The Huawei MateBook X Pro is a pretty nice little laptop, featuring a 13.9 inch, 3000 x 2000 pixel touchscreen display with super-slim bezels, an all-metal chassis, and support for up ton an Intel Core i7-8550U processor, 16GB of RAM, 512GB of storage, and NVIDIA GeForce MX150 graphics.
Huawei recently announced that the MateBook X Pro is coming to America, and it’s up for pre-order from B&H.
Sooner than I honestly expected, it seems that the Crostini Project has made its way to the Developer channel on the Samsung Chromebook Plus.
As Robby reported in early May, the Crostini Reddit revealed a user who was already up and running with Crostini(sort of) on the ARM-powered Chromebook. Additionally, a number of commits in the Chromium repository gave us some pretty solid evidence that developers had shifted their efforts to making the container tech work outside of the Pixelbook.
Thanks to a recent update to the Developer channel, we are now seeing reports that ‘Kevin‘ a.k.a the Samsung Chromebook Plus can now run the Linux terminal app just like the Pixelbook does.
The Chrome OS ecosystem is finally changing. This comes after Chromebooks, and the Chrome OS, in general, are now supporting Linux apps. This means that Chromebooks could now actually run more applications. By doing so, tech-savvy users claim that Chromebooks would become eventually a major competitor to both Mac and Windows laptops.
During KubeCon + CloudNativeCon Europe 2018, Justin Cormack and Nassim Eddequiouaq presented a proposal to simplify the setting of security parameters for containerized applications. Containers depend on a large set of intricate security primitives that can have weird interactions. Because they are so hard to use, people often just turn the whole thing off. The goal of the proposal is to make those controls easier to understand and use; it is partly inspired by mobile apps on iOS and Android platforms, an idea that trickled back into Microsoft and Apple desktops. The time seems ripe to improve the field of container security, which is in desperate need of simpler controls.
Well, here we are. Kubernetes turns four years old this month—technically, on June 7, 2018—the very same platform that brings users and data center administrators scalable container technologies. Its popularity has skyrocketed since its initial introduction by Google. Celebrating the project’s birthday is not the only thing making the headlines today. Amazon recently announced the general availability of its Elastic Container Services for Kubernetes (EKS), accessible via Amazon Web Services (AWS).
Once upon a time, it wasn’t a simple task to orchestrate and manage containers in the cloud. Up until this recent EKS announcement, it was up to the administrator to spin up a virtual machine through an Elastic Cloud Compute (EC2) service, run Kubernetes on top of a traditional Linux server installation in EC2 and rely on other AWS moving components to host the container image registry. The entire process was very involved. Not any more!
Nobody knows what DevOps really is, but if you are not doing, using, breathing, dreaming – being? – DevOps, you’re doing it wrong. All teasing aside, with the advent of DevOps, the gap that existed between development teams and operation teams has become closer, to the extent of some companies mixing the teams. Even so, some of those took a different approach and have multidisciplinary teams where engineers work on the product throughout the lifecycle, coding, testing and deploying – including on occasion security teams as well, now called DevOpsSec.
When containers were first introduced in 2008, Virtual Machines, or VMs, were the state-of-the-art option to optimize a data center’s physical resources. This arrangement worked well enough, but had some flaws: Virtual machines utilized too many resources because they required both a complete operating system, and emulated instructions to reach the physical CPU. Even with some technologies like Intel VT-x and AMD-V that attempted to solve the emulation problem, virtual machines were behind bare metal.
The project was founded in 2009. In 2010 the team decided to donate the project to the Apache Software Foundation (ASF). It was incubated at Apache and in 2013, it became a Top-Level Project (TLP).
There were many reasons why the Mesos community chose Apache Software Foundation, such as the permissiveness of Apache licensing, and the fact that they already had a vibrant community of other such projects.
It was also about influence. A lot of people working on Mesos were also involved with Apache, and many people were working on projects like Hadoop. At the same time, many folks from the Mesos community were working on other Big Data projects like Spark. This cross-pollination led all three projects -- Hadoop, Mesos, and Spark -- to become ASF projects.
Stratis is a new local storage-management solution for Linux. It can be compared to ZFS, Btrfs, or LVM. Its focus is on simplicity of concepts and ease of use, while giving users access to advanced storage features. Internally, Stratis's implementation favors tight integration of existing components instead of the fully-integrated, in-kernel approach that ZFS and Btrfs use. This has benefits and drawbacks for Stratis, but also greatly decreases the overall time needed to develop a useful and stable initial version, which can then be a base for further improvement in later versions. As the Stratis team lead at Red Hat, I am hoping to raise the profile of the project a bit so that more in our community will have it as an option.
The advent of user namespaces and container technology has made it possible to extend more root-like powers to unprivileged users in a (we hope) safe way. One remaining sticking point is the mounting of filesystems, which has long been fraught with security problems. Work has been proceeding to allow such mounts for years, and it has gotten a little closer with the posting of a patch series intended for the 4.18 kernel. But, as an unrelated discussion has made clear, truly safe unprivileged filesystem mounting is still a rather distant prospect — at least, if one wants to do it in the kernel.
Attempts to make the mount operation safe for ordinary users are nothing new; LWN covered one patch set back in 2008. That work was never merged, but the effort to allow unprivileged mounts picked up in 2015, when Eric Biederman (along with others, Seth Forshee in particular) got serious about allowing user namespaces to perform filesystem mounts. The initial work was merged in 2016 for the 4.8 kernel, but it was known to not be a complete solution to the problem, so most filesystems can still only be mounted by users who are privileged in the initial namespace.
In February, the bpfilter mechanism was first posted to the mailing lists. Bpfilter is meant to be a replacement for the current in-kernel firewall/packet-filtering code. It provides little functionality itself; instead, it creates a set of hooks that can run BPF programs to make the packet-filtering decisions. A version of that patch set has been merged into the net-next tree for 4.18. It will not be replacing any existing packet filters in its current form, but it does feature a significant change to one of its more controversial features: the new user-mode helper mechanism.
The core motivation behind bpfilter is performance. An in-kernel, general-purpose packet filter must necessarily offer a wide range of features; any given site will probably only use a small subset of those features. The result is a lot of unused code and time spent checking for whether a given feature is in use, slowing the whole thing down. A packet-filtering configuration expressed as a BPF program, instead, contains only the code needed to implement the desired policy. Once that code is translated to native code by the just-in-time compiler, it should be both compact and fast. The networking developers hope that it will be fast enough to win back some of the users who have moved to proprietary user-space filtering implementations.
If bpfilter is to replace netfilter, though, it must provide ABI compatibility so that existing configurations continue to work. To that end, the bpfilter developers intend to implement the current netfilter configuration protocol; bpfilter will accept iptables rules and compile them to BPF transparently. That compilation is not a trivial task, though, and one that could present some security challenges, so the desire is to do it in user space, but under kernel control.
This time we talk trackpoints. Or pointing sticks, or whatever else you want to call that thing between the GHB keys. If you don't have one and you've never seen one, prepare to be amazed. [1]
Trackpoints are tiny joysticks that react to pressure [2], convert that pressure into relative x/y events and pass that on to whoever is interested in it. The harder you push, the higher the deltas. This is where the simple and obvious stops and it gets difficult. But then again, if it was that easy I wouldn't write this post, you wouldn't have anything to read, so somehow everyone wins. Whoop-dee-doo.
Peter Hutterer writes about the behavior of trackpoint devices in great detail.
The FUSE updates have been sent in for allowing file-systems in user-space, what Linus Torvalds previously referred to as being for toys and misguided people.
With FUSE for Linux 4.18 it adds a new feature: user name-space support to allow for safe unprivileged FUSE mounts within a user name-space.
The Linux kernel has already been prepping for years for Year 2038 and that work is still ongoing with the in-development Linux 4.18 kernel.
