never suffered fools gladly. In particular, he really dislikes people who make improving security in Linux more trouble than it needs to be. Most recently, in his own inestimable style, he called some security developers "f*cking morons". But, Torvalds, while often colorful, also gave direction to security programmers.
It all started when Torvalds took Google Pixel developer Kees Cook, who had submitted a pull request that could have caused Linux kernel panics, to task. Torvalds snarled, "Honestly, this is the kind of completely unacceptable 'security person' behavior that we had with the original user access hardening too, and made that much more painful than it ever should have been. IT IS NOT ACCEPTABLE when security people set magical new rules, and then make the kernel panic when those new rules are violated."
The merge window is effectively over for Linux 4.15 with it being the 14th day of the process, although 4.15-rc1 might not end up coming out today due to Linus Torvalds' traveling around the US Thanksgiving holiday. But with Torvalds tending to not approve major last minute additions to new kernels, we don't anticipate any last minute surprises and therefore here is our feature overview of the changes and new features of Linux 4.15. This is arguably the most exciting and feature-packed kernel update ever.
Linux 4.15 is quite a big update. As of writing, when looking at a Git diff short-stat from v4.14 to the current tip, there have been 11,879 files changed this cycle with 580,942 lines of new code and 272,010 lines of deleted code. In comparison, going from v4.13 to v4.14-rc1 saw 400 fewer files changed and a net gain of just 251,211 lines of code versus the net gain this cycle of 308,932 as of writing... From v4.12 to v4.13-rc1 as additional reference saw just 10,000 files changed.
This year, I did a lot of patches that improves Linux documentation. A lot of them were related to the conversion from the XML-based DocBook docs to a markup language (Restructured Text). Thanks to that, no documents use the legacy document system anymore. I also finally closed the documentation gap at the DVB API, with was out of sync for more than 10 years! I also did several bug fixes at the media subsystem, including the 4.9 breakage of many drivers that were doing DMA via stack.
The out-of-tree Reiser4 file-system driver has been updated with compatibility for the latest Linux 4.14 stable series. Besides reworking the code to run on Linux 4.14, this controversial file-system has also added support for Zstd file-system compression.
Linux 4.14 introduced Zstd support in the mainline kernel and wired it in for SquashFS and Btrfs. Our Btrfs Zstd benchmarks have been promising for transparent file-system compression compared to the other supported algorithms. Reiser4 has now picked up Zstd compression as an eventual replacement to their Gzip compression support.
At the end of last week, the developer announced the sixteenth maintenance update to the Linux 4.13 kernel series, versioned 4.13.16, which appears to be the last to be released for the branch. This means that Linux 4.13 won't receive any other updates.
Therefore, if you're using a kernel from the Linux 4.13 series, you need to upgrade to Linux kernel 4.13.16 or prepare to upgrade to the latest Linux 4.14 LTS kernel, which is a long-term support release that should be maintained for the next few years.
In October 2017, the Linux kernel team agreed to extend the next version of Linux's Long Term Support (LTS) from two years to six years, Linux 4.14. This helps Android, embedded Linux, and Linux Internet of Things (IoT) developers. But this move did not mean all future Linux LTS versions will have a six-year lifespan.
As Konstantin Ryabitsev, The Linux Foundation's director of IT infrastructure security, explained in a Google+ post, "Despite what various news sites out there may have told you, kernel 4.14 LTS is not planned to be supported for 6 years. Just because Greg Kroah-Hartman is doing it for 4.4 does not mean that all LTS kernels from now on are going to be maintained for that long."
So, in short, 4.14 will be supported until January 2020, while the 4.4 Linux kernel, which arrived on Jan. 20, 2016, will be supported until 2022. Therefore, if you're working on a Linux distribution that's meant for the longest possible run, you want to base it on Linux 4.4.
Recently a number of patches have been floating around the kernel mailing list for prepping "KAISER" in what will likely be merged come Linux 4.16. KAISER is a new security feature for the Linux kernel.
KAISER was originally devised at Austria's Graz University of Technology as Kernel Address Isolation to have Side-channels Efficiently Removed. KAISER unmaps most of the kernel from user-space page tables and makes it more difficult to defeat KASLR (Kernel Address Space Layout Randomization).
While Linux 4.15 is going to be a mega kernel update with its major new features and changes as we have been covering for the past two weeks, there is some functionality that has yet to see the light of day in mainline.
ONAP was first formed by the Linux Foundation in February 2017 as a consolidation of the AT&T led ECOMP and China Mobile led OPEN-O network automation projects. An initial code release release from ONAP came out in April, but the new Amsterdam release is the first full platform milestone.
Arpit Joshipura, general manager, Networking and Orchestration at The Linux Foundation told EnterpriseNetworkingPlanetthat there were 538 contributors from 46 member organization that helped to develop the ONAP Amsterdam release. Joshipura explained that a core design goal for ONAP was to decouple and modularize elements of the OPEN-O and ECOMP project to enable agility and further development
While Mesa 17.3 is still in the works, the development team released this past weekend a new maintenance update to the current stable series of the open-source graphics stack for GNU/Linux distributions.
Mesa 17.2.6 is now available and brings many new fixes for Intel and AMD Radeon GPUs, including improvements to SIMD32 and little-core for the Intel i965 OpenGL driver and a fix for a GPU hang that occurred when playing hardware-accelerated video with the MPV open-source video player.
For AMD Radeon GPUs, the Mesa 17.2.6 update plugs not one but two memory leaks from the Radeon RADV Vulkan driver, and fixes an issue with the reversing of the tess factor components for isolines. on the r600 driver. On the other hand, Mesa 17.2.6 fixes two performance regressions for the SWR driver and addresses a use-after-free bug in the Gallium driver.
A while ago, we wrote about teleconsole which is used to share terminal instantly to anyone (whoever you trusting). Today also we are going to discuss about same kind of application called tmate.
Why you want tmate application? this will help you to get help from your friends when you need.
That said, a couple of juicy app updates did manage to squeak out during the past 7 days, including new releases of a Linux Winamp alternative, a free software stalwart, and one of my absolute favourite utilities.
When it comes to Linux, there are tons of Linux distributions to choose from. Some are popular and used by many people, some just disappear not long after they are released to the public. For installing software in these distributions, most come with a software center where you can install (or remove) software easily, but internally they are using a different architecture from each other, and installing software via the command line is different for different distros.
Ozone is Chromium’s next-gen platform abstraction layer for graphics and input. When developing either Ozone itself or an application that uses Ozone, it is often beneficial to be able to run the code on the development machine, which is usually a typical GNU/Linux desktop system, since doing so speeds up the development cycle.
ââ¬â¹When it comes to penetration testing, hacking and offensive distros, one of the first to be mentioned is Kali Linux. It is based on Debian and is available in 32-bit and 64-bit editions. Today we take a look at installing Kali Linux. We will look at using the entire disk and installing alongside Windows.
While there's long been VK9 as an effort to get Direct3D 9 running atop Vulkan and Wine developers planning VKD3D for Direct3D 12 over Vulkan, now coming in between is DXVK for Direct3D 11 support.
DXVK is a two month old project working to implement Direct3D 11 using the Vulkan API. The end goal is that DXVK could be used by Wine for accelerating Direct3D 11 using Vulkan rather than currently with its translation layer to OpenGL.
The Wine 2.22 development release arrived at the end of last week with some more improvements and bug fixes for various Windows games and apps, as well as better support for latest GCC compiler.
Continuing the project's bi-weekly release tradition, Wine 2.22 is here to improve the support for the ARM64 (AArch64) hardware architecture, adds a source selection dialog for scanners, resolves some issues with the DLL injection support, and improves the input methods.
Few games make me excited beyond help, especially when they're on Kickstarter, but space drone building game Nimbatus [Kickstarter, Official Site] is fully funded and coming to Linux.
There's a key point here that helped me get excited—it has a fully working demo for Linux!
The advanced open source game engine Godot [Official Site] has managed to secure funding from Enjin Coin [Official Site], which should go a long way to wards hiring a second developer.
It's not a small amount either, they're throwing $1,500 a month to help with Godot development! The folks at Godot are now getting just short of $6K a month, with their goal at $7.5K to hire a second developer. I've no doubt they will hit that within the next few months, likely once Godot 3.0 has officially released as I imagine that would give them a boost.
Black Mesa [Steam], the fan-made recreation of Half-Life has once again delayed the release of the Xen levels. They were last delayed for December this year, where the developer said "we consider December to be a do-or-die deadline", but sadly they've had to miss that target again.
Timber Tennis [Steam, Official Site], a new entry in the 'Timberman' series of games is an amusing looking casual sports game coming to Linux.
Back in September we wrote about the Ataribox, a new Linux-powered console from Atari — today we get a look at its new joystick.
Over on Facebook Atari shows off the new Ataribox Joystick that will (presumably) come bundled with the video games (and home entertainment) machine when it goes on sale next year
If you’ve been sleeping under a pile of E.T. carts, the Ataribox is pitched as the “ultimate video game & entertainment box”, offering classic Atari games, thousands of PC & indie games, and streaming apps from major content providers.
In the mood for a retro-inspired Metroidvania? External Visions [Steam] looks pretty damn good and it released for Linux recently.
After being in development for over 4 years, the sandbox RPG Spoxel [Steam, Official Site] is finally nearing a release on Steam. Another from my list of emails that got buried after I moved house.
Do you think Linux doesn't have enough fighting games? Way of the Passive Fist [Steam, Humble Store, Official Site] should hopefully tick a box for you then.
Ultimately, KaOS is responsive, focused, customizable, and elegant; especially since it sports one of the best KDE performances.
As an independent KDE distro it houses the Plasma desktop – and coupled with its focus on QT and KDE apps, it is easy for both beginners to the Linux distro world and pro users alike to function and customize efficiently.
With all the turmoil the project experienced in 2017 it looked for a while as if we wouldn’t have a face to face meeting this year. But that’s not good for a project working on its fourth major release! We knew we really had to sit together, and finally managed to have a smaller than usual, but very productive, sprint in Deventer, the Netherlands from Thursday 23th to Sunday 26th.
Not having been together since August 2016, we had an agenda stuffed with a enormous backlog of items. And since we’ve been working on new code for a long time ago, our bug tracker was also slowly dying from elephantiasis of the database.
Let’s do the bug tracker first: we managed to close over 120 bugs! Not every bug that gets closed gets closed with a fix: the problem is that most bug reports are actually help requests from users, and many of the rest are duplicates, or requests for features that are irrelevant for Krita. Still, while triaging the list of open and unconfirmed bug reports, we managed to fix more than a dozen real bugs.
I tend to hate any of my artwork if it is more than 1-3 months old but there are a couple of exceptions. The Kiki painting I made for the artbook “Made with Krita” is one of them. I used a bunch of new tricks in here and probably made a few good choices by accident.
KDAB has unique experience in porting the code base for toolkits like Qt 3, Qt 4, Motif, Java, Tcl, GTK, .NET, MFC, and Photon to Qt 5. Porting legacy GUI toolkits to Qt 5 is a job where proven experience saves a lot of time.
For the last couple of years my focus was on the Osmocom project to bring Free Software to the world of telecommunication. With a group of enthusiasts we have implemented the components necessary to run a complete network using Free Software. The Rhizomatica project is using the software to connecting people that were left behind. Our tools enabled high impact security research leading, leading to improvements to privacy and security for all of us….
