Is systemd on Linux Evil? How does it compare to alternatives like runit? I discuss some considerations with systemd and below are the links I reference in the video.
The key difference is that Linux is open source. In the most simple terms, it just means that no one single person or corporation controls the code. Instead, the operating system is maintained by a dedicated group of developers from around the world. Anyone who is interested can contribute to the code and help check for errors. Linux is more than an operating system; it is a community.
It may have gotten lost in the shuffle of all the Android P news at Google's I/O conference last week, but fear not, dear friends: Chrome OS has definitely not been forgotten.
Google's been making steady progress in advancing its Chromebook operating system over the past several months, particularly around its efforts to further align Android and Chrome OS and turn Chromebooks into all-purpose productivity machines and Android tablet replacements. Practically every week, in fact, there's some new and noteworthy feature being added into the platform (something we've talked about a great deal in my weekly newsletter as of late).
And though it wasn't in the keynote, a massive new development did sneak its way into Chrome OS during I/O: the quietly announced ability for Chromebooks to run Linux apps as if they were native applications, without the need for any complex and security-defeating configurations. Linux app support is on its way to the Pixelbook to start — currently in that device's developer channel and likely becoming available much more broadly before long.
System76’s latest laptop Oryx Pro is a beast in terms of configuration and it focuses on AI and Machine Learning developers. Read about the specifications and pricing
Linux Apps On Chromebooks. Does this present a compelling reason to buy a Chromebook or instead, is this too little too late for Google? We discuss.
Brian Behlendorf, a driving force behind the Apache web server and longtime supporter of open source software, now spends his time developing blockchain technology for the enterprise.
As the executive director of the Hyperledger project, an open source blockchain initiative hosted by the Linux Foundation, Mr. Behlendorf is working to create enterprise-ready distributed ledger technologies and develop a community of corporate blockchain developers that will outlast a fevered investment climate.
Blockchain is still nascent in the enterprise, but the conversation has evolved beyond basic technology questions to more involved discussions about scale, interoperability and governance, Mr. Behlendorf said.
Many organizations are making the move to cloud-native platforms as their strategy for digital transformation. cloud-native allows companies to deliver fast-responding, user-friendly applications with greater agility. However, the architecture of the data in support of cloud-native transformation is often ignored in the hope that it will take care of itself. With data becoming the information currency of every organization, how do you avoid the data mistakes commonly made during this cloud transformation journey? What data questions should you ask when building cloud-native applications? How can you gain valuable insight from your data?
The ensuing presentation includes six key considerations companies must have when they make this transition to cloud-native.
Kubernetes is one of the biggest technology disruptors to hit the IT industry in a long time — maybe since Amazon EC2, now more than a decade old. It has helped turn containers from a convenient packaging method into the building blocks of modern application architectures, and has shifted the discussion in many circles from cloud computing to cloud-native computing.
If that seems like a form of technological hair-splitting, it isn’t. Cloud-native technologies and architectures are the means by which more traditional businesses — like insurance, financial services or even heavy machinery — can transition from simply consuming cloud resources into operating like the cloud providers themselves. This is shifting the way they run their businesses, making them more agile, distributed and ready to tackle via software, whatever their businesses demand. As with most new technologies, however, it’s important to look at Kubernetes with some perspective.
Labtainers is quite interesting as it allows isolating a lab in several containers running in their own dedicated virtual network, which helps distributing a lab without needing to install anything locally.
My tweak allows to run what I called the “master” container which contains the labtainers scripts, instead of having to install labtainers on a Linux host. This should help installation and distribution of labtainers, as well as deploying it on cloud platforms, some day soon. In the meantime Labtainer containers of the labs run with privileges so it’s advised to be careful, and running the whole of these containers in a VM may be safer. Maybe Labtainers will evolve in the future to integrate a containerization of its scripts. My patches are pending, but the upstream authors are currently focused on some other priorities.
Thomas Hellstrom of VMware who has worked on Mesa going back to the Tungsten Graphics days is developing a remote KMS back-end that could be transmitted over VNC or similar protocols.
In essence this kernel mode-setting (KMS) kernel back-end would allow the display to be transmitted remotely over VNC or similar remote desktop sharing technologies. The current intention is on open-source VNC server support.
Mesa 18.0.4 is now available.
In this release we have:
r600 driver gets a fix for constant buffer boounds, which fixes rendering bugs in Trine and Witcher 1.
Several fixes for RADV driver: fixes around alpha channel in Pre-Vega, fix in multisample image copies, and fixes around multilayer images in compute path.
For the case of ANV/i965 drivers, also a couple of fixes, all of them around ISP. On top, there are a couple of fixes relative to code emission around 16-bit integers, and a a fix for a leak in blorp for Gen4 and Gen5.
Speaking of leaks, there are also fixes for winsys/radeon/amdgpu and pipe-loader.gets a couple of patches to fix a couple of leaks.
SPIR-V part gets a patch to apply OriginUpperLeft to FragCoord.
Mesa core gets a couple of patches to fix error handling in get_framebuffer_parameteriv, and to add missing support for glFogiv(GL_FOG_DISTANCE_MODE_NV).
Mesa 18.1 might be out this weekend but for those riding the Mesa 18.0 stable release series for now, Mesa 18.0.4 is the latest point release.
With the great shape that ROCm has been getting into recently for open-source Radeon GPU compute support on Linux including advancing OpenCL support, one might have rightfully assumed that was going to be their centralized compute stack moving forward. It turns out that their PAL-based compute stack will continue to be maintained too.
What was developed as the VC5 Gallium3D driver is now renamed to V3D and enabled by default in new Mesa 18.2 builds.
The Broadcom Video Core V driver that was already part of Mesa was renamed to V3D to match the name of the V3D DRM kernel driver. The VC5 to V3D renaming occurred since this driver is already supporting a VideoCore VC6 device, so the VC5 naming was no longer deemed appropriate.
Usually X.Org DDX driver releases aren't too notable these days with most of the open-source Linux graphics innovations happening elsewhere in the stack, but for those using the VMware graphics virtualization support available through their different virtualization products, the xf86-video-vmware update out today is on the heavier side.
Initial open-source driver support for the NVIDIA GV100 "Volta" GPUs will be introduced with the upcoming Linux 4.18 kernel cycle.
Earlier this month I wrote about the initial open-source GV100 Volta patches coming out for the Nouveau Direct Rendering Manager while now that work has been queued into the DRM-Next tree ahead of the Linux 4.18 merge window opening in June.
The in-development Panfrost reverse-engineered, open-source driver for supporting ARM Mali T700 series graphics is now much more capable thanks to work carried out on their "half-way" Gallium3D driver in recent weeks.
Alyssa Rosenzweig has provided an update on the Panfrost driver progress and their very early stage Gallium3D driver. Their recent code is quite a bit of progress considering where they were one month ago with just being able to render a cube.
We knew it was coming while today NVIDIA has rolled out the CUDA 9.2 stable release update.
The CUDA 9.2 release includes speed-ups for launching CUDA kernels as well as faster performance for GEMM computational performance for half-precision and small N matrices. CUDA 9.2 also fixes a number of issues, including incorrect results with some GEMM calls on V100 Tensor Core GPUs and other BLAS problems.
First time Mesa release manager Dylan Baker has managed to release Mesa 18.1 on time as the Q2'2018 quarterly update to this OpenGL/Vulkan driver stack.
While it feels like Mesa 18.0 was just recently released, it's already been a month and a half, which had arrived significantly late due to release delays. Fortunately, Mesa 18.1 is now available and hopefully allowing for a normal Mesa 18.2 release cycle for next quarter.
Mesa 18.1 ships with the Intel OpenGL shader cache now being enabled by default, OpenGL 3.1 with ARB_compatibility context support for the prominent Gallium3D drivers, ARB_bindless_texture support for Nouveau NVC0 that is important for some newer Linux game ports like Dawn of War 3, EXT_semaphore support for RadeonSI, various other new OpenGL and Vulkan extensions being supported by Radeon and Intel, and other enhancements. See our Mesa 18.1 feature overview for a more thorough look at all of the changes that made it into this release.
In continuing with our recent benchmarks of the brand new GCC 8.1 compiler, here are more tests while using an Intel Skylake CPU and testing with -O2, -O3, and -O3 -march=native optimization levels while comparing the resulting binary performance of GCC 8.1 and GCC 7.3.
Vim 8.1 is a minor release, a few new features have been added since Vim 8.0. A lot of bugs have been fixed, documentation was updated, etc.
Vim 8.1 is out today as the latest stable feature update to this advanced cross-platform text editor.
Caprine is an Electron Facebook Messenger application that's focused on privacy. I know that Facebook and privacy shouldn't really be used in the same sentence unless they are accompanied by 'lack of', but Caprine tries to improve this, by preventing Facebook from tracking the links that you click.
The application also ships with options to hide the last seen / typing indicator, and a way to quickly disable receiving desktop notifications.
I know we often write about games that might see Linux support, but this one seems rather promising. Antigraviator [Official Site] is a very slick and polished looking anti-grav racer.
One of the best and most long-standing open-source Linux games is 0 A.D. and in time for the weekend they have a new release.
This open-source ancient warfare game is out with its twenty-third alpha release ahead of the weekend. This RTS game in its latest alpha release features a new civilization, new models, improved AI behavior, a mod downloader, new random maps, and other changes to enhance the game-play for this game that's been open-source for nearly a decade.
Wildfire Games, an international group of volunteer game developers, proudly announces the release of 0 A.D. Alpha 23 “Ken Wood”, the twenty-third alpha version of 0 A.D., a free, open-source real-time strategy game of ancient warfare.
0 A.D. [Official Site] the free and open source RTS from Wildfire Games has a new alpha build available and it's a pretty huge release.
I'm always amazed at the progress of 0 A.D. as they really do put the effort in to make it looks so incredibly detailed and professional. This release is no different, with a lot of work going into all aspects of the game.
Valve have officially put out a beta version of their new Steam Link Android app, which allows you to stream games from your Linux PC to your favourite device. As expected (and as Valve previously confirmed to us), it fully supports a Linux PC as the host device.