For those unfamiliar with the Year 2038 problem, that is when systems using a signed 32-bit integer for storing the time since 1 January 1970, as is standard for the Unix time-stamp, will wrap around. That obviously will cause many systems to be confused. The Linux kernel across its around 20 million lines of code has been working to address the "Y2038" problem but it's no easy task with the around twenty million lines of code to the Linux kernel.
Adding to the growing list of kernel changes for Linux 4.18 are a great deal of sound driver/subsystem updates.
David Miller has submitted the big platter of networking updates for the in-development Linux 4.18 kernel.
Arguably the most notable networking addition for Linux 4.18 is the new BPFILTER infrastructure that will eventually be used to replace existing firewall and packet filtering implementations within the kernel. The new BPFILTER-based solution should allow better security, easier maintenance, and potential performance wins via BPF JIT and hardware offloading. But for Linux 4.18 is just the initial framework and the user-mode helpers.
The Linux community works, it turns out, because the Linux community isn’t too concerned about work, per se. As much as Linux has come to dominate many areas of corporate computing – from HPC to mobile to cloud – the engineers who write the Linux kernel tend to focus on the code itself, rather than their corporate interests therein.
Such is one prominent conclusion that emerges from Dawn Foster’s doctoral work, examining collaboration on the Linux kernel. Foster, a former community lead at Intel and Puppet Labs, notes, “Many people consider themselves a Linux kernel developer first, an employee second.”
With all the “foundation washing” corporations have inflicted upon various open source projects, hoping to hide corporate prerogatives behind a mask of supposed community, Linux has managed to keep itself pure. The question is how.
Keynote speakers include:
Ajay Agrawal, Artificial Intelligence & Machine Learning Expert, Author of Prediction Machines, and Founder of The Creative Destruction Lab Jennifer Cloer, Founder of reTHINKit and Creator and Executive Producer of The Chasing Grace Project Wim Coekaerts, Senior Vice President of Operating Systems and Virtualization Engineering, Oracle Ben Golub, Executive Chairman and Interim CEO, and Shawn Wilkinson, Co-founder, Storj Labs Preethi Kasireddy, Founder & CEO, TruStory Window Snyder, Chief Security Officer, Fastly Imad Sousou, Corporate Vice President and General Manager, Open Source Technology Center, Intel Sana Tariq, Senior Architect, E2E Service Orchestration, TELUS
For over six years now has been the Intel DRM driver's "Fastboot" support for eliminating unnecessary mode-set operations during the boot process, with an original focus on improving the laptop/ultrabook boot experience. While there have been attempts at getting Fastboot enabled by default, it hasn't happened to date but now a Red Hat developer is hoping to get it turned on for at least some generations of Intel hardware to benefit the work going into improving the Fedora boot experience.
A premium patron recently asked about testing the open-source Radeon driver performance when testing the forced "high" dynamic power management state rather than the default "auto" mode. Here are some benchmarks.
The Etnaviv Gallium3D driver for providing reverse-engineered, open-source 3D graphics driver support for Vivante graphics hardware is currently pursuing NIR intermediate representation support.
Philipp Zabel is one of multiple Pengutronix developers working on this open-source Etnaviv driver stack. He shared on Tuesday that they have been working on NIR support for a while, the new intermediate representation brought up over the past few years initially for the Intel Mesa driver and has since expanded to VC4, Freedreno, and optionally the RadeonSI driver as part of their SPIR-V support.
DXVK 0.54 is available today as the latest version of this Direct3D-11-over-Vulkan translation layer to benefit Wine gamers looking to enjoy faster D3D11 gaming performance on Linux.
With DXVK 0.54 comes support for utilizing host-visible device-local memory with AMD graphics cards. This allows putting dynamic resources there that need fast access by the graphics processor. In turn this should improve the performance; at least for The Witcher 3 it ends up being about a 5% performance improvement for this change to the memory flags.
The awesome DXVK project for Vulkan D3D11 in Wine has another fresh release out and it's a pretty good one.
Once again, I'm shocked by how quickly it has been releasing updates and solving issues. Considering it's mostly by one person, it's mind-boggling how far it has come in such a short amount of time. Anyway…here's what's new on 0.54.
David Airlie, the subsystem maintainer for the Direct Rendering Manager, has submitted the big feature pull request today for the Linux 4.18 kernel. All of the DRM feature work yields a net gain of close to fifty-thousand lines of code for this cycle.
When running tests this week on a MacBook Pro for the Dota 2 Vulkan/OpenGL cross-OS performance I also took the opportunity as part of the fun benchmarking week for celebrating the Phoronix 14th birthday by running a broader set of system benchmarks across the latest macOS 10.13 High Sierra, Windows 10 Pro, and various Linux distributions. Here are those CPU/system performance benchmark results.
This morning Feral Interactive released A Total War Saga: THRONES OF BRITANNIA for Linux gamers. This Linux port of A Total War Saga: THRONES OF BRITANNIA is powered by the Vulkan graphics API rather than OpenGL and makes for an interesting test subject. Here are our initial benchmarks of this game under Ubuntu Linux with a range of AMD Radeon and NVIDIA GeForce graphics cards.
Keeping a journal, even irregularly, can have many benefits. It's not only therapeutic and cathartic, it's also a good record of where you are and where you've been. It can help show your progress in life and remind you of what you've done right and what you've done wrong.
No matter what your reasons are for keeping a journal or a diary, there are a variety of ways in which to do that. You could go old school and use pen and paper. You could use a web-based application. Or you could turn to the humble text file.
You might not be running macOS but you’re a GNU/Linux user so you have the option to switch your style up and make your app launcher similar to the dock on macOS.
The dock apps here are top-class so don’t blame me if you have a tough time picking one of them. On the plus side, you can use them all!
The new FAI release 5.7 is now available. Packages are uploaded to unstable and are available from the fai-project.org repository. I've also created new FAI ISO images and the special Ubuntu only installation FAI CD is now installing Ubuntu 18.04 aka Bionic. The FAI.me build service is also using the new FAI release.
Good news fellow Xfce users, we proudly present a new Thunar release, our beloved easy-to-use and fast file manager!
The main highlight in this release is that Thunar, as all Xfce components, is saying goodbye to Gtk+ 2 and is now Gtk+ 3 based. Other than that, our team has addressed several critical bugs that compromised Thunar’s stability. Most of those fixes were backported to 1.6.x series and we hope our users do not experience crashes anymore.
By the way, by “our team” I mean Alexander Schwinn and myself, as well as all other developers which contributed to the project, specifically Jonas Kümmerlin, without his work we wouldn’t get here.
Thunar 1.8 is now available as the latest stable release of the Xfce desktop's file manager.
Most significant about Thunar 1.8 is that this important Xfce component has finally been migrated in full from GTK+ 2 to GTK+ 3. Thunar 1.8+ is now fully running on GTK3 and in the process many fixes and adjustments took place.
Using Timekpr Revived, you can control the computer usage for certain user accounts by setting some predefined access rules.
Timekpr Revived is a fork of the old Timkpr application, which was initially updated with Ubuntu Unity support, but later received many other improvements, including porting the UI to GTK3, support for newer Ubuntu versions, and so on.
In recent weeks, Timekpr Revived has received support for KDE Plasma (the developer tested it in Kubuntu 18.04), as well as some important Ubuntu 18.04 (Gnome) fixes. As a result, Timekpr now runs in Unity, Gnome, KDE, Xfce, and MATE. Since I use Gnome, that's the only desktop environment in which I personally tried it though (on Ubuntu 18.04).
If you like the sound of designing your own train, hiring crew and travelling across the dangerous Wild West then Bounty Train [Official Site] will probably be your thing.
Additionally, the natural successor to OpenGL, called Vulkan, has never worked in macOS despite repeated requests from developers and even though it is an open source project.
Before Space Invaders – which did require Nishikado to build some hardware using parts ordered through the mail – games were often created by plotting out circuitry and electronic components on an arcade board. Nishikado saw another way, however, and pioneered the notion that games could be designed on a computer. His ambition wasn’t quite met by the underwhelming power of the microcomputers of the time, but in building his own development tools and customising the hardware, he set a convention for the future of the video game industry: games were now software, not hardware.