But during the last months I had the opportunity to return to C++ and Qt work and it feels like coming home to the world of ARM powered hardware. When I left, the transition from consumer electronics (e.g. settop boxes) to automative (e.g. IVI) began and it seems it successfully completed! On Friday I explored a regression in OpenSSL and today I had the pleasure to understand input method handling of wayland a little bit better.
I wanted to see if I can use wayland and run QtVirtualKeyboard only in the Compositor. I couldn’t find answers in the documentation and started to read the code. Once I understood how it should work, I found a simple example in QtWayland. Isn’t Qt wonderful?
Qt 5.10 RC was expected back on 16 November but only this morning is making its debut.
While arriving nearly two weeks late, The Qt Company is still hoping to get the official Qt 5.10.0 release out on time, which has been scheduled for 30 November. Thus there's basically two days left to get the release candidate tested if getting the release out on time.
We are targeting to get final Qt 5.10.0 out 30.11.2017 as planned so please test the packages now & report me immediately if you find something which should really block the release. But remember: We won't block the release without really good reasons. Qt 5.10.1 will be released quite quickly so if we can live with issue as known issue in Qt 5.10.0 we will. So please add those issues directly in known issues page (https://wiki.qt.io/Qt_5.10.0_Known_Issues).
Since Akademy in Almería we have been going through the process of defining goals for KDE for the next 3 to 4 years. Different ideas were proposed and refined. 10 of them made it into the community-wide vote to select 3 of them. Today I am proud to announce the result based on the 684 submitted votes.
Since this year's KDE Akademy conference, KDE developers have been plotting their vision for the next few years and recently wrapped up voting on what should be their three main goals to focus on over the next few years.
If you've been following the Linux world at all, you know this has been an entire year for spring cleaning. Early in 2017, Canonical stopped work on its homegrown Unity desktop, Mir display server, and its larger vision of "convergence"—a unified interface for Ubuntu for phones, tablets, and desktops.
And now almost exactly six years after Ubuntu first switched from GNOME 2 to the Unity desktop, that has been dropped, too. The distro is back to GNOME, and Canonical recently released Ubuntu 17.10, a major update with some significant changes coming to the popular Ubuntu Linux operating system.
Thanks to the GNOME Foundation, a handful of designers and developers got together last week in London to refocus on the core element of the GNOME experience, the shell. Allan and Cassidy have already summed up everything in their well written blog posts, so I’d like to point to some pretty pictures and the video above.
At the start of my trial, in fact for the first day or two, I was not a fan of Artix Linux. I'm not, generally speaking, in favour of installers that download packages over the Internet, especially when I plan to perform multiple installs. And the first time through my attempt to start with a minimal desktop environment resulted in me not having a working desktop at all. This is probably my fault as I must have missed a necessary package somewhere in the selection, but I think (since I was installing the LXQt edition) it would have made sense for the distribution to automatically install all the components necessary to run a minimal graphical environment.
Once the distribution was installed and running, I ran into a few bugs, such as the folder icon not opening the file manager and the VLC media player failing to run. These are relatively minor bugs in the big picture, but with such a minimal distribution any malfunctioning applications stand out. I also ran into a bug early on where the QTerminal window would open partly off the screen and could not be moved. I had to disable the "remember window position" option in QTerminal to get the window to open entirely on my display.
4MLinux 24.0 BETA is ready for testing. Basically, at this stage of development, 4MLinux BETA has the same features as 4MLinux STABLE, but it provides a huge number of updated packages, including a major change in the core of the system, which now uses the GNU Compiler Collection 7.1.0.
Development of the 4MLinux 24.0 operating system was kicked off two weeks ago with the release of the 4MLinux 24.0 Core Beta edition, on which 4MLinux 24.0 is based, as well as any other GNU/Linux distributions created by the developer, including TheSSS, 4MParted, 4MRescue, Antivirus Live CD, and BakAndImgCD.
Shipping with up-to-date core components, the 4MLinux 24.0 Beta is now ready for testing, powered by the long-term supported Linux 4.9.52 kernel and GCC (GNU Compiler Collection) 7.1.0 compiler, which is used by default for all the apps included in the distribution. You can study the list of pre-installed packages for more details.
Yesterday I saw that Openmandriva Lx 3.03 was released.
The version that I had installed on my laptop was 3.0. I tried 3.1 and 3.2 but they simply would not launch properly and it was until much later that I found a way to circumvent the problem.
After announcing the demise of the 32-bit support for their ethical hacking and penetration testing GNU/Linux distribution, BlackArch Linux developers released a new ISO snapshot with various improvements.
The BlackArch Linux 2017.11.24 ISO snapshot is now available to download as the latest for the ethical hacking/pentesting distro, adding more than 50 new hacking tools, which tops the total number of supported tools to 1,910.
This release also bumps the kernel to Linux 4.13.12 and updates all in-house built BlackArch tools and core components. In addition, BlackArch Linux 2017.11.24 ships with the latest BlackArch Installer v0.6, and includes various tweaks and cleanups.
This is the rather exhaustive, sad list of things you will most likely need to do in order to be able to use openSUSE Leap 42.3 as intended. Or just on a level that is actually usable. Hardware problems, crashes, hangs, problems with media, remote access, even basic desktop customization. Not a happy list.
I like this guide, because it should help you enjoy yourselves, should you or must you choose openSUSE for your Linux desktop, for whatever reason. The best alternative is to actually use a different system, but then, if not, here's a comprehensive set of tweaks and changes that should hopefully help you get a stable, efficient, practical system. Take care and happy Linuxing.
Some of you may remember over a year ago when I proposed the concept of Tumbleweed Snapshots [1] and later the prototype that I provided [2]. Today I would like to announce hosting for the snapshots, that is not inside my house Smile, and ready to use!
For those not familiar with the concept I will describe it in the form to which it has evolved.
Tumbleweed, being a rolling distribution, is constantly changing and packages are constantly being rebuilt against one another and updating requirements. As such it becomes necessary to update even when undesirable. For example, one is running snapshot 17 and the next day snapshot 18 contains a QT update that rebuilt a large number of packages. When attempting to install an application that depends on QT one is greeted with an ugly unresolveable error. It is then necessary to run a full update, likely very large with many unrelated changes, in order to simply install an application as would have been possible yesterday.
Red Hat’s version of Linux containers is based on the popular Kubernetes engine, which it says will enable cloud providers and enterprises to scale up securely and efficiently.
With the recent release of Fedora 27, Fedora 25 officially enters End Of Life (EOL) status on December 12th, 2017. After December 12th, all packages in the Fedora 25 repositories no longer receive security, bugfix, or enhancement updates. Furthermore, no new packages will be added to the Fedora 25 collection.
Upgrading to Fedora 27 or Fedora 26 before December 12th 2017 is highly recommended for all users still running Fedora 25
We’re pleased to announce the third release candidate for Qubes 4.0! Our goal for this release candidate is to improve the stability and reliability of Qubes 4.0, so we’ve prioritized fixing known bugs over introducing new features. Many of the bugs discovered in our previous release candidate are now resolved. A full list of the Qubes 4.0 issues closed so far is available here.
Fedora Rawhide ahead of Fedora 28 has begun offering more packaged Rust applications.
The Rust applications now available on Fedora include base100 (an app to encode any byte into unique emoji symbols), fd-find as an alternative to the find command, exa as a modern replacement for the ls command, ripgrep as an alternative to GNU grep, rustfilt as a program to demangle Rust symbols, rustfmt as a Rust code formatter, and Tokei as a code statistics program.
It’s strange – even six months after founder and returning CEO of Canonical, Mark Shuttleworth, announced that the Unity project was dead – to hear Unity 8 described as a “bad investment” by a Canonical employee.
Will Cooke, desktop manager at Canonical, seemed quite comfortable with the new narrative when we spoke to him on release day, although he preferred to use the term ‘parked’ in relation to Unity 8 rather than closed, which would appear to open the possibility of Unity 8 being reversed out of its ‘parking bay’ in the future.
His initial comment on Mir was quite open-ended as well: “Mir still exists, the display server still exists and is in development and that’s especially interesting to IoT device manufacturers, but for the time-being we’re using Wayland on the desktop now.”
However, given the widespread support for Wayland now, and the Ubuntu desktop team’s own support of Wayland, it seems unlikely that Mir will become the default display server on Ubuntu’s desktop distro. Whatever you think of Gnome 3 returning as the default desktop, Ubuntu 17.10 is a defining fork in the road for the distribution that’s used by millions of Linux users, so for this interview we were mostly concerned with the transition.
First, I like Unity. While I saw news about Unity 7 abandonment and Canonical's decision to use GNOME instead, I believed that someday a new Ubuntu with Unity 7 will come. The Ubuntu Unity Remix is now likely the answer to my expectation. So this new Unity 7 revival project makes me happy and I believe, many of you will be happy too. Second, my expectation is of course Ubuntu Unity Remix to become official flavor next year. Third, I hope the developers could provide 32bit version so the users using old computers can still use it. Fourth, finally, let us help the development of Ubuntu Unity Remix by informing the others about it or by directly joining the team. Thank you Ubuntu Unity Remix developers!
Originally created to improve Ubuntu’s usability on smaller netbook screens, Unity became the default desktop environment on Ubuntu after Canonical had a falling out with the GNOME team. However, after seven years of development, Canonical Founder and CEO Mark Shuttleworth decided to switch from Unity back to GNOME 3.
Since that announcement, Unity 7 has been put in maintenance mode. Canonical planned to support Unity until 2021 because that’s when support was scheduled to end for the 16.04 LTS (Long Term Support) release.
This is a fundamentally good decision, considering the limited resources available to the Mint development team, and how different KDE is from Linux Mint's core distributions of Cinnamon and MATE. Not only at the user interface level but perhaps even more importantly at the development level, the libraries, the utilities and applications, pretty much everything is different. But that is not going to make this hurt any less for the long-time dedicated Mint KDE users.
The Linux Mint team announced a few moments ago the general availability of the Cinnamon and MATE editions of their latest Linux Mint 18.3 "Sylvia" operating system.
Dubbed Sylvia, Linux Mint 18.3 is now officially out with the latest Cinnamon 3.6 and MATE 1.18 desktop environments. The distribution is powered by the Linux 4.10 kernel from Ubuntu 16.04.3 LTS (Xenial Xerus) and includes many new features and improvements, along with updated components from the upstream software repositories.
Linux Mint 18.3 is a long term support release which will be supported until 2021. It comes with updated software and brings refinements and many new features to make your desktop even more comfortable to use.
Linux Mint 18.3 is a long term support release which will be supported until 2021. It comes with updated software and brings refinements and many new features to make your desktop even more comfortable to use.
Linux Mint has released 18.3 "Sylvia" in Cinnamon and MATE editions. Linux Mint 18.3 is a long term support release which will be supported until 2021. Both editions feature a revamped Software Manager with support for flatpaks. See more about what's new in the Cinnamon and MATE editions or check out the release notes for Cinnamon and MATE.
Based on the Ubuntu 16.04.3 LTS (Xenial Xerus) operating system, Black Lab Enterprise Linux 11.5 uses the latest Xfce 4.12 desktop environment by default for the Desktop edition and it's powered by the upstream Linux 4.10.0-40 kernel. This is the first release of the OS two ship with two editions, Desktop and Core.
"The first is full-featured, offering everything users need," said Roberto J. Dohnert. "Core is designed for embedded systems, IoT devices and users who want to build their own systems from the ground up; servers, appliances and specialized desktop environments can be brought out of Core."