As a reminder, you will need to update your Steam Controller's firmware in the Steam Beta Client. As we wrote about before, the Steam Controller was recently updated to support Bluetooth Low Energy mode in preparation for this. The Steam Link app is also compatible with a number of other Bluetooth pads as well.
The latest Steam Client update has left beta, bringing the Bluetooth Low Energy mode to everyone with the Steam Controller amongst other things. It also, sadly, broke other gamepad support in Big Picture mode.
There's this bug report on Valve's GitHub, which has been open since May 9th. That only mentions PS3 controllers, but there's other bug reports open for other gamepads. I've tested it myself, with the Steam Controller working as normal and all other gamepads are broken on Linux in Big Picture Mode.
This is great, not long after the rather good release of Horizon Chase Turbo, we have another retro-inspired racer with Slipstream. This one is very interesting, since it was developed on Linux.
FOX n FORESTS [Official Site] is another retro-inspired action platformer, although it does have a slight twist with the season changing mechanic.
We're certainly not short on action platformers, especially retro inspired titles. To be fair though, there's not actually a great deal of them that are worth playing. Sure, there's a couple of excellent titles, but there's also a lot that just aren't any good.
Slightly sad news to share today, as the Linux Dev Lead at Feral Interactive who've ported tons of quality games to Linux is leaving the company.
The group leader of the Linux porting efforts at Feral Interactive is leaving the company for "different pastures."
The first of two new Steam Apps for mobile devices is now available.
Valve has launched the Steam Link App today for Android devices. This allows any capable Android-powered device to effectively serve as a Steam Link device where they can stream games to it from Steam running on a Linux/macOS/Windows PC on their local network.
Thursday, 17 May 2018. Today KDE unveils a beta release of Plasma 5.13.0.
Members of the Plasma team have been working hard to continue making Plasma a lightweight and responsive desktop which loads and runs quickly, but remains full-featured with a polished look and feel. We have spent the last four months optimising startup and minimising memory usage, yielding faster time-to-desktop, better runtime performance and less memory consumption. Basic features like panel popups were optimised to make sure they run smoothly even on the lowest-end hardware. Our design teams have not rested either, producing beautiful new integrated lock and login screen graphics.
Hello all! This is my first time writing about my work progress in a blog, so some things are still awnkward for me. And it is also my first time participating in GSoC and there are many things new to me. I’m cooperating with KDE organisation or rather with one of their projects, named Krita.
The Calamares team is happy to announce the availability of Calamares 3.2.0, the first iteration of the new features-and-functionality series of Calamares 3.2.x releases. This is the new series of Calamares releases following on from the stable 3.1 series.
Calamares is a distribution-independent system installer, with an advanced partitioning feature for both manual and automated partitioning operations. Calamares is designed to be customizable by distribution maintainers without need for cumbersome patching, thanks to third party branding and external modules support.
Version 3.2 of the Calamares universal Linux distribution installer framework is now available as their latest big feature release that has been in development the past number of months.
Calamares 3.2 features new localization capabilities, improved logging, enhanced GeoIP detection, improved KDE Plasma integration, optional user-tracking, upgraded KPMCore usage, and various module improvements.
We have released Qt 5.11.0 RC2 today. Delta to RC(1) release can be found as an attachment. We are still targeting to release Qt 5.11.0 Tue 22nd May as planned
The Qt Company is hoping to be able to release the Qt 5.11 tool-kit in just a few days.
Developers working on Qt 5.11 are striving still to release this half-year tool-kit update ahead of schedule on Tuesday, 22 May, rather than the following week as originally was planned.
Now that the beta 1 release of Qt 3D Studio 2.0 is out, let’s go through the steps involved in trying it out for real.
Purism's Dorota Czaplejewicz has been active within the Wayland community recently as they work on their Librem 5 phone Wayland compositor and Phosh shell for this software stack and iMX8 hardware they hope to begin shipping next year.
On behalf of Purism, Dorota's latest Wayland work is proposing a new virtual keyboard protocol for Wayland. This allows for the emulation of keyboards by applications and complements the existing input-method protocol. The new virtual-keyboard protocol is based upon the Wayland keyboard specification but with support for seat bindings and dropping serials.
Arguably the most critical functionality in a phone is the ability to make and receive calls through the Public Switched Telephone Network (PSTN), that is normal cellular calls using phone numbers. While at Purism we are eager to implement communication systems that enable much greater privacy and security than one can expect from PSTN calls, the PSTN is still the most ubiquitous network and for the time being we can’t very well go around selling a phone that isn’t able to make PSTN calls.â°
My task has been to develop a dialer and call handler for PSTN calls. Like all of our work on the Librem 5, this is intended to make use of existing code wherever possible and also target the GNOME platform which our PureOS defaults to. There is currently no GNOME PSTN dialer so we intend to contribute our program to the GNOME project.
Purism has formally introduced "Calls", its GTK3-based PSTN (Public Switched Telephone Network) phone dialing application that it hopes will be accepted into the upstream GNOME project. Purism plans to develop this phone dialer using GNOME's Telepathy framework but for now is using a simple oFono back-end.
Calls is the new program Purism is developing to make and receive conventional telephone calls for supporting their default GNOME-based software stack being developed for the Purism 5 smartphone.
While Telepathy is controversial among even GNOME developers, they are pursuing this framework for their phone call application as it will also support SIP calls and other features provided by the GNOME framework.
Boxes has been the go-to option for easy virtual machine setups in GNOME for quite some time, but some people don’t know that our beloved application can also act as a remote viewer.
The “Enter URL” option in the new machine assistant is how you get a new remote machine added to your collection. It supports addresses of Spice and VNC servers and oVirt and Libvirt brokers. You can also paste the URL of an operating system image (iso, img, qcow, etc…) and Boxes will download and boot it for you.
On my dual monitor setup, if I made any application fullscreen on the primary monitor (left-hand side screen - monitor "1" in the image above), the mouse cursor would get stuck on the secondary monitor (right-hand side screen) and I could only move it back to the primary monitor if I moved between monitors through the top part of the screen.
Dash to Panel merges the GNOME Dash (aka Dock) and top bar into a unified, single panel that you can place on any edge of the screen:
In the latest update, Dash to Panel v14, the task bar picks up a bunch of welcome improvements, including support for “intellihide” (aka auto-hide).
This option (off by default) makes the panel slide out of view when an application window is maximised and/or touching it, and gracefully restored when there’s space for it.
Although hidden you can access the panel at any time just by moving your mouse to the screen edge it’s hiding under.
The Open Service Broker API standard aims to standardize how services (cloud, third-party, on-premise, legacy, etc) are delivered to applications running on cloud platforms like OpenShift. This allows applications to consume services the exact same way no matter on which cloud platform they are deployed. The service broker pluggable architecture enables admins to add third-party brokers to the platform in order to make third-party and cloud services available to the application developers directly from the OpenShift service catalog. As an example AWS Service Broker created jointly by Amazon and Red Hat, Azure Service Broker created by Microsoft and Helm Service Broker created by Google to allow consumption of AWS services, Azure services and Helm charts on Kubernetes and OpenShift. Furthermore, admins can create their own brokers in order to make custom services like provisioning an Oracle database on their internal Oracle RAC available to the developers through the service catalog.
A popular quote from Mohandas Gandhi graces most of the Red Hat Canada offices across the country: “First they ignore you, then they laugh at you, then they fight you, then you win.”
It’s been said that making money from something that’s given away for free is next to impossible, but Red Hat and its Canadian business has turned that assumption on its head and remains dedicated to the open source community.
Red Hat’s decided virtual servers ought not to be a standalone silo for much longer, so has created a “Virtualization Suite” that combines Red Hat Virtualization with the CloudForms tool it offers to manage OpenStack and cloud-native applications.
CloudForms has been around for a while and offers administrators one app with which to manage and automate hybrid infrastructure. But Red Hat’s Virtualization (RHV) tools have remained their own little island.
“The impact of AI will be visible in the software industry much sooner than the analog world, deeply affecting open source in general, as well as Red Hat, its ecosystem, and its userbase. This shift provides a huge opportunity for Red Hat to offer unique value to our customers. In this session, we’ll provide Red Hat’s general perspective on AI and how we are helping our customers benefit from AI.”
In this briefing, Red Hat’s Ramon Acedo Rodriguez presents the strategy, vision and current state of affairs for containers within Red Hat OpenStack Platform. In this session you will learn what role containers play in OpenStack, what we as Red Hat are focusing on, what we already have brought to our customers and what you can be expecting in the future in infrastructure as well as tenant layers.
As you can imagine, Ubuntu 18.10 will come with a lot of new features and improvements, some of which Canonical planned for a long time but didn't manage to implement them in the recently released Ubuntu 18.04 LTS (Bionic Beaver) operating system due to its long-term support status and the focus on stability and reliability.
So, like any other 9-month supported release, Ubuntu 18.10 will be a testbed for Canonical to try new things. Some of these include the ability to unlock your Ubuntu desktop with a fingerprint reader, integration with the KDE Connect Android app by default through GS Connect, a new installer, and a new system theme.
Why else did the Tennibot team turn to Ubuntu originally? “We needed something that was both light and compatible with libraries and existing software. Given the geographical spread of where the Tennibot would end up, our final choice needed to have remote upgrading capability too. And of course, both for ourselves plus our users who are not tech savvy, it needed to be solidly tested and stable” said Lincoln Wang, CTO at Tennibot.
Haitham Eletrabi, CEO of Tennibot adds, “The compatibility with software like ROS and OpenCV makes the implementation and testing of Tennibot’s algorithms an easy task. The support from the Ubuntu community also simplifies debugging the device’s software. In addition, Ubuntu is so versatile with different sensors and components that it really makes it the more superior option for us.”
Bionic is out the door and we’ve started the Cosmic cycle so I wanted to take this opportunity to tell you about our plans for this cycle, the sorts of features we want to work on and what you can expect from 18.10 when it arrives in October.
This week we reconstruct a bathroom and join the wireless gaming revolution. We discuss the Steam Link app for Android and iOS, the accessible Microsoft Xbox controller, Linux applications coming to ChromeOS and round up the community news.