In place of human curators, the company says that it’s building new tools to allow users more control over the kinds of games they see on the store. There will also be some kind of new tools for developers as well, likely to combat issues like review bombing.
"We've decided that the right approach is to allow everything onto the Steam Store, except for things that we decide are illegal or straight-up trolling," Johnson wrote. "Taking this approach allows us to focus less on trying to police what should be on Steam and more on building those tools to give people control over what kinds of content they see."
In an interesting blog post written up today, Valve's Erik Johnson has said how Valve will be relaxing their rules for what will be acceptable on Steam.
You might have seen the discussion recently about how Valve sent word to a few developers, giving them notice that their games are going to be removed from Steam. Even we picked up on this, as it didn't really feel right.
Paradox Interactive are continuing their quest for world domination as they've taken a 100% share of developer Harebrained Schemes.
The X-Plane cross-platform flight simulator has been depending upon OpenGL for nearly two decades since the program first came into existence, but a port of its rendering engine to use the Vulkan API has been a work-in-progress.
Since X-Plane began working on virtual reality (VR) support for their flight simulator, they have talked of making use of Vulkan on Windows/Linux/Android while also pursuing Metal API support for macOS. The company has previously confirmed they are going with Vulkan on supported platforms including Windows, rather than pursuing DirectX 12. It looks like their Vulkan support is getting squared away as the company has tweeted this weekend they will be talking about Vulkan integration this weekend at the Flight Sim Expo in Las Vegas.
Feral Interactive has released their latest Linux game port, A Total War Saga: THRONES OF BRITANNIA, is now live via their store and on Steam.
Feral Interactive have once again delivered for strategy games fans, with the release today of Total War Saga: Thrones of Britannia for Linux. As a reminder, this is another Linux port that's Vulkan-only as Feral are now full steam ahead with this newer API.
THRONES OF BRITANNIA is a standalone Total War game that challenges you to build and defend a kingdom of Anglo-Saxons, Gaelic clans, Welsh tribes or Viking settlers.
UK-based video games publisher Feral Interactive announced on Thursday the availability of the Total War Saga: Thrones of Britannia strategy game for Linux-based operating systems.
Set at a critical moment in history, A Total War Saga: Thrones of Britannia is a standalone campaign of the multi-award-winning strategy series where you'll have to choose your strategy, whether you rule as an Anglo-Saxon king, a Gaelic warrior, or a Viking warlord.
The game features a Grand Campaign that offers players a choice of several routes to their glorious victory in shaping the future of the British Isles. It comes with one of the most detailed Total War maps ever created so you can explore and conquer the British Isles.
Like your strategy games? How about one centred around naval combat in a big open environment? Victory At Sea Pacific [Official Site] ticks those and it's coming to Linux.
There's quite a lot of hype going for Crazy Justice [Official Site], the third-person shooter with single-player, co-op and Battle Royale that's coming to Linux, here's some more details on it.
The kind folks at Slimbook recently sent me the latest generation of their ultrabook-style laptop line for review, the KDE Slimbook 2. You can hear my thoughts on the latest episode of the Ubuntu Podcast, released on June 7th 2018.
Slimbook are a small laptop vendor based in Spain. All the laptops ship with KDE Neon as the default operating system. In addition to their hardware, they also contribute to and facilitate local Free Software events in their area. I was sent the laptop only for review purposes. There's no other incentive provided, and Slimbook didn't see this blog post before I published it.
Being a small vendor, they don't have the same buying power with OEM vendors as other big name laptop suppliers. This is reflected in the price you pay. You're supporting a company who are themselves supporting Free Software developers and communities.
If you're after the cheapest possible laptop, and don't care about its origin or the people behind the device, then maybe this laptop isn't for you. However, if you like to vote with your wallet, then the KDE Slimbook should absolutely be on your list to seriously consider.
Yesterday TechEmpower released the results for round 16 of their benchmarking tests, you can see their blog about it here. And like for round 15 I’d like add my commentary about it here.
Before you look into the results web site it’s important to be aware of a few things, first round 16 runs on a new hardware newer and more powerful than the previous rounds, they also did a Dockerization of the tests which allowed us to pull different distro images, cache package install and isolate from other frameworks. So don’t try to compare to round 15.
There were already numerous existing projects that attempt to integrate Qt and Rust. A great GUI toolkit should be working with a great language.
The digital world has changed over the last 10 years. The usage of mobile devices skyrocketed whereas the desktop market is stagnating. The trend is also going towards smaller and convertible devices. The mobile market is controlled by two major corporations. One of them is religiously cutting down your personal freedom and aiming towards a walled garden proprietary ecosystem, the other one is disrespecting your privacy enormously. With Plasma Mobile the KDE community is envisioning a mobile experience that is giving you maximal freedom while ensuring your privacy. It seems like a bold venture, but we have to at least try, right?
Plasma Mobile would not be a true KDE project without the same degree of integration with the desktop as we already have with Android devices. Therefore we aim to make Plasma Mobile a first-class citizen of KDE Connect.
[...]
Kirigami Framework it will run on Plasma Mobile automagically. What are you waiting for?
After successfully connecting to the broker. The MQTT client subscribes to the "#" wildcard. This means that the client gets every message published on the broker, so we can add every active topic to a combo box. The user can choose from these topics the ones the MQTT client will subscribe to. Since lots of topics are added to the combo box, by starting to type the topic's name we can narrow down the list the user has to choose from. Subscribing and unsubscribing to a topic is also implemented.
Microsoft is going to rename the Git Virtual File System to eliminate its clash with GNOMErs.
The purpose of the Git Virtual File System was laudable: Redmond's developers were sick of taking the afternoon off after typing “git clone” (even “git checkout” could take hours), so they gave GitHub users a workaround.
At the time, Microsoft's Saeed Noursalehi explained that GVFS “virtualises the file system beneath your repo and makes it appear as though all the files in your repo are present, but in reality only downloads a file the first time it is opened.”
At last, developers could handle terabyte-size repos without taking up knitting.
If you're reading this and use cups to print (almost certainly you do if you're on Linux), you may want to contact your distribution and ask them to add this patch.
It adds translation support for a few keyword found in some printers PPD files. The CUPS upstream project has rejected with not much reason other than "PPD is old", without really taking into account it's really the only way you can get access to some advanced printer features (see comments in the same thread)
Linux lite is one of the top and one of the most downloaded Linux distros and recently it has released its latest version in Linux Lite 4.0. In this article, we are going to look into the new features and enhancements that is made available in Linux Lite 4.0 along with a step by step guide to install Linux Lite 4.0 in your system.
The good news about containers, such as Docker's, is they make it easy to deploy applications, and you can run far more of them on a server than you can on a virtual machine. The bad news is that putting an application into a container can be difficult. That's where Buildah comes in.
Buildah is a newly released shell program for efficiently and quickly building Open Container Initiative (OCI) and Docker compliant images and containers. Buildah simplifies the process of creating, building, and updating images while decreasing the learning curve of the container environment.
Last year, Red Hat embarked on a journey to articulate our company's "Why"—our highest level reason for existing in the world. We followed an open and inclusive process that engaged more than 10,000 Red Hatters, which I outlined in a previous column. Today, I'll share a few lessons we learned along the way.
The AMD GPUOpen engineers maintaining the ROCm "Radeon Open Compute" driver stack with OpenCL support have today rolled out the ROCm 1.8.1 point release.
ROCm 1.8 was released last month with various improvements to this OpenCL/compute stack designed for the "larger" AMD GPUs compared to their alternative PAL OpenCL driver stack for APUs and smaller GPUs. With ROCm 1.8.1 it's just a minor update.
Red Hat, the world’s leading provider of open source solutions, introduced Red Hat Hyperconverged Infrastructure for Cloud, an integrated solution for customers seeking to co-locate compute and storage functions in OpenStack environments.
The new offering combines Red Hat OpenStack Platform 13 and Red Hat Ceph Storage 3 in a single user experience, supported by a common lifecycle for greater operational and organisational efficiency.
