Hey everyone, I’m happy to announce the release of an update to our coreboot images for Librem 13 v2 and Librem 15 v3 machines.
All new laptops will come pre-loaded with this new update, and everyone else can update their machines using our existing build script which was updated to build the newest image. Some important remarks:
Purism has released updated Coreboot images for their Librem 13 v2 and Librem 15 v3 laptops.
The updated Coreboot images are now re-based to Coreboot 4.7, Intel FSP 2.0, IOMMU (VT-d) support is now available, TPM support is also enabled, and there are fixed ATA errors for 6Gbps speeds.
In November, we announced the availability of our Trusted Platform Module as a $99 add-on for early adopters, something that would allow us to cover the additional parts & labor costs, as well as test the waters to see how much demand there might be for this feature. We thought there would be “some” interest in that as an option, but we were not sure how much, especially since it was clearly presented as an “early preview” and offered at extra cost.
Peter has been quite busy thinking about the most ergonomic mobile gestures and came up with a complete UI shell design. While the last design report was describing the design of the lock screen and the home screen, we will discuss here about navigating within the different features of the shell.
We love containers. And, for most of us, containers means Docker. As RightScale observed in its RightScale 2018 State of the Cloud report, Docker's adoption by the industry has increased to 49 percent from 35 percent in 2017.
Phil Estes painted a different picture of container history at Open Source 101 in Raleigh last weekend, speaking from the perspective of someone who had a front row seat. To hear him tell it, this rise and success is a story filled with intrigue, and enough drama to keep a daytime soap opera going for a season or two.
A year and a half ago I wrote about a start-up working on dynamically-tuned, self-optimizing Linux servers. That company is now known as Concertio and they just launched their "AI powered" toolkit for IT administrators and performance engineers to optimize their server performance.
Concertio Optimizer Studio is their product making use of machine learning that aims to optimize Linux systems with Intel CPUs for peak performance by scoping out the impact of hundreds of different tunables for trying to deliver an optimal configuration package for that workload on that hardware.
This last week marked two years since the debut of Vulkan 1.0, you can see our our original launch article. My overworked memory missed realizing it by a few days, but it's been a pretty miraculous two years for this high-performance graphics and compute API.
Noralf Trønnes has spent the past few months working on generic FBDEV emulation for Direct Rendering Manager (DRM) drivers and this week he volleyed his third revision of these patches, which now includes a new in-kernel API along with some clients like a bootsplash system, VT console, and fbdev implementation.
The glxinfo utility is handy for Linux users in checking on their OpenGL driver in use by their system and related information. But it's not often that glxinfo itself gets updated, except that changed today with the release of mesa-demos-8.4.0 as the package providing this information utility.
Mesa-demos is the collection of glxinfo, eglinfo, glxgears, and utilities related to Mesa. With the Mesa-demos 8.4.0 it is predominantly glxinfo updates.
Igalia's Jose Maria Casanova Crespo sent out a set of patches today for fixes that allow for the enabling of the VK_KHR_16bit_storage extension within Intel's ANV Vulkan driver.
The patches are here for those interested in 16-bit storage support in Vulkan. This flips on the features for storageBuffer16BitAccess, uniformAndStorageBuffer16BitAccess, storagePushConstant16 and the VK_KHR_16bit_storage extension. This support is present for Intel "Gen 8" Broadwell graphics and newer. Hopefully the work will be landing in Mesa Git soon.
It's been a busy past week for open-source GPU compute with Intel opening up their new NEO OpenCL stack, Karol Herbst at Red Hat posting the latest on Nouveau NIR support for SPIR-V compute, and now longtime Nouveau contributor Pierre Moreau has presented his latest for SPIR-V Clover support.
Pierre has been spending about the past year adding SPIR-V support to Gallium3D's "Clover" OpenCL state tracker. SPIR-V, of course, is the intermediate representation used now by OpenCL and Vulkan.
We've known that Pengutronix developers had been working on i.MX8M / GC7000 graphics support within their Etnaviv open-source driver stack from initial patches posted in January. Those patches back at the start of the year were for the DRM kernel driver, but it turns out they have already got basic 3D acceleration working.
With Mir focusing on Wayland compatibility now, toolkits and other software making direct use of Mir's APIs can begin making use of any existing Wayland back-end instead. GTK4 drops the Mir back-end since the same can be achieved with the Wayland compatibility and now SDL is now making a similar move.
Going back to last October, Marek of AMD's open-source driver team has been working on ARB_compatibility support for Mesa with a focus on RadeonSI/Gallium3D. Today that work was finally merged.
The ARB_compatibility support allows use of deprecated/removed features of OpenGL by newer versions of the specification. ARB_compatibility is particularly useful for OpenGL workstation users where there are many applications notorious for relying upon compatibility contexts / deprecated GL functionality. But ARB_compatibility is also used by a handful of Linux games too.
AMD's Alex Deucher today sent in the first pull request to DRM-Next of AMDGPU (and Radeon) DRM driver feature material that will in turn be merged with the Linux 4.17 kernel down the road. There's some fun features for AMDGPU users coming with this next kernel!
First up, Linux is finally getting some WattMan-like functionality after it's been available via the Windows Radeon Software driver since 2016. WattMan allows for more fine-tuning of GPU clocks, voltages, and more for trying to maximize the power efficiency. See the aforelinked article for details but currently without any GUI panel for tweaking all of the driver tunables, this WattMan-like support needs to be toggled from the command-line.
Back in December was our most recent round of Windows Subsystem for Linux benchmarking with Windows 10 while since then both Linux and Windows have received new stable updates, most notably for mitigating the Spectre and Meltdown CPU vulnerabilities. For your viewing pleasure today are some fresh benchmarks looking at the Windows 10 WSL performance against Linux using the latest updates as of this week while also running some comparison tests too against Docker on Windows and Oracle VM VirtualBox.
With having around a Windows 10 installation this week for the latest Windows 10 WSL vs. Linux benchmarking, I also carried out some fresh benchmarks of the Radeon gaming performance between Windows 10 and Ubuntu Linux using the very latest drivers on each platform. This time around a Radeon RX 580 and RX Vega 64 were used for this benchmarking.
Earlier this week I delivered a number of benchmarks comparing Amazon EC2 instances to bare metal Intel/AMD systems. Due to interest from that, here is a larger selection of cloud instance types from the leading public clouds of Amazon Elastic Compute Cloud, Microsoft Azure, and Google Compute Engine.
Are you a developer who uses npm as the package manager for your JavaScript or Node.js code? If so, do not -- I repeat do not -- upgrade to npm 5.7.0. Nothing good can come of it. As one user reported, "This destroyed 3 production servers after a single deploy!"
So, what happened here? According to the npm GitHub bug report, "By running sudo npm under a non-root user (root users do not have the same effect), filesystem permissions are being heavily modified. For example, if I run sudo npm --help or sudo npm update -g, both commands cause my filesystem to change ownership of directories such as /etc, /usr, /boot, and other directories needed for running the system. It appears that the ownership is recursively changed to the user currently running npm."
A bug in npm (Node Package Manager), the most widely used JavaScript package manager, will change ownership of crucial Linux system folders, such as /etc, /usr, /boot.
Changing ownership of these files either crashes the system, various local apps, or prevents the system from booting, according to reports from users who installed npm v5.7.0. —the buggy npm update.
It was invented as a programming language, for use in web pages, that would run not on your web server but inside every web visitor’s browser.
An update for the popular Npm package manager used by many developers for JavaScript-based projects crashed Linux systems after changing the permissions for critical directories.
NPM – the biz behind the Node.js package management software used to wrangle JavaScript code and various related frameworks – on Thursday undid a code update less than 24 hours after it was issued because the software was messing with Linux file permissions.
The release of npm 5.7.0 on Wednesday – under the company's pre-release next distribution tag rather than its stable distribution tag – prompted reports of server crashes, application failures, and other undesirable behavior for Linux users.
A SECURITY BUG has been found in one of the most popular JavaScript package managers, which changes ownership of crucial Linux system folders, such as ‘/etc', ‘/usr', and ‘boot', without users' permission.
Found in the Node Package Manager, or npm as it is more commonly called, the bug caused the system to crash and also cause various local apps to crash, or even prevent the system from booting if the ownership of the files is changed.
This update also builds upon the major changes introduced in the release of Audacity 2.2.0 last year, as well that of the minor 2.2.1 update earlier this year.
A new version of the Geary email client for Linux desktops is available to download.
Although a (relative) minor update when compared to the huge Geary 0.12 release last year, Geary 0.12.1 is worthwhile.
The update solves a stack of crashes and server compatibility issues, while also updating translations in the interface and user manual to ensure as many people can use Geary as possible.
How many GNU/Linux photo managers do you know have a beautiful UI for browsing photos and organizing them into collections coupled with inbuilt editing tools and cloud integration? This one goes by the name of GNOME Photos.
GNOME Photos is a simple and yet elegant photo management app with which you can organize, share, and intuitively edit your photos on your Linux workstation. It features a file manager-like environment for easy navigation and cloud integration via GNOME Online Accounts.
Let’s deal with the issue of cost up front. Every single application featured in this article is available to download without payment. This, in itself, helps to keep IT costs within a tight budget. And cost can be a very important driver when seeking an IT solution for firms – particularly for freelancers, entrepreneurs, start-ups, small businesses, and educational establishments. Naturally, these types of people and organizations will have some sort of IT budget. From a business perspective, open source business applications won’t necessarily be zero cost. Using unfamiliar software entails training costs for a firm — the costs are not limited to time itself. And then there’s the expense of obtaining support for the software, or even hiring development time to customize certain aspects of the software to add additional functionality. Off-the-shelf software is unlikely to completely address a company’s needs. But if a proprietary solution is sought, it’s likely that this development will be more expensive.
It is sometimes thought that Linux software cannot rival Microsoft applications in a commercial setting because the strength of Linux comes from its price. In fact, Linux’s strength derives from other considerations such as flexibility, stability, security, cutting-edge technology, and ease of use. Additionally, the virtues of open source software are invaluable to commercial organizations whatever their size. With full access to source code, companies can easily develop extensions to the software, tailor made to their own specific needs and requirements. Moreover they are not reliant on the goodwill of a single vendor in order to do business: Linux is about freedom and choice and that is just as important to an organisation as to an individual.
On the Linux Desktop, there are quite a few choices for email applications. Each of these has their own pros and cons which should be weighed depending on one’s needs. Some clients will have MS Exchange support. Others do not. In general, because email is reasonably close to free (and yes, we can thank Hotmail for that) it has been a difficult place to make money. Without a cash flow to encourage developers, development has trickled at best.
Opera Software promoted today its upcoming Opera 52 web browser to the beta channel claiming that it has the faster ad blocker on the market compared to previous Opera release and Google Chrome.
One of the key highlights of the Opera 52 release will be the improved performance of the built-in ad blocker as Opera claims to have enhanced the string matching algorithm of the ad blocker to make it open web pages that contain ads much faster than before, and, apparently than other web browsers, such as Chrome.