With Ubuntu 18.04 LTS out the door, the folks at Canonical are starting to talk about plans for the next version of the popular GNU/Linux distribution. Actually, the next two.
Ubuntu 18.04.1 is expected to roll out in July, bringing bug fixes and a few new features including easier access to Thunderbolt settings and support for unlocking a PC with your fingerprint.
Earlier this month, the Kubuntu developers have confirmed to us that they won't support new 32-bit installations with the upcoming Kubuntu 18.10 release, and now they made it official.
Developer Valorie Zimmerman posted a message on the Kubuntu-devel mailing list a couple of days ago to officially announce that Kubuntu 18.04 LTS (Bionic Beaver) is the last Kubuntu release to offer 32-bit ISO images, as starting with Kubuntu 18.10 (Cosmic Cuttlefish) they won't be supporting new 32-bit installations.
As already widely reported, the removal of the 32-bit install media revolution has begun amongst official Ubuntu flavors. The first to take the big step was Ubuntu MATE, followed closely by Ubuntu Budgie, Ubuntu Studio, and Ubuntu Kylin. After an official proposal from developer Bryan Quigley, Xubuntu and Kubuntu followed too.
The Lubuntu development team promised to finally switch from LXDE (Lightweight X11 Desktop Environment) to the more modern and actively maintained LXQt (Lightweight Qt Desktop Environment), and the switch is now official.
Lubuntu developer Simon Quigley approached us earlier today to inform that the latest Lubuntu 18.10 daily build is quite usable as he and his team did a lot of work in the past week to accommodate the LXQt desktop environment by default instead of the LXDE desktop environment.
The main difference between LXDE and LXQt is that the former is written with the GTK+ 2 technologies, which will eventually be phased out in favor of the more advanced GTK+ 3, and the latter is built using the Qt framework. However, it doesn't look like there are any plans for LXDE to move to GTK+ 3.
After working on Lubuntu-Next for a while in transitioning from the GTK-based LXDE desktop environment to the modern and maintained LXQt desktop environment that is powered by Qt5, the Lubuntu 18.10 will be the release that officially moves over to the LXQt desktop and pushes out LXDE.
Walter Lapchynski of the Lubuntu project has confirmed that for the Ubuntu 18.10 "Cosmic Cuttlefish" cycle they are switching to LXQt for good.
A Linux-based smartwatch platform that could function as an alternative to Android Wear OS is now finally available for download.
After being in development for a number of years the first release of the new AsteroidOS wearable operating system has been released, providing alternative for Android Wear and supporting a wide variety of Android based smartwatches. Watch the demonstration video below to learn more about the first stable AsteroidOS v1.0 release which is now available to download.
Asteroid OS 1.0 has been created to provide all the features you’d expect of a modern wearable including notifications, agenda, alarm clock, calculator, music remote control, settings customisations, a stopwatch, a timer, and a weather forecast app. The difference between this and other operating systems is that AsteroidOS open-source operating system for smartwatches.
After more than three years of development, AsteroidOS has finally reached the version 1.0 milestone. This open source smartwatch OS is designed to offer Android Wear owners an alternative, especially for older watch models that have stopped receiving Wear OS updates.
AsteroidOS is an open-source alternative to Google’s Wear OS that’s been in development for quite some time, and now owners of compatible smartwatches can finally compile the OS for themselves and give it a try. The official website has a detailed guide for how to compile and install the OS, and it’s already compatible with a range of popular modern and older smartwatches like the LG Watch Urbane and ASUS ZenWatch 2. At this stage, AsteroidOS is pretty basic, with only a few essential apps like a calculator and alarm clock on board. There are also a number of connectivity options, including multiple versions of Bluetooth in low-power mode. The real draw, however, is that the OS is completely opened up to developers, with an SDK already available and the whole project being entirely open-source.
The Raspberry Pi 3 and RPi 3 Compute Module are quickly expanding into the industrial touch-panel market. Here’s a guide to six RPi-based contenders.
In the smart home, voice agents are increasingly replacing the smartphone touchscreen interface as the primary human-machine interface (HMI). Yet, in noisier industrial and retail IoT environments, touchscreens are usually the only choice. The industrial touch-panel computer market has been in full swing for over a decade. Touch-panel systems based on Linux, and to a lesser extent, Android, are gaining share from those that use the still widely used Windows Embedded, and over the past year, several Raspberry Pi based systems have reached market. Here we look at six RPi-based touch-panels.
Klashwerks has launched a $299, gesture controlled “Raven” dashcam, security system, navigation tool, and OBD-II telematics reporting device, which runs Android on a Snapdragon 650 and offers front- and cabin-facing HD cameras.
Klashwerks’ Android-based Raven dashcam and automotive computer was a hit on Indiegogo and won a CES Innovation Award. Now it’s available publicly for $299.
Volvo’s decision to pick Intel’s Atom automotive system on chip (SoC) to run In Vehicle Infotainment (IVI) for its new XC40 SUV highlights the intensifying competition among chip makers in this fast-growing sphere. The decision to base the system on Android also illuminates the evolving OS scene for cars, with Linux the primary alternative in its AGL (Automotive Grade Linux) variant.
Mysterious gaming startup Wonder has revealed some interesting details of its upcoming gaming hardware. Thanks to an early prototype obtained by The Verge, it’s now confirmed that Wonder is working on an Android-powered device focused on gaming.
Andy Kleinman, the CEO and co-founder of secretive startup Wonder, thinks the game industry is finally ready for a truly hybrid piece of hardware — and he’s not talking about the Nintendo Switch. Sitting in The Verge’s San Francisco office late last month, he pulls what looks like a standard Android smartphone out of a mesh black case. It’s sleek, square cornered, and sports a massive screen.
As good as it looks, it’s still a prototype device, crafted by notable Silicon Valley industrial designer Yves Behar. Wonder hopes it will be the centerpiece of an entertainment ecosystem for gamers and gadget heads who are fans of forward-looking tech. Unlike a standard Android phone, this device is running a custom layer of software, tentatively called WonderOS, that lets the company overclock the phone’s graphics processor like it were a PC gaming rig and allows the device to beam the display to a television when docked, much like a Switch.
One thing artists, engineers, and hackers share in common is their antipathy for management. So, when the time comes when we actually need project management, it comes as a painful growing experience.
For the Lunatics! animated open movie project, we started by using basic tools popular with open source software projects, like a version control system (Subversion), a wiki (MediaWiki), and a bug-tracker and online browser for the source code (Trac). This is viable for a team of a half-dozen people and an unhurried schedule on a volunteer project. But it quickly becomes unmanageable for larger teams and tighter schedules.
Simple software is a thing of the past. Think about it: No program out there is created in a vacuum. Every program uses libraries, has run-time dependencies, interacts with operational environments, and reacts to human inputs. Free and opensource software, as a creative free-market approach to software development, provides more than one solution for every challenge. There are multiple compilers, operating systems, statistics packages (known today as machine learning), test frameworks, orchestration solutions, and so on. Each project moves at its own speed, releasing new features and adding new attributes. Imagine for a second that there is a need to combinea few of these complicated projects into a meta-complex system. It sounds quite sophisticated, doesn't it?
Continuing our quest for robust, enterprise-grade open source network monitoring, we tested Icinga Core 2 (version 2.8.1) and the stand-alone Icinga Web 2 interface. Created in 2009 as a fork of the Nagios network monitoring tool, Icinga has come a long way.
We found Icinga to be a powerful monitoring tool with many great features. The Core install is straightforward and basic monitoring is easy with either pre-configured templates or plugins. However, we discovered that the Web install is a bit more complicated and could stand to be streamlined.
The DigitalBits Foundation is an open source project that provides development resources, infrastructure, events and education via a global transaction network and protocol. Loyalty program operators are able to tokenize their respective loyalty points as digital assets on this decentralized network and users can trade these various digital assets on-chain. DigitalBits latest addition is a partnership with Cogeco Peer 1, a global provider of business-to-business products and services.
The Foundation’s vision is to see the DigitalBits blockchain help solve portability, security and liquidity issues with certain digital assets, such as Loyalty and Rewards programs, and help generate additional value for consumers, businesses and certain charitable organizations.
Al Burgio, the founder and CEO, talked with Block Tribune about the organization.
There’s been a lot of drama in 2018 concerning the Chinese vendors Huawei and ZTE and their ability to do business in the United States. The fate of these companies seems inextricably tied to larger geo-political events.
ZTE has been banned for seven years from buying components from U.S. companies for its products. And members of the U.S. Congress have attacked Huawei’s ability to do business in the country, claiming the vendor’s equipment poses a national security risk.
The project is led by a core group of contributors and Googlers, and managed by the community. The group of core contributors is self-managing and added by two supporting votes from other core contributors.
According to Google, some parts of Bazel will never make it into open source because it integrates with Google-specific technology or the company plans to get rid of those features in the future.
The Angular team has announced plans to migrate its build scripts with Bazel to get faster and more reliable incremental builds. As of Angular 6, Angular itself is now built with Bazel, according to Stephen Fluin, developer advocate for Angular. “Bazel is the build system that Google and the Angular team use to keep incremental builds under 2 seconds,” the team wrote in a post.
Bazel is already being used by companies such as Asana, Ascend.io, Databricks, Dropbox, Etsy, Google, Huawei, LingoChamp, Pinterest and Uber. Open-source projects using Bazel include Angular, Deepmind Lab, GRPC, gVisor, Kubernetes, Sonnet, TensorFlow and Trunk.
KDE Student Programs is happy to present our 2018 Google Summer of Code students to the KDE Community.
Welcome Abhijeet Sharma, Aman Kumar Gupta, Amit Sagtani, Andrey Cygankov, Andrey Kamakin, Anmol Gautam, Caio Jordão de Lima Carvalho, Chinmoy Ranjan Pradhan, Csaba Kertesz, Demetrio Carrara, Dileep Sankhla, Ferencz Kovács, Furkan Tokac, Gun Park, Iván Yossi Santa María González, Kavinda Pitiduwa Gamage, Mahesh S Nair, Tarek Talaat, Thanh Trung Dinh, Yihang Zhou, and Yingjie Liu!