Red Hat Hyperconverged Infrastructure for Cloud offers an open platform to improve application portability between the data centre and the edge, especially critical to enterprises that historically didn’t have any choice outside of inflexible, proprietary systems.
Red Hat, Inc. (NYSE: RHT), the world€´s provider of open source solutions, has announced the availability of Red Hat Fuse 7, the next major release of its distributed, cloud-native integration solution, and introduced a new fully hosted low-code integration Platform-as-a-Service (iPaaS) offering, Fuse Online, the company said.
With Fuse 7, Red Hat is expanding its innovative integration capabilities natively to Red Hat OpenShift Container Platform, the industry€´s most comprehensive enterprise Kubernetes platform. Fuse gives customers a unified solution for creating, extending and deploying containerized integration services across hybrid cloud environments.
Bearish analysts warned that companies would buy less of Red Hat's software for their private data centers and that it could be shut out from the cloud. One worry was that Amazon Web Services offered customers its own version of open-source Linux for free.
Red Hat, a leading provider of open source solutions, has introduced Red Hat Hyperconverged Infrastructure for Cloud, an integrated solution for customers seeking to co-locate compute and storage functions in OpenStack environments.
Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, introduced Red Hat Hyperconverged Infrastructure for Cloud, an integrated solution for customers seeking to co-locate compute and storage functions in OpenStack environments. The new offering combines Red Hat OpenStack Platform 13 and Red Hat Ceph Storage 3 in a single user experience, supported by a common lifecycle for greater operational and organizational efficiency.
Red Hat Hyperconverged Infrastructure for Cloud offers an open platform to improve application portability between the datacenter and the edge, especially critical to enterprises that historically didn’t have any choice outside of inflexible, proprietary systems. In addition, nodes in an OpenStack deployment are interoperable, giving customers the choice to use non-hyperconverged nodes across their networks, with hyperconverged nodes at the edge, further improving resource utilization. By using existing skill sets in building private and hybrid cloud deployments, customers can innovate faster to address next-generation requirements for the edge.
Working in Support is not an easy task, each customer has adapted our products to best fit their needs and while this is a great advantage of open source software, it also broadens the spectrum of different configurations.
Over time, the typical support case has evolved. It’s not just a system with some failure or behavior that should be checked like individual system-level configuration, tuning, lifecycle management, master kits, etc. Now, it’s leaning towards the interactions between several systems like clustering, virtualization (Red Hat Virtualization) and finally cloud (OpenShift, OpenStack or combinations).
The Fedora Project is running an election for members of the Fedora Engineering Steering Committee (FESCo). Interviews with the candidates have been posted: Justin Forbes, Petr à  abata, Stephen Gallagher, Randy Barlow, and Till Maas.
So you have probably noticed by now that we started offering some 3rd party software in the latest Fedora Workstation namely Google Chrome, Steam, NVidia driver and PyCharm. This has come about due to a long discussion in the Fedora community on how we position Fedora Workstation and how we can improve our user experience. The principles we base of this policy you can read up on in this policy document. To sum it up though the idea is that while the Fedora operating system you install will continue as it has been for the last decade to be based on only free software (with an exception for firmware) you will be able to more easily find and install the plethora of applications out there through our software store application, GNOME Software. We also expect that as the world of Linux software moves towards containers in general and Flatpaks specifically we will have an increasing number of these 3rd party applications available in Fedora.
We had quite a good turnout for the first round of Fedora classroom sessions, so we're now trying to plan the second round. We need you to instruct a session, and so, pass on the knowledge you've accrued over the years to others in the community. A lot of the folks that attend these sessions are newbies who are still only testing the waters and haven't contributed yet, and it makes it a lot easier for them to learn some skills from a contributor.
Bela is a low latency optimized platform for audio applications built using Debian and Xenomai, running on a BeagleBoard Black. I recently stumbled upon this platform while skimming through a modular synthesizer related forum. Bela has teamed up with the guys at Rebel Technologies to build a Bela based system in eurorack module format, called Salt. Luckily enough, I managed to secure a unit for my modular synthesizer.
Officially launched on Tuesday, Amazon Elastic Container Service for Kubernetes (Amazon EKS) is engineered to deliver Kubernetes, the open-source and production-grade container orchestration tool as a managed service on the AWS (Amazon Web Services) cloud computing services. As Ubuntu is the most widely used container host operating system, especially for Kubernetes deployments, it can now be used to host containers in Amazon’s EKS.
"The benefits of Ubuntu optimization by Amazon and Canonical now extend to Amazon’s Elastic Container Service for Kubernetes (EKS) with Ubuntu worker nodes hosting high-performance Docker containers in AWS. This creates perfect portability for enterprise container workloads developed on Ubuntu workstations and operated on private infrastructure with Canonical’s distribution of upstream Kubernetes," said Canonical.
One of the biggest and most feature packed Sailfish OS updates is now available through early access on Jolla devices and Sailfish X! This update’s name is Mouhijoki, which is a river in Finland with roots from the lake Mouhijärvi. Mouhijoki is only 11,5 km long. It runs through farming field sceneries, with occasional cottages and saunas in Pirkanmaa area close to the city of Tampere.
Firefly’s Core-PX3-SEJ COM runs Ubuntu or Android on a new quad -A7 Rockchip PX3-SE SoC. The module is available as part of a $120 Firefly-PX3-SE dev board with -20 to 80ââÆ support.
Firefly’s SODIMM-style, 67.6 x 40mm Core-PX3-SEJ module runs Android 5.1 or Ubuntu 15.04 on a Rockchip PX3-SE (translated), a new 1.3GHz, quad-core, Cortex-A7 SoC. The $40 module is available in a 1GB RAM/8GB eMMC configuration on a $120, 117 x 85mm Firefly-PX3-SE development board. Other memory configurations may also be available (see spec list below).
Last year, I decided to leave Apple & Google: I want to free myself from the smartphone duopole, I want to regain control over my data privacy, I want to protect my freedom.
At first, I thought I would just fork Android, add a better design, remove any Google stuff, select a few privacy-compliant web services and add them to the system.
A little more than 6 months later, I realize that we’re building something really, really bigger than I had expected. This is made possible by the tremendous support I’m getting from many people around the world, and by a growing community of eelo contributors…
So, I backed the Gemini and received my shiny new device just a few months after they said that it'd ship, not bad for an indiegogo project! Out of the box, I flashed it, using the non-approved linux flashing tool at that time, and failed to backup the parts that, err, I really didn't want blatted... So within hours I had a new phone that I, err, couldn't make calls on, which was marginally annoying. And the tech preview of Debian wasn't really worth it, as it was fairly much unusable (which was marginally upsetting, but hey) - after a few more hours / days of playing around I got the IMEI number back in to the Gemini and put back on the stock android image. I didn't at this point have working bluetooth or wifi, which was a bit of a pain too, turns out the mac addresses for those are also stored in the nvram (doh!), that's now mostly working through a bit of collaboration with another Gemini owner, my Gemini currently uses the mac addresses from his device... which I'll need to fix in the next month or so, else we'll have a mac address collision, probably.
Nvidia announced an “Isaac” software developer platform for robots and other autonomous machines that runs on its Linux-friendly octa-core, ARM64 “Jetson Xavier” module with integrated high-end Volta GPU. A $1,300 dev kit is due in August.
It's not a CPU-based Vulkan implementation or along those lines, but Intel's newest open-source project allows converting SPIR-V into optimized instructions for running on modern CPUs.
HarfBuzz 1.8 was released on Tuesday, the same day as the Unicode 11 release. HarfBuzz is the text shaping library born out of the FreeType project that is now widely used across many applications from Firefox to Inkscape and Java.