You can view information about traffic coming and going from a given network interface using tcpdump. This diagnostic tool allows you to see packet information, that is where incoming packets come from and where outgoing packets are heading to on an interface, with some extra information. You can even save the output to a file to inspect later on. This article will demonstrate the simple examples of tcpdump.
University student Andrew Comminos wasn't too familiar with Direct3D or Wine development, but out of a desire for better World of Warcraft performance on Linux, he figured out the code-base and a means of enhancing the WineD3D code.
Thanks to the perf subsystem and APITrace, he was able to figure out World of Warcraft's rendering technique and how a GPU pipeline stall was happening. He ended up making use of OpenGL's ARB_buffer_storage extension to write a GPU heap allocator that performs much better for buffer maps.
This isometric tactical RPG blends in sci-fi, a Cold War that never ended and lots of spirited action. It’s powered by Unreal Engine 4 and has good Linux support.
I love gaming, but I have two main problems with being a gamer. First, I'm terrible at video games. Really. Second, I don't have the time to invest in order to increase my skills. So for me, a game that is easy to get started with while also providing an extensive gaming experience is key. It's also fairly rare. All the great games tend to have a horribly steep learning curve, and all the simple games seem to involve crushing candy. Thankfully, there are a few games like Tales of Maj'Eyal that are complex but with a really easy learning curve.
Proudly showing off its Game Boy aesthetics and high level of difficulty, Madcap Castle [Official Site] seeks to fill its own niche. I gave the game a whirl and have a few thoughts to share.
For those of you looking to fly across rooftops and solve puzzles in the dead of night, this new puzzle game may tickle your fancy. It was released earlier today with same-day Linux support and I have a few brief thoughts.
Since I am now in the business of photography and image processing (see my travel photography blog here), I thought it was time to finally get proper monitors and calibrate them. I wanted to do this with Open Source tools and use the calibration data for my Linux desktop, so I ordered a ColorHug2 colorimeter, which is Open Hardware compliant and all the tools are FOSS licensed. And from then on everything just went downhill.
In the past few years, it’s become clear that, outside of powering Android, Linux on mobile devices has been a resounding failure. Canonical came close, even releasing devices running Ubuntu Touch. Unfortunately, the idea of Scopes was doomed before it touched down on its first piece of hardware and subsequently died a silent death.
The next best hope for mobile Linux comes in the form of the Samsung DeX program. With DeX, users will be able to install an app (Linux On Galaxy—not available yet) on their Samsung devices, which would in turn allow them to run a full-blown Linux distribution. The caveat here is that you’ll be running both Android and Linux at the same time—which is not exactly an efficient use of resources. On top of that, most Linux distributions aren’t designed to run on such small form factors. The good news for DeX is that, when you run Linux on Galaxy and dock your Samsung device to DeX, that Linux OS will be running on your connected monitor—so form factor issues need not apply.
Mycroft is running through the last 24 hours of the crowdfunding campaign for its Mark II assistant. The machine looks awesome and offers similar functionality to other proprietary alternatives, but with none of the spying and leaking of personal data.
The Mark 2 will be delivered to backers at the end of this year, but you can enjoy the pleasures of giving orders to an AI right now by installing the Mycroft widget on Plasma courtesy of KDE hacker Aditya Mehra.
The quest to make Discover the most-loved Linux app store continues at Warp 9 speed! You may laugh, but it’s happening! Mark my words, in a year Discover will be a beloved crown jewel of the KDE experience.
With it we support recalculation of some fields based on others. An example that calculates sum, average, product, minimum and maximum of three numbers can be found in this youtube video.
I have started an RFC to integrate rsvg-rs into librsvg. rsvg-rs is the Rust binding to librsvg. Like the gtk-rs bindings, it gets generated from a pre-built GIR file.
With the pre-built images, and caching of Rust artifacts, Jordan was able to reduce the time for the "test on every commit" builds from around 20 minutes, to little under 4 minutes in the current iteration. This will get even faster if the builds start using ccache and parallel builds from GNU make.
Currently we have a problem in that tests are failing on 32-bit builds, and haven't had a chance to investigate the root cause. Hopefully we can add 32-bit jobs to the CI pipeline to catch this breakage as soon as possible.
A new report by MeriTalk has found that 73 percent of federal information technology leaders said that deriving data from legacy applications is vital in efforts that seek to advance government reform and use of shared services.
The collaboration offers a scalable pay-as-you-go platform for developers to manage apps and build virtualised environments
Red Hat Enterprise Linux is now globally available on Alibaba's Cloud Marketplace as a pay-as-you-go subscription model, enabling businesses to deploy and manage applications, build virtualised environments and create hybrid clouds.
Red Hat has unveiled a technology platform designed to help enterprise customers build applications to automate business decision management processes.
Red Hat Decision Manager 7 is built to support traditional or cloud-based information technology applications as well as simplify the development and implementation of rules-based platforms, the company said Wednesday.
Atos and Red Hat announced this morning "a new fully-managed cloud container solution - Atos Managed OpenShift (AMOS) - built on Red Hat OpenShift Container Platform". The press release adds, "Because AMOS is built on Red Hat OpenShift Container Platform, a container-centric hybrid cloud solution, it can deliver the flexibility customers seek from cloud-native and container-based applications."
Red Hat is perhaps best known for its Enterprise Linux platform, but it has been a player in the Business Process Management (BPM) suite for over a decade too.
On Feb. 21, Red Hat Decision Manager 7 was officially announced as the successor to the company's JBoss Business Rules Management System (BRMS) product. Red Hat first released BRMS back in May 2009 which itself was an evolution of the JBoss Rules Engine.
As part of Red Hat's CTO office chief security architect Mike Bursell has to be informed of security threats past, present and yet to come – as many as 10 years into the future.
The open source company has access to a wealth of customers in verticals including health, finance, defence, the public sector and more. So how do these insights inform the company's understanding of the future threat landscape?
Red Hat (NYSE: RHT) has released a platform that will work to support information technology applications and streamline the deployment of rules-based tools in efforts to automate processes for business decision management, ExecutiveBiz reported Thursday.
A year and a couple of months ago, Christian Schaller asked me to pivot a little bit from working full time on Fleet Commander to manage a new team we were building to work on client hardware enablement for Fedora and GNOME with an emphasis on upstream. The idea was to fill the gap in the organization where nobody really owned the problem of bringing up new client hardware features vertically across the stack (from shell down to the kernel), or rather, ensure Fedora and GNOME both work great on modern laptops. Part of that deal was to take over the bootloader and start working closer to customers and hardware manufacturing parnters.
My trip is getting really close, so I decided to upgrade my system to rawhide. Wait, what ? That is usually what everybody would tell you not to do. Rawhide has this reputation for frequent breakage, and who knows if my apps will work any given day. Not something you want to deal with while traveling.
Of course, we’re still sorely lacking volunteers who would really care about mentors.debian.net; the codebase is a pile of hacks upon hacks upon hacks, all relying on an old version of a deprecated Python web framework. A few attempts have been made at a smooth transition to a more recent framework, without really panning out, mostly for lack of time on the part of the people running the service. I’m still convinced things should restart from scratch, but I don’t currently have the energy or time to drive it… Ugh.
It's time for some more "Cooking With Linux" without a net, meaning the video you are about to watch was recorded live. Today, I'm going to install a new Linux distribution (new to me, anyhow) called Solyd XK.
So has Canonical been breaking rules with Ubuntu is 2017, or has it in been writing its own rulebook?
Back in April we saw an AWS-tuned kernel of Ubuntu launched, the move to cloud is unstoppable, clearly. We also saw Ubuntu version 17.04 released, with Unity 7 as the default desktop environment. This release included optimisations for environments with low powered graphics hardware.
Canonical, as I’ve not doubt you’re now fully aware of, plan to collect system data in new installs of Ubuntu 18.04 LTS on an opt-out basis. The data they want to collect — forgive the feverish proclamations of some — is rather anaemic compared to that combed by more lubricious operating systems.
A total of 26 security flaws were fixed in today's kernel update for Ubuntu 14.04 LTS systems and derivatives, including an out-of-bounds write vulnerability in Linux kernel's F2F (Flash-Friendly File System) file system, a use-after-free flaw in Linux kernel's ALSA PCM subsystem, and an integer overflow in Linux kernel's sysfs interface for the QLogic 24xx+ series SCSI driver.
Additionally, the kernel update addresses a use-after-free vulnerability in Linux kernel's SCTP protocol implementation, as well as a race condition in the LEGO USB Infrared Tower driver and a use-after-free vulnerability in the USB serial console driver, both allowing a physically proximate attacker to execute arbitrary code or crash the system with a denial of service attack.
The Ubuntu Kernel team promised at the beginning of the development cycle for Ubuntu 18.04 LTS (Bionic Beaver), Canonical's seventh long-term supported Ubuntu release to receive security and software update for the next five years, that they target the Linux 4.15 kernel series for the operating system.
Linux 4.15 had one of the longest development cycles in the history of kernels for GNU/Linux distributions, due to the numerous patches to mitigate the nasty Meltdown and Spectre security vulnerabilities for 64-bit architectures. It finally arrived at the end of January, so it took a month for Ubuntu Kernel team to implement it.
I was surprised to learn that up until this week, Mir's initial Wayland support didn't allow for windows of Wayland clients to be moved around the screen.
Fortunately, that has now been resolved with allowing window movement to be initiated by Wayland clients running on Mir. Now you can enjoy Qt, GTK apps, and even the Weston Terminal to be moved around the screen. Previously there was just server-side support for moving windows in Wayland while now is client-side support.
Some time ago our first release candidate builds for all flavours that released with xenial have been posted to the ISO tracker [1] into the 16.04.4 milestone.
As with each point-release, we would need volunteers to grab the ISOs of their flavour/flavours of choice and perform general testing. We obviously are mostly looking for regressions from 16.04.3, but please fill in any bugs you encounter (against the respective source packages on Launchpad). There is still time until the target release date on 1st of March, but for now we're not considering pulling in any more fixes besides ones for potential release-blockers that we encounter.
With enough luck the images that have been made available just now might be the ones we release on Thursday.
Following the release of Ubuntu 17.10 Artful Aardvark, Canonical CEO Mark Shuttleworth announced that Ubuntu 18.04, which would be an LTS release, is going to be called “Bionic Beaver.” While Beaver refers to a large, amphibious rodent with smooth fur and sharp teeth, Bionic is an ode to the robotics and artificial body parts.
We also conducted a little poll on Fossbytes regarding the name. About 80% visitors loved the codename. Others suggested names like Ballsy Baboon, Busy Bee, Bumble Bee, etc. This also brings us to the next step, i.e., exploring what could be the expected features of Ubuntu 18.04 LTS. In case you’re running an LTS release and planning to make perform the upgrade to 18.04, things are surely going to be pretty exciting for you.