I attended PyCon US in Cleveland over the last week. Here’s a quick summary of the conference.
Aside from my usual “you should go to PyCon” admonition, I’d like to suggest writing a summary like this every time you visit a conference. It’s a nice way to share what you found valuable with others, and also to evaluate the utility of attending the conference.
I barely write a lick of Python anymore, so I mostly attend PyCon for the people and for the ideas. ome themes are common to PyCon: data science, machine learning, education, and core language. Of course, there’s always a smattering of other topics, too.
During the poster session, I saw a poster on the Python Developers Survey 2017 from JetBrains. One statistic that surprised me: 50% of respondents use Python primarily for data analysis.
Nineteen years in, LinuxFest Northwest is the original community LinuxFest and is easily the lowest-stress event on my calendar. While Bellingham, Washington may seem like an odd place to host a conference, it is actually the natural end of the line for tech workers who migrate up the West coast from Silicon Valley in search of an affordable place to live and work where you can kayak after work. This lifestyle draw has created quite the tech scene in the Bellingham area and its proximity to the Canadian border makes LFNW an attractive destination for Vancouver, B.C. community members. Some attendees traveled from as far away as Germany and Taiwan, making this an international event despite its remote location. If you have never been to an LFNW, I encourage you to consider attending the 20th anniversary one in 2019!
Apart from the technical side of things, I also tried to act as a city guide and hope my guests liked the places I took them. I for sure had lots of fun hanging out with all those people!
On April 22nd and 23rd, we attended a growing OSS event called FOSS North in Gothenburg – Sweden. According to foss-north.se, “FOSS-North is a free / open source conference covering both software and hardware from the technical perspective. Hosted in Gothenburg between Copenhagen, Oslo and Stockholm with an international airport, we provide a meeting place for the Nordic foss communities and will bring together great speakers with a great audience.” and that alone sounds like a lot of fun for us nerds!
[...]
FOSS-North hosted a bevy of different speeches during the 2-day period with 25 speakers, 2 of them from Jolla! We held our speech about the history of Jolla and the Sailfish community, continued by a piece of our roadmap for Sailfish X, Sailfish 3, and what is planned for the future. We ended the talk by a rather long Q&A from the audience. You can watch the whole talk below, and also access our slides that we used during the talk here.
After launching in 2017, the OpenDev Conference is now an annual event. At the inaugural event last September, the conference focus was on edge computing. This year's event, taking place May 22-23, will be focused on Continuous Integration/Continuous Deployment (CI/CD) and will be co-located with the OpenStack Summit in Vancouver.
Thanks to Debian, I have the chance to be able to attend the Hamburg Mini-DebConf, taking place in Hamburg from May 16th to May 20th. We are hosted by Dock Europe in the amazing Viktoria Kaserne building.
I missed my flight on Wednesday, and for a moment I thought I would have to cancel my attendance, but luckily I was able to buy a ticket for Thursday for a good price.
I arrived at the venue just in time for a "stand-up" meeting, where people introduced themselves and shared what are they working on / planning to work on. That gave me a great feeling, having an idea of what other people are doing, and gave me motivation to work on my projects.
The venue seems to be some kind of cooperative, with office space for different associations, there is also a small guest house (where I am sleeping), and a "kantina". The building seems very pretty, but is going through some renovations, so the scaffolding does not let you see it much. It also has a big outdoors area, which is always welcomed.
Mozilla released on Wednesday the first point release to the Firefox 60.0 web browser, version 60.0.1, which brings several improvements and fixes some annoyances reported by users lately.
One of the annoyances that Mozilla resolved in the Firefox 60.0.1 release, which started rolling out to Linux, Mac, and Windows platforms, is the displaying of "Sponsored content" on the New Tab page. Mozilla says that it will now immediately disappear when the user disables the "Sponsored Stories" option in Preferences.
With the Firefox 60.0.1 release, the web browser now avoids overly long cycle collector pauses with certain add-ons, improves momentum scrolling on non-zoomable pages for touchscreen devices, and restores language translations of the Preferences panels when using a language pack.
I’ve spent some time during this DebCamp to migrate to Pelican, which is written in Python, packaged in Debian, and its dependencies are quite straighforward to install. I had to install (and write) a few plugins to make the migration easier, and port my custom Octopress Bootstrap theme to Pelican.
Canonical and Microsoft have rolled out Ubuntu 18.04 LTS to the Microsoft Store for running with Windows Subsystem for Linux (WSL). Here are some initial benchmarks of Ubuntu 18.04 LTS on Windows 10 WSL with the April 2018 Update compared to the Bionic Beaver installed bare-metal and then also the older Ubuntu 16.04 WSL setup.
Hey all, It’s been a while since I last posted but I thought I would hammer something out here. My most recent purchase was a System76 Galago Pro. I thought, afer playing with POP! OS a bit, is there any reason I couldn’t get BSD on this thing. Turns out the answer is no, no there isnt and it works pretty decently.
To get some accounting stuff out of the way I tested this all on FreeBSD Head and 11.1, and all of it is valid as of May 10, 2018. Head is a fast moving target so some of this is only bound to improve.
Of the many notable new features, GIMP 2.10 has ported most of its image processing capabilities to GEGL, a data flow based image processing framework that is free software (its source code is in GNOME git).
GEGL provides floating point processing and non-destructive image processing capabilities, “allowing high bit depth processing, multi-threaded and hardware accelerated pixel processing, and more”.
GIMP’s lack of multi-core processing has historically caused performance issues, which is a true deterrent in the graphics processing world.
Moreover, the program can now utilise parallel processing, which is a big deal for various reasons, namely, more efficient processor usage through use of multiple cores.
The 2016 Abstractions conference drew software professionals from all over the world — many of them big names in the field, such as Larry Wall, who invented the Perl programming language; Richard Stallman, founder of the Free Software Foundation and creator of GNU; and Raffi Krikorian, formerly of Twitter and Uber — which was one of Reese’s goals when he first started hosting Code & Supply’s meetups.
Graphing calculators are one of those funny markets that never seem to change. Standardized testing has created a primordial stew of regulatory capture in which ancient technology thrives at modern retail prices while changing little. The NumWorks calculator certainly isn’t the first competitor to challenge the Texas Instruments dynasty with a more modern interface (and a design from this decade), but behind it’s subtle color pops and elegant lines lies the real gem; a fantastically well documented piece of open source hardware. The last time we wrote about the NumWorks, it was to demonstrate a pretty wild hack that embedded an entire Pi Zero but it’s worth drawing attention to the calculator itself.
The Git Protocol Version 2 was announced today by Google as a major update to the distributed revision control system's wire protocol. Git protocol version 2 is much more efficient and yields significant performance benefits.
The new Git wire protocol offers server-side filtering for references, easy extensibility for new features, and simplified client handling of the HTTP transport.
Today we announce Git protocol version 2, a major update of Git's wire protocol (how clones, fetches and pushes are communicated between clients and servers). This update removes one of the most inefficient parts of the Git protocol and fixes an extensibility bottleneck, unblocking the path to more wire protocol improvements in the future.
The protocol version 2 spec can be found here.
[...]
We recently rolled out support for protocol version 2 at Google and have seen a performance improvement of 3x for no-op fetches of a single branch on repositories containing 500k references. Protocol v2 has also enabled a reduction of 8x of the overhead bytes (non-packfile) sent from googlesource.com servers. A majority of this improvement is due to filtering references advertised by the server to the refs the client has expressed interest in.
Imagine something really cool, like a fridge connected to a powerwall, powered entirely by solar panels. What could be cooler than that?
How about a fridge powered entirely by solar panels without the powerwall? Zero battery use, and yet it still preserves your food.
The patent system was allegedly designed to allow recovery of the investment in research and development (R&D) of a new product, through the selling of the product under exclusivity for a period of time. Several studies have related high prices of medicines to the monopoly situation established by the patent system and other monopoly rights (such as data exclusivity). It is known that the existence of a patent can lead to high prices due to the market condition in which one producer can operate with exclusivity. In the absence of competition, a producer can charge virtually any price for its product. Competition, therefore, can promote significant price reduction and increase access.
It takes five to eight years for a patent to be examined in Thailand because of the Department of Intellectual Property’s (DIP’s) “innovative step examination” procedure, said Chalermsak Kittitrakul, coordinator for access to medicines campaigns at AIDS Access Foundation. When a patent application is submitted to the DIP, the agency makes a formal notification to the public. Patent protection begins from the filing date and extends for up to 20 years. If the application is not opposed, or is opposed but later accepted, the applicant has the option of waiting five years to submit a request to start the examination process, he said.
A study carried out with the support of the DIP and the Thai Food and Drug Administration found that the large patent examination backlog is attributable both to the innovative step examination and to the multinational pharmaceutical industry, said Chalermsak. Since patent protection begins when an application is filed, multinational drug companies will often send threatening legal notices to generic companies seeking to produce a similar drug even if it’s not yet clear that the patent will be granted, he said. Companies also take advantage of the gap in the patent examination process, he said: The study, on evergreening patents on medicines carried out be an academic team covering patents and patent applications in 2000-2010, showed that most innovative step examination requests for drug patents are submitted to the DIP in the fourth and fifth year.
Headlines were generated earlier this week, following a report that China has introduced 25-year patent terms for some innovative drugs. However, it turns out not to be true, with a number of sources confirming that no such changes have yet been implemented. Nevertheless, with a conditional patent term extension for pharmaceuticals products having been proposed by Chinese state institutions – which are also considering other reforms of pharmaceutical IP rights – life sciences innovators ought to keep a close eye on developments in the country. The reports began with a Nikkei Asian Review article on the 16th May...
I totally forgot to talk about EFAIL in my last blog posts. It was a little shock when I woke up on Monday, the first day of the coding phase, only to read sentences like “Are you okay?” or “Is the GSoC project in danger?” :D I’m sure you all have read about the EFAIL attack somewhere in the media, so I’m not going into too much detail here (the EFF already did a great job *cough cough*). The E-Fail website describes the attack as follows: “In a nutshell, EFAIL abuses active content of HTML emails, for example externally loaded images or styles, to exfiltrate plaintext through requested URLs.”