Linux Mint is a great operating system. For those that want an alternative to Windows 10, it is a wonderful choice for two specific reasons. For one, it has a superior user interface. Whether you opt for the Cinnamon desktop environment or instead choose Mate, you will have a more intuitive experience than the insanity that is Windows 10. Secondly and more importantly, however, you don't have to worry about a billion dollar company tracking all of your activity. While telemetry sometimes has its benefits, Microsoft seems to have forgotten that their operating system is a guest on your computer. Again, it is your computer -- not the Windows-maker's.
The Linux Mint team has released version 18.3 of the popular Linux distribution as MATE and Cinnamon versions to the public.
Linux Mint 18.3 is a long term support released; this means that the development team will support it with updates until 2021.
Linux Mint has a reputation for being an easy-to-use Linux distribution, making it a good option for folks who may be new to Linux, but already familiar with Windows or macOS.
The latest version of Linux Mint is out this week, and it’s a long-term support release that will be officially supported until 2021. For the most part, Linux Mint 18.3 is an incremental update, but it does have a few major improvements.
Amid the barrage of Android phones desperate to differentiate themselves via camera technology, overlay software or physical design comes something truly different: the Gemini PDA. Gemini is an Android/Linux hybrid in a tiny clamshell chassis with a keyboard that's truly magnificent.
This Indiegogo-backed project is an unashamed homage to the Psion Series 5, the iconic Personal Digital Assistant that launched (hold your breath) 20 years ago in 1997. The Gemini's relationship to the earlier ground-breaker is clear in its physical design, in some of its software features, and in the general ethos of those who are bringing it to market. When I spoke with Dr Janko Mrsic-Flogel, CEO of Planet Computers -- the company behind Gemini -- he explained that his ethos is to be true to the original device, while also creating something exciting for the modern user.
Avalue’s factory hardened, 177 x 123 x 43.5mm “EPC-APL” mini-PC offers Apollo Lake SoCs, 2x GbE, mSATA, mini-PCIe, and triple displays.
Avalue, which recently announced a 3.5-inch ECM-APL2 SBC, has unveiled a rugged EPC-APL mini-PC that uses the SBC as its mainboard. The 177 x 123 x 43.5mm, 1.2-Kilogram system similarly runs Linux or Windows 10 on Intel’s Atom, Celeron, and Pentium “Apollo Lake” system-on-chips.
NXP Semiconductorsâ⢠N.V. (NASDAQ:NXPI), a worldwide leader in advanced secure connectivity solutions, today announced an industrial Linux distribution with real-time OS extensions and Time-Sensitive Networking (TSN) support for factory-automation OEMs. By breaking down the barriers of real-time computing and networking in a standard, community-based distribution, Open Industrial Linux (OpenIL) helps these OEMs usher in the Industry 4.0 era.
As of today, users of the HTC U11, Sony Xperia XZ, Sony Xperia XZs, and Sony Xperia X Performance mobile phones are receiving the latest Android 8.0 Oreo software update.
The paperless utopia I imagined I would be living in by now remains a work in progress. As I've thought more about why, I've decided it's the long tail of paper that's holding me back. Sure, almost all of my communications are electronic these days, and my scanner makes quick work of almost everything that comes to me in a dead tree format.
But as I look around my home office and wonder why there are still stacks of paper here and there, I realize there are some things that just make more sense in physical form, at least for part of their existence. I see calendars and brochures and instruction guides. I see posters from events, and even a piece of origami. While you could argue that some of these items could be made obsolete by their digital equivalents, they haven't been, and digitizing them myself is more work than the payoff would justify.
AT&T gave a glimpse into its vision of a Disaggregated Network Operating System (dNOS) in a recent white paper titled “Toward an Open, Disaggregated Networking Operating System” with a push toward software-defined networking (SDN) and white box hardware.
As part of its vision, AT&T coined the term dNOS to refer to the beginning of “an industry discussion on technical feasibility, build interest in participating in the formulation of technical detail, and determine suitable vehicles (standards bodies, open source efforts, consortia, etc.) for common specification and architectural realization.”
Everledger’s CEO, Leanne talked about women in technology and swiftly made us realize how we need equal representation of all genders to tackle the global problem. I talked about Outreachy with other female participants and amidst such a diverse set of participants, I felt really connected with a few people I met who were open source contributors. Open source community has always been very warm and fun to interact with. We exchanged what conferences we attend like Fosdem, DebConf and what projects we worked on. Outreachy current round 15 is ongoing however, the applications for the next round 16 of Outreachy internships will open in February 2018 for the May to August 2018 internship round. You can check this link here for more information on projects under Debian and Outreachy. Good luck!
Open source can be more than just a technology: it can be a hand up. The transparency and the community all come together to create a unique software experience. In this article, Tracy Miranda explains how she got her start in open source and how these skills have proved to be irreplaceable in her career.
In a humorous All Things Open 2017 Lightning Talk, "Death of an Enterprise Software Salesman," Corey Quinn calls out the slick, but not substantive, methods used to market closed-source enterprise software.
In just under five minutes, the author of Amazon Web Services news roundup site Last Week in AWS tears apart closed-source enterprise software marketing by pretending to be a salesman. His mock presentation is filled with nonsensical business jargon and meaningless charts, but Corey's undertone of bitng sarcasm makes his message clear: Closed-source enterprise software is successful because of its glossy image and fearmongering sales tactics, even though open source software is superior.
Thanks to the Student President of the School of Electric Engineering, Yelstin Soltelo, we were able to celebrated our third session as it was planned in the Wiki.
This time we have started with the online support of Carlos Soriano with his newcomer talk to clone a GNOME project using Builder. First we needed to the check the version of Flatpak (>9.25) followed by downloading the Builder software. After that, we did clone GNOME To Do, and we were waiting for the installation of Sdk. It was taking so long because we had a bandwith speed of the 80’s. Meanwhile, Carlos was explaining the tools GNOME offer in the developed center Website, and the initiatives and to do list the some GNOME applications have in GitLab. Thanks so much Carlos Soriano!
The Linux Foundation has released its entire 2018 events schedule.
The nonprofit organisation insists that it maintains a mission focused on the ‘creators, maintainers and practitioners’ of open source projects.
Looking back at the current year, the Foundation says that this years’ events attracted over 25,000 developers, sysadmins, architects, community thought leaders, business executives and other industry professionals from more than 5,000 organisations across 85 countries.
On the 4th and the 5th of November, the FOSSCOMM 2017 conference took place at Harokopio University of Athens, Greece. The KDE Community had a presence at the conference. Our Greek troops gave a talk on Sunday about the past, present and future of KDE, focusing on the vision of the community.
Mozilla has worked for years to give back the stardom their open source web browser lost with the release of Google Chrome. Firefox’s revival journey started with the addition of multiprocess earlier this year, followed by the head-to-toe overhaul of Firefox which now uses Project Neon as its new face.
Firefox 57 is hailed as a strong competitor to Google Chrome. Now, whether we like it or not, comparisons of the two browsers will be made. So, going along similar lines, this Firefox Quantum vs Chrome post tries to put the two web browsers in front of each other.
That's right, LibreOffice 6.0 Beta is now available to download, and while it's been released mostly for those involved in the bug hunting sessions arranged by The Document Foundation to triagge and resolve as many issues as possible before the final release, it can also be installed by early adopters.
A second Beta release could arrive early next month if there's still some critical bugs present, but the development cycle will continue in the second half of December with the first Release Candidate (RC) milestone, followed by the second and third RCs in January 2018. The final LibreOffice 6.0 release is expected at the end of January 2018.
After the first Bug Hunting Session for LibreOffice 6.0, which was held on October 20th 2017, we’re glad to announce the Second Bug Hunting Session on November 27th – this time being held on a Monday, for the first time!
LibreOffice 6.0 will be announced at the end of January 2018, and so far, almost 800 bugs have been fixed in this version, with more than 700 people reporting, triaging or fixing those bugs. More info can be found here. Besides that, a large number of new features, which are summarized in the release notes, have been added.
Let me start by saying that I'm biased towards systems that use flat files for blogs instead of the ones that require a database. It is so much easier to make the posts available through other means (such as having them backed up in a Git repository) that assure their content will live on even if the site is taken down or dies. It is also so much better to download the content this way, instead of pulling down a huge database file, which may cost a significant amount of money to transfer that amount of data. Having flat files with your content with a format that is shared among many systems (such as Markdown) might also assure a smooth transition to a new system, should the change become a necessity at some point.
Earlier this month I reported on Intel's plans for removing Cilk Plus from GCC 8 since this parallel programming effort of theirs was depreciated in GCC 7 and hadn't seen much adoption. It's now official with the code being stripped out of the GCC 8 code-base.
As of this morning, it's official and Cilk Plus was removed. This marks an end to Cilk Plus in GCC that had only been in GCC since 5.0 and this multi-threaded parallel computing extension for C/C++ that was originally devised at MIT in the late 90's.
Red Hat, Facebook, Google and IBM have announced efforts to promote additional predictability in open source licensing, by committing to extend additional rights to cure open source license compliance errors and mistakes.
The GNU General Public License (GPL) and GNU Lesser General Public License (LGPL) are among the most widely-used open source software licenses, covering, among other software, critical parts of the Linux ecosystem. When GPL version 3 (GPLv3) was released, it introduced an express termination approach that offered users opportunities to cure errors in license compliance. This termination policy in GPLv3 provided a more reasonable approach to errors and mistakes, which are often inadvertent. This approach allows for enforcement of license compliance that is consistent with community norms,
To provide greater predictability to users of open source software, Red Hat, Facebook, Google and IBM today each committed to extending the GPLv3 approach for license compliance errors to the software code that each licenses under GPLv2 and LGPLv2.1 and v2.
The GNU Public License version 2 (GPLv2) is arguably the most important open-source license for one reason: It's the license Linux uses. On November 27, three Linux-using technology powers, Facebook, Google, and IBM, and the major Linux distributor Red Hat announced they would extend additional rights to help companies who've made GPLv2 open-source license compliance errors and mistakes.
The GPLv2 and its close relative, GNU Lesser General Public License (LGPL) are widely-used open source software licenses. When the GPL version 3 (GPLv3) was released, it came with an express termination approach that offered users opportunities to cure errors in license compliance. This termination policy in GPLv3 provided a way for companies to repair licensing errors and mistakes. This approach allows license compliance enforcement that is consistent with community norms.
Red Hat, Inc., Facebook, Inc., Google, and IBM Corp. are joining forces to help alleviate open source licence issues, including compliance errors and mistakes.
The GNU General Public Licence (GPL) and GNU General Public Licence (LGPL) are two of the most common open source software licences, covering almost all software, including parts of the Linux system. The third version of GPL (GPLv3) includes an express termination approach that gives users the opportunities to fix errors in licence compliance in a faster and more efficient manner than before.
Now, the trio has committed to extending the express termination feature to the previous two versions of GPL to provide better predictability to users of open source software.
Google, Facebook, IBM and Red Hat have taken steps to increase the predictability of open-source licensing, extending additional rights to fix open source licence compliance errors and mistakes.
The move follows a recent announcement by many kernel developers about licence enforcement.
The Linux kernel, which is used widely by the four companies named, is released under the GNU General Public Licence version 2.0. A later version of this licence includes an approach that offers users an opportunity to comply with the licence.
Today Google joins Red Hat, Facebook, and IBM alongside the Linux Kernel Community in increasing the predictability of open source license compliance and enforcement.