The free version of Endless OS adheres to the free license policy. It includes preinstalled video and audio codecs that are free of patents. That can limit the types of files you can play. Non-included codecs are available for purchase at the Endless OS Store.
If you dislike managing frequent system updates and new release upgrades, you may have a special liking for Endless OS. As long as you have an Internet connection, the OS periodically checks for updates and automatically downloads and applies them in the background. You get a notification to restart.
Although this desktop design should be an ideal environment for touchscreens, Endless OS does not take to touch very well. This is a major feature weakness if you have a touchscreen laptop or desktop monitor.
Linux is in everything these days, and that means designers and engineers are crying out for a simple, easy-to-use module that simplifies the design of building a product to do something with Linux. The best example of this product category would probably be the Raspberry Pi Compute Module, followed by the C.H.I.P. Pro and its GR8 module. There are dozens of boards with Allwinner and Mali chips stuffed inside that can be used to build a Linux product, and the ‘BeagleBone on a Chip’ is a fantastic product if you need Linux and want to poke pins really, really fast.
Field-programmable gate arrays (FPGAs) have come of age. Once viewed as exotic and scary there are a number of FPGA boards targeting the maker market and among them is a new range of open source TinyFPGA boards.
The latest TinyFPGA board is the TinyFPGA BX board, an updated version of their B2 board, and it’s arriving soon on Crowd Supply.
China’s smartphone market has seen intense competition over the past few years with four local brands capturing more than 60 percent of sales in 2017.
Huawei Technologies, Oppo, Vivo and Xiaomi Technology recorded strong shipment growth on a year-on-year basis. But some market experts warned that Oppo and Vivo may see the growth of their shipments slow this year as users become more discriminating.
I ever so slightly regret the "upgrade" to Android. With a version less than the tablet, the UI changes are extremely noticeable, and the transition isn't as smooth. The device lags, and it just doesn't have enough processing power to give the necessary feel of goodness and elegance. On the other hand, you get tons of native applications that you can actually use, as opposed to the Ubuntu Touch idea. Shame really. For 'tis a compromise. If you ask me, I wholeheartedly embrace the M10 tablet upgrade, but on the phone, you might as well keep Ubuntu unless you need the device for serious use. If it's just an opportunistic call/SMS thing for when abroad and such, or to loan to friends, the original combo is adequate. If you need apps, then Android is the way to go, but do not except any miracles. It won't be speedy, and it won't be too pretty. All in all, an okay player.
It is silly attaching sentiments to software or hardware, but I do guess I will fondly remember the Ubuntu phone attempt as a noble idea to make something great and fun. I could have kept the device in its original state, perhaps, but in the end, it would have ended in a pile of ancient stuff you keep around for a decade until you decide you need to throw it away to leave room for fresh memories and less ancient stuff. Having a flawless Android experience would have helped soften the edge, but as it is, it remains the bittersweet attempt at what could have been a revolution. The end.
Nix 2.0 is now available as the latest major update to this functional package manager most commonly associated with the NixOS Linux distribution.
First post for quite some time. A side effect of being busy to get streamline our KubeVirt user experience.
KubeVirt v0.3.0 was not released at the beginnig of the month.
That release was intended to be a little bigger, because it included a large architecture change (to the good). The change itself was amazingly friendly and went in without much problems - even if it took some time.
But, the work which was building upon this patch in the storage and network areas was delayed and didn’t make it in time. Thus we skipped the release in order to let storage and network catch up.
In our increasingly collaborative world, open source technology is a top trend that is having a major impact on the development and implementation of cutting edge capabilities. Open source is when source code connected to a program is made freely available, giving users the opportunity to make modifications and to share with other users.
The common alternative to this is proprietary software, source code that remains under the strict control of an organisation, team or individual, ensuring that the integral code remains private and controlled by its owner.
Building an enterprise-grade big data application with open source components is not easy. Anybody who has worked with Apache Hadoop ecosystem technology can tell you that. But the folks at DataTorrent say they’ve found a way to accelerate the delivery of secure and scalable big data applications with Apoxi, a new framework they created to stitch together major open source components like Hadoop, Spark, and Kafka, in an extensible and pluggable fashion.
Mozilla Firefox is an open source project, so anyone can take its code, modify it, and release a new browser. That’s what Waterfox, Pale Moon, and Basilisk are—alternative browsers based on the Firefox code. But we recommend against using any of them.
This is the first line of our Community Participation Guidelinesââ¬Å —ââ¬Å and an nudge to keep empathy at center when designing response processes. Who are you designing for? Who is impacted? What are their needs, expectations, dependencies, potential bias and limitations?
Meet Kelly Davis, the Manager/Technical Lead of the machine learning group at Mozilla. His work at Mozilla includes developing an open speech recognition system with projects like Common Voice and Deep Speech (which you can help contribute to). Beyond his passion for physics and machine learning, read on to learn about how he envisions the future of AI, and advice he offers to young people looking to enter the field.
While the world celebrates athletic excellence, we’re taking a moment to share some of the amazing Internet champions that help build, support and share Firefox.
The National Science Foundation and Mozilla recently announced the first round of winners from their Wireless Innovation for a Networked Society (WINS) challenges—$2 million in prizes for "big ideas to connect the unconnected across the US". According to the press release, the winners "are building mesh networks, solar-powered Wi-Fi, and network infrastructure that fits inside a single backpack" and that the common denominator for all of them is "they're affordable, scalable, open-source and secure."
The legacy AirMozilla platform will be decommissioned later this year. The reasons for the change are multiple; however, the urgency of the change is driven by deprecated support of both the complex back-end infrastructure by IT and the user interface by Firefox engineering teams in 2016. Additional reasons include a complex user workflow resulting in a poor user experience, no self-service model, poor usability metrics and a lack of integrated, required features.
Every Monday and Thursday around 3pm I check dev-telemetry-alerts to see if there have been any changes detected in the distribution of any of the 1500-or-so pieces of anonymous usage statistics we record in Firefox using Firefox Telemetry.
More than a month since their public discloser the nasty Meltdown and Spectre security vulnerability have now been fixed for various BSD operating systems including FreeBSD and OpenBSD.
FreeBSD announced last month that it was made aware of the Spectre and Meltdown security vulnerabilities discovered by various researchers from Google's Project Zero, Graz University of Technology, Cyberus Technology, and others in late December 2017 to have time to fix them for their BSD-powered operating system.
You've been appointed the DevOps champion in your organisation: congratulations. So, what's the most important issue that you need to address?
The open educational resources (OER) movement has been gaining momentum over the past few years, as educators—from kindergarten classes to graduate schools—turn to free and open source educational content to counter the high cost of textbooks.
Over the past year, the pace has accelerated. In 2017, OERs were a featured topic at the high-profile SXSW EDU Conference and Festival. Also last year, New York State generated a lot of excitement when it made an $8 million investment in developing OERs, with the goal of lowering the costs of college education in the state.
David Usinski, a math and computer science professor and assistant chair of developmental education at the State University of New York's Erie Community College, is an advocate of OER content in the classroom. Before he joined SUNY Erie's staff in 2007, he spent a few years working for the Erie County public school system as a technology staff developer, training teachers how to infuse technology into the classroom.
Lattice structures are integral to 3D printed designs, and Aaron Porterfield, an industrial designer at additive manufacturing service bureau FATHOM, has developed Crystallon, an open source project for shaping them into structures.
California-based FATHOM, which expanded its on-site managed services and announced important partnerships with Stratasys and Desktop Metal last year, is introducing a fascinating new open source project called Crystallon, which uses Rhino and Grasshopper3D to create lattice structures. FATHOM industrial designer Aaron Porterfield, also an Instructables member, developed the project as an alternative to designing lattices with commercially available software.
He joined the company’s design and engineering team three years ago, and is often a featured speaker for its Design for Additive Manufacturing (DfAM) Training Program – and as the project developer, who better to explain the Crystallon project?
As technology advancements continue, the core technology must be updated with new ideas that break paradigms and enable innovation. Linux* systems are based on two main core technologies: the Linux Kernel project and the GNU C Library (GLIBC) project. The GLIBC project provides the core libraries for the GNU system and GNU/Linux systems, as well as many other systems that use Linux as the kernel. These libraries provide interfaces that allow programs to manipulate and manage files, memory, threads and other operating system objects. The release of GLIBC version 2.27 marks a new step on the Linux technology roadmap, with major new features that will allow Linux developers to create and enhance applications. This blog post describes several key new features and how to use them.
Released at the beginning of February was Glibc 2.27 and it's comprised of a lot of new features and performance improvements. But what's the best of Glibc 2.27?
One of the Clear Linux developers at Intel, Victor Rodriguez Bahena, put out a blog post this week outlining some of the most exciting features for this GNU C Library update. While most Linux distributions tend to be conservative in rolling out new GLIBC updates, Clear Linux is already on v2.27 and even had back-ported some of the performance patches prior to the official 2.27 debut.
Linux developers and enthusiasts on x86_64 have long enjoyed the ability to use the -march=native option for having the GCC compiler attempt to auto-detect the CPU and set the appropriate microarchitecture flags. That support is finally being offered up for ARM with GCC 8.
This week -march=native now works on AArch64 as well as for ARM in general too.
There are two main reasons to archive all of the digital evidence that you use an investigation: to preserve it in case it is removed from its original source, and to prove to your audience that the material (if it has been removed) really existed as you present it. Screenshots can be easily forged, so it is vital that you find a way to retain the materials in a way that shows that you did not have the opportunity to modify the content.
For passengers, the cumbersome boarding process—watching people insist that yes, this bag will fit in the overhead bin, it has before!—means more time spent jammed in a too-small seat. For airlines, it means lost revenue. In an industry with tight profit margins, every moment a plane spends on the tarmac is time it’s not making money.
Interestingly, this isn't DHL's first clusterfuck rodeo. Six years ago, Burger King experienced similar issues after entrusting their supply chain to the shipping company.
former Microsoft retail manager is suing the software giant for making her work long hours without overtime and breaks.
Her lawsuit, set to be heard by a US district court in northern California, alleged Redmond violated labor laws by unfairly classifying her, a retail worker, as a professional salaried employee to stiff her on overtime pay and skirt other requirements.
According to her complaint, filed this month, the alleged violations occurred from 2015 to May of last year when plaintiff Jennifer Sullivan worked for Microsoft as the manager of a sales kiosk in Roseville, California.
One of the best-loved mobile apps of the past decade, Swype, has been given the bullet. Parent company Nuance confirmed it will no longer develop the letter-tracing keyboard, which will disappear from the Apple and Google app stores.
The new Emergency SOS feature released by Apple for the iPhone is the one to blame for no less than 1,600 false calls to 911 since October, according to dispatchers.
And surprisingly, emergency teams in Elk Grove and Sacramento County in California say they receive at least 20 such 911 calls every day from what appears to be an Apple service center.
While it’s not exactly clear why the iPhones that are probably brought in for repairs end up dialing 911, dispatchers told CBS that the false calls were first noticed in the fall of the last year. Apple launched new iPhones in September 2017 and they went on sale later the same month and in November, but it’s not clear if these new devices are in any way related to the increasing number of accidental calls to 911.