If you’re a developer that implements push notifications in your app and you or your users care about data privacy, then it’s important that you transmit these push messages securely. For those of you who are already into data security, then implementing strong encryption measures is a no-brainer. For others, it’s a difficult feature to implement. Google’s Firebase Cloud Messaging (FCM) pushes messages over TLS so you can send your messages securely through Google’s servers, but by doing so you aren’t meeting the gold standard which is end-to-end encryption. Without end-to-end encryption, a theoretical third party could compromise the data; with it, only the end user’s device can decrypt the data. Implementing E2E encryption can be difficult for new developers, so that’s why Google is introducing Project Capillary. It is an open-source library that facilitates implementing E2E encryption between developers’ servers and clients’ devices.
I hate Skype. And though I've had better luck with Google Hangouts, I mostly hate it too. In 2018, it's still a big freaking chore to meet people face-to-face over the internet, particularly for business meetings -- even if your company uses something fancier like BlueJeans or WebEx or what have you.
At this year’s WWDC, Apple introduced a major new feature for FaceTime: the ability to make group calls of up to 32 participants, provided that all users’ Apple devices are on iOS 12. But, eight years ago, Steve Jobs promised something different.
To say that the network edge and edge computing is an area of much discussion is perhaps the understatement of the year, and the technology choices available to telcos can be perplexing. Verizon is one of the more progressive carriers in this area, so how did the US telco approach this new wild frontier and what were its requirements for a successful Edge deployment? There are numerous technology choices available, from VMs to containers, but just how robust and resilient are some of the new software and hardware projects – and are they what many operators like to call “telco grade”?
We decided that, until we better understood the best way to shape our data, we shouldn’t worry about optimizing the efficiency of storing it. The tricky thing with data efficiency, is that you first need to figure out the best way to extract the information your service requires, in order to determine the best architecture. A parallel could be drawn to a work table, you first need to use it, work on it, live it to analyze the mess and from it obtain a use pattern for your tools and then arrange them.
And there, we made a compromise, an O/RM. O/RMs, like many other technologies that bridge two different paradigms, have their fair share of detractors and supporters… and we’ve certain experienced both sides. At first it was wonderful, in about a week we moved our code base to use the O/RM (I am intentionally omitting the name because I don’t believe in software shaming open source projects) and for a period it was good: We moved the structure of our data, added columns, made queries, moved info and it was all done relatively easily, almost “magically”.
The second Operating-System-Directed Power-Management (OSPM18) Summit took place at the ReTiS Lab of the Scuola Superiore Sant'Anna in Pisa between April 16 and April 18, 2018. Like last year, the summit was organized as a collection of collaborative sessions focused on trying to improve how operating-system-directed power management and the kernel's task scheduler work together to achieve the goal of reducing energy consumption while still meeting performance and latency requirements.
[...]
What is still missing in load tracking? Vincent Guittot presented the evolution of the load tracking mechanism in the Linux scheduler and what should be the next steps. The session was split into three parts. The first part showed the improvements made in scheduler load tracking since last OSPM summit and listed the features that have already been merged. The audience agreed that new load tracking was far more accurate, stable, and helpful in scheduler load balancing.
Vincent then described what still remains to be fixed, like the case of realtime tasks preempting ordinary tasks. There is also a desire to remove the current rt_avg mechanism and to replace it with the new load-tracking information. Based on this use case, the discussion extended to the definition of CPU utilization and what is needed to get a complete view. We already track ordinary task utilization, and we had seen with the previous use case that tracking realtime utilization is beneficial. The audience agreed that we should extend that to account for interrupt pressure and SCHED_DEADLINE usage to get a complete view of the utilization.
Google Chrome, Firefox's biggest rival in the browser world, managed to increase its massive lead from 60.08% in June 2017 to 62.85% in May 2018.
Today we are excited to announce that Common Voice, Mozilla’s initiative to crowdsource a large dataset of human voices for use in speech technology, is going multilingual! Thanks to the tremendous efforts from Mozilla’s communities and our deeply engaged language partners you can now donate your voice in German, French and Welsh, and we are working to launch 40+ more as we speak. But this is just the beginning. We want Common Voice to be a tool for any community to make speech technology available in their own language.
We’re very proud to be announcing the next phase of the Common Voice project. It’s now available for contributors in three new languages, German, French and Welsh, with 40+ other languages on their way! But this is just the beginning. We want Common Voice to be a tool for any community to make speech technology available in their own language.
Speech interfaces are the next frontier for the Internet. Project Common Voice is our initiative to build a global corpus of open voice data to be used to train machine-learning algorithms to power the voice interfaces of the future. We believe these interfaces shouldn’t be controlled by a few companies as gatekeepers to voice-enabled services, and we want users to be understood consistently, in their own languages and accents.
As anyone who has studied the economics of the Internet knows, services chase money. And so it’s quite natural that developers and publishers seek to develop for the audience that will best reward their efforts. What we see as a consequence is an Internet that is heavily skewed towards English, in a world where English is only spoken by 20% of the global population, and only 5% natively. This is increasingly going to be an accessibility issue, as Wired noted last year, “Voice Is the Next Big Platform, Unless You Have an Accent”.
For a long time Mozilla’s JS team and others have been using https://arewefastyet.com to track the JS engine performance against various benchmarks.
Since its Quantum update I have to say that I’m loving Mozilla Firefox — but a promising new feature on the horizon could help me to love it even more!
It’s called Side View and it’s an experimental feature available to try, from today, as part of the Firefox Test Pilot program.
What’s that?
Firefox Test Pilot is an opt-in, participatory effort that allows wily Firefox users like you and me to help test new features as web extensions before they’re ready for wider dissemination.
Mozilla released on Wednesday Firefox 60.0.2, the second point release of the Firefox 60 "Quantum" web browser series with an updated NSS component and various improvements.
Coming about three weeks after Firefox 60.0.1, this point release isn't as imperious as it, but it updates the NSS (Network Security Services) component, a set of libraries for supporting cross-platform development of security-enabled server and client apps, to version 3.36.4 from 3.36.1 used in the previous release.
One of the core projects we did over 2017 was a major overhaul of the Localization and Internationalization layers in Gecko, and all throughout the first half of 2018 we were introducing Fluent into Firefox.
Just for the record, if you really need to know about the browser container of your WebExtension, do NOT rely on StackOverflow answers... Most of them are based, directly or not, on the User Agent string. So spoofable, so unreliable. Some will recommend to rely on a given API, implemented by Firefox and not Edge, or Chrome and not the others. In general valid for a limited time only... You can't even rely on chrome, browser or msBrowser since there are polyfills for that to make WebExtensions cross-browser.
Mozilla yesterday announced that its Common Voice project, which is crowdsourcing a large dataset of human voices for use in speech technology, will now be multilingual. You currently can donate your voice in German, French and Welsh, and Mozilla will be adding 40+ languages soon.
Side View is a Firefox Test Pilot project, meaning it might become part of Firefox later. This simple feature lets you browse websites using the Firefox sidebar. Here’s a quick overview:
Mozilla has announced that it’s expanding its crowdsourced Common Voice project — an initiative that’s setting out to create an open source voice-recognition dataset — to include more languages.
The tech organization first announced Common Voice last June, inviting volunteers from around the world to record snippets of text with their voice through web and mobile apps.
SQLite 3.24.0 was quietly released earlier this week as the newest version of this widely-used embedded database library.
The most prominent addition to SQLite 3.24.0 is that it adds support for an UPSERT operation. The UPSERT syntax allows for an INSERT to happen but to act as an UPDATE if necessary or no operation in the event of a uniqueness constraint being violated. UPSERT is not part of standard SQL but SQLite is following the PostgreSQL syntax. SQLite's UPSERT behavior is outlined via their documentation.
The BeOS-compatible Haiku OS had been struggling for some time with its application support, but it seems to be advancing more rapidly in the past year or two -- at least from being an outside observer on the project over the years.
WordPress 4.9.6 is now available, bringing a whole bunch of GDPR-compliant features with it. For example, site owners can now designate a privacy policy page which will be shown on login and registration pages. Furthermore, Wordpress site owners can now export a ZIP file containing a user’s personal data, using data gathered by WordPress and participating plugins. And finally, site owners can erase a user’s personal data, including data collected by participating plugins.