We are taking an approach to compliance enforcement that is consistent with the Principles of Community-Oriented GPL Enforcement. We hope that this will encourage greater collaboration on open source projects, and foster discussion on how we can all continue to work closely together.
“We are taking an approach to compliance enforcement that is consistent with the Principles of Community-Oriented GPL Enforcement. We hope that this will encourage greater collaboration on open source projects, and foster discussion on how we can all continue to work closely together,” Chris DiBona, director of open source for Google, wrote in a blog post.
Red Hat, Inc. (NYSE: RHT), Facebook, Inc. (NASDAQ: FB), Google (NASDAQ: GOOGL) and IBM (NYSE: IBM) today announced efforts to promote additional predictability in open source licensing, by committing to extend additional rights to cure open source license compliance errors and mistakes.
Today a coalition of major companies—led by Red Hat and including Google, IBM and Facebook—who create, modify and distribute FOSS under copyleft licenses have committed to the use of GPLv3’s approach to license termination for all their works published under the terms of GPLv2 and LGPLv2.1. Following last month’s statement to similar effect by the developers of the Linux kernel, the world’s most widely-used GPLv2 program, today’s announcement establishes a broad consensus in favor of the “notice and cure period” approach to first-time infringement issues that Richard Stallman and I adopted in GPLv3 more than a decade ago. This adoption of GPLv3’s approach for GPLv2 programs is an enormously important step in securing the long-term viability of copyleft licensing. All computer users who wish to see their rights respected by the technology they use are better off.
GPLv2, which was written by Richard Stallman and Jerry Cohen, is a masterpiece of legal innovation and durability. First released in mid-1991, GPLv2 transformed thinking around the world about the viability of copyright commons, and gave birth to a range of “share alike” licensing institutions, not only for software but for all forms of digital culture. It is still in unmodified use after more than a quarter-century, attaining a degree of institutional stability more often associated with statutes and constitutions than with transactional documents like copyright licenses.
The tech giants, which release a fair amount of GNU-GPL-licensed source code, have committed to extend the GPLv3's 60-day "cure period" to license compliance errors under GPLv2 and LGPLv2.1 and v2.
Facebook, Google, IBM, and Red Hat today announced they’re going to provide greater legal protection for some of the open source code they license. The companies committed to extend more rights to cure open source license compliance errors.
Their announcement relates to two widely used open source software licenses: The GNU General Public License (GPL) and the GNU Lesser General Public License (LGPL). The GPL version 3 (GPLv3) introduced an express termination approach that offered users an opportunity to cure errors in license compliance, especially mistakes that are inadvertent.
I've spent most of my professional life helping organizations be more open to their stakeholders. I'm a partner in a consulting company in Chile, whose typical customer is a for-profit organization wishing to develop some kind of public works project (for example, an electricity generation station, a transmission line, a mine, a road, an airport, or something similar). Projects like these typically aim to fill a social need—but they're often intended for locations where development and operation can have negative impacts (or, in economic terms, "externalities").
I haven't taken a biology class in years, but the TV show Grey's Anatomy keeps me acquainted with some aspects of the scientific world. I never expected that an episode of the medical drama series would inspire me to explore open source principles in scientific research.
Maybe you've seen the episode: the characters Derek and Callie, surgeons in neuroscience and orthopedics, are doing a research study using brain sensors to control the movement of prosthetics. When the White House recruits Derek for a brain-mapping initiative, officials mention that the sensors necessary for the work will become proprietary, available only to Derek's project. The proprietary policy leads to an argument about ownership of the sensor technology and whose research is of greater importance.
In addition to the GCC plugin support on Windows/MinGW, there are more compiler happenings this weekend.
Hitting mainline GCC since that earlier post about the MinGW plugin support is this commit landing the -march=cannonlake target for these next-gen Intel CPUs. It's among the many GCC 8 features and previously covered the Cannonlake enablement while now it's been merged to mainline.
As a flashback to the past, hitting the LLVM Git/SVN code today were improvements for those still running with processors supporting AMD's 3DNow! extensions.
Last month, Scott Nesbitt wrote about Mozilla awarding $500K to support open source projects. Phaser, a HTML/JavaScript game platform, was awarded $50,000. I’ve been teaching Phaser to my pre-teen daughter for a year, and it's one of the best and easiest HTML game development platforms to learn. Pygame, however, may be a better choice for beginners. Here's why.
Linux perf is an immensely useful and powerful tool suite for profiling of C/C++ applications. I have used it extensively and successfully on various customer projects, both for desktop applications as well as automotive or industrial projects targeting low-end embedded Linux targets running on ARM hardware.
My last post (The long goodbye to C) elicited a comment from a C++ expert I was friends with long ago, recommending C++ as the language to replace C. Which ain’t gonna happen; if that were a viable future, Go and Rust would never have been conceived.
But my readers deserve more than a bald assertion. So here, for the record, is the story of why I don’t touch C++ any more. This is a launch point for a disquisition on the economics of computer-language design, why some truly unfortunate choices got made and baked into our infrastructure, and how we’re probably going to fix them.
Along the way I will draw aside the veil from a rather basic mistake that people trying to see into the future of programming languages (including me) have been making since the 1980s. Only very recently do we have the field evidence to notice where we went wrong.
I think I first picked up C++ because I needed GNU eqn to be able to output MathXML, and eqn was written in C++. That project succeeded. Then I was a senior dev on Battle For Wesnoth for a number of years in the 2000s and got comfortable with the language.
About 3 months, a GStreamer Conference and two bug-fix releases have passed now since the GStreamer Rust bindings release 0.8.0. Today version 0.9.0 (and 0.9.1 with a small bugfix to export some forgotten types) with a couple of API improvements and lots of additions and cleanups was released. This new version depends on the new set of releases of the gtk-rs crates (glib/etc).
Vulkan 1.0.66 was released this morning as the newest version of the Vulkan 1.0 graphics and compute specification.
Vulkan 1.0.66 has a number of fixes pertaining to the documentation as well as some clarifications. There are also three new extensions.
It would be fun to use the Otamatone in a musical piece. But for someone used to keyboard instruments it's not so easy to play cleanly. It has a touch-sensitive (resistive) slider that spans roughly two octaves in just 14 centimeters, which makes it very sensitive to finger placement. And in any case, I'd just like to have a programmable virtual instrument that sounds like the Otamatone.
Throughout Bombshell, animated sketches illustrate Lamarr’s inventions, but the film doesn’t dig deep into the science. The primary focus is the tension between Lamarr’s love of invention and her Hollywood image. With commentary from family and historians, as well as old interviews with Lamarr, Bombshell paints a sympathetic portrait of a woman troubled by her superficial reputation and yearning for recognition of her scientific intellect.
He specifically told the Dutch parliament that he plans to “extensively explore” the use of compulsory licensing of patents of medicines that are too expensive. (See here for media coverage in Dutch). Compulsory licensing lifts the monopoly effect of a patent by allowing others to produce generic versions. The Dutch patent law provides for compulsory licensing, including for reasons of public interest, which presumably covers addressing “absurd pricing” of needed medicines. EU medicines regulations may stand in the way of the Minister’s plans when data exclusivity rules prevent the registration of the generic. For a detailed discussion of the need to ensure coherence in EU law on this matter see our paper here. He will also explore if he can authorise pharmacists to prepare medicines al lower cost for individual patients.
The Minister follows the recommendations of the Netherlands Council for Public Health and Society, an official government advisory body, which published its report on eight November. The Council’s report – Development of new medicines: Better, faster, cheaper – outlines a number of actions the Dutch government can take to immediately address high drug pricing, including the use of compulsory licensing to strengthen the government’s position in price negotiations.
Few topics in the global health agenda are as contentious as access to affordable medicines and medical care, and expectedly, divergent views permeated the discussions at a high-level conference in New Delhi, India last week. But if there is one thing that the three-day meet made amply clear, it was this: access to affordable healthcare has emerged as a global problem, and an emerging coalition of the like-minded, cutting across the developed and developing countries, is determined to have their voices heard in international policy circles on the issue.
The 1st World Conference on Access to Medical Products and International Laws for Trade and Health in the context of the 2030 Agenda for Sustainable Development was held in New Delhi from 21-23 November.
For instance, the number of centers providing patients with information on “healing touch”—a type of “energy medicine”—increased nearly 30 percent between 2009 and 2016. Cancer patients at 26 of the 45 government-designated comprehensive centers around the country can now learn about that hocus-pocus along with actual cancer therapies. Likewise, inclusion of Ayurveda—a pseudoscience involving herbal, mineral, and metal treatments—increased by 10 percent in the same timeframe. Now, 18 of 45 cancer centers supported by the National Cancer Institute provide patients with information on that sorcery.
While the data may alarm evidence-based physicians and health experts, an accompanying article on the semantics of “integrative medicine” may be of more concern. In it, advocates of “integrative medicine” try to define what “integrative medicine” is, exactly. But rather than a clear definition, they create a vague and broad one that includes “mind and body practices.” It involves everything from the “medicalized” components of a healthy lifestyle (such as simple exercise) to what can charitably be described as magic.
Open source DNS software vendor PowerDNS has advised users to patch its "Authoritative" and "Recursor" products, to squish five bugs disclosed today.
None of the bugs pose a risk that PowerDNS might itself be compromised, but this is the DNS: what an attacker can do is fool around with DNS records in various ways.
That can be catastrophic if done right: for example, if a network is tricked into advertising itself as the whole of the Internet, it can be hosed, or if the wrong network promises it's the best way to reach YouTube, then YouTube is blackholed.
The UK's National Health Service will pay white hat hackers up to €£20m to protect its IT systems, it announced today.
NHS Digital is looking to make a deal with consultants to create a security operations centre, which it says will ensure the safety of staff and patient data nationwide.
Speaking to The Telegraph, NHS Digital said the contract "will provide access to extra specialist resources during peak periods and enable the team to proactively monitor the web for security threats and emerging vulnerabilities."
This comes against the backdrop of the Wannacry ransomware attack in May this year, which demonstrated the NHS' lack of preparedness for dealing with a large attack across several locations at once.
Intel's Management Engine (ME) is a small coprocessor built into the majority of Intel CPU chipsets[0]. Older versions were based on the ARC architecture[1] running an embedded realtime operating system, but from version 11 onwards they've been small x86 cores running Minix. The precise capabilities of the ME have not been publicly disclosed, but it is at minimum capable of interacting with the network[2], display[3], USB, input devices and system flash. In other words, software running on the ME is capable of doing a lot, without requiring any OS permission in the process.
Back in May, Intel announced a vulnerability in the Advanced Management Technology (AMT) that runs on the ME. AMT offers functionality like providing a remote console to the system (so IT support can connect to your system and interact with it as if they were physically present), remote disk support (so IT support can reinstall your machine over the network) and various other bits of system management. The vulnerability meant that it was possible to log into systems with enabled AMT with an empty authentication token, making it possible to log in without knowing the configured password.
This vulnerability was less serious than it could have been for a couple of reasons - the first is that "consumer"[4] systems don't ship with AMT, and the second is that AMT is almost always disabled (Shodan found only a few thousand systems on the public internet with AMT enabled, out of many millions of laptops). I wrote more about it here at the time.
Beginning in at least 2013, the defendants “and others known and unknown to the grand jury” used spearphishing emails containing malicious attachments or customized malware to hack into networks used by U.S. and foreign businesses, according to the indictment.