German carmaker BMW (BMWG.DE) said on Friday it would recall 11,700 cars to fix their engine management software after it discovered that the wrong programming had been installed on its luxury 5- and 7-Series models.
“In the course of internal tests, the BMW Group has discovered that a correctly developed software update was mistakenly assigned to certain unsuitable model-versions,” the company said in a statement.
A former Tesla employee claims the company knowingly sold defective cars, often referred to as “lemons,” and that he was demoted and eventually fired after reporting the practice to his superiors. He made these allegations in a lawsuit filed in late January in New Jersey Superior Court under the Conscientious Employee Protection Act (CEPA).
The former employee, Adam Williams, worked for Tesla as a regional manager in New Jersey dating back to late 2011. While there, he says he watched the company fail “to disclose to consumers high-dollar, pre-delivery damage repairs” before delivering its vehicles, according to the complaint. Instead, he says the company sold these cars as “used,” or labeled as “demo/loaner” vehicles.
Communication is a two-way street. Thanks to quantum mechanics, that adage applies even if you’ve got only one particle to transmit messages with.
ETH scientists have been able to prove that a protein structure widespread in nature – the amyloid – is theoretically capable of multiplying itself. This makes it a potential predecessor to molecules that are regarded as the building blocks of life.
Long regarded as a biological aberration, amyloids are fibrous aggregates of short protein fragments. Amyloids have a bad reputation because they are thought to be the cause of multiple neurodegenerative diseases, including Alzheimer's, Parkinson's and Creutzfeldt–Jakob disease.
Researchers have demonstrated that tiny micrometer-sized crystals—just barely visible to the human eye—can "walk" inchworm-style across the slide of a microscope. Other crystals are capable of different modes of locomotion such as rolling, flipping, bending, twisting, and jumping. In the future, these moving crystals may open the doors to the development of crystal-based robots.
The announcement comes the day after Science|Business reported that NSF had recalled the directors of its offices in Brussels and Beijing, citing budget cuts in internal announcements of the change (the third office, in Tokyo, was already without a director). The article notes that the Brussels office’s accomplishments include brokering a science cooperation agreement that makes it easier for US researchers to partner with international colleagues under the Horizon 2020 funding program, and introducing European researchers to US funding opportunities. Altogether, the three offices cost NSF about $1 million per year to run, the article estimates.
Inside a small laboratory in lush countryside about 50 miles north of New York City, an elaborate tangle of tubes and electronics dangles from the ceiling. This mess of equipment is a computer. Not just any computer, but one on the verge of passing what may, perhaps, go down as one of the most important milestones in the history of the field.
Remarkably, living cells are able to package a jumble of DNA over two meters in length into tidy, tiny chromosomes while preparing for cell division. However, scientists have been puzzled for decades about how the process works. Researchers from the Kavli Institute of Delft University and EMBL Heidelberghave now isolated and filmed the process, and witnessed in real time how a single protein complex called condensin reels in DNA to extrude a loop. By extruding many such loops in long strands of DNA, a cell effectively compacts its genome so it can be distributed evenly to its two daughter cells. The scientists published their findings in Science.
A new technique developed by neuroscientists at the University of Toronto Scarborough can, for the first time, reconstruct images of what people perceive based on their brain activity gathered by EEG.
The technique developed by Dan Nemrodov, a postdoctoral fellow in Assistant Professor Adrian Nestor's lab at U of T Scarborough, is able to digitally reconstruct images seen by test subjects based on electroencephalography (EEG) data.
I was considering upgrading my desktop with a new CPU and motherboard, but new, comparably priced CPUs have about the same clock speed as my 4-year-old model.
With China’s biotech sector on the rise, changes are afoot at the agency tasked with regulating the country’s pipeline of new drugs.
In 2014, the class of drugs known as “opioids” were involved in more than 28,000 deaths, or 61 percent of all drug overdose deaths, according to the Centers for Disease Control. The rate of opioid overdoses has tripled since the year 2000. Recent data show two different but related trends: an increase in so-called “illicit” opioid overdoses, largely due to heroin, and then this 15-year increase in overdose deaths involving prescription opioid pain relievers. Those drugs, like oxycodone and hydrocodone, or brand names like OxyContin and Vicodin, account for more than 16,000 fatal overdoses each year. The CDC says they’re comfortable using the term “epidemic” to describe the crisis.
A runaway cow that avoided captivity for weeks died on Thursday after it was caught and put on a truck to be taken to a farm, a local official said.
The red Limousin beef cow fled on January 23 as it was to be transported to a slaughterhouse. It gained celebrity status as it defended its life and freedom, tricking searchers, swimming from island to island, and roaming a lake-filled region near Nysa, in southwestern Poland.
CARB-X , a global private-public partnership for research on antimicrobial resistance, this week announced its 2018 rounds of funding for research on “antibiotics, vaccines, diagnostics, devices and other life-saving products to respond to the threat of drug-resistant bacteria.”
The white paper – entitled ‘Reforming Biopharmaceuticals Pricing at Home and Abroad’ – was produced by the Council of Economic Advisers, a politically-appointed group which is part of the Executive Office of the President. It fleshes out for the first time the US executive’s approach to lowering the high drug prices paid by US patients – a cause which Donald Trump has repeatedly expressed his commitment to.
An outbreak of typhoid fever in Pakistan is being caused by an extensively drug resistant “superbug” strain, a sign that treatment options for the bacterial disease are running out, scientists said on Tuesday.
Researchers from Britain’s Wellcome Sanger Institute who analyzed the genetics of the typhoid strain found it had mutated and acquired an extra piece of DNA to become resistant to multiple antibiotics.
The attack worked by exploiting two separate vulnerabilities: one in Tinder and another in Facebook’s Account Kit system, which Tinder uses to manage logins. The Account Kit vulnerability exposed users’ access tokens (also called an “aks” token), making them accessible through a simple API request with an associated phone number.
Hackers are using SSH brute-force attacks to take over Linux systems secured with weak passwords and are deploying a backdoor named Chaos.
Attacks with this malware have been spotted since June, last year. They have been recently documented and broken down in a GoSecure report.
Now that the dust is beginning to settle around the Meltdown and Spectre mitigation techniques on the major operating systems, in the weeks and months ahead we are likely to see more performance optimizations come to help offset the performance penalties incurred by mitigations like kernel page table isolation (KPTI) and Retpolines. This week a new patch series was published that may help with KPTI performance.
The identity management system is a central part of any IT department. As long as it is working, few people will take notice of its existence and consequently, it is often not optimized to improve the quality of the system. With 16 years of experience in developing a central identity management (IdM) server solution, Univention identified ten steps on how to improve your IdM, no matter whether you are running your IdM on premises or in the cloud such as UCS on AWS. Let us go through them.
The Stuxnet worm that targeted Iran's nuclear program almost a decade ago was a watershed piece of malware for a variety of reasons. Chief among them, its use of cryptographic certificates belonging to legitimate companies to falsely vouch for the trustworthiness of the malware. Last year, we learned that fraudulently signed malware was more widespread than previously believed. On Thursday, researchers unveiled one possible reason: underground services that since 2011 have sold counterfeit signing credentials that are unique to each buyer.
The OurMine hacking group recently used DNS poisoning to attack WikiLeaks and take over its web address. Learn how this attack was performed from expert Nick Lewis.
Google researchers informed Intel of flaws in its chips in June. The company explained in its own letter to lawmakers that it left up to Intel informing the government of the flaws.
Intel said that it did not notify the government at the time because it had “no indication of any exploitation by malicious actors,” and wanted to keep knowledge of the breach limited while it and other companies worked to patch the issue.
The company let some Chinese technology companies know about the vulnerabilities, which government officials fear may mean the information was passed along to the Chinese government, according to The Wall Street Journal.
As iTWire reported recently, Intel faces a total of 33 lawsuits over the two flaws. Additionally, the Boston law firm of Block & Leviton is preparing a class action lawsuit against Intel chief executive Brian Krzanich for allegedly selling a vast majority of his Intel stock after the company was notified of the two security flaws and before they became public.
Current and former U.S. government officials have raised concerns that the government was not informed of the flaws before they became public because the flaws potentially held national security implications. Intel said it did not think the flaws needed to be shared with U.S. authorities as hackers [sic] had not exploited the vulnerabilities.
The S3 bucket used by the LA Times is apparently world-writable and an ethical hacker [sic] appears to have left a warning in the repository, warning of possible misuse and asking the owner to secure the bucket.
When an Oregon science fiction writer named Charity tried to log onto Facebook on February 11, she found herself completely locked out of her account. A message appeared saying she needed to download Facebook’s malware scanner if she wanted to get back in. Charity couldn’t use Facebook until she completed the scan, but the file the company provided was for a Windows device—Charity uses a Mac.
As Tinder uses Facebook profile pics for its users to lure in a mate or several, the 'dating' app is somewhat tied to the social network. When a swipe-hungry Tinder user comes to login to their account they can either do so via Facebook or use their mobile number.
When a mass shooting occurs, politicians leap into the void with plenty of ideas of how to fix it. They can't -- or won't -- fix it, but they're more than willing to sacrifice other Constitutional amendments to keep the Second Amendment intact. Kentucky Governor Matt Bevins was the first to fill the void with garbage following the latest school shooting by blaming violent video games, despite there being no evidence linking violent acts to violent video games.
Now it's Donald Trump blaming school shootings on the First Amendment. During a discussion with Florida legislators (video here), Trump suggested doing something we've been doing for years.
In a White House meeting held with lawmakers on the theme of school safety, President Donald Trump offered both a direct and vague call to action against violence in media by calling out video games and movies.
"We have to do something about what [kids are] seeing and how they're seeing it," Trump said during the meeting. "And also video games. I'm hearing more and more people say the level of violence on video games is shaping more and more people's thoughts."
Trump followed this statement by referencing "movies [that] come out that are so violent with the killing and everything else." He made a suggestion for keeping children from watching violent films: "Maybe they have to put a rating system for that." The MPAA's ratings board began adding specific disclaimers about sexual, drug, and violent content in all rated films in the year 2000, which can be found in small text in every MPAA rating box.
Exclusive: Selective outrage over civilian suffering in Syria – hyping Syrian government abuses while downplaying the effects of U.S.-led Coalition air strikes – undermines the legitimacy of human rights advocacy, argues Jonathan Marshall.
[...]
But the recent situation in Eastern Ghouta is unfortunately not as unique as recent media accounts suggest. Just last month, the respected, independent monitoring group Airwars reminded us that U.S.-led Coalition air strikes on the Syrian city of Raqqa created many more victims with the same destructive tactics of “siege, bomb and evacuate.”
In just one incident in March 2017, Coalition bombers killed as many as 400 civilians at a school near Raqqa, where hundreds of women and children were taking shelter from the war.