The first was the kernel. I ended up hand-crafting a kernel, removing anything I thought was unlikely we'd need, then restarting several times when I discovered that the system wouldn't boot because the things I thought I understood were more … esoteric than I'd realised. I'm not a kernel developer, and this was a salutary lesson in how skilled those folks are. At least, at the time I was doing it, there were less code and fewer options than there are today. On the other hand, I was having to hack back to a required state, and now there are more cut-down kernels and systems to start with than there were back then.
The other piece I left for last was pruning the installed operating system applications and associated utilities. Again, there are cut-down options that are easier to use now than then, but I also had some odd requirements—I believe that we needed Java, for instance, which has, or had …. well let's say a lot of dependencies. Most modern Linux distributions start off by installing lots of pieces so you can get started quickly without having to worry about trying to work out dependencies for every piece of external software you want to run.
This policy has continued to the present. In the summer of 2012, the U.S. Defense Intelligence Agency outlined their strategy in a secret document : “THERE IS THE POSSIBILITY OF ESTABLISHING A DECLARED OR UNDECLARED SALAFIST PRINCIPALITY IN EASTERN SYRIA (HASAKA AND DER ZOR).”The U.S. looked favorably on what the document predicts will be the creation of the “Islamic State”: “THIS IS EXACTLY WHAT THE SUPPORTING POWERS TO THE OPPOSITION WANT, IN ORDER TO ISOLATE THE SYRIAN REGIME…”.
Then, in a leaked audio conversation with Syrian opposition figures in September, Secretary of State John Kerry said the U.S., rather than seriously fight Islamic State in Syria, was ready to use the growing strength of the jihadists to pressure Assad to resign, just as outlined in the DIA document.
“We know that this was growing, we were watching, we saw that Daesh [a derisive name for Islamic State] was growing in strength, and we thought Assad was threatened,” Kerry said. “We thought however we could probably manage that Assad might then negotiate, but instead of negotiating he got Putin to support him.”
Russia began its military intervention in late September 2015 without the United States, with the Kremlin’s motives made abundantly clear by Vladimir Putin and other Russian officials. But such clear explanations are rarely reported clearly by Western corporate media, which instead peddles the line from officials and think tanks that Russia is trying to recover lost imperial glory in the Middle East.
[...]
The true “state sponsor of terrorism” is not Iran; it is the West and their allies. Since Iran has been fighting ISIS and other extremists in Syria, it is appropriate that the first feature length movie depicting that battle against terrorism and ISIS comes from Iran.
Hundreds of Iranians have given their lives alongside their Syrian and Iraqi comrades. “Damascus Time” is not the product of Hollywood fantasy; it’s the product of actual human drama and conflict occurring in the Middle East today. “Damascus Time” is fictional but based on a real conflict with actual blood, atrocities, tragedies and martyrs.
Monday’s casualties included 1,861 wounded, bringing total injuries inflicted by Israel to 6,938 people, including 3,615 with live fire. Israel is using bullets designed to expand inside the body, causing maximum, often permanent damage: “The injuries sustained by patients will leave most with serious, long-term physical disabilities,” says Médecins Sans Frontières (Ha’aretz, 4/22/18).
The Palestinian health ministry in Gaza says Israeli soldiers killed at least 60 Palestinians and wounded as many as 2,700 in an eight-hour period pm May 14. Palestinians protesting both the horrific living conditions in Gaza and their inability—despite international law—to leave it, to return to the homes from which they were expelled, along with hundreds of thousands of people, in the 1940s. At the same time—and for many US TV viewers, on a sickening split-screen—Israeli Prime Minister Benjamin Netanyahu, celebrating the opening of the US embassy in Jerusalem, declared it a “great day for peace.”
Media could hardly avoid revealing the disjunction, even as many worked hard to tell you you weren’t seeing what you thought you were seeing—that the overwhelmingly unarmed people were a violent mob, that the snipers picking them off from a distance were defending their lives.
Venezuelan President Nicolás Maduro is the frontrunner in the presidential elections that will take place on Sunday. If past pronouncements and practice by the United States are any indication, every effort will be made to oust an avowed socialist from the the U.S. “backyard.”
This week, the leftist president of Bolivia, Evo Morales, tweeted: “Before the elections they (U.S. and allies) will carry out violent actions supported by the media and after the elections they will try a military invasion with Armed Forces from neighboring countries.”
U.S. antipathy towards the Venezuelan government started with the election of Hugo Chávez in 1998, followed by a brief and unsuccessful U.S.-backed coup in 2002. Chávez made the magnanimous, but politically imprudent, gesture of pardoning the golpistas, who are still trying to achieve by extra-parliamentary means what they have been unable to realize democratically. After Chávez died in 2013, the Venezuelans elected Maduro to carry on what has become known as the Bolivarian Revolution.
WikiLeaks has announced it will sue the British Guardian over the scurrilous allegations it made on May 15 that Julian Assange “hacked” the communication system of the Ecuadorian embassy in London where he has been confined since he sought political asylum in June 2012.
The only and obvious motive behind the unsubstantiated, “anonymous” allegations is to provide the Ecuadorian government with a pretext to renege on Assange’s asylum and force him out of the embassy. Upon doing so, he would be arrested by waiting British police for breaching bail conditions. Once in British custody, the WikiLeaks editor would face the prospect of extradition to the US to stand trial on charges of espionage, which could lead to his protracted imprisonment or, potentially, even his execution (see: “Conspiracy emerges to push Julian Assange into British and US hands”).
In a tweet issued shortly after the publication of the Guardian articles, WikiLeaks denounced the assertions as an “anonymous libel” made on behalf of the “current UK-US government onslaught against Mr Assange’s asylum—while he can’t respond. You’ve gone too far this time. We’re suing.”
Rafael Correa, the former president of Ecuador, denounced his country’s treatment of Julian Assange as “basically torture.”
In an exclusive interview with The Intercept, Correa said the following.
However, it's worth pointing out that regardless of whether he leaked classified information to WikiLeaks or is guilty of any crime, he was sloppy in a way that we'd probably prefer intelligence officials with security clearances to not be.
This week, we got together with young reporters and editors from Real Chi — a learning newsroom that covers Chicago’s West Side — to discuss Illinois’ Freedom of Information Act, or FOIA, and answer questions about how their team could use public records to inform their reporting.
We’ve already filed a few thousand public records requests across our Illinois newsroom. Public records have played a role in almost all of our stories — including reporter Jodi S. Cohen’s recent piece about medical research misconduct at the University of Illinois at Chicago, where documents revealed how negligence and noncompliance put children at risk. Since Real Chi’s reporting covers a specific part of the city, we enjoyed the opportunity to talk about public records on a hyperlocal scale.
Ecuador's President Lenin Moreno is eliminating the extra security for WikiLeaks founder Julian Assange provided by his predecessor, Rafael Correa.
Ecuador's president Lenin Moreno is eliminating all additional security from the London embassy in which WikiLeaks founder Julian Assange has been housed in political asylum since 2012, according to state newspaper El Telegrafo.
Ecuador has cancelled extra security at the London embassy where WikiLeaks founder Julian Assange has been holed up since 2012.
Breaking news: a series of articles has been published by the Guardian concerning Julian Assange, splashed over the front pages. The big reveal? That after the UK threatened to invade the Ecuadorean embassy, Ecuador beefed up its security and surveillance at said embassy. And that this costs money. And there is pressure to find a solution to a situation that has been described by the United Nations as illegal and arbitrary detention.
Lost in the lede was this: that Ecuador appears to be hoping “that Assange’s already uncomfortable confinement will become intolerable”. The Oxford dictionary defines “intolerable” as “unbearable, insufferable, unsupportable, insupportable, unendurable, beyond endurance, unacceptable, impossible, more than flesh and blood can stand, too much to bear, past bearing, not to be borne, overpowering (…)”.
Isn’t the headline story that the editor-in-chief of WikiLeaks remains detained without access to fundamental healthcare? And since March this year, has been cut off from the outside world, bar meetings with his lawyers, which have apparently been surveilled?
U.S. authorities have identified a suspect in last year’s “Vault 7” leaks of CIA hacking and electronic surveillance tools used in foreign espionage operations, reports the Washington Post.
The Vault 7 release – a series of 24 documents which began to publish on March 7, 2017 – reveal that the CIA had a wide variety of tools to use against adversaries, including the ability to “spoof” its malware to appear as though it was created by a foreign intelligence agency, as well as the ability to take control of Samsung Smart TV’s and surveil a target using a “Fake Off” mode in which they appear to be powered down while eavesdropping.
“The Far Left Is Winning the Democratic Civil War” was the headline over a Washington Post report (5/16/18) on the results of recent primary elections.
So what counts as “far left” to the Washington Post, the newspaper owned by the world’s richest human?
[...]
Scott Wallace in Pennsylvania was described as “the grandson of Henry Wallace, who was Franklin Roosevelt’s vice president for a term, and then ran against Harry Truman, who FDR dumped him for, from the far left in 1948.” Aside from Scott Wallace’s self-description as a “proud progressive” and his promise to “make America sane again,” genealogy was all the Post presented to tie him to the “far left.”
There were also some candidates who were implicitly placed in the “far left” by the fact that they successfully challenged “Democratic moderates,” thus “causing a new bout of heartburn among party strategists.” For example, Pennsylvania congressional candidate Susan Wild was worrisome because she defeated John Morganelli who “opposes abortion rights and ‘sanctuary cities,’” and whom she criticized for “for speaking positively about Trump and tweeting that he was open to taking a job in the administration during the transition.” You know, like “moderates” do.
Tony Perkins does not believe the Constitution protects the religious freedom of Muslims or liberal Christians.
The newest addition to the U.S. Commission on International Religious Freedom, Tony Perkins, does not believe in religious freedom.
Perkins, who was appointed to the post by Senate Majority Leader Mitch McConnell (R-Ky.), will now serve on a commission that supposedly serves as a watchdog “dedicated to defending the universal right to freedom of religion or belief abroad,” even though he has repeatedly demonstrated that he does not believe in the equal protection of Muslims and others.