Wu Yingzhuo, Dong Hao, and Xia Lei face federal charges that they conspired to steal hundreds of gigabytes of data belonging to Siemens AG, Moody’s Analytics, and the GPS technology company Trimble. The indictment, which was filed in September and unsealed on Monday, said the trio used spear phishing e-mails with malicious attachments or links to infect targeted end users. The defendants used customized tools collectively known as the UPS Backdoor Malware to gain and maintain unauthorized access to the targeted companies' networks.
The U.S. military had earlier publicly said it had around 500 troops in Syria, mostly supporting the Syrian Democratic Forces group of Kurdish and Arab militias fighting Islamic State in the north of the country.
Two U.S. officials, speaking on the condition of anonymity, said the Pentagon could, as early as Monday, publicly announce that there are slightly more than 2,000 U.S. troops in Syria. They said there was always a possibility that last minute changes in schedules could delay an announcement.
That is not an increase in troop numbers, just a more accurate count, as the numbers often fluctuate.
In Syria, dozens of civilians have been killed in the last 24 hours by shelling and airstrikes reportedly carried out by the Syrian regime and Russia. The attacks occurred in the ISIS-controlled eastern province of Deir Az Zor and the rebel-controlled district of Eastern Ghouta, outside the capital Damascus.
Residents later reported that the region spent much of the day under attack from Saudi jets and American drones, which hovered overhead and intermittently fired missiles from above.
The attacks were described as a success in most Western newspapers. The Daily Mail in London highlighted the fact that "10 Al-Qaeda Suspects" were killed in the attacks, as confirmed by government officials.
Donald Trump is unpredictable and erratic, yet the ulterior motive for a lot of his decisions seems fairly unsophisticated: as Ta Nahisi Coates points out in his brilliant piece, Trump’s ultimate motive is to obliterate the legacy of Barack Obama. The more Obama prided himself on an achievement, the more adamant Trump becomes on destroying it. The Iran deal was a policy Obama advocated passionately. No wonder Trump stubbornly pursues its destruction.
Trump has given a few speeches about the Iran deal. He is yet to come up with any substantial argument against it. He throws in talking points and threadbare clichés about Iran, without saying anything new. Most likely without realizing it, Trump is in fact yet another figure in the long line of imperial leaders who have tapped into a certain image of Iran, without caring whether it bears any resemblance to its reality.
For decades the United States held itself up as Latin America’s ideal future even as it crushed post WWII nationalist projects for economic independence and social democracy. After decades of brutal counterinsurgency, the US promoted neoliberal democracy—free elections and free markets—as the path to peace and prosperity in Guatemala. Twenty years after historic peace accords, Guatemala’s democratic transition is a failure by every standard metric. Modest reforms were gutted while poverty and inequality grew worse, perpetuating the exploitation of working people and the indigenous underclass—the root causes of the armed conflict. Crime has skyrocketed. Dozens are murdered weekly in the capitol, and brutal killings of hundreds of women go uninvestigated. Gangs rule giant swaths of territory by terror. Narco-violence has killed thousands. Millions flee to the US for work and safety. Institutionalized corruption drains public coffers while infrastructure and state services decay. Food insecurity and malnutrition are epidemic. These appalling conditions are the predictable result of the violent imperialist imposition of free market reforms on a poor, unequal, and war torn country. Guatemalan society convulses in a permanent state of collapse, at war with itself, riddled with expanding zones of environmental sacrifice and social abandonment and lives in a constant state of risk and precarity, not unlike a prison or labor camp. This year, when forty-three girls died in a fire in an overcrowded and understaffed state run “safe home” for victims of violence, abuse, and abandonment, it became for many Guatemalans a perfect symbolic condensation of patriarchy, economic violence, and official negligence.
As the United Nations children's fund warned Sunday that nearly every Yemeni boy and girl—that's more than 11 million children—is in acute need of humanitarian assistance, Iran said the United States admitted its own complicity "in the atrocities committed by Saudi Arabia" in the warn-ravaged country.
The comments by Iran's foreign ministry spokesman, Bahram Ghassemi, follow a statement released Friday by the White House, which said that the U.S. remains "committed to supporting Saudi Arabia and all our Gulf partners against the Iranian Islamic Revolutionary Guard Corps' aggression and blatant violations of international law." The statement also praised Saudi Arabia for opening the port in Hodeidah and airport in Sanaa "to allow the urgent flow of humanitarian aid to the people of Yemen."
Aid groups, however, said the partial opening of the nearly three-week long blockade is "a minor and insufficient concession" that "still leave[s] the population of Yemen in a worse situation than they were two weeks ago before the blockade started" and the country still "on the brink."
Almost half the breeding population of the world’s most endangered penguin species, the yellow-eyed penguin, has disappeared in one part of New Zealand and conservation groups believe commercial fishing is to blame.
The yellow-eyed penguin is endemic to New Zealand’s South Island and sub-Antarctic islands, where there are just 1,600 to 1,800 left in the wild, down from nearly 7,000 in 2000.
According to Digiconomist the estimated power use of the bitcoin network, which is responsible for verifying transactions made with the cryptocurrency, is 30.14TWh a year, which exceeds that of 19 other European countries. At a continual power drain of 3.4GW, it means the network consumes five times more electricity than is produced by the largest wind farm in Europe, the London Array in the outer Thames Estuary, at 630MW.
This week on CounterSpin: As Americans celebrate a fairly tale about the relationship between Native Americans and settlers, Native Americans are mourning the pollution of more of their land, and lives, by fossil fuels. The November 16 spill of more than 200,000 gallons of oil from the Keystone pipeline occurred adjacent to the South Dakota reservation of the Sisseton-Wahpeton Oyate tribe.
A proposal by a California administrative law judge has given safe energy advocates new hope that two Diablo Canyon nuclear reactors will be shut before an earthquake on the San Andreas fault turns them to rubble, potentially threatening millions of people.
The huge reactors—California’s last—sit on a bluff above the Pacific, west of San Luis Obispo, among a dozen earthquake faults. They operate just 45 miles from the San Andreas. That’s half the distance from the fault that destroyed four reactors in Fukushima, Japan, in 2011. Diablo’s wind-blown emissions could irradiate the Los Angeles megalopolis in less than six hours if an earthquake destroyed the plant.
He visited the product page on Amazon.com and suspected he was the victim of "sniping," when one merchant sabotages another by hiring people to leave critical reviews of their goods and then voting those reviews as being helpful, making them the most prominent feedback seen by shoppers. Freelancers in China and Bangladesh willing to do this for $10 an hour are easily found online. Even though the toy has a 4.8 star rating out of 5 based on more than 1,100 reviews, shoppers first see a string of critical one-star reviews and many may get scared away.
26th November 2017
Since the referendum result there has been a lack of realism about Brexit by the UK government and many Leavers.
The current difficulties about the Irish border are one of many examples.
But lack of realism is not a monopoly of those wanting the UK to depart the EU.
There is wishful thinking – indeed, magical thinking – by those who want the UK to remain in the EU, or at least by those who want to have a Brexit significantly “softer” than which is currently likely to happen.
The (grim or glorious) truth is that the UK will be leaving the EU by automatic operation of law on 29 March 2019, unless something exceptional happens to change that legal position.
The Senate Republican tax plan gives substantial tax cuts and benefits to Americans earning more than $100,000 a year, while the nation's poorest would be worse off, according to a report released Sunday by the nonpartisan Congressional Budget Office.
The largest bitcoin exchange in the U.S., Coinbase, added about 100,000 accounts between Wednesday and Friday — just around Thursday's Thanksgiving holiday — to a total of 13.1 million. That's according to public data available on Coinbase's website and historical records compiled by Alistair Milne, co-founder and chief investment officer of Altana Digital Currency Fund. Coinbase had about 4.9 million users last November, Milne's data showed.
While you might be still struggling to recover from all the goodies you gulped over the Thanksgiving dinner, Bitcoin has continued hustling to make its way towards the magical mark of $10,000.
Next week, the City of London Choir begins its Christmas season with a charity concert at St Mary-le-Bow, Cheapside. Were it in need of an extra bass or alto, it need not look far. Because the number of City voices expressing deep concern over UK finances is fast becoming a chorus.
In space of two days, a series of City figures have lined up to intone publicly on the impact of Brexit on inward investment. But not all expect an audience as appreciative as the choir’s.
Sen. Bernie Sanders is traveling to Kentucky, Ohio and Pennsylvania this weekend to rally against the Republican tax bill, his office told NBC News, keeping up a brisk pace of political activity since leaving the presidential race last year and ahead of a potential second one in 2020.
Sanders, who held a similar series of rallies across the country this year to oppose the repeal of the Affordable Care Act, is using his "Protecting Working Families Tour" to pressure on-the-fence GOP senators before a vote on the tax bill, President Donald Trump's top legislative priority.
Theresa May is facing fresh accusations of “rigging Parliament” with an unprecedented move to prevent MPs from changing legislation on the Budget.
Labour attacked May’s latest “power grab” after it emerged that the Government will deploy a little-used procedural device to effectively eliminate any attempts to amend the Finance Bill.
The tactic will severely restrict MPs’ ability to secure alternative tax measures, such as a DUP-backed plan to abolish VAT on all domestic fuel after Brexit.
It also ensures that no backbench rebels can join Labour or other parties in ambushing the Government on particular plans - as they have in recent years on issues like the ‘tampon tax’ or taxes on solar panels.
But Leave do not have a monopoly in their lack of realism.
Some Remainers seem to think that the Article 50 process, once triggered, can be ended lightly.
Just a matter of politics; just a quick fix; just some tinkering; it will all be alright in the end.
And there is some force to this: if the politics of Brexit change, then the legal process can be ended (or paused).
If a lever is pulled then the conveyor belt to the big industrial jagged saw will jolt and then halt.
The British government has been accused of being weak on tax avoidance after failing to block the EU from taking the first step in naming and shaming its overseas territories in a tax haven blacklist.
Ministers in recent weeks fought to prevent Brussels from sending of letters informing 12 countries that they would be listed unless they promised to change their tax rules. The final EU blacklist is due to be published on 5 December.
The correspondence was eventually sent to the British overseas territories, but only following a ruling by members states’ experts sitting on a European council code of conduct group, which trumped the initial British protests.
According to a study by a watchdog group released this week, numerous judges at the International Court of Justice (ICJ) have worked or are working on at least 90 investor-state dispute settlement cases, despite a prohibition on them doing work outside their ICJ duties. Fees paid to the judges ranged above USD 1 million among three judges in a number of cases.
‘Crisis - The EU Meat Industry in a Hard Brexit Scenario’ report, commissioned by Europe’s meat industry body UECBV, analyses the potential impact of a hard Brexit on the European and UK meat industry.
It found that a ‘no-deal’ outcome would lead to a collapse in trade, with a 90% drop in beef exports and 53% drop in lamb exports from the UK to the EU.
In this scenario, meat products would face greater burdens than almost any other sector.
According to the report, the industry would face higher WTO tariffs than any other sector, and face additional costs of veterinary checks, in addition to the customs checks faced by all goods.
On Dec. 5 the EU will publish a blacklist of countries that have “harmful tax practices.” By its own criteria, that should include six EU member states, according to a report by the Tax Justice Network, an NGO. Those countries are Luxembourg, Ireland, the Netherlands, Cyprus, Malta, and the UK. The first five don’t have to worry since the EU says it won’t blacklist its own members, but when Britain leaves the bloc in 2019 it could find itself named and shamed. The EU has three criteria it uses to assess whether a country is a tax haven. These countries fail on “fair taxation,” which is pretty vague. The Tax Justice Network’s report is based on a (seemingly slightly playful) “best guess at what their criteria mean,” according to Alex Cobham, director of the group and co-author of the report. Britain falls short because it acts as a “tax conduit,” the report says, with low taxes on moving capital that allow multinationals to shift profits to low-tax jurisdictions while paying little or nothing where it was earned.