I was teaching the day the airplanes hit the World Trade Center. It was the second meeting of “The Communist Manifesto for Seminarians,” a course for my fellow graduate students. By the time I got to class, both towers had collapsed. A few hours later, Building 7 came down as well. We dispensed with a planned discussion about what Marxists mean by “idealism” and “materialism” and talked instead about the meaning of this particular example of the “propaganda of the deed.”
The armed officer stationed at Marjory Stoneman Douglas High School in Parkland, Fla., resigned Thursday after an internal review found he did not enter the school during last week’s deadly shooting.
Broward County Sheriff Scott Israel announced Deputy Scot Peterson chose to resign after Israel suspended him without pay.
Janine Jackson: Many were stirred by the sight of North and South Korean athletes parading together at the Winter Olympics opening ceremony in Pyeongchang. And that’s a big problem, says Vice President Mike Pence, who declared, to some media applause, that he would “seize every opportunity” to stop North Korea from using the games as an opportunity for propaganda.
There’s something funny about decrying nationalist propaganda at the Olympics, but corporate media coverage of Korea is funny in a lot of ways. When the Washington Post writes gibberish about Pence’s plan to “fight propaganda with some no-nonsense spin of his own,” that’s of a piece with coverage in which North Korea and Kim Jong-un are cartoon demons: the definition of an official enemy. It all makes sense for those who require such an enemy. But what about those of us who don’t sell weapons, or appreciate threats of nuclear war?
Joining us now to talk about all of this is Christine Hong, associate professor at the University of California, Santa Cruz, and an executive board member of the Korea Policy Institute. She joins us now by phone from Santa Cruz. Welcome to CounterSpin, Christine Hong.
Like much of Generation X, “Mister Rogers’ Neighborhood” was a childhood TV staple. Even as I grew older and came to see the world both inside my home and beyond its front door as considerably harsher, Mister Rogers’ gentle affirmations remained steady and true. Thus I found myself watching the series long after I matured out of its target audience, probably because his central message was ageless. “‘You’ve made this day a special day, by just your being you,” he says at the end of every show. “There’s no person in the whole world like you. And I like you just the way you are.”
Teens' recent fight for gun control is awesome and inspiring, but don't forget that it's exactly what young black activists have been doing.
The U.S. Supreme Court on Wednesday refused to broaden protections for corporate insiders who call out misconduct, ruling they must take claims of wrongdoing to the Securities and Exchange Commission in order to be shielded against retaliation.
Ecuador blamed Britain on Friday for upending its efforts to mediate a solution for Wikileaks founder Julian Assange, who has lived in the Ecuadorean embassy in London since June 2012 to avoid extradition.
Foreign Minister Maria Fernanda Espinosa said Ecuador had hoped to forge an agreement with Britain on Australian-born Assange, who entered the embassy to avoid being sent to Sweden to face allegations of sex crimes, which he has denied.
Ecuador's efforts to negotiate the release of WikiLeaks founder Julian Assange from its London embassy have failed, the South American country's foreign minister admitted Friday.
"On the issue of mediation, I have to say very honestly that it has not been successful because two parties are needed to mediate. Ecuador is willing, by not necessarily the other party," said Foreign Minister Maria Fernanda Espinosa, referring to Britain.
Ecuador says the country's latest efforts to negotiate the departure of WikiLeaks founder Julian Assange from its London embassy have failed.
Foreign minister Maria Fernanda Espinosa said the UK was unwilling to take part in talks about his release.
Mr Assange, 46, has been staying at the country's London embassy since 2012 where he was granted political asylum.
Last week, the arrest warrant against him was upheld meaning as soon as he leaves the embassy he will be detained.
Ecuador’s foreign minister has blamed Britain over the stalemate surrounding WikiLeaks publisher Julian Assange following rekindled attempts to secure his safe exit from Quito’s embassy in London.
“On the issue of mediation, I have to say very honestly that it has not been successful because two parties are needed to mediate,” Maria Fernanda Espinosa, the Ecuadorian foreign minister, told reporters Friday with respect to the Assange case, Agence France-Presse translated.
Talks between the UK and Ecuador over the future of Julian Assange at its London embassy have broken down, the South American country’s foreign minister has said.
Maria Fernanda Espinosa suggested British officials had been unwilling to negotiate over the Wikileaks founder’s potential release
Ms Espinosa said of the failed talks: “To mediate you need two parties, Ecuador is willing, but not necessarily the other party.”
Ecuador said it would continue to protect Mr Assange’s rights, however there was a risk to his physical and psychological well being after spending nearly six years in the building as a “refugee”.
The country has assessed more than 30 similar cases in a bid to break the deadlock, including that of British-Iranian citizen Nazanin Zaghari-Ratcliffe, who is in prison in Iran accused of spying.
Whales, some sharks and other marine species such as rays are increasingly at risk from microplastics in the oceans, a new study suggests.
Species such as baleen whales and basking sharks, which feed through filtering seawater for plankton, are ingesting the tiny particles of indigestible plastic which now appear to permeate oceans throughout the world. Some of these species have evolved to swallow hundreds or even thousands of cubic metres of seawater a day, but taking in microplastic can block their ability to absorb nutrients, and may have toxic side-effects.
The new study, published in the journal Trends in Ecology and Evolution, advises more research on the megafauna of the oceans, as the effects of microplastics on them is currently not well understood. Scientists have found, for instance through examining the bodies of beached whales, large pieces of plastic in the guts of such creatures, but the effect of microplastics, though less obvious, may be just as harmful.
Every February an extraordinary research project resumes in the southwestern corner of California’s Central Valley. It takes place inside a series of huge cages that span 20 acres by a vast pistachio grove. Each cage is shaped like a rectangular warehouse but is made entirely of extremely fine netting, pulled tight and straight along strong, narrow beams to form see-through walls and ceilings. The experiment is run by Gordon Wardell, director of bee biology for the Wonderful Company, the largest almond grower in the world. For the past eight years Wardell has been using these cages to develop an alternative insect to replace the honeybee.
Annual production of the raw material is only around 100,000 tonnes primarily as a byproduct of nickel and copper mining with more than 60% coming from the Democratic Republic of the Congo, where fears about political instability and the challenges of ethical sourcing combine to supercharge supply concerns.
Lewis, also a principal investigator at the federally funded Joint Center for Artificial Photosynthesis, wants his artificial leaf to outperform nature’s best plants. Plants, for all their success, are actually terrible at converting sunlight into energy. Even if you don’t know anything about how photosynthesis works, you can tell from the leaves’ green color that totally efficient energy conversion might not be a plant’s top priority (black leaves would be much better at absorbing the sun’s rays). The green chloroplasts in leaf cells function well enough for a plant’s needs. They perform complex chemical reactions that, fueled by the sun’s energy, turn carbon dioxide and water into the energy-storing sugars needed for such activities as surviving and reproducing. When all is said and done, the most efficient plants convert barely 1 percent of the incoming sunlight into stored energy.
The president of the University of Wisconsin System is trying to reconcile a well-funded assault on public institutions with the state’s deep blue sea of support for accessible education.
Three major business groups alone—the US Chamber of Commerce, the National Association of Realtors, and the Business Roundtable—spent $56 million in the last three months of 2017 lobbying Congress to give them a massive tax cut. According to Public Citizen, 6,243 lobbyists—more than half of the total number of active lobbyists in DC—worked on the bill, which works out to 11 for each and every lawmaker in Congress.
Kylie Jenner tweets she hasn’t been using the app lately
A glitch [sic] in J.P. Morgan's online banking accounts rerouted customers to other clients' accounts, revealing personal information.
A whopping $21 trillion was found to be missing from the US federal budget as of this past year.
This week, Cooke Aquaculture, a Canadian fish farm corporation, explicitly threatened to use the North American Free Trade Agreement (NAFTA) to sue the U.S. government in a private tribunal if lawmakers in Washington state enact a proposed ban on the farming of Atlantic salmon, an invasive species, in the state’s waters.
The proposed policy follows the escape of over 200,000 Atlantic salmon from the company’s fish farms in the Puget Sound last August -- the latest in a series of such accidents, sparking outcry from Indigenous groups, environmentalists, and fishing communities that depend on the Puget Sound ecosystem. Washington’s proposed ban on Atlantic salmon farming would apply to all companies, domestic and foreign. Cooke Aquaculture has threatened to sue the U.S. for $76 million, plus lost anticipated profits, if the ban is enacted, using NAFTA’s controversial investor-state dispute settlement (ISDS) system. The company’s press release bluntly states: “If the Legislature approves a ban on our operations, Cooke will seek to recover our confiscated investment, plus costs and lost profits, through mandatory arbitration against the State of Washington under Chapter 11 of the North American Free Trade Agreement.”
The problem with the Brooks/Pinker story is that we expect the economy/people to get richer through time. After all, technology and education improve. In the ’50s, we didn’t have the Internet, cell phones and all sorts of other goodies. In fact, at the start of the ’50s, we didn’t even have the polio vaccine.
The question is not whether we are better off today than we were 60 years ago. It would be incredible if we were not better off. The question is by how much.
In the ’50s, wages and incomes for ordinary families were rising at a rate of close to 2 percent annually. In the last 45 years, they have barely risen at all.
Nine years into recovery from the Great Recession, labor-productivity-growth rates remain near historic lows across many advanced economies. Productivity growth is crucial to increase wages and living standards, and helps raise the purchasing power of consumers to grow demand for goods and services. Therefore, slowing labor productivity growth heightens concerns at a time when aging economies depend on productivity gains to drive economic growth. Yet in an era of digitization, with technologies ranging from online marketplaces to machine learning, the disconnect between disappearing productivity growth and rapid technological change could not be more pronounced.
In an alternative world, it is an intriguing possibility. A series of stripped-down regional infrastructure projects to rival China’s Belt and Road Initiative, the trillion-dollar program of ‘New Silk Road’ superhighways, connecting the country with Asia, Africa, the Middle East, Europe and Latin America.
When you’re having a picnic, the last thing you want is ants, and when you’re a billionaire venture capitalist, it’s equally irksome to have plebeians accessing the beach next to your 89 acres of land. On Thursday, Sun Microsystems co-founder Vinod Khosla filed a 151-page petition with the Supreme Court in order to fight to keep the public off the shoreline near his property.
China's Zhejiang Geely Holding Group is now the top shareholder in German automaker Daimler, the parent of Mercedes Benz, with a 9.69% stake, adding another European auto asset to its growing portfolio.
The shares were purchased on behalf of the Chinese automotive group's chairman, Li Shufu, according to a filing by Daimler, and are worth around $9 billion at current prices. Li has displaced a Kuwaiti sovereign wealth fund as the German automaker's top shareholder.
The Chinese government on Friday seized control of Anbang Insurance Group Co Ltd and said its chairman had been prosecuted, dramatically illustrating Beijing’s willingness to curtail big-spending conglomerates as it cracks down on financial risk.
Anbang [ANBANG.UL] had violated laws and regulations which “may seriously endanger the solvency of the company”, the China Insurance Regulatory Commission (CIRC) said in a statement announcing the seizure, without giving details.