Free open-source software isn't a new concept in the world of music production. Many of us have used Audacity for quick audio editing tasks, and Ardour has enjoyed a fair amount of success as a free alternative to major DAWs like Ableton and Logic. For those with a more technical background, Pure Data and Supercollider offer very deep potential for sonic experimentation. By and large however, open-source music production tools are often marginalised in favour of commercial alternatives that offer more user-friendly interfaces, greater stability and better performance. A new open-source software project released this past September called VCV Rack has the potential to become one of the first to break through that barrier and make a real impact in the world of electronic music production.
The TrueOS Project has some big plans in the works, and we want to take a minute and share them with you. Many have come to know TrueOS as the “graphical FreeBSD” that makes things easy for newcomers to the BSDs. Today we’re announcing that TrueOS is shifting our focus a bit to become a cutting-edge operating system that keeps all of the stability that you know and love from ZFS (OpenZFS) and FreeBSD, and adds additional features to create a fresh, innovative operating system. Our goal is to create a core-centric operating system that is modular, functional, and perfect for do-it-yourselfers and advanced users alike.
TrueOS will become a downstream fork that will build on FreeBSD by integrating new software technologies like OpenRC and LibreSSL. Work has already begun which allows TrueOS to be used as a base platform for other projects, including JSON-based manifests, integrated Poudriere / pkg tools and much more. We’re planning on a six month release cycle to keep development moving and fresh, allowing us to bring you hot new features to ZFS, bhyve and related tools in a timely manner. This makes TrueOS the perfect fit to serve as the basis for building other distributions.
Going back to when TrueOS was known as PC-BSD, the operating system has generally been known as a desktop-friendly version of FreeBSD that currently ships with its own Qt5-powered Lumina Desktop Environment while also having a server installer, etc. The folks working on TrueOS at iXsystems are now planning to take TrueOS into a new direction.
TrueOS is going to become a downstream fork of FreeBSD while continuing with innovations like the ZFS file-system by default but also making use of OpenRC as the init system, LibreSSL, and other changes compared to upstream FreeBSD.
Continuing LLVM release manager Hans Wennborg has begun discussing plans for the upcoming LLVM 7.0 release.
As is usual with LLVM's six-month release cadence, the next release should be out in September as usual. But while LLVM normally branches for its second release of the year around mid-July, LLVM 7.0 might branch around the start of August. Due to Wennborg having a later summer holiday this year, he would like to branch when he gets back to work at the start of August.
Here's a new release of DFArc, a frontend to run the GNU FreeDink game and manage its numerous add-on adventures or D-Mods :)
The GNU General Public License (GPL) and GNU Lesser General Public License (LGPL) are among the most widely used open source software licenses covering many important software projects, including the Linux kernel. GPL version 3 (GPLv3) introduced an approach to termination that offers distributors of the code an opportunity to correct errors and mistakes in license compliance. This approach allows for enforcement of license compliance consistent with a community in which heavy-handed approaches to enforcement, including for financial gain, are out of place, the statement added.
Leap Motion today released the designs for the Project North Star reference AR headset, along with instructions on how to put it together.
Leap Motion has long been a proponent of immersive technology. The company specializes in gesture tracking technology and first introduced a peripheral that would enable you to control your PC with a wave of your hand. When VR hardware began to emerge in the consumer market, Leap Motion quickly adapted its technology for VR input. Now it has turned its sights to the budding AR market, but instead of offering to license its tracking technology to hardware makers, the company created a full reference headset to help accelerate AR HMD design.
Less than two months since unveiling Project North Star, Leap Motion has released the reference design that will allow developers, makers, and even manufacturers to build their own augmented reality headsets based on Leap Motion's work.
The version of the Project North Star headset built by Leap Motion features a pair of 1600 x 1400 displays capable of 120 fps and a combined field of view exceeding 100 degrees. The headset also features Leap Motion's next generation ultra-wide tracking module, which has yet to hit the market in an AR headset. The rest of the headset is comprised of a combination of off-the-shelf and 3D printed components.
The concept of Android game development is not confined only to gaming consoles, PCs and allied programmable hardware. The present–day digital domain is highly enriched with latest gadgets and modern technology that provide flexibility, portability and engaging exposure. Android is regarded as the most popular operating system for mobiles, but it is also widely used in digital cameras, wrist watches, gaming consoles and television. The trend of Android game development became evident when it was successfully blended into different hardware platforms. Due to this reason, the gaming sector understood the preference of Android technology over Java or Symbian.
If you’re just getting started with a squad model, you may not be sure what roles you’ll need for your team to function smoothly. Our squad model in the IBM Digital Business Group is based on the Spotify Squad framework. At a high level, a squad is a small, cross-functional team that has autonomy to deliver on their squad mission. The squad missions and cross-squad priorities are set at an organizational level. Then within each squad, they decide "what to build, how to build it, and how to work together while building it."
We tweaked the Spotify squad model a bit to fit our own style of working. One key difference for us is that our squads are more long-lived than those at Spotify. Some squads in our org will last for a few months, and others will last for a couple of years. The squads that build and operate new services tend to be long-lived, while the mission-oriented squads that use existing services to build something new tend to be short-lived.
Now that GitLab is stepping up its game, what do you think about it?
Do you have a project hosted on GitHub? Will you be switching over? Or, luckily, you already happen to use GitLab from the start?
This post is not about Microsoft, GitHub or GitLab, and it's neither about any other SaaS solution out there, the named companies and products are just examples. It's more about "do you really want to self-host?"
Consider all the data that's used to provide the value-added features on top of git. Issue tracking, wikis, notes in commits, lists of forks, pull requests, access controls, hooks, other configuration, etc. Is that data stored in a git repository?
Github avoids doing that and there's a good reason why: By keeping this data in their own database, they lock you into the service. Consider if Github issues had been stored in a git repository next to the code. Anyone could quickly and easily clone the issue data, consume it, write alternative issue tracking interfaces, which then start accepting git pushes of issue updates and syncing all around. That would have quickly became the de-facto distributed issue tracking data format.
Instead, Github stuck it in a database, with a rate-limited API, and while this probably had as much to do with expediency, and a certain centralized mindset, as intentional lock-in at first, it's now become such good lock-in that Microsoft felt Github was worth $7 billion.
Most of the material in this blog is already written up, and the best sources I found are here and here. There practically everything is written down, but when one goes down to business some things work out a bit differently.
Developers can be passionate about the tools and languages they use for development. This passion is a double-edged knife. It can foster growth of the technology's adoption and inspire the direction of energy into the language that one has chosen to advocate. The passion might also scare off those who wish to use the language or are just entering the field, particularly when the opposing view is exaggerated, incorrect or out of date with the current state of the technology. This latter scenario injects (often unintentionally) into the dialogue regarding the technology in question Fear, Uncertainty and Doubt (FUD).
It’s now nearly a year that I started writing non-trivial amounts of C code again (the first sokol_gfx.h commit was on the 14-Jul-2017), so I guess it’s time for a little retrospective.
But the beloved developer platform may also introduce moderation headaches. Microsoft will soon need to formally decide what will happen to the many GitHub repositories that conflict with its own interests. The tech giant will face similar content moderations challenge that peers like Facebook and Google have, but with code instead of speech.
After the recent news that Microsoft acquired GitHub, many users were concerned regarding the future of the popular free and open source code editor Atom, developed by GitHub. Lee Dom, Open Source Community Manager at GitHub, has assured users that "Atom remains key to GitHub", but he didn't get into any details.