The White House already takes precautions with personal wireless devices, including by requiring officials to leave phones in cubbies outside of meeting rooms where sensitive or classified information is discussed. Top officials haven’t yet decided whether or when to impose the ban, and if it would apply to all staff in the executive office of the president.
For the time being, though, Zuckerberg’s possible political ambitions are not really the issue. Far more important is what we know already: that his power is titanic, and Facebook is shaping millions of people’s understanding of who they are and their place in the world, often in grim ways.
The claims around alleged Russian meddling in British politics has been stirred by allegations that fake Twitter accounts attempted to influence the Brexit vote. But while the mere suggestion was enough to make mainstream headlines, little was said about the “infinitesimal” quantity of tweets involved.
On one side are the National Republican Senatorial Committee, Senate Majority Leader Mitch McConnell, and House Speaker Paul Ryan. They have disowned Roy Moore, the party’s nominee for the U.S. Senate in Alabama, over allegations that he targeted, and in some cases molested, minors and other teen girls. On the other side are social conservatives, including Alabama’s state auditor, who argue that courtship between an older man and a teenage girl is consensual, biblical, good for the girl, and grounded in the natural attraction of a godly man to the “purity of a young woman.” Alongside the purity camp is the tolerance camp, led by Alabama Gov. Kay Ivey. These Republicans don’t deny the allegations or endorse Moore’s conduct, but they support him anyway, reasoning that other issues are more important.
Many Republicans are afraid to take sides in this debate. They want to stick with the GOP nominee, or at least avoid antagonizing voters who support him. But they don’t want to defend the sexual exploitation of minors. So they’ve staked out a neutral position: Moore is innocent until proven guilty. President Trump adopted this position on Tuesday, urging voters not to elect Moore’s Democratic opponent, Doug Jones. A reporter asked Trump: “Is Roy Moore, a child molester, better than a Democrat?” The president replied: “Well, he denies it. … He totally denies it. He says it didn’t happen.”
Can the emergence of non-traditional candidates help revive a faltering Democratic Party that is facing its lowest approval rating in nearly a quarter century? We speak with two Democrats who won key races with support from grassroots sources outside of the Democratic Party. In Charlotte, North Carolina, Braxton Winston is a former middle school football coach who took to the streets in 2015 along with hundreds of people to protest the police killing of Keith Lamont Scott. We also speak with Lee Carter, a Democratic Socialist and former Marine who unseated the Republican majority whip of Virginia’s House of Delegates.
The “code talkers” were Native American soldiers who were deployed during the world wars to send messages between units using a nearly uncrackable code: their native languages. During World War II, Navajo men were recruited by the Marines and served in the Pacific theater, aiding in the defeat of the Japanese army. Their story has become well known, including being featured in a 2002 film.
What has many observers far more concerned are connections among the new attraction’s principal funders and the right wing. Here its mission becomes suspect, more political than religious, although with the right wing, it is always difficult to separate the two, each possessing a will to dominate.
[...]
In the words of historian of religion Randall Ballmer, “You have a movement that has so totally embraced a particular political party that it’s willing to go along with any outrage as long as it’s within the tent of party.”
Fortunately, there are Christians who say no. In Alabama itself, dozens of pastors signed a letter condemning Moore. It reads, in part:
Who is the true propagandist? The man who offers you information which you can freely choose to believe or disregard — or the man who tries to control what you see, for fear you might start using your own brain to distinguish truth from lies?
That is essentially what Eric Schmidt, the Executive Chairman of Google’s parent company Alphabet, is doing when it comes to news articles from this website, RT. Schmidt was closely involved in Hillary Clinton’s campaign for president, and in a recent interview he admitted that Google is creating special algorithms to filter RT’s news and make it appear less prominently in Google’s search results. In his own words, Google is trying to “engineer the systems” to make RT’s content less visible.
Yesterday, on a trip into London to see the Christmas lights of Regent Street and Carnaby Street, and a subsequent walk across the Thames saw me stop by the Westminster Reference Library with my two kids for a cartoon workshop as part of their Gagged exhibition on censorship, with the Professional Cartoonists’ Organisation raising awareness of – and money for – cartoonists who have been fired, imprisoned or even killed for their work. It’s a subject I’d been discussing with my kids of late anyway, and it seemed a way to bring some of the realities of creativity into sharp relief.
[...]
A news team from Al Jazeera also popped by, so be warned, you may see our ugly mugs on a screen near you sometime. Here’s how the whole thing looked, including from my kids, Eve and Alice, who decided that their rebellion against authority – would be against me, in their collaborative alter ego, The Savage Kid.
Among the growing assaults on freedom of speech is an Israeli-driven campaign to criminalize a campaign to boycott Israel over its racist persecution of Palestinians, writes Lawrence Davidson.
Moath al-Alwi’s prayer rug is stained with paint. Every day, he wakes before dawn and works for hours on an elaborate model ship made from scavenged materials — one of dozens of sculptures he has created since he was first detained at the Guantánamo Bay military prison in 2002. Mr. al-Alwi is considered a low value detainee, but is being held indefinitely. His art is his refuge.
The sails of Mr. al-Alwi’s ships are made from scraps of old T-shirts. A bottle-cap wheel steers a rudder made with pieces of a shampoo bottle, turned with delicate cables of dental floss. The only tool Mr. al-Alwi uses to make these intricate vessels is a pair of tiny, snub-nosed scissors, the kind a preschooler might use. It is all he is allowed in his cell.
Three of Mr. al-Alwi’s model ships are currently on view in an exhibit at John Jay College of Criminal Justice in New York City, along with 32 other paintings and sculptures from other prisoners or former detainees. My colleagues and I curated this exhibit after learning that many lawyers who have worked with detainees have file cabinets stuffed full of prisoners’ art. In the atmosphere of surveillance and control that is Guantánamo, these artworks are among the only ways detainees have to communicate with the outside world.
National Award-winning filmmaker Anand Gandhi says he feels "restless" and "anxious" when he sees fundamental rights of the artistes being attacked in the country today.
The 37-year-old director says the kind of threats, both commercial and indie projects are facing from different sections of the society, the creative freedom is at stake.
Panaji: Speaking about censorship, film producer Karan Johar said filmmakers like himself aspire for certification according to age brackets and not censorship. This, he says, will tremendously enhance the possibilities of content.
China's film censorship bureau surprised practically everyone recently when it authorized Pixar's newest animated feature, Coco, to release in Chinese theaters.
Xavier Viegas, the University of Coimbra academic who coordinated and wrote the report, said in a column published on Tuesday that “nothing justifies the decision to censor” one of its chapters and pledged to do all he could to ensure that the stories of the victims of the fires in Pedrógão Grande and Góis, in central Portugal, are known.
The fires in Pedrógão and neighbouring municipalities that started on 17 June and burned for several days claimed 64 lives, and left 200 people injured, some seriously.
In the opinion column in Publico newspaper, Viegas condemned the CNPD’s decision to bar the publication of parts of chapter 6 of the report, saying that in order to protect the constitutional rights to privacy and personal data of the families of the victims, only the families should see it.
The UK powers that be consider online porn to be akin to cyber matches: you just can’t let kids play with that stuff, lest they set their eyeballs on fire.
It’s a well-established, thoroughly legislated angst, with the most current relevant legislation tucked into the Digital Economy Act. The problem – well, one of many – is that this angst seems poised to set the adult population of the country up for Ashley Madison-esque breaches.
The country is eager to protect children from porn. It’s a worthy goal, mind you, given that research shows that exposing kids to porn can be damaging. Unfortunately, it’s a quixotic goal, given that porn is impossible to block. Nevertheless, the UK is now on the brink of creating a database of the country’s porn habits.
It also seems poised to hand the age verification piece of that puzzle over to an outfit that Vice refers to as “the shady company that controls the majority of free porn tube sites.”
The Trump Administration has released a new version of the Vulnerabilities Equities Process -- one nominally slanted towards greater transparency and outside participation. The previous process was broken in multiple ways, not the least of which was intelligence oversight's general belief everything was fine even though the NSA didn't follow the previous rules, despite statements to the contrary.
It's unclear why this new VEP is appearing now. The new administration doesn't seem particularly concerned about surveillance overreach or the legality of tactics deployed by the Intelligence Community. On the other hand, the up-cycling of undisclosed NSA exploits by malicious hackers has probably forced the government's hand. It's impossible to get ahead of criticism, especially when so many of the exploited exploits dated back several years. But perhaps it's possible to head off future criticism with a diplomatic gesture, which is what this appears to be.
On a walk across the show floor at January's Consumer Electronics Show, a friend working in technology for nearly thirty years expressed unease at where it all seemed to be headed.
As I pulled my head away from a consumer door lock containing an embedded retinal scanner, I replied. “I don’t know what you’re talking about."
But I did. I could feel it in my gut and heard it from everyone else who’d spent a career working in technology. It isn’t just that a few megacorporations nearing trillion-dollar valuations have sucked all of the oxygen out of the room, it’s that they’ve become so big they’ve started to warp the fabric of reality.
Facebook got caught out in May using real-time emotional profiling to target vulnerable teenagers with commercial offers.
Google was caught out last week tracking Android users even when they’re not supposed to.
President Trump’s nominee to be Commissioner of U.S. Customs and Border Protection (CBP), Kevin McAleenan, revealed during his confirmation process how the agency implements its new policy not to access cloud content during border searches of digital devices.
In response to written questions for the record submitted by Sen. Ron Wyden (D-OR) and other members of the Senate Finance Committee, Mr. McAleenan explained that in accordance with CBP’s new policy to access only information that is “physically resident” on a device, border agents must “ensure that network connectivity is disabled to limit access to remote systems” (page 92).
While Mr. McAleenan did not provide details, disabling network connectivity can mean a few things, such as putting a phone or other device into “airplane mode,” or individually toggling off cellular data and Wi-Fi. It could also mean making sure a laptop is not connected to an Ethernet cable, or bringing a device into a SCIF-type room that blocks electromagnetic signals.
This is software to save lives. Facebook’s new “proactive detection” artificial intelligence technology will scan all posts for patterns of suicidal thoughts, and when necessary send mental health resources to the user at risk or their friends, or contact local first-responders. By using AI to flag worrisome posts to human moderators instead of waiting for user reports, Facebook can decrease how long it takes to send help.
Facebook previously tested using AI to detect troubling posts and more prominently surface suicide reporting options to friends in the U.S. Now Facebook is will scour all types of content around the world with this AI, except in the European Union, where General Data Protection Regulation privacy laws on profiling users based on sensitive information complicate the use of this tech.
Wikipedia, the internet’s free encyclopedia is accessible on the dark web. But, it isn’t track-proof as the traffic has to go outside the boundaries of the Tor network.
Now, we have an unofficial dark web version that can help netizens use Wikipedia without someone spying on them–thanks to the ex-Facebook engineer Alec Muffet who has worked on a personal project and is the first to create the specially crafted onion website.
A federal judge has issued the final word in one long-running dragnet surveillance suit. The lawsuit, filed by Larry Klayman immediately after the first Snowden leak, alleged the Section 215 phone records program -- targeting Verizon Business customers according to the leaked document -- was unconstitutional. DC district court judge Richard Leon agreed, issuing an injunction in December 2013 demanding a cessation of the Section 215 dragnet.