According to the new rules, developers that use Twitter's API will no longer be able to let users:
- Simultaneously post identical or substantially similar content to multiple accounts.
- Simultaneously perform actions such as Likes, Retweets, or follows from multiple accounts
- Use of any form of automation (including scheduling) to post identical or substantially similar content, or to perform actions such as Likes or Retweets, across many accounts that have authorized your app (whether or not you created or directly control those accounts) is not permitted
Paul Manafort, one-time Trump campaign manager, has been indicted for cooking his books in order to qualify for a loan; prosecutors secured the evidence of his fraud by searching his email, which contained attachments that clearly showed him doctoring his financial statements and then emailing them to his co-conspirator Richard Gates so Gates could convert them to PDFs, which literally just involves selecting "Save As..." and choosing "PDF."
It’s unclear why Masterson was removed, but the timing is likely to be a significant blow to the ongoing effort to secure voting machines against hacking. Less than nine months remain before the 2018 elections, and several types of voting machines remain vulnerable to remote hacking through remote-access software attacks and other vulnerabilities.
Masterson has been a popular figure among state election officials, many of whom have praised his expertise and leadership on cybersecurity issues and expressed displeasure at his pending departure. The agency was created by Congress in 2002 to assist states in complying with federal election standards.
These kinds of delays and communication snafus show a system that operates at a snail’s pace relative to the speed of cyber probes and attacks. To make matters worse, in many states — and in Congress, as seen in the just-passed federal budget — there’s no willingness to spend the funds needed to modernize voting in the United States.
Following a federal indictment of Russians accused of meddling in the U.S election, a former CIA director on Friday said the U.S. “probably” meddles in other countries’ elections, as well.
Conspiracy theories about the teen survivors of the school shooting in Parkland, Florida, have begun making the inevitable rounds, and on Wednesday, one of them landed the coveted spot of YouTube’s top trending video.
The video in question suggested that 17-year-old David Hogg, a student at Marjory Stoneman Douglas High School who has appeared on TV news programs over the last few days advocating for stricter gun laws, is an actor. (He is not.) By the time the video was removed later on Wednesday, Motherboard reported it had amassed more than 200,000 views. And that was just one of the videos hawking false theories that aimed to defame the mass-shooting survivor and budding gun-reform activist.
A former adviser to Donald Trump plans to enter a deal Friday afternoon to cooperate with special counsel Robert Mueller, according to a federal court filing.
During the interview, Trump’s first explanation for having shared the anti-Muslim videos was that they were a depiction of “radical Islamic terror.” He went on to explain that, even though he had effectively promoted the propaganda campaign of Britain First, a far-right and ultra-nationalist political group, this was hardly worth mentioning and was “not a big story” in the US. Finally, Trump explained, he should not be held responsible for these hateful tweets because he had not known that they had been posted by racists. Morgan asked Trump for an apology so that the British could get to know “the real you.” As Mackey reported, Trump “stammered out something less than contrition,” saying, “If you’re telling me that’s a horror p – people, horrible racist people, horror – I would certainly apologize, if you’d like me to do that.” But, Mackey wrote, “instead of going on to actually offer an apology, Trump returned to excusing himself, adding, ‘I know nothing about them.’”
Remember that Kendall Jenner Pepsi ad that suggested you could solve police brutality with a cold refreshing soft drink? How about the recent Super Bowl commercial wherein Ram Trucks uncovered the hidden secret that a famous Martin Luther King Jr. speech was actually about buying a Ram? Both were widely mocked, which makes it seem like we don't fall for manipulative advertising anymore. But brands have realized this, and are taking advantage of a huge blind spot to hide their sketchy practices.
PEOPLE who worry about Donald Trump’s presidency worry especially about how he might respond to a national-security crisis. Now they know. American intelligence chiefs have long viewed Russia’s campaign to discredit and influence America’s elections as a security threat. And the 16 indictments unveiled by Robert Mueller, the special counsel in the case, imply that the threat is more long-standing, sophisticated and effective than was commonly understood. Such clear evidence of foreign interference would normally constitute a moment for the commander-in-chief to reassure an anxious nation that the attack—in an election year, no less—would be repulsed. But that was not Mr Trump’s response.
The president made no formal comment on the indictments, yet his Twitter feed suggested they stirred in him a range of powerful emotions. He at first rejoiced that Mr Mueller had not accused him of complicity in the Russian sabotage: “The Trump campaign did nothing wrong—no collusion!” Then he fretted that it was getting so much attention as to cast doubt on his legitimacy. In subsequent tweets the president lambasted the FBI for spending too much time investigating the attack. It could otherwise have prevented a recent massacre of schoolchildren in Florida, he wrote. He then attacked his national-security adviser, H.R. McMaster, for failing to defend him more robustly and Barack Obama for failing to stop the Russians sooner. He claimed never to have dismissed the Russian campaign as a hoax, though he has done so many times. At no point did Mr Trump express any concern for the safety of American democracy.
The latest silly attempt by right-wing media barons to discredit Jeremy Corbyn as a Cold War spy, comes from the ever more ridiculous Telegraph’s Gordon Rayner.
Rayner has persuaded former MI6 boss Sir Richard Dearlove (no, I assure you that’s NOT a made-up name taken from a 1970s James Bond film) as the latest establishment figure to try to persuade the country that electing Corbyn as PM would be tantamount to electing Blofeld to Number 10:
A cross-party initiative by MEPs that are committed to working to protect media freedom have called on Commission Vice-President to propose Anti-SLAPP legislation.
The report identifies 60 verified incidents – including killing, arbitrary arrest and detention, closure, suspension or censorship of newspapers, and blocking of websites – in the period from July 2016 to December 2017.
It also found that Government security forces, including the National Security Service, Sudan People’s Liberation Army, and the South Sudan National Police Service, were responsible for two-thirds of the verified cases of human rights violations.
In at least 60 incidents over the last year and a half journalists in South Sudan were killed, beaten, detained, denied entry or fired for doing their jobs, a UN report said Thursday.
The House of Representatives is about to vote on a bill that would force online platforms to censor their users. The Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA, H.R. 1865) might sound noble, but it would do nothing to stop sex traffickers. What it would do is force online platforms to police their users’ speech more forcefully than ever before, silencing legitimate voices in the process.
Back in December, we said that while FOSTA was a very dangerous bill, its impact on online spaces would not be as broad as the Senate bill, the Stop Enabling Sex Traffickers Act (SESTA, S. 1693). That’s about to change.
Germans like to rate things online. We have rating sites for hotels, restaurants, playgrounds and of course - doctors. Jameda is one (of about 10) such websites that focusses on user-generated, anonymous reviews of doctors.
It has been around for over 10 years, lists around 250.000 German doctors and attracts more than 10m visitors each month. These numbers show how important it is for doctors who appear on the website to be described in a positive light by their patients in order to remain competitive.
1-800-LAWFIRM's oblique assault on Section 230 continues. This firm, along with Excolo Law, have been behind several Plantiff v. Social Media lawsuits seeking to hold Facebook, Twitter, YouTube, etc. responsible for acts of terrorism. The legal theories are as terrible as they are long-winded. In an effort to route around Section 230 immunity, these firms have tried to portray the mere existence of terrorist groups on social media platforms as active material support for terrorism by tech companies. But Section 230 itself is also targeted, just in case the plaintiffs happen to luck into a federal judge willing to punch holes in immunity.
So far, none of these efforts have been successful. The Ninth Circuit Appeals Court recently rang up another loss for 1-800-LAWFIRM, finding none of its arguments credible. Unfortunately, it did not go so far as to reaffirm Section 230 immunity, limiting itself to 1-800-LAWFIRM's novel legal theories about the Anti-Terrorism Act (ATA). But, as Cathy Gellis noted in her coverage of the decision, this isn't necessarily a bad thing. By focusing on the ATA, Section 230 remains undamaged, and doesn't draw the attention of enterprising politicians who might try to "do something" (terrible) to keep terrorists from using social media platforms.
There is growing outrage among students and workers throughout the United States to the efforts of social media companies and the US government to censor the Internet under the guise of combatting “fake news” and promoting “authoritative content.”
The International Youth and Student for Social Equality (IYSSE) spoke with students on campuses from coast to coast who denounced censorship and talked about the power of the Internet to organize opposition and disseminate information outside the control of the corporate and state media.
The recent controversies over censorship of films took centre stage on Saturday at a debate on the second day of Bengaluru International Film Festival (BIFFes). Most filmmakers strongly opposed it, instead arguing that the industry should practice self-censorship.
At a panel discussion ‘Censorship in India’, several filmmakers, led by M.S. Sathyu, recounted the ordeal they had to face in their creative careers.
Lionel Shriver has criticised the “politically correct censorship” in fiction and urged writers to take a stance against it.
The We Need To Talk About Kevin author revealed her thoughts on cultural appropriation and the possible impact on literature of the #MeToo controversy, in Prospect magazine on Wednesday (21st February), and revealed how she has been criticised for featuring black, Asian and minority ethnic (BAME) characters in her books.
“I’ve plenty of recent experience of using non-white characters in my novels, only to have them singled out and scrutinised for thought crime,” she writes in the article titled 'Writers blocked: how the new call-out culture is killing fiction'.
It's no secret that Valve's Steam platform is the dominant marketplace for PC video games. Much comes along with that status, including the strategies and metrics studios must employ to get their games noticed on Steam. One of the important metrics for recognition is Steam reviews. And it's not just the review scores themselves that are important, but actually getting reviews -- any reviews -- to begin with is a big deal.
So it's no surprise that game studios strategize on how to get their games in enough customer hands to generate reviews. Still, one studio's strategy has massively backfired. Insel Games out of Malta recently released Wild Buster, it's latest title. Sadly, in the all important initial release window, the game was not generating enough reviews to result in a general review score on the game page. Those scores are often used by consumers to quickly decide whether a title deserves their attention at all and a lack of a score can indicate that the game isn't good enough to even warrant a look. Insel's CEO, Patrick Steppel, decided to address this with a strongly-worded email to his own staff insisting that they all buy the game and review it, despite having had a hand in making the game. If employees refused to do this, Steppel warned that it could mean that they would no longer have a job at the studio.
The proliferation of the internet and the seemingly unlimited access many of us have to it often leads to the feeling that the world is all online, all interconnected, and all free. In reality, this freedom is largely a perceived truth, rather than a factual one. In fact, according to Freedom House’s 2017 Freedom on the Net report, less than one-fourth of the world’s internet users reside in countries where the internet is technically designated “free.”
Freedom House’s study ranked 65 countries worldwide on their level of censorship based on 21 questions and nearly 100 subquestions, which were divided into three categories: obstacles to access, limits on content, and violations of user rights. The study found that not only are many of the world’s internet users censored online, disinformation and online manipulation tactics have actually increased, leading to an overall decline of internet freedom around the world for the seventh consecutive year. Of the 65 countries studied, 32—almost half—have seen an overall decline in internet freedom.