One of the first nanoparticle-containing cosmeceutical products was launched by the French company L'Oreal in 1995. This product was formulated to deliver prolonged cosmetic and/or pharmaceutical activity to the skin (U.S. Patent Nos. 5,556,617 and 5,993,831). Nowadays there are many cosmeceutical products using nanotechnology for many different purposes. For example, ZnO and TiO2 nanoparticles are used to provide a transparent and less greasy sunscreen product to protect the skin from ultraviolet ray damage (U.S. Patent Application Publication No. US 20120097068). Core-shell structured nanoparticles have been developed to deliver active agents to specific sites (U.S. Patent No. 6,635,720 and U.S. Patent Application Publication No. US 20170000737). Gold and/or silver nanoparticles have been combined in various ratios with pigments to provide long lasting and variable brilliant colors (U.S. Patent Application Publication No. US 20090022765). Hard nanoparticles, such as nanoclay, nanosilica, and nanoceramics, have been incorporated into nail polish to increase the strength and scratching/cracking resistance of these products (U.S. Patent Application Publication No. US 20100196294).
ProPublica and 90.7 WMFE are investigating post-traumatic stress disorder and how it affects first responders and their families. Reported by WMFE’s Abe Aboraya, the year-long project will shed light on these issues, starting with Orlando, the site of the 2016 Pulse nightclub shooting in which 49 people were killed.
Photography by Cassi Alexandra. Music composition by Julian Bond. Special thanks to Framed by WDET, a similar audio-visual experience produced by Detroit’s WDET 101.9 FM, for their guidance in producing this event.
Snaps are becoming more and more popular these days as Canonical pushes its universal binary format into mainstream GNU/Linux distributions outside the Ubuntu ecosystem.
More and more independent developers are packaging their apps as Snaps, making their deployment a breeze across multiple Linux-based operating systems, for both end users and package maintainers. One of the last such apps that caught our attention is called Nitrokey-app and was created by Szczepan.
Bugcrowd released its 2018 State of the Bug Bounty report on June 6, revealing key trends in the evolving market for bug bounties.
Among the high-level findings in the report is that organizations are now paying more for vulnerability disclosures than they have in prior years. Across Bugcrowd's platform, the average bug bounty is now $781, which is a 73 percent increase over the company's 2017 report.
Linux kernel developer veteran Konrad Rzeszutek Wilk at Oracle has posted a set of experimental/debug patches for dealing with AMD "Speculative Store Bypass Disable" (SSBD) support for mitigating the Spectre Variant Four vulnerability.
Cisco Talos, while working with our various intelligence partners, has discovered additional details regarding "VPNFilter." In the days since we first published our findings on the campaign, we have seen that VPNFilter is targeting more makes/models of devices than initially thought, and has additional capabilities, including the ability to deliver exploits to endpoints. Talos recently published a blog about a broad campaign that delivered VPNFilter to small home-office network devices, as well as network-attached storage devices. As we stated in that post, our research into this threat was, and is, ongoing. In the wake of that post, we have had a number of partners step forward with additional information that has assisted us in our work. This post is an update of our findings over the past week.
For months, Google employees have led a campaign demanding that the company terminate its contract with the Pentagon for Project Maven, a program that uses machine learning to improve targeting for drone strikes. Nearly five thousand Google workers signed an internal petition to cancel the project, and dozens resigned.
Back in April, when lots of anti-Trump folks were cheering on the decision of the Democratic National Committee (DNC) to sue various Russians and Wikileaks for hacking and publishing DNC emails, we pointed out that the lawsuit was full of some pretty crazy claims, especially those against Wikileaks. As we said, even if you really hate the role that Julian Assange and Wikileaks played in the 2016 election, the lawsuit itself could have serious ramifications on press freedom, at a time when you would think that those who don't support the President would want the press to have more freedom to report on him and the various things happening in his administration.
Exactly what killed the computer hacker who gave up Army whistleblower Chelsea Manning to the FBI remains a mystery.
Forensic pathologists who performed Adrian Lamo's autopsy were unable to determine how the 37-year-old died in March in Wichita. His autopsy report, released Wednesday afternoon, lists Lamo's cause and manner of death as "undetermined." That means that after a thorough examination of his body, results of toxicology testing and information about Lamo's life and last hours, there is nothing that points to a specific reason he died.
"Despite a complete autopsy and supplemental testing, no definitive cause of death was identified," Scott Kipper, deputy coroner and medical examiner at the Sedgwick County Regional Forensic Science Center, wrote in the report.
The opinion section of the report notes that Lamo had a history of anxiety, depression, Asperger's syndrome, and drug and alcohol abuse. He also suffered from a seizure disorder that could not be ruled out as a possible cause or contributing factor to his death, it says.
Australian government officials have paid a mysterious visit to Julian Assange in his Ecuadorian embassy refuge in London, in a sign there may be a breakthrough in the stalemate that has lasted almost six years.
Two officials from Australia's High Commission were spotted leaving the embassy in Knightsbridge in west London on Thursday.
On Facebook, wildlife traffickers can speedily connect with buyers across the globe, fast-tracking illegal, unregulated deals from within the semiprivate world of groups. That means, in order to tackle wildlife trading, you have to first figure out Facebook. Michael’s new profile was the first step in a massive digital sting operation, aimed at exposing how Facebook facilitates the illegal wildlife trade. Eventually, the evidence he collected would help a global consortium of conservationists launch a complaint they hope will rid the site of these kinds of posts—and tamp down on trafficking writ large.
Superficially, the issue is about the company moving to seven-day delivery, but the issue that's forcing the strike is the sizable cohort of union members who are unwilling to accept a two-tier workplace where established workers get the full protection of the union and younger hires are given a worse deal. This has been a traditional way that employers have split, weakened and ultimately killed their workers' unions -- by buying off the long-established employees with better deals that make the workers who'll replace them feel that unions have nothing to offer them, which establishes divisions that can be exploited later to lay off those higher-paid workers, leaving only the lowest-paid employees and no union they can use to press for better pay.
"Most people understand in the world of Amazon (AMZN) and e-commerce, UPS isn't going to be Monday to Friday or even Monday to Saturday any more, it's going to be a seven-day operation," said David Levin, spokesman for UPS Teamsters United. "But they made record profits. They don't need concessions to do that."
It’s a fundamental part of representative government: Politicians are elected to advocate for their constituents, and not their own interests.
But in many states, laws and ethics rules allow representatives to advance bills that would benefit their own financial interests, as well.
Take Louisiana, where lawmakers only have to recuse themselves if a proposed bill benefits them specifically and no one else, as The Advocate and ProPublica have detailed this week. So, for example, if the owner of a group of nursing homes votes for a bill that would increase profits for his business, but not for other nursing home owners, that would be a conflict of interest. But if the bill increases profit for the entire industry, then it’s acceptable.
Similar language exists in the majority of states, regardless of whether they have full-time, part-time or citizen legislatures. In part-time and citizen legislatures, in which lawmakers are not paid a full salary and often rely on other employment, this means people connected to certain industries or fields are not automatically barred from voting on legislation that might affect them financially.
State Sen. Norby Chabert wanted to offer a helping hand to his district’s truck stop casinos.
The number of video poker machines allowed in the casinos is tied to how much gas the attached stations sell. Bridge construction projects in Chabert’s hometown of Houma have diverted traffic and hurt gas sales at nearby casinos, limiting the number of video poker machines they can have.
Earlier this year, Chabert supported a bill eliminating that link for truck stops more than 10 years old.
“Without the bridge being constructed, they would have hit every sales trigger that they needed,” he said of one such casino. “It was at one of the biggest intersections on the east side of Houma, and when you shut down a bridge in bayou country, people go to the next bridge … and it damn near shut them down,” Chabert told his colleagues in a Senate committee meeting.
What Chabert, a Republican, left out of the story: His own brother owns a truck stop on the east side of Houma that has been affected by the bridge construction.
Chabert acknowledged to The Advocate that his brother, Marty, matches the particulars of the story he told, but so do other truck stop casinos in his district. Marty Chabert earned $1.5 million in income from the truck stop in 2015 and 2016, according to the financial disclosure forms he filed as a member of the state Board of Regents.
CryptoKitties is a game built on top of the Ethereum blockchain and smart contracts. CryptoKitties is a decentralized application, or “DApp,” built on top of the Ethereum computing platform. This means that the application is run and the kitties are stored on a distributed network of computers running Ethereum nodes.