The commission has a long history of politicization, along with anti-Muslim and anti-LGBT bias. Perkins’ inclusion will only continue to undermine its credibility.
While he claims to support religious freedom, Perkins believes that the Constitution does not protect the rights of Muslims.
A federal judge on Thursday cast doubt on a civil lawsuit brought against the Trump campaign and Roger Stone by three Democrats who claim that election-year WikiLeaks releases destroyed their reputations.
The hearing put Trump campaign lawyers in the position of arguing in court that there was no collusion between President Donald Trump's campaign and the Russians -- a drama that played out on the one-year anniversary of special counsel Robert Mueller's criminal investigation into exactly that matter.
A lawyer for U.S. President Donald Trump’s campaign on Thursday rejected as “wild speculation” allegations by three Americans that it conspired with Russians to disseminate their private information from hacked emails to deter them from supporting Hillary Clinton in the 2016 election.
A few days ago, we held a live taping of the “Trump, Inc.” podcast at The Greene Space in New York City. Tony Schwartz, the co-author with Donald Trump of “The Art of The Deal,” talked with Ilya Marritz from WNYC and Jesse Eisinger from ProPublica about what Schwartz does and does not recognize in President Trump now.
That conclusion is inescapable if you closely examine the sworn testimony of two erstwhile FBI allies, James Comey and Andrew McCabe, about the leaking episode that led to McCabe’s firing in March. After all, two diametrically opposed accounts can’t both be correct.
President Donald Trump has seized upon the situation — laid bare in a report from the Justice Department’s inspector general — to assail both men, long among his favored targets for reasons having nothing to do with their veracity. “He LIED! LIED! LIED!” Trump wrote, in a veritable presidential tweet-gasm, hours after the McCabe report’s release. “McCabe was totally controlled by Comey - McCabe is Comey!! No collusion, all made up by this den of thieves and lowlifes!”
This is much more than a venomous 21st century personal duel — tweet versus tweet at 10 paces. The credibility of Comey and McCabe is crucial, giving Trump every incentive to tar them. The former has offered withering accounts of his interactions with the president. And given what the two men observed both before and after Trump sacked Comey, both could be called on for key testimony in a potential obstruction of justice charge against the president.
The best evidence that Russia-gate is sinking beneath the waves is the way those pushing the pseudo-scandal are now busily covering their tracks. The Guardian complains that “as the inquiry has expanded and dominated the news agenda over the last year, the real issues of people’s lives are in danger of being drowned out by obsessive cable television coverage of the Russia investigation” – as if the Guardian’s own coverage hasn’t been every bit as obsessive as anything CNN has come up with.
The Washington Post, second to none when it comes to painting Putin as a real-life Lord Voldemort, now says that Special counsel Robert Mueller “faces a particular challenge maintaining the confidence of the citizenry” as his investigation enters its second year – although it’s sticking to its guns that the problem is not the inquiry itself, but “the regular attacks he faces from President Trump, who has decried the probe as a ‘witch hunt.’”
The "fake news" law erected in Malaysia was put in place to do one thing: allow the government to increase its control of journalists. Top-level corruption needed to be buried, and a "fake news" law seemed like a handy way to do it. The law made one thing clear: the government alone would decide what news was fake. The most likely target appeared to be reporting about the mysterious appearance of $700 million in Prime Minister Najib Razak's personal bank account.
The law claimed its first victim shortly after being enacted. A Danish citizen visiting Malaysia was arrested and charged after he posted a YouTube video allegedly misrepresenting the time it took for emergency services to respond to the shooting of a Hamas engineering expert. The man will now spend a month in jail after being unable to pay the $2,500 fine handed down by the court.
It once looked like the law might be headed for a swift derailment. Mahathir Mohamad promised he would abolish the law entirely if elected Prime Minister. The BBC reports only part of the previous sentence has come to pass.
Maybe, in a crowded lift packed with people whom I didn't know, I was feeling a little claustrophobic. Maybe I'm too fond of old jokes.
But when a voice from the front of the elevator called out: 'What floors would you like, people at the back?' I retorted: 'Ladies' lingerie!'
Having been thinking, reading, speaking, and writing about “hate speech” over the last four decades, I had come to believe that I had nothing new to say, and that all arguments on all sides of the topic had been thoroughly aired.
That view began to change several years ago, as I started to see increasing activism on campus and beyond in sup€port of various equal rights causes. Having been a student activ€ist myself, I have been thrilled by the recent resurgence of student engagement. I have been disheartened, how€ever, by the fact that too many students and others have called for censoring speakers who don’t share their views, apparently believing that freedom of speech would undermine the social justice causes they champion.
On the heels of World Press Freedom Day – a day designed to raise awareness of the importance of freedom of the press and remind leaders of their duty to uphold and respect the right to freedom of expression – I’m reminded I shouldn’t have to point that fact out.
Isn’t it 2018? Aren’t we all preaching for acceptance of diversity, as well as diverse thoughts and points of view?
Not according to some, and that was on full display in the community last week.
A group of individuals were angry a particular letter had been published in our Letters to the Editor section for it expressing an opinion they disagreed with. Rather than contact us directly and speak with us about the rationale behind why the letter was published, they decided to use social media to slam the Lacombe Globe as if we endorsed the letter or were using it as a “publicity stunt.”
In what could emerge as an interesting First Amendment test case, Texas A&M University was sued in federal court for allegedly censoring user comments on its official Facebook page. The lawsuit was filed by the Electronic Frontier Foundation, a nonprofit devoted to defending civil liberties online, on behalf of the People for the Ethical Treatment of Animals. The plaintiffs believe government-owned social media sites should be a forum for public discourse. Since 2016 PETA has been waging a campaign against alleged animal abuse at Texas A&M’s muscular dystrophy dog laboratory, and claims that the university’s social media team has been suppressing user comments about the lab.
The operation runs like clockwork, seven days a week, every waking hour, without significant variation. If Philip Cross genuinely is an individual, there is no denying he is morbidly obsessed. I am no psychiatrist, but to my entirely inexpert eyes this looks like the behaviour of a deranged psychotic with no regular social activities outside the home, no job (or an incredibly tolerant boss), living his life through a screen. I run what is arguably the most widely read single person political blog in the UK, and I do not spend nearly as much time on the internet as “Philip Cross”. My “timecard” would show where I watch football on Saturdays, go drinking on Fridays, go to the supermarket and for a walk or out with the family on Sundays, and generally relax much more and read books in the evenings. Cross does not have the patterns of activity of a normal and properly rounded human being.
[...]
There is no doubt that Kamm, leader wirter of Murdoch’s Times, is close the the “Philip Cross” operation. Many people believe that Kamm and Cross are the same person, or that Kamm is part of a multiple persona. Six times I have personally had hostile edits to my Wikipedia page by “Philip Cross” made in precise conjunction with attacks on me by Kamm, either on Twitter, in a Times editorial or in Prospect magazine. Altogether “Philip Cross” has made 275 edits to my Wikipedia page. These include calling my wife a stripper, deleting my photo, removing my reply to attacks made on me by Kamm and Harding among others, and deleting my refusal of all honours while a British diplomat.
Neil Clark and Peter Oborne are among many others who have suffered attacks on them by Philip Cross on Wikipedia simultaneously with attacks by Kamm on other media. Clark is taking Kamm to court for stalking – and “Philip Cross” has deleted all reference to that fact from Kamm’s Wikipedia page.
What is plain is that Kamm and Cross have extremely similar political views, and that the dividing line of those they attack and those they defend is based squarely on the principles of the Euston Manifesto. This may be obscure, but is in fact an important Blairite declaration of support for Israel and for neo-con wars of intervention, and was linked to the foundation of the Henry Jackson Society. Who do we find editing the Wikipedia entry for the Euston Manifesto? “Philip Cross”.
What is particularly interesting is that “Philip Cross”‘s views happen to be precisely the same political views as those of Jimmy Wales, the founder of Wikipedia. Jimmy Wales has been on twitter the last three days being actively rude and unpleasant to anybody questioning the activities of Philip Cross. His commitment to Cross’s freedom to operate on Wikipedia would be rather more impressive if the Cross operation were not promoting Wales’ own opinions. Jimmy Wales has actively spoken against Jeremy Corbyn, supports the bombing of Syria, supports Israel, is so much of a Blairite he married Blair’s secretary, and sits on the board of Guardian Media Group Ltd alongside Katherine Viner.
The UK government's continuing efforts to save the country's children from the evils of internet porn are increasingly ridiculous. Filtering efforts applied by ISPs have managed to seal off access to plenty of non-porn sites while still remaining insanely easy to circumvent. The government -- with a straight face -- suggested there was nothing not normal about internet customers turning over personal information to ISPs in exchange for the permission to view porn. It's as if building a database of the nation's porn aficionados was the government's original intent.
Since nothing about this was working about the way the porn filter's architects (one of whom was arrested on child porn charges) imagined, the UK government decided the same non-functioning tech could be put to work filtering out "terrorist content." Bad ideas have repeatedly been supplanted by worse ones, and now it appears UK citizens may be able to opt out of ISP porn-related data harvesting by [squints at press report] buying a porn license from their local newsjobber.
It is a violently subversive darkly comic take on police brutality, white supremacy, and US machismo – and Childish Gambino’s music video, This is America, has been released to critical acclaim, 133,000,000 YouTube hits (and counting), and minimal backlash.
It may seem incongruous, then, that in 1988, Noam Chomsky and Ed Herman proposed that the media industry would not oppose state or private power in any fundamental way. Herman and Chomsky highlighted five causal factors that led them to this conclusion: concentrated corporate ownership; the prevalence of advertising money; the reliance on official information sources; the disproportionate ability of powerful organisations to issue flak against dissenters, and a pervasive axiom that the Western economic system is a panacea.
As you might know, translating from a language like Mandarin to English is not as simple as say, French to English, especially when it comes to names. Ben, for example, took a Mandarin class and the teacher gave him the name "Jiang Pin Sun" because it sounds kind of like "Ben Johnson."