This order was immediately stayed to allow the government to appeal (and to continue harvesting domestic phone records in bulk). The Appeals Court disagreed with Leon, sending the case back for another ruling. It didn't change anything at the lower level. Judge Leon still found the program unconstitutional and ordered the NSA to stop collecting the phone records of the two named plaintiffs.
The last year-and-a-half has provided plenty of evidence that the Russian government attempted to influence the 2016 presidential election. Unfortunately, most of the evidence confirming this has been delivered by entities outside the US government. The government has released reports but has omitted plenty of key details.
This hasn't done much for those affected by Russia's efforts. In almost every case, individuals targeted by Russian government-directed hacking entity Fancy Bear were made aware of this by journalists, not the FBI, despite the fact both had access to the same evidence.
In August 2016, a mysterious entity calling itself “The Shadow Brokers” began releasing the first of several troves of classified documents and hacking tools purportedly stolen from “The Equation Group,” a highly advanced threat actor that is suspected of having ties to the U.S. National Security Agency. According to media reports, at least some of the information was stolen from the computer of an unidentified software developer and NSA contractor who was arrested in 2015 after taking the hacking tools home. In this post, we’ll examine clues left behind in the leaked Equation Group documents that may point to the identity of the mysterious software developer.
Back in March, we speculated that the point behind the Russian hacks and Wikileaks document dumps during the 2016 election was to create a mole hunt in our intelligence agencies. There now are indications that our speculation was spot on.
The New York Times recently reported that, largely as a result of Wikileaks and the publication of other documents, the National Security Agency (NSA) is in the midst of a mole hunt.That report also tends to confirm speculation which we have privately heard from people in the intelligence community: that Russia may have multiple sources within the NSA that are supplying it with some of our most closely guarded secrets.
[...] Aadhaar has been made mandatory for getting benefits under the Varishtha Pension Bima Yojana (VPBY) pension scheme, according to a notification by the finance ministry on November 20.
Congress will return from its weeklong Thanksgiving break facing a rapidly-shrinking timeline to reform and renew an authority the intelligence community says is critical to identifying and disrupting terrorist plots.
The key piece of the Foreign Intelligence Surveillance Act, known as Section 702 and passed in 2008, is set to expire at the end of the year. It allows the National Security Agency (NSA) to collect the texts and emails of foreigners abroad without an individualized warrant — even when the subjects communicate with Americans in the U.S.
Throughout the fall, privacy advocates on Capitol Hill pushed for changes to the law to curtail what critics say is a violation of Americans’ Fourth Amendment protections — a push that seemed to gain some momentum despite the objections of the Trump administration.
Tencent is counting on its user data — from the music people play, the news they read and the places they go — to deliver targeted commercials and capture a bigger share of China’s 350 billion yuan ($53 billion) online advertising market. Success in games and social media has meant the company hasn’t had to rely on ads, a business that generates just 17 percent of its revenue compared with 97 percent for Facebook.
The police report was clear. Anti-drug officers shot and injured three men in this poor district of the Philippine capital, then “rushed” them to hospital where they were pronounced dead on arrival.
But security camera footage obtained by Reuters tells a different story of what happened just after midday on October 11 in Barangay (district) 19. It shows that police took at least 25 minutes to haul away the men they had shot. The victims show no signs of life; police are seen carrying them by their arms and legs and loading their limp bodies onto pedicabs to take them to hospital.
The footage casts new doubts on the official accounts of police killings in President Rodrigo Duterte's 17-month war on drugs.
Were these actual ads? No. And as someone who’s spent the past month on a New York City apartment hunt, I’m pretty confident that no one would mistake our “real estate company” for an actual brokerage.
But here’s the question: could they have been real? Yes — and our ability to limit the audience by race, religion, and gender — among other legally protected attributes — points to the same problem my colleagues Terry Parris Jr. and Julia Angwin reported out a year ago, exciting much outrage from people who care about fixing discriminatory housing practices.
NATO’s military intervention in Libya in 2011 has justifiably earned its place in history as an indictment of Western foreign policy and a military alliance which since the collapse of the Soviet Union has been deployed as the sword of this foreign policy. The destruction of Libya will forever be an indelible stain on the reputations of those countries and leaders responsible.
But now, with the revelation that people are being sold as slaves in Libya (yes, you read that right. In 2017 the slave trade is alive and kicking Libya), the cataclysmic disaster to befall the country has been compounded to the point where it is hard to conceive of it ever being able to recover – and certainly not anywhere near its former status as a high development country, as the UN labelled Libya 2010 a year prior to the ‘revolution’.
Back in 2011 it was simply inconceivable that the UK, the US and France would ignore the lessons of Iraq, just nine years previously in 2003. Yet ignore them they did, highlighting their rapacious obsession with maintaining hegemony over a region that sits atop an ocean of oil, despite the human cost and legacy of disaster and chaos which this particular obsession has wrought.
The House Intelligence Committee’s Russia investigation has taken an unexpected turn, with investigators homing in on a New York City-based comedian and veteran civil rights activist named Randy Credico. Credico received a letter this month from Committee ranking member Rep. Adam Schiff and Rep. Michael Conaway, the Republican leading the investigation. The lawmakers requested that Credico “participate in a voluntary, transcribed interview at the Committee’s offices” during the first half of December.
Credico informed the House committee through his legal counsel that he would not submit to the voluntary interview. Soon after, his lawyer informed him that the committee planned to issue a subpoena to compel his presence.
Credico is among the unlikeliest characters to have surfaced as a player in the ongoing Russiagate drama. For over two decades, he split time as a comedy professional while waging a tireless crusade against the war on drugs. The former host of a radio show on the Pacifica affiliate WBAI, Credico’s activism eventually brought him into the company of a who’s who of political dissidents. The most prominent among them was Julian Assange, the Wikileaks founder accused by CIA Director Mike Pompeo of overseeing a “hostile intelligence service” and by Hillary Clinton of having collaborated with the Russian government to subvert the 2016 presidential election in Donald Trump’s favor.
This Wednesday and Thursday, November 29 and 30, a hearing is taking place at the High Court in London to assess whether Lauri Love, a computer expert with Asperger’s Syndrome, should be extradited to the US for acts of online activism — allegedly targeting US government websites in the wake of the suicide of computer expert and activist Aaron Swartz in January 2013, along with many other online activists.
There is no evidence that any harm was caused in the US, Lauri has never set foot in the US, the British government has brought no case against him in the UK, and yet, under the terms of the 2003 US-UK Extradition Treaty, the US is able to demand that he be sent to the US to be imprisoned (in isolation in a maximum-security prison) and subsequently tried (in a broken, punitive system in which huge pressure is exerted to accept a plea deal and a 10-20 year sentence rather than fight and lose and be imprisoned for life). Worryingly, Lauri Love has been openly stating that he could not bear punitive isolation in the US, and would kill himself rather than be extradited, and those closest to him do not dispute this intent.
I have some experience of the chronic unfairness of the US-UK Extradition Treaty, because, back in 2012, I worked to oppose the injustice of the treaty with reference to the cases of Talha Ahsan and Babar Ahmad, who ended up being extradited in relation to a UK website encouraging Muslim resistance to oppression, which was run from the UK, but had, at one point, involved a server in Connecticut — enough, apparently, for extradition to take place.
Both men had been imprisoned for six and eight years respectively in the UK, without charge or trial, while they resisted extradition, and in neither case was there any sign that they would or could have been successfully prosecuted in the UK, but in October 2012 home secretary Theresa May allowed their extradition to take place, and then boasted about it to the Conservative Party Conference.
Lauri Love is an activist, a physicist, a computer scientist, an angel and the person I want to spend my life with. He is stubborn and smart, near to the point of arrogance, and he fights every battle he can against injustice. Next week Lauri will be in court appealing against extradition to the United States where he faces a 99-year prison sentence on allegations British authorities investigated and decided not to charge him for.
Lauri is a much nicer person than I am and he is a much more positive and hopeful person. Where I see climate destruction and oppressive regimes, he sees opportunities to overcome. His hacker mind is hard-wired to solve problems and this world has many.
Something's very wrong with Albuquerque-area law enforcement. The Albuquerque Police Department has been described as a "criminal enterprise." These words didn't come from an activist group or an enraged op-ed in the local paper, but rather from a departing District Attorney in a letter to the DOJ.
The DOJ is at least partially aware of the Albuquerque PD's criminal activities. Its 2014 investigation concluded APD officers routinely engaged in indiscriminate force deployment. Worse, those above the officers did almost nothing to curb misconduct and brutality. Beyond shooting citizens at an alarming rate, APD officers were found to be tampering with camera footage -- an accusation brought by a private employee of the department in an affidavit presented to a judge.
It seems the APD isn't the only law enforcement agency in the Albuquerque area prone to unchecked acts of violence. Nor is it the only one actively disinterested in any form of accountability. In the last four months, the Bernalillo Sheriff's Department deputies have shot nine people. One deputy -- Charles Coggins -- shot two people in 22 days, killing one of them.
The Post did not publish an article based on her unsubstantiated account. When Post reporters confronted her with inconsistencies in her story and an Internet posting that raised doubts about her motivations, she insisted that she was not working with any organization that targets journalists.
But on Monday morning, Post reporters saw her walking into the New York offices of Project Veritas, an organization that targets the mainstream news media and left-leaning groups. The organization sets up undercover “stings” that involve using false cover stories and covert video recordings meant to expose what the group says is media bias.
Since taking office, President Donald Trump and Attorney General Jeff Sessions have been trying illegally to strong-arm law enforcement agencies across the country into colluding with the Department of Homeland Security’s mass deportation agenda. But the courts have blocked them every step of the way.
President Trump took his first shot across the bow just a few days after inauguration. A single provision buried in Executive Order 13768 threatened to cut off all federal funds to so-called sanctuary cities. The provision was broad and undefined. It appeared to target jurisdictions that have adopted a range of lawful and sensible law-enforcement policies.
A federal court in California quickly put the executive order’s provision on hold. And last Monday, after months of hearings, the court permanently blocked the unconstitutional provision, ruling that it violated separation of powers, the Constitution’s Spending Clause, and the Tenth Amendment. The court also ruled that the provision was unconstitutionally vague. The judge in the case wrote that “[f]ederal funding that bears no meaningful relationship to immigration enforcement cannot be threatened merely because a jurisdiction chooses an immigration enforcement strategy of which the President disapproves.” The government has appealed this case to the Ninth Circuit Court of Appeals, but for the time being, the president cannot carry out his threat.
Last week EFF attended the Global Conference on Cyberspace (GCCS) in New Delhi, India, as one of a small handful of nonprofit organizations invited to participate. This was the fifth in a series of conferences sometimes called the London Process, after the first event that was held in London in 2011. Focusing on international cybersecurity issues, it is a counterpart to other regular government-organized Internet conferences, such as the Freedom Online Coalition (FOC) conference which focuses on Internet freedom and human rights, China’s World Internet Conference which focuses on the digital economy, and the International Telecommunications Union’s WSIS Forum which tracks Internet for development goals.
When we think of the term ageism in the IT sector, we generally think of how employers and project managers will systematically or casually discriminate against individuals simply on the basis of their age.
This past June, when the New York Times unceremoniously killed off its public editor position, publisher Arthur Sulzberger tried mightily to characterize the move as addition by subtraction. In a newsroom memo, he promised that a newly created “Reader Center” would make the paper’s reporting “more transparent” and its journalists “more responsive.” As FAIR (6/1/17) noted at the time, these excuses were disingenuous “rationalizations, not legitimate rationales,” and were more likely to make the paper less accountable and transparent in the long run. And this past weekend proved these fears were well-justified.