Because it’s based on Ethereum, CryptoKitties uses the Ether cryptocurrency token. Ether is an “altcoin,” which just means it’s a cryptocurrency that isn’t Bitcoin. Performing tasks like breeding CryptoKitties involves paying Ether tokens to the Ethereum network, compensating the people running those Ethereum nodes for their computing power. Ether is also used when buying and selling CryptoKitties.
Eight overt white nationalists are running for office in 2018—a new record, according to the Southern Poverty Law Center. Overt fascists, inspired by the rise of President Donald Trump, have found a place both within and just outside the margins of the official Republican Party. Over 20,000 people voted in a GOP primary this past March for former American Nazi Party member Art Jones, making him the Republican candidate for the US House in Illinois’ 3rd District. Patrick Little, who told NBC (5/3/18) that the “monstrous nature of the Jewish people must be known to the public,” ran as a Republican for Sen. Dianne Feinstein’s seat in California, and got more than 50,000 votes.
With the increase on the US right in overt Nazi activity, one might be surprised to see the paper of record (New York Times, 5/29/18) turn its sights not on this disturbing trend, but on progressive candidate Leslie Cockburn, whose criticism of Israel is being cynically exploited by her opponents in the Republican Party—the same party increasingly finding common cause with a host of white nationalists, alt-right and “alt-light” elements.
Let’s begin with the headline, “Democratic Candidate Who Criticized Israel Faces Charges of Antisemitism.” It’s rare for political reporters to let partisan opponents wholly manufacture a controversy, much less frame it, but when it does happen—as it did in January 2016 when the Times let a number of Clinton operatives smear Sanders as a Commie infiltrator (FAIR.org, 5/25/16)—one can be certain it will be against a left-leaning candidate.
If you are wondering why so little is heard these days of accusations that Russia hacked into the U.S. election in 2016, it could be because those charges could not withstand close scrutiny. It could also be because special counsel Robert Mueller appears to have never bothered to investigate what was once the central alleged crime in Russia-gate as no one associated with WikiLeaks has ever been questioned by his team.
Veteran Intelligence Professionals for Sanity — including two “alumni” who were former National Security Agency technical directors — have long since concluded that Julian Assange did not acquire what he called the “emails related to Hillary Clinton” via a “hack” by the Russians or anyone else. They found, rather, that he got them from someone with physical access to Democratic National Committee computers who copied the material onto an external storage device — probably a thumb drive. In December 2016 VIPS explained this in some detail in an open Memorandum to President Barack Obama.
On January 18, 2017 President Obama admitted that the “conclusions” of U.S. intelligence regarding how the alleged Russian hacking got to WikiLeaks were “inconclusive.” Even the vapid FBI/CIA/NSA “Intelligence Community Assessment of Russian Activities and Intentions in Recent U.S. Elections” of January 6, 2017, which tried to blame Russian President Vladimir Putin for election interference, contained no direct evidence of Russian involvement. That did not prevent the “handpicked” authors of that poor excuse for intelligence analysis from expressing “high confidence” that Russian intelligence “relayed material it acquired from the Democratic National Committee … to WikiLeaks.” Handpicked analysts, of course, say what they are handpicked to say.
Almost exactly a year ago, we wrote about a ridiculous defamation lawsuit filed by a plaintiff who has a history of fairly trollish, attention seeking behavior. I chose not to name the person in the post as I argued that the lawsuit itself was something of a publicity stunt, and I'll continue to do that here, even though it will become clear in the quoted parts of the ruling below. I have no interest in participating in the publicity stunt part of the lawsuit -- but do feel compelled to write about it because of the First Amendment issues that are a key component in the case. Amusingly, the plaintiff had a history of loudly proclaiming her support for free speech and the First Amendment, even going so far as to once state: "I care more about free speech... than almost any other issue."
The U.S. Department of Homeland Security (DHS) is quietly building what will likely become the largest database of biometric and biographic data on citizens and foreigners in the United States. The agency’s new Homeland Advanced Recognition Technology (HART) database will include multiple forms of biometrics—from face recognition to DNA, data from questionable sources, and highly personal data on innocent people. It will be shared with federal agencies outside of DHS as well as state and local law enforcement and foreign governments. And yet, we still know very little about it.
The records DHS plans to include in HART will chill and deter people from exercising their First Amendment protected rights to speak, assemble, and associate. Data like face recognition makes it possible to identify and track people in real time, including at lawful political protests and other gatherings. Other data DHS is planning to collect—including information about people’s “relationship patterns” and from officer “encounters” with the public—can be used to identify political affiliations, religious activities, and familial and friendly relationships. These data points are also frequently colored by conjecture and bias.
In late May, EFF filed comments criticizing DHS’s plans to collect, store, and share biometric and biographic records it receives from external agencies and to exempt this information from the federal Privacy Act. These newly-designated “External Biometric Records” (EBRs) will be integral to DHS’s bigger plans to build out HART. As we told the agency in our comments, DHS must do more to minimize the threats to privacy and civil liberties posed by this vast new trove of highly sensitive personal data.
Last week, we noted that the EU Parliament's website appeared not to be compliant with the GDPR. As we noted, this was pointed out in response to EU Commissioner Vera Journova claiming that complying with the GDPR was so easy, that even she could do it. Now, a valid response to all of this would be to point out that the EU Parliament is different than the EU Commission or other parts of the EU government. But, now that we know the EU Parliament is not compliant, would it surprise you at all to find out that the European Commission is also not compliant with the GDPR. Apparently, while she was so busy claiming it was easy to comply with, Journova forgot to have the Commission itself comply.
Specifically, Jason Smith, at the website Indivigital, discovered that various places on the EU's websites were hosting spreadsheets with personal information on many people who had attended events, and were revealing that information without permission (the report also found various GDPR violations involving 3rd party cookies).
VPN provider Private Internet Access, which has a strict no-logging policy, has proven once again that it is unable to link online activities with a user's identity. The conclusion, which was revealed as part of a hacking trial in San Jose federal court, is the second time that the provider's claims have been successfully tested in public.
The social media company had data-sharing partnerships with Huawei, Lenovo, Oppo and TCL that date back to at least 2010, according to the report.
The agreements gave the companies private access to certain user data.
Despite Mark Zuckerberg's internal war on transparency, the Facebook data abuse reveals just keep on coming.
Facebook is under fire yet again for potentially being far too casual in its treatment of private consumer data.
Earlier this week, the New York Times issued a report noting that Facebook had struck deals with more than 60 different hardware vendors since at least 2010, providing them with "vast amounts" of private user data. According to the report, these partnerships allowed some devices to retrieve personal information even from users’ friends who believed they had barred any sharing with third party vendors, potentially violating a 2011 FTC consent decree that banned such sharing without obtaining express customer permission.
To be clear, the partnerships are notably different from the deals struck with companies like Cambridge Analytica, which we now know routinely let app makers hoover up private data under false pretenses, then use that data for other purposes (like oh, riling up partisans ahead of an election). And Facebook was quick to issue a blog post trying to downplay the scope of the revelations:
Facebook has data-sharing partnerships with at least four Chinese electronics companies, including a manufacturing giant that has a close relationship with China’s government, the social media company said on Tuesday.
The agreements, which date to at least 2010, gave private access to some user data to Huawei, a telecommunications equipment company that has been flagged by American intelligence officials as a national security threat, as well as to Lenovo, Oppo and TCL.
The four partnerships remain in effect, but Facebook officials said in an interview that the company would wind down the Huawei deal by the end of the week.
Facebook gave access to the Chinese device makers along with other manufacturers — including Amazon, Apple, BlackBerry and Samsung — whose agreements were disclosed by The New York Times on Sunday.
Earlier this week, the news of Facebook giving data access to device makers came to light. It turns out, not only Apple, Amazon, and Blackberry were okayed by the social media company to access data, but four other Chinese firms too.
In Apple’s defense, CEO Tim Cook claimed that company has requested or received “zero” personal data that was mentioned in