SAG-AFTRA president Gabrielle Carteris has blasted a federal judge’s recent ruling barring California’s legislation requiring that subscription entertainment database sites remove an actor’s age, if requested by the actor.
U.S. District Court Judge Vince Chhabria issued the ruling on Feb. 20, backing IMDb’s 2016 lawsuit attempting to invalidate AB 1687. IMDb — a subsidiary of Amazon — had contended in its suit that the law, which applies only to subscription sites such as IMDb Pro, was unconstitutional.
The defendants in the suit are Secretary of State Xavier Becerra and SAG-AFTRA, which joined the suit as a defendant after campaigning vigorously for the law in 2016. The union has already declared it will appeal Chhabria’s ruling.
In the annals of stupid legislation, California's attempt to fight ageism at Hollywood studios by targeting third-party websites and using the First Amendment as a doormat will secure a prominent place in infamy. Rising from the ashes of a failed lawsuit brought by an actress who claimed IMDb cost her untold amounts of wealth by publishing her age, the law basically said IMDb couldn't publish facts on its website. Those pushing the legislation included the Screen Actors Guild, which apparently doesn't have the spine to stand up to studios and target them for discriminating against actors and actresses.
Last year, IMDb secured a temporary injunction against the state of California, forbidding it from enforcing the law while the courts sorted out its constitutionality. That day has arrived. A federal court has declared the law unconstitutional and permanently blocked California from going after IMDb because Hollywood producers participate in discriminatory hiring. (h/t Jacob Gershman)
United States intelligence chiefs from the National Security Agency and Department of Homeland Security warned Australian Prime Minister Malcolm Turnbull not to enlist Huawei’s help in its efforts to deploy the fifth generation of mobile networks, AFR reported Friday, citing people familiar with the matter. The officials are said to have personally briefed Mr. Turnbull on the matter earlier this month, urging the head of the state to reconsider Canberra’s collaboration with Huawei due to the tech giant’s close ties to Beijing that raise various security concerns, insiders claim. The chiefs reportedly identified “Beijing’s cyber espionage” as one of the top risks on their joint cybersecurity agenda.
The Australian Financial Review reported that Turnbull, who is on a visit to the US, was told of Washnigton's concerns about Huawei when he met the head of the NSA, Mike Rogers, and the secretary of the Department of Homeland Security, Kirstjen Nielsen, on Friday.
In the case, the trial court had concluded that a party’s communications with a patent agent were only privileged to the extent that the patent agent was acting under an attorney’s direction. The court here reverses that judgment — no supervision is necessary. The court does offer a major caveat — that communications outside of the patent agent’s authorized practice area might not be protected...
Ulbricht is known as the Dread Pirate Roberts, Frosty, Altoid, and creator of the Silk Road dark web marketplace. Here, Ulbricht challenges his conviction and sentencing for drug trafficking, money laundering, and hacking — arguing that the evidence used to convict was illegally obtained in violation of his constitutional rights.
It would be remarkably easy to achieve. It’s just a matter of making explicit the determinations that already go into credit scores—of binding together the data brokerages that even now siphon up public records, social-media profiles, web searches, and similar digital traces of life here in the West, and making our rights and privileges as city dwellers and citizens contingent on what they infer from our behavior. Unless this tendency is contested and defeated now, what has unfolded in China since 2014 might become an early preview of the way order is achieved and maintained in the cities of the 21st century.
Greenfield writes about China's "Citizen Scores", a rapidly growing system of social control that marries your credit report, internet usage, location data, snitching by your peers, and other factors (like your perceived "sincerity") to determine whether you can borrow money, use high-speed transport, get a job, or rent an apartment.
[...]
The Chinese-Western feedback loop involves each worsening the other's worst ideas, lather-rinse-repeating in the most dystopian of fashion. China's social control is just neoliberal capitalism's social control, plus ten years.
Another paper has been released, adding to the current encryption discussion. The FBI and DOJ want access to the contents of locked devices. They call encryption that can be bypassed by law enforcement "responsible encryption." It isn't. A recent paper by cryptograpghy expert Riana Pfefferkorn explained in detail how irresponsible these suggestions for broken or weakened encryption are.
This new paper [PDF] was put together by the National Academies of Science, Engineering, and Medicine. (h/t Lawfare) It covers a lot of ground others have and rehashes the history of encryption, along with many of the pro/con arguments. That said, it's still worth reading. It raises some good questions and spends a great deal of time discussing the multitude of options law enforcement has available, but which are ignored by FBI officials when discussing the backdoors/key escrow/weakened encryption they'd rather have.
This story is part of When Spies Come Home, a Motherboard series about powerful surveillance software ordinary people use to spy on their loved ones.
Responsible for the development and maintenance of the Tor anonymity network, the Tor Project has long been a central institution in the internet freedom community. For many, Steele’s directorship, which started in December 2015, signaled a sea change within the organization and shifted Tor towards being more inclusive and community focused. The following May, developer Jacob Appelbaum left the Tor Project amid widespread accusations of sexual assault, triggering a broader crisis within the organization. (Appelbaum denies the allegations.) The following month, Tor replaced its board of directors.
Given the narratives that surround the industry, it would be easy to fall into the trap of suggesting that these women suffered as a result of the cruel and degrading conditions working in porn involves, as suggested by some commentators, such as Julie Bindel. But to do so is to ignore the realities of the industry as told by the workers themselves and to talk about porn in a manner removed from wider discussions on workplace rights, gender and culture. This tendency also prevents us from engaging in a wider conversation about mental health, sex work and stigma. And this is key to understanding the circumstances surrounding each death.
When asked by Selangor Sharie prosecutor Sofian Ahmad if she had referred to any other materials before making the complaint, Sulastri replied: “I did not base it on anything, I just read from the book censorship report.
Today was the first day of trial and Sulastri was the first prosecution witness.
Ezra is facing a charge under Section 16(1)(a) of the Syariah Criminal Offences (Selangor) Enactment 1995 as the director and main shareholder of ZI Publications for allegedly publishing a book written by Irshad Manji and titled Allah, Kebebasan dan Cinta with contents purportedly contrary to Islamic law in terms of faith.
Students have turned last week's school shooting into an exemplary push for change. Here's a quick primer on their rights.
Students around the country are turning last week’s heartbreaking school shooting in Parkland, Florida, into an inspiring and exemplary push for legislative change. In the last few days, many people have a written by Irshad Manjisked whether schools can discipline students for speaking out. The short answer? It depends on when, where, and how the students decide to express themselves.
When you write regularly about lawsuits, you learn very quickly that not all court systems are equal when it comes to allowing modern access to public filings and records. The country is a veritable panoply of an access spectrum, with some districts offering modern e-filing systems and websites to review documents, while other districts are far more antiquated and restrictive. That said, it's hard to imagine a county court system more backwards than that of Chicago's Cook County.
ProPublica obtained the chat logs of Atomwaffen, a notorious white supremacist group. When Samuel Woodward was charged with killing 19-year-old Blaze Bernstein last month in California, other Atomwaffen members cheered the death, concerned only that the group’s cover might have been blown.
In New York and 34 other states, police officers accused of raping people in their custody can offer a consent defense.
On the night of Sept. 15, 2017, Edward Martins and Richard Hall, narcotics detectives with the New York Police Department, pulled over an 18-year-old woman and her two male friends for being in a park after dark. After finding marijuana in the car’s cup holder, they handcuffed the woman and told her friends to leave. The woman says that the detectives then put her in their unmarked police van with tinted windows and raped her as she cried and repeatedly told them “no.” Semen collected in a forensic evidence kit matched the DNA of both men.
In November, Martins and Hall resigned from the NYPD and currently face rape and kidnapping charges. Both pleaded not guilty. Their defense against these allegations is almost as disturbing as the crimes they are accused of. They claim that they had consensual sex with the woman while she was in their custody.
This week on CounterSpin: “A ‘gun-free’ school is a magnet for bad people” is a real statement from the actual president, in response to a horrific event in which a 19-year-old shot and killed 17 people at his former high school in Parkland, Florida. Which suggests that waiting for Trump to act to prevent gun violence should be no part of an effort to prevent gun violence.
If Americans really want to stop being “the only country where this happens,” which keeps officially claiming there’s “no way to prevent” it, it will require not just deep examination of the multiple roots of mass violence of this sort, but also an approach to political processes that keeps its eye on the prize of real change. We’ll talk about possibilities of movement on the issue of gun control and about some of the other cultural aspects of this violence, whose examination has to be part of getting beyond this cycle of mass shootings and ‘thoughts and prayers’ and more mass shootings.
An e-passport is essentially a passport that includes machine-readable RFID chips containing a traveler's personal information. These more digitally secure passports, which began to be required by the United States for visitors form visa waiver countries beginning in 2007, are scanned at the border by a CBP agent’s computer. However, without a digital signature, it is impossible to validate that the data contained on the passport is actually authentic.
Ron Wyden is at it again. Sending pesky letters to government officials who appear to be completely falling down on the job. The latest is asking Customs and Border Patrol why it's still not verifying the e-passport chips that have been in all US passports -- and in all countries on the visa waiver list -- since 2007 (hat tip to Zach Whittaker). The letter points out that the US government pushed hard for these chips... and then never bothered to check to make sure no one has tampered with them.
This means that since as far back as 2006, a skilled hacker [sic] could alter the data on an e-Passport chip—like the name, photo, or expiration date—without fear that signature verification would alert a border agent to the changes. That could theoretically be enough to slip into countries that allow all-electronic border checks, or even to get past a border patrol agent into the US.
A guard at a privately run immigration jail beat a detainee because the man joined a hunger strike protesting conditions at the facility, the Washington state chapter of the American Civil Liberties Union said in a federal lawsuit Friday.
The organization sued U.S. Immigration and Customs Enforcement as well as the GEO Group, which operates the Northwest Detention Center in Tacoma.
According to the lawsuit, Jesus Chavez Flores is one of more than 120 immigrant detainees at the facility who began a hunger strike Feb. 7 to protest the conditions of their confinement, including the quality of the food they are served and that the prisoners are paid just $1 per day to perform janitorial, kitchen, laundry or other work there.
Milwaukee residents have long thought they were targeted for their race. New data reveals they were right all along.
For years, Black and Latino residents of Milwaukee have protested the fact that they and their neighborhoods have been consistently and unfairly targeted for overzealous police stops. They were right to do so. New expert evidence unmasks the city’s stop-and-frisk program for what it is: a program that encourages routine stops of individuals that are without a sufficient legal basis and that are often based on the individual’s race or ethnicity.
With this new evidence, Milwaukee joins a host of cities nationwide whose stop-and-frisk practices — as reflected in their own data — run afoul of the law.