This idea, of phonetic translation, brings us to... Rice Bunny. If you translate the English words "rice" and "bunny" into Chinese, you get something that kind of sounds like "me too." And if you've been an adult on the internet recently, you're pretty familiar with what "Me Too" means.
In China, though, the hashtag #metoo is censored; posts containing it are deleted and wiped out forever by government censors. So activists and supporters, who are constantly trying to keep the movement alive, have started using the words for rice and bunny, or the emoji of a a rice bowl and a rabbit.
Obviously, many of the examples we chose were designed to be challenging (many based on real situations). But the process was useful and instructive. With each question there were four potential actions that the "trust & safety" team could take and on every single example at least one person chose each option. In other words, even when there was a pretty strong agreement on the course of action to take, there was still at least some disagreement.
Now, imagine (1) having to do that at scale, with hundreds, thousands, hundreds of thousands or even millions of pieces of "flagged" content showing up, (2) having to do it when you're not someone who is so interested in content moderation that you spent an entire day at a content moderation summit, and (3) having to do it quickly where there are trade-offs and consequences to each choice -- including possible legal liability -- and no matter which option you make, someone (or perhaps lots of someones) are going to get very upset.
Few issues are as controversial as the right to free speech, especially when it's pitted against people's desire not to feel attacked or hated simply because of their race, gender, or sexual orientation.
Over the past 20 or 30 years, speech codes have proliferated in the workplace and at colleges and universities. By a narrow margin, says Gallup, today's college students say promoting an inclusive campus environment is more important than protecting First Amendment rights of free speech. Yet large majorities also say they want a campus in which all speech is allowed and that their own campus stifles free expression.
Nadine Strossen, who served as the president of the American Civil Liberties Union (ACLU) from 1991 to 2008, is the author of the new book Hate: Why We Should Resist It with Free Speech, Not Censorship, which lays out a compelling argument against policies that try to restrict what individuals are allowed to say. Attempts to legally prevent and criminalize hate speech, Strossen writes, typically end up being used against the very people and groups they are intended to protect. What's more, she says, the alleged harms caused by ugly speech are routinely overstated.
People have a right to hear all sides of controversial issues and to decide for themselves what they want to believe. They should be free to buy books and attend conferences that address controversial topics. Adults should be permitted to seek voluntary, faith-based counseling services that they believe are in their best interest.
[...]
Specifically, California Assembly Bill 2943 would make “advertising, offering to engage in, or engaging in sexual orientation change efforts with an individual,” connected with the sale of goods or services, unlawful as a type of consumer fraud. The bill defines “sexual orientation change efforts” as “any practices that seek to change an individual’s sexual orientation. This includes efforts to change behaviors or gender expressions, or to eliminate or reduce sexual or romantic attractions or feelings toward individuals of the same sex.” Of course, the bill does not prohibit those psychotherapies that the government believes are intended to affirm rather than change gender expressions or romantic feelings.
A new Repeal the 8th mural, commissioned by the Irish Council for Civil Liberties, was unveiled in Dublin today, as the council said censoring art is “highly questionable” legally. The mural by street artist Giant Sigh, at Bang Bang café in Phibsboro, calls for a Yes vote and is of a figure combining Lavery’s Cathleen Ní Houlihan, familiar from the old pound note, with Rosie the Riveter, the second World War symbol of working women, complete with a Repeal tattoo on her arm.
The Irish Council for Civil Liberties has criticised what it has described as censorship in the artistic community surrounding the debate on the Eighth Amendment.
It said it was concerned at the “chilling effect” of decisions to remove Maser’s Repeal the 8th mural at the Project Arts Centre in Dublin, and to drop a discussion on a new book on the repeal campaign from Dublin’s International Literature Festival.
The council, which is advocating a Yes vote in the referendum, also cited difficulties encountered by Grace Dyas and Emma Fraser in presenting a touring theatre piece Not At Home, which incorporates testimonies from Irish women and is designed to be accessible to all sides.
A cell phone tracking service called LocationSmart has been reportedly leaking real-time location data on millions of mobile phone customers across North America.
Exploiting a bug in its website, anyone could track the location of US cell phone users without obtaining their consent. This bug was spotted by Robert Xiao, a Carnegie Mellon University researcher, in a free trial feature of the website.
A California federal judge summarily refused Wednesday to accelerate a hearing considering access to classified materials sought by AT&T customers pursuing a putative class action over records collected by the National Security Agency.
U.S. District Judge Jeffrey S. White did little more than sign his name to the NSA’s proposed order refusing to move the hearing up from July 6 to June 8 as the customers wanted, to counteract delays granted the government and address arguments on their standing to sue.
Previously, we posted a proposal to mark all HTTP pages as definitively “not secure” and remove secure indicators for HTTPS pages. HTTPS usage on the web has taken off as we’ve evolved Chrome security indicators. Later this year, we’ll be taking several more steps along this path.
Google announced on Thursday in an official blog post that the ‘Secure’ indicator on websites will be removed from September onwards. The move is followed by the gradual shift of web towards adopting HTTPS as the default safety protocol.
The background to this change is the Web's gradual migration to the use of HTTPS rather than HTTP. With an ever-growing fraction of the Web being served over secure HTTPS—something now easy to do at zero cost thanks to the Let's Encrypt initiative—Google is anticipating a world where HTTPS is the default. In this world, only the occasional unsafe site should have its URL highlighted, not the boring and humdrum secure site.
A federal judge has allowed the ACLU, EFF, and the several plaintiffs they represent to continue their Fourth Amendment lawsuit against DHS, ICE, and CBP. The plaintiffs are challenging the Constitutionality of border device searches -- something that has skyrocketed in recent years. As it stands now, these agencies believe nothing stronger than reasonable suspicion is needed to perform highly-intrusive searches. In many cases, not even suspicion is needed, thanks to the "border search" exception to the Fourth Amendment courts have carved out for the government.
Policies for agencies performing border device searches are pretty much identical. All allow searches and seizures of devices without individualized suspicion. This warrantless, suspicionless search may also result in the device being confiscated for weeks or months while a forensic search is undertaken -- again, supposedly without violating travelers' rights. CBP's policy was altered this year, requiring forensic searches and the mirroring of devices to at least reach the level of reasonable suspicion. Better than ICE's policy, but still nothing approaching a warrant.
The government sought to have the lawsuit dismissed, claiming the plaintiffs had no standing to assert violations, much less seek injunctive relief on the theory they would likely be subjected to intrusive device searches the next time they traveled.
He also applauded the European Union for its efforts to reclaim back taxes from major companies. The EU has ordered Apple to pay Ireland $15 billion after regulators determined that the country had granted it illegal tax breaks. Apple is appealing the ruling.
He also hinted it is worth considering whether monopolists like Facebook, Amazon, and Apple should be split up.
“The actions of the National Crime Agency are hostile and seem to point to an investigation of reporters and not the murder of Ján Kuciak,” the OCCRP said in a statement. “We have seen this same behaviour by police in captured states and autocratic regimes. It does not belong in Europe.”
During the alleged interrogation, it is claimed an attempt was made to download information from her phone using specialist equipment. Holcová was allegedly threatened with a €1,650 (€£1,440) fine unless she agreed to cooperate. When the download attempt failed, officers are said to have produced a prosecutor’s order which allowed them to seize it.
Francis Boyle is professor of international law at the University of Illinois College of Law. He is the author of many books on International Law and an outspoken critic of US policy in the Middle East. Boyle’s books include Foundations of World Order and the sequel, Destroying World Order. In the following interview with Pacifica Radio host Dennis J Bernstein, Boyle warns that, among other things, given her background as key implementer of the US torture program, Gina Haspel is vulnerable to be arrested for war crimes and crimes against humanity if she travels abroad.
[...]
We have a 600-page executive summary of the Senate Foreign Intelligence Committee’s report on the extent of torture and extraordinary disappearances by the CIA. This is an official US government document. She was not personally named in there, but she was a high-level official who was personally involved. She certainly supervised the operation in Thailand. Under international law, there is a command responsibility. She is denying that she herself physically tortured anyone, but she supervised others doing the torturing. Under international criminal law, she is accountable for the criminal behavior she oversaw.
There is a new gold standard in the movement to require transparency and community engagement before local police departments are permitted to acquire or use surveillance technology. Oakland’s Surveillance and Community Safety ordinance builds upon the momentum of several cities and counties that have enacted laws to protect their residents from the unchecked proliferation of surveillance technology with the power to invade privacy and chill free speech.
Santa Clara County in Northern California passed the first ordinance of this type in 2016, putting into public view a range of surveillance equipment already in county law enforcement possession and requiring use policies, annual impact reports, and approval at a public hearing before agencies could acquire or use surveillance equipment. Since then, cities across the country, including Seattle, WA; Berkeley, CA; and Davis, CA; have expanded on this model. In addition to reports on the potential risks to civil liberties and privacy, required reporting includes an assessment of whether the surveillance technology’s use would impact or has resulted in a disparate impact on a particular segment of their community.
Oakland’s Surveillance and Community Safety ordinance raises the floor on what should be expected as additional cities and towns look to embrace these critical protections. For example, Oakland’s ordinance more clearly applies the definition of surveillance technology to include software used for surveillance-based analysis. Also, Oakland’s ordinance sets a new bar in disclosure by expressly prohibiting city agencies from entering into non-disclosure agreements (NDA) or any surveillance-related contract that conflicts with the ordinance.
The government is still trying to land a conviction from its mass arrest of participants in last year's Inauguration Day protests in Washington, DC. So far, it has nothing to show for its efforts but a far-too-casual disregard for civil liberties.
The prosecutions began with the government's breathtaking demand for the personal info of all 1 million+ visitors to the Disrupt J20 website. From there, things did not improve. The government's prosecutors accused protest participants of "hiding behind the First Amendment" while attempting to strip away First Amendment protections. One of those charged by the government with rioting was journalist Alexi Wood, who had filmed the protests and had the footage to show he wasn't a participant in violent or destructive acts.
The government compounded its unconstitutional behavior in court when its lawyer (Jennifer Kerkhoff) tried to downplay the significance of a foundational part of our justice system -- that the accusers must prove "beyond a reasonable doubt" the accused committed a crime.