It started on Saturday, when the Times (11/25/17) ran a naive, normalizing profile of a Nazi sympathizer from the suburbs of Dayton, Ohio. Almost immediately, the paper (rightly) faced outraged comments online, as serious critiques of the piece’s flawed framing rolled in. As @magi_jay wrote in a detailed Twitter thread: “The Times failed in many respects, but, above all, they failed by enthusiastically allowing [Tony] Horvater to drive the narrative of his own white supremacy.”
A woman who reported being kidnapped and raped over a six month period to the police was arrested as she sought care, Politics.co.uk can reveal.
The shocking case reveals how far Theresa May's 'hostile environment' towards immigrants has gone and raises serious questions about whether immigration enforcement practices are now discouraging the victims of crimes from reporting them to the police.
The woman, who was five months pregnant at the time of her arrest, attended a London police station in March to report that she had been kidnapped and raped in Germany between September 2016 and March 2017.
Buried in the same news dump ahead of the national holiday were further liberalisation rules for media ownership including a limit on how many homes in the US a single broadcaster can reach. At the moment the cap is set at 39%, but the FCC has indicated it might revise or scrap that limitation entirely. A second measure would also allow TV stations to use different frequency channels that count less against this overall cap on broadcasting reach.
After paying a fee for basic service, subscribers can add any of five further options for about $6 per month, allowing an additional 10GB data allotment for the apps within the options: a “messaging” tier, which covers such services as instant messaging, Apple FaceTime, and Skype; “social,” with liberal access to Facebook, Instagram, Twitter, Snapchat, and so on; “video” (youTube, Netflix, etc.); “email and cloud” (Gmail, Apple’s iCloud); or “music” (Spotify, Pandora).
Portugal isn’t the only country allowing tiering of internet services. In Britain, the internet service provider Vodaphone charges about $33 a month for basic service but offers several “passes” allowing unlimited video or music streaming, social media usage, or chat, at additional tariffs of up to $9.30 per month.
Although both countries are part of the European Union, which has an explicit commitment to network neutrality, these arrangements are allowed under provisions giving national regulators some flexibility. These regulators can open loopholes permitting “zero-rating,” through which ISPs can exclude certain services from data caps. That’s what the Portuguese and British ISPs essentially are doing.
The letter added, "An internet without net neutrality protections would be the opposite of the open market, with a few powerful cable and phone companies picking winners and losers instead of consumers."
But Mr. Pai faces a more serious legal problem. Because he is killing net neutrality outright, not merely weakening it, he will have to explain to a court not just the shift from 2015 but also his reasoning for destroying the basic bans on blocking and throttling, which have been in effect since 2005 and have been relied on extensively by the entire [I]nternet ecosystem.
If Trump FCC chairman Ajit Pai had confined his attack on Net Neutrality to merely rolling back the 2015 Title II rules, he might have gotten away with it; but like the Republic plan to kill Obamacare, the Republican plan to rob the middle class to enrich billionaires, and, well, every other Republican plan in this administration, Pai's plan is so grotesque, so overreaching, so nakedly corrupt that it is likely to collapse under its own weight.
That's because the Supreme Court has held that a federal agency contemplating a significant change in policy must "examine the relevant data and articulate a satisfactory explanation for its action." But there are no new facts in evidence since the first Net Neutrality rules were enacted in 2004 to justify a change. We don't know what evidence Pai will bring to court when it comes time to fight his plans, but the cards he's played so far are hilariously weak: for example, he claims that the 2015 Title II rule led to a decrease in infrastructure investment by telcos. In fact, the telcos' own filings and investor calls reveal that the reverse is true (Pai is entitled to his own opinions, but not his own fact).
Americans do not want internet service providers (ISPs) like Comcast and Verizon controlling what websites they can see, or how quickly they can load them. When pollsters ask U.S. voters whether they support net neutrality — regulations that require ISPs to treat all web traffic equally — a large bipartisan majority answers in the affirmative.
Among Americans who care deeply about the issue, support for net neutrality is even more overwhelming. When the Federal Communications Commission considered unwinding those regulations in 2015, so many Americans posted pro-net-neutrality messages to the FCC’s webpage for public comments, the site crashed.
The ISPs, however, are quite keen on accruing more power to curate your internet experience (a.k.a. extort content creators into paying for competitive broadband speeds). And the Trump administration’s regulatory philosophy is, ostensibly, that powerful corporations should be able to do whatever unpopular thing they want (so long as they purchase an indulgence from a Republican campaign committee).
Net Neutrality is a huge topic, again. But it’s important to realize that Net Neutrality is mostly being discussed in the United States — not because it is ahead, but because it is behind. In countries where fiber is the norm to households and they typically have 15-20 ISPs to choose from, Net Neutrality is so taken for granted, it is not a discussion at all.
You might think that the "Big Lie" is the idea that the 2015 rules killed investment. And that is a lie. Actual evidence from financial reports has proven that completely false repeatedly. But, that's a smaller lie here. Ajit Pai's Big Lie is the idea that gutting all net neutrality protections is somehow returning FCC policy to the way things were two years ago, and that "for decades" the FCC kept out of this debate. All of that is wrong. And, unlike the other lie concerning investment -- where Pai and others can fiddle with numbers to make his claims look right -- Ajit Pai knows that the Big Lie is false.
Pai likes to point back to the Telecommunications Act of 1996 as his starting point in claiming that the internet is free from regulations, and suggests that things just changed with the 2015 FCC order. But he literally knows this is wrong. First of all, for all his talk of using 1996 as the starting date to show "decades" of supposedly unchanged FCC positions on this, he conveniently leaves out that the FCC didn't actually classify cable broadband as an information service... until 2002. That's from the FCC's own announcement about it. And this was fought out in court, eventually leading to the Brand X Supreme Court ruling in 2005 that said the FCC had the right to determine if broadband was an information service or a telco service (which is why the 2015 order has been upheld).
So as we've been noting for a while, the FCC's policy order taking aim at net neutrality has been rife with all kinds of bizarre and fraudulent behavior, from the agency's made up DDOS attack (apparently a ham-fisted PR attempt to downplay the "John Oliver effect") to the numerous fake or otherwise dead people that have oddly supported the agency's unpopular plan in the FCC's comment proceeding. It's clear the FCC's plan is extremely unpopular, and it's also clear the agency, ISPs and some policy groups have engaged in some extremely dodgy behavior to try and downplay that fact.
The GAO is already investigating the FCC's bogus DDOS claims, and the FCC is already being sued for turning a blind eye to the problem and ignoring FOIA requests. The fraudulent comments by fake or otherwise non-breathing individuals will surely play a starring role in the inevitable lawsuits against the agency. If evidence is found that the FCC violated procedural norms (or hey, the law), it could help to reverse the agency's myopic and unpopular hand out to the nation's telecom duopolies.
On Wednesday November 22, FCC Chairman Ajit Pai published his draft order outlining his plan to undo the net neutrality protections that have been in place in the U.S. since the beginning of the Internet. His proposal would leave both the FCC and the states powerless to protect consumers and businesses against net neutrality violations by Internet Service Providers (ISPs) like Comcast, AT&T, and Verizon that connect us to the Internet. His plan discards decades of careful work by FCC chairs of both political parties, who recognized and acted against the danger ISPs posed to the free markets that rose out of and depend on the Internet. If his plan takes effect, ISPs would be free to disrupt how the Internet has worked for 30 years.
In a new proposal issued last week, the Federal Communications Commission (FCC) set out a plan to eliminate net neutrality protections, ignoring the voices of millions of Internet users who weighed in to support those protections. The new rule would reclassify high-speed broadband as an “information service” rather than a “telecommunications service” (remember, the FCC is forbidden from imposing neutrality obligations on information services). It would then eliminate the bright-line rules against blocking, throttling, and pay-to-play (as well as the more nebulous general conduct standard) in favor of a simplistic transparency requirement. In other words, your ISP would be free to set itself up as an Internet gatekeeper, as long as it is honest about it.
Despite the nation's biggest ISP and cable company having spent millions of dollars and lobbying man hours on repealing broadband privacy rules and soon net neutrality protections, executives at the least-liked company in America hope you're dumb enough to believe they won't be taking full advantage.
Comcast has spent months now falsely claiming that it will still adhere to "net neutrality" once the FCC's rules are gutted by Ajit Pai. But the company's pet definition of net neutrality is so narrow as to be effectively meaningless. For example, last week as the FCC was trying to hide its obvious handout to telecom duopolies behind the cranberry and stuffing, Comcast issued a tweet again insisting that you can trust them to be on their best behavior despite the fact there will soon be no meaningful rules holding their feet to the fire
These two points have just been demonstrated in a messy, drawn-out fight over the standardization of DRM in browsers, and since we threw a lot of blood and treasure at that fight, one thing we hope to salvage is an object lesson that will drive these two points home and provide a roadmap for the future of DRM fighting.
We lost at the W3C, but we got farther than we had any right to, and that's because we created a powerful new tactic for fighting DRM, one that everyone needs to know about and use as we fight to save the rest of the internet -- including its extrusions into the physical world, AKA the "internet of things" -- from DRM.
The last time we mentioned the Wu-Tang Clan here at Techdirt, we were discussing the group's bizarre yet inventive attempt to curtail digital music's infinite goods problem by releasing a single copy of an entire album for $1 million. It was a creative approach, though one that likely isn't a model that transfers well to the music industry as a whole. But it seems that the copyright arena isn't the only intellectual property venue in which Wu-Tang wants to play, as RZA, a member of the group, has filed a trademark opposition to a dog-walking company calling itself Woof-Tang Clan.
[...]
All that's left of Wu-Tang Clan is the name https://www.techdirt.com/articles/20171122/10384838670/wu-tang-clans-rza-opposes-trademark-application-dog-walking-company-called-woof-tang-clan.shtml they had some good tracks (in the 90s)
We are happy to invite you to the 15th edition of Out of Office on 8 December 2017 from 17:00 to 19:00 at Spring House. During this Out of Office we will reflect with Ms Julia Reda, Member of the European Parliament, on the recent developments concerning the ongoing copyright reform in Europe. Come and join us in search of new insights, encounters and inspiration, while enjoying music, drinks and snacks!
Julia Reda is Member of the European Parliament for the Greens/EFA group and a co-founder for the Parliament’s current Digital Agenda intergroup. She is an advocate for a free Europe with open borders, open communication structures and the relaxation and harmonisation of copyright laws. Reda will share her thoughts on the ongoing copyright reform and whether progress has been made since the DSM Directive (more info below) was proposed by the European Commission.
Anti-piracy outfit Rightscorp has filed its latest set of financial results and they reveal yet more misery for the company. Its traditional revenue stream, comprised of cash settlements from alleged BitTorrent pirates, is down 48% on the same period last year. This contributes to the company turning in net losses of $1.45 million for the first nine months of the year. But could value lie elsewhere?
The first university in the world to deploy Dropbox wall-to-wall in what is a multi-million dollar, 67,000-user agreement and deal "to power greater collaboration" is the University of Sydney.
A German court has ruled that a man, whose Internet connection was used to share pirated films, cannot be required to 'spy' on his family members. The law firm representing the Internet subscriber stresses that these kinds of investigations violate the EU Charter of Fundamental Rights, which protects respect for private and family life.