Can state employees who decline to join a union in their workplace be required to pay fees to support the union’s work? On February 26, the Supreme Court will hear arguments in Janus v. American Federation of State, County, and Municipal Employees, a case pitting the First Amendment claims of dissenting employees against the interests of public-sector unions. Mark Janus, an Illinois state employee who opposes the union, argues that a state law allowing public-sector unions to charge nonmembers fees for collective-bargaining activities violates his First Amendment rights. Were the Court to accept this argument, it would severely undermine such unions, by requiring them to provide services free of charge to any worker who says he objects to the union. Regardless of what you think about unions, such a ruling would turn First Amendment law on its head.
The Census Bureau is scrambling to respond to a last-minute request by the Justice Department to add a question on citizenship status to the 2020 census, according to hundreds of pages of emails obtained through a Freedom of Information Act request.
The emails show that the DOJ’s December request set off a flurry of activity in the bureau as career Census officials hurried to research the history of how citizenship has been handled in past surveys, raced to come up with alternatives to the DOJ request and vented their frustration over public outrage on the issue.
As ProPublica first reported, the DOJ asked for the question to be added in a December letter, saying it needed more data to better enforce voting rights laws.
Another challenge of the NIT (Network Investigative Technique) warrant used by the FBI during its investigation of a dark web child porn website has hit the appellate level. A handful of district courts have found the warrant used invalid, given the fact that its reach (worldwide) exceeded its jurisdictional grasp (the state of Virginia, where it was obtained). That hasn't had much of an effect on appeals court rulings, which have all found the warrant questionable to varying degrees, but have granted the FBI "good faith" for violating the jurisdictional limits the DOJ was attempting to have rewritten (Rule 41 -- which governs warrant jurisdictional limits, among other things) to allow it to do the things it was already doing.
Even though the FBI had to have known searches performed all over the world using one Virginia-based warrant violated Rule 41 limits, appellate judges have declared the FBI agent requesting the warrant wasn't enough of a legal expert to know this wasn't allowed. Two appeals courts have stated suppressing the evidence is pointless because the law changed after the jurisdiction limit violation took place. The appellate decisions have been troubling to say the least, providing further evidence that the good faith exception is the rule, rather than the outlier.
Schneider did not explain how eliminating net neutrality rules preserved anyone's "free speech rights."
The repeal is contingent on US Office of Management and Budget [OMB] approval of modified information collection requirements, the FCC said. Later, the FCC will publish another document in the Federal Register "announcing the effective date(s) of the delayed amendatory instructions," the FCC said. "The Declaratory Ruling, Report and Order, and Order will also be effective upon the date announced in that same document." The FCC voted to repeal its net neutrality rules on December 14,
"OMB approval needs to happen before any of the substantive rules take effect, and the date they come into effect will be in a future Federal Register publication," Senior Counsel John Bergmayer of consumer advocacy group Public Knowledge told Ars.
The major obstacle for states is that FCC Chairman Ajit Pai has claimed the authority to preempt states and municipalities from imposing laws similar to the net neutrality rules his FCC is getting rid of. ISPs that sue states to block net neutrality laws will surely seize on the FCC's repeal and preemption order.
The final draft of the rules sets April 23 as the day the repeal goes into effect, but portions of the order are still pending approval from the Office of Management and Budget, which could delay its implementation.
A few years back the FCC (under Obama's first FCC boss Julius Genachowski) spent around $300 million on a broadband availability map that did a crap job actually measuring broadband availability. As we noted at the time, the map tended to hallucinate both available competitors and the speeds they could deliver to any address, providing a completely bogus sense of the nation's competitive options. It also failed utterly to include pricing data at ISP behest, lest somebody actually look at the data and realize that a lack of competition drives high prices and abysmal customer service from coast to coast.
None of the five governors’ offices responded to our questions about how they plan to monitor broadband providers for net neutrality violations. Falcon says states will need hard data, and engineers to review that data, to identify throttling, discrimination, or prioritization. That's part of the motivation behind Northeastern University's Wehe project, which helps users check to see how neutral their connections are.
Ajit Pai's Net Neutrality-killing order is scheduled to go into effect on April 23, and when that happens, it'll be open season on the free, fair and open internet.
Today, the FCC’s so-called “Restoring Internet Freedom Order,” which repealed the net neutrality protections the FCC had previously created with the 2015 Open Internet Order, has been officially published. That means the clock has started ticking on all the ways we can fight back.
While the rule is published today, it doesn’t take effect quite yet. ISPs can’t start blocking, throttling, or paid prioritization for a little while. So while we still have the protections of the 2015 Open Internet Order and we finally have a published version of the “Restoring Internet Freedom Order,” it’s time to act.
First, under the Congressional Review Act (CRA), Congress can reverse a change in regulation with a simple majority vote. That would bring the 2015 Open Internet Order back into effect. Congress has 60 working days—starting from when the rule is published in the official record—to do this. So those 60 days start now.
The Senate bill has 50 supporters, only one away from the majority it needs to pass. The House of Representatives is a bit further away. By our count, 114 representatives have made public commitments in support of voting for a CRA action. Now that time is ticking down for the vote, tell Congress to save the existing net neutrality rules.
Like many cities around the country, San Francisco is considering an investment in community broadband infrastructure: high-speed fiber that would make Internet access cheaper and better for city residents. Community broadband can help alleviate a number of issues with Internet access that we see all over America today. Many Americans have no choice of provider for high-speed Internet, Congress eliminated user privacy protections in 2017, and the FCC decided to roll back net neutrality protections in December.
This week, San Francisco published the recommendations of a group of experts, including EFF’s Kit Walsh, regarding how to protect the privacy and speech of those using community broadband.
This week, the Blue Ribbon Panel on Municipal Fiber released its third report, which tackles competition, security, privacy, net neutrality, and more. It recommends San Francisco’s community broadband require net neutrality and privacy protections. Any ISP looking to use the city’s infrastructure would have to adhere to certain standards. The model of community broadband that EFF favors is sometimes called “dark fiber” or “open access.” In this model, the government invests in fiber infrastructure, then opens it up for private companies to compete as your ISP. This means the big incumbent ISPs can no longer block new competitors from offering you Internet service. San Francisco is pursuing the “open access” option, and is quite far along in its process.
The thin line that exists between entertainment industry DRM software and plain malware has been pointed out both recently and in the past. There are many layers to this onion, ranging from Sony's rootkit fiasco, to performance hits on machines thanks to DRM installed by video games, up to and including the insane idea that copyright holders ought to be able to use malware payloads to "hack back" against accused infringers.
What is different in more recent times is the public awareness regarding DRM, computer security, and an overall fear of malware. This is a natural kind of progression, as the public becomes more connected and reliant on computer systems and the internet, they likewise become more concerned about those systems. That may likely explain the swift public backlash to a small game-modding studio seemingly installing something akin to malware in every installation of its software, whether from a legitimate purchase or piracy.
The Anglo-Dutch professional-information and events company also said it intends to buy back further shares worth 700 million pounds ($974.4 million) this year, of which GBP100 million have already been repurchased. This adds to the GBP700 million buyback the company conducted last year.
After previously being legal for personal use, in 2014 the Netherlands banned downloading of copyrighted content. In 2013, 41% of people engaged in the practice but according to a new study, just 24% admitted to having downloaded pirate media within the previous 12 months. While that sounds like good news, unauthorized streaming is absent from the stats.
One of the perennial questions around here is what companies should do about unauthorized copies of physical products. As readers will know, on Techdirt we don't think automatically filing lawsuits is the way to go. This little vignette from the New York Times reveals an alternative approach that is smarter and more remunerative:
U.S. District Judge Jon Tigar of the Northern District of California on Wednesday dismissed without prejudice software company Rearden’s copyright claims against major picture studios, including The Walt Disney Co., Twentieth Century Fox and Paramount.
A 9th Circuit judge found in Redbox's favor, holding that the DVDs' license agreement were not a binding contract, and slamming Disney for "copyright misuse" in trying to impose conditions on people who buy its products by sneaking in some legal fine-print that tries to convert the sale into a license.
He also sided with Redbox's argument that Disney was misusing its copyrights by trying to restrict the reselling of copies of its movies after they had already been sold.
Last week was a big week for dramatically bad copyright rulings from the New York federal courts: the one finding people liable for infringement if they embed others' content in their own webpages, and this one about 5Pointz, where a court has found a building owner liable for substantial monetary damages for having painted his own building. While many have hailed this decision, including those who have mistakenly viewed it as a win for artists, this post explains why it is actually bad for everyone.
The facts in this case are basically this: the owner of a run-down, formerly industrial building in a run-down neighborhood aspired to do something to redevelop his property, but it would be a few years before the time would be right. So in the meantime he let some graffiti artists use the building for their aerosol paintings. The building became known as 5Pointz, and the artwork on it soon began to attract attention. The neighborhood also began to change, and with the improvement the prospects for redeveloping the property into residences became more promising. From the outset everyone knew that redevelopment would happen eventually, and that it would put an end to the arrangement since the redevelopment would likely necessitate tearing down the building, and with it the art on the walls. As the date of demolition grew closer, the artists considered buying the building from the owner in order to prevent it from being torn down and thus preserve the art. However the owner had received a variance that suddenly made the value of the property skyrocket from $40 million to $200 million, which made the buyout impossible. So the artists instead sued to halt the destruction of their art and asked for a preliminary injunction, which would ensure that nothing happened to the art while the case was litigated. But in late 2013 the court denied the preliminary injunction, and so a few days later the building owner went ahead and painted over the walls. The painting-over didn't end the litigation, which then became focused on whether this painting-over broke the law. In 2017 the court issued a ruling allowing the case to proceed to trial on this question. Then last week came the results of that trial, with the court finding this painting-over a "willfully" "infringing" act and assessing a $6.7 million damages award against the owner for it.
ICE’s deal with Facebook covers 290,000 rights-holders across 160 territories, and as part of the deal, ICE will be working with Facebook to help develop its rights reporting system for more accurate royalties data. ICE currently has over 40 online music licenses in place with various streaming platforms and has distributed over 300 million euros to rights-holders since 2016. Specifics of ICE’s payout structure with Facebook have not been disclosed.
Facebook today took its latest step towards making good on paying out royalties to music rightsholders around tracks that are used across its multiple platforms and networks. The company has signed a deal with ICE Services — a licensing group and copyright database of some 31 million works that represents PRS in the UK, STIM in Sweden and GEMA in Germany — to provide music licensing and royalty collection for works and artists represented by the group, when their music is used on Facebook, Instagram, Oculus and Messenger.
Recently, FairPlay Canada — a coalition of more than 25 telecom companies, broadcasters, and other organizations — unveiled a proposal that asks the Canadian Radio-television and Telecommunications Commission (CRTC) to order internet service providers (ISPs) to block their customers from accessing websites that host what regulators deem to be pirated content. Michael Geist, a University of Ottowa law professor, notes that such a pirate site blacklist would inevitably be expanded, maybe to include VPN
Mikko von Hertzen, who sings and plays guitar in the popular rock band the Von Hertzen Brothers, says he thinks the way Spotify and other streaming services pay artists for their compositions and performances is murky. Few artists seem to know, he says, how money is being shared.