The presumption of innocence is supposed to protect those accused of a crime, in law and in the press. In corporate media, that rule also seems to apply to white people who report people of color to the police for doing innocuous things. As FAIR found, their identities are far more closely protected than those of people falsely targeted for “suspicious” behavior.
In the past few weeks, major news media have been flooded with coverage of incidents of alleged racial profiling and implicit bias—from golfers reported to police for playing “too slowly,” to picnickers fingered for using the wrong type of grill at a park. This coverage was prompted by viral videos and other social media posts released by the accused or by concerned bystanders, in real time or soon after these events occurred. The characters in these stories had one thing in common: The callers and officers involved were white; the alleged offenders, black or brown.
It appears the concept of "extreme vetting" at our borders has been backburnered. The Washington Post is reporting ICE has scrapped plans to acquire software capable of strip-mining immigrants' social media accounts and converting this info into a RATE MY DANGEROUSNESS number. However, it does not appear the concept is being done away with entirely.
Federal immigration officials have abandoned their pursuit of a controversial machine-learning technology that was a pillar of the Trump administration’s “extreme vetting” of foreign visitors, dealing a reality check to the goal of using artificial intelligence to predict human behavior.
Immigration and Customs Enforcement officials told tech-industry contractors last summer they wanted a system for their “Extreme Vetting Initiative” that could automatically mine Facebook, Twitter and the broader Internet to determine whether a visitor might commit criminal or terrorist acts or was a “positively contributing member of society.”
After campus police at Colorado State University pulled two Native American teens off a college tour when a woman told 911 that they were “definitely not” supposed to be there, the school’s president spoke directly to concern about “white supremacists” and their attempt to “frighten and isolate people.” While, if headlines are meant to tell the tale, the New York Times’ “Native American Brothers Pulled From Campus Tour After Nervous Parent Calls Police” fell rather short. Euphemism aside, listeners likely heard about the incident, spotlighted like others, via social media.
Did you know, though, that fully a third of the senior Interior Department officials reassigned in Secretary Ryan Zinke’s recent reshuffle are Native American, even though Native Americans make up less than 10 percent of the department’s workforce? Sources say it’s part of Zinke’s barely veiled plan to remove obstructions to extractive industry. That news, reported by Alice Ollstein at Talking Points Memo—and that’s about it—is also a story about indigenous people and their life in 2018 America. Isolated snapshots of outrageous harms are a meager substitute for genuine coverage of a complex community. There are plenty of things that won’t be captured on cellphone cameras.
A 2014 report by the National Institute of Justice, part of the Department of Justice’s Office of Juvenile Justice and Delinquency Prevention, highlighted the counterproductive nature of punitive policies in the juvenile justice system. They simply don’t work. It would be more effective to provide incarcerated youth with educational opportunities so they don’t fall behind their peers, ensuring they have a fair shot at integrating back into society. California has an opportunity to accomplish exactly this by providing the state’s juvenile offenders with access to quality education resources though the Internet.
Juvenile facilities and state-run foster care programs across California don’t have to provide youth with Internet access for educational purposes. Assemblymember Mike Gipson introduced a bill, A.B. 2448, that aims to fix this problem. The bill ensures that juvenile detention facilities provide youth with access to Internet and computer technology for educational purposes. It also encourages those facilities to provide Internet access for youth to remain in contact with family members. Additionally, youth in foster homes will be given access to the Internet for age-appropriate enrichment and social activities.
By now you've probably been informed that the next-generation of wireless broadband technology is going to revolutionize everything. Much like they did with 3G and 4G, wireless carriers like AT&T, Verizon, Sprint and T-Mobile have repeatedly hyped the fifth-generation (5G) wireless standard, insisting that the technology will somehow usher forth a "societal transformation" that's going to have a magical, cascading impact on every sector in technology, from the internet of (broken) things to the smart cities and self-driving car technologies of tomorrow.
The United States Senate has voted to overturn the FCC and restore net neutrality protections, the fate of that measure currently rests in the House of Representatives. While many will think that the uphill battle there makes it a lost cause, that is simply not true. Together, we have the power to win in the House of Representatives.
Now that the Senate has officially voted 52-47 to reverse the FCC’s so-called “Restoring Internet Freedom Order” under an expedited procedure known as the Congressional Review Act (CRA). It is now pending a vote in the House of Representatives. And while many will incorrectly assume since House Republican leadership has expressed their opposition to ever voting on net neutrality, nothing will come of it, the wishes of the leadership are frankly irrelevant.
What actually matters is whether 218 members of the House of Representatives from either party want to vote to protect net neutrality through a process called a “discharge petition.”
This article is brought to you based on the strategic cooperation of The European Sting with the World Economic Forum.
Author: Kay Firth-Butterfield, Head, Artificial Intelligence and Machine Learning, World Economic Forum LLC & Yoon Chae, Prior Fellow, World Economic Forum Center for the Fourth Industrial Revolution; Intellectual Property Associate, Baker McKenzie.
Warburg Pincus has sold intellectual property management service ipan Group to Castik Capital.
Since its acquisition by Warburg Pincus in 2014, ipan has more than tripled its revenues.
Earlier this year, ipan further expanded its product offering by launching ip-x-change, a new open platform for IP related Software and Services.
I thought this was interesting. Magistrate’s daughter will be a summer associate at the patentee’s firm, and so she disclosed it to the parties and invited their views on whether they thought the case should be reassigned. It is Pacific Coast Building Products, Inc. v. Certainteed Gypsum, available here.
When I was clerking for the CAFC a few years ago, as clerks we avoided cases where we had any entanglement as an internal procedure, but I thought this was interesting because obviously the patentee’s firm knew it was going to hire the daughter, and the magistrate thought it wasn’t a conflict, but wanted the facts out there.
The main change from the draft is the introduction of a new third regulation that seeks to set out the relationship between trade secrets and the existing law of confidential information
The UK government published the Trade Secrets Regulations 2018 today after the legislation was laid before parliament.
There are a couple of things to note here. Tommy Gun's applied for its trademark in Canada in 2009. Luong opened his shop under its current name in 2003. At that time he also registered his business with the local government, something that Tommy Gun's is insisting he change as well. Tommy Gun's own LinkedIN page suggests that the chain was founded in 2009, meaning that Luong was using the name in commerce first. If anything, it seems that Luong should have been the one to have fired off a C&D rather than the other way around.
Triggerballs’ failed attempt to register a 3D mark for its massage ball follows a growing trend of reluctance for EU courts to grant trade mark rights in shapes
The Court of Justice of the European Union ruled on May 16 that a trade mark does not have distinctive character because the product it covers is innovative.
China is set to overtake the US as the biggest foreign trade mark filer by 2020, according to a CompuMark study published today.
You may recall that way back in early 2015, we discussed the absurd story of the New Jersey Turnpike Authority suing Jersey Boardwalk Pizza for trademark infringement. At issue was that the pizza joint's owners, both from New Jersey, had crafted a clever logo that mimicked the logo for the Garden State Parkway, except it altered all the words to be the parlor's name and the food it served. It was a clear homage. Nobody denied it. That didn't change the fact, however, that the NJ Turnpike Authority is both not in the business of selling pizza, nor is it in the business of being in Florida. As such, there was zero potential for customer confusion, and the court dismissed the case.
You would have thought that would be the end of this story. But, no, the NJTPA decided to go the trademark office and try to have the pizza parlor's trademark invalidated.
New Jersey has lost a significant battle against the owners of a small Florida-based pizza franchise whose owners modeled their advertising logo after the state's Garden State Parkway sign. logos-border.jpgJersey Boardwalk Pizza has been using the logo on the left to advertise its business. The New Jersey Turnpike Authority argues its too similar to the Parkway logo. File photo
Three administrative judges with the United States Patent and Trademark Office ruled Monday that Jersey Boardwalk Pizza can continue to use its logo, which the New Jersey Turnpike Authority argued was confusingly similar to the Parkway logo.
If you've been following how much the record labels stumbled around the internet for the past couple of decades, then you know the basics here. But time has a way of erasing some of the nuances of history, and I find it incredible to watch the RIAA and the record labels these days walking around proudly acting as if they were the ones who "saved" the music industry by embracing streaming services that now make up the bulk of the recording industry's revenues. Indeed, as we've pointed out for years, the recording industry has a very long history of overvaluing the music and undervaluing the services that people want. They've spent so long insisting that the music is the sole source of the value of what they produce, that they always downplay (or entirely erase) the rest of the equation: getting the music to fans in a manner that is convenient, reasonable, and non-burdensome. Instead, they always focus on killing the golden goose -- insisting that any successful music tech service pay them more and more until they're squeezed dry.
Over at Motherboard, Ernie Smith, has a good history of how the recording industry screwed up streaming in the early days (unfortunately he does what most people do and refers to what's really the "recording industry" as the "music industry" -- and also simplifies the history to be just one round of mistakes, rather than many, many mistakes leaving a graveyard of dead tech companies in its wake -- but the overall article is still excellent). It's a very instructive piece in detailing exactly how the record label bosses were so focused on making sure that they had control and limits, that they didn't care at all about providing a service that people actually wanted. Much of it focuses on the two idiotic music label-approved streaming services that the industry tried to launch MusicNet and PressPlay (which we dubbed MusicNot and PressPause way back in 2001). Smith details how both services were built entirely focused on "how do we protect our revenue stream" rather than "how do we serve the customer."
Last month, the Conseil d’Etat, the highest administrative court in France, declared that the 313 manuscripts and telegrams written by Charles de Gaulle between 11 December 1940 and 11 December 1942 were official public archives belonging to the state of France (see herein French). As a result, the manuscripts written by the former French President and leader of the Resistance during the Second World War will soon be made available to the public as opposed to becoming part of a private collection. For many historians and public domain enthusiasts, the decision reads as a win. The dispute was not one of copyright but rather of heritage law, leaving the status of these archives in relation to the (copyright) public domain in need of further clarification. Indeed, war-time copyright material is eligible for a special type of protection in France… Read on for more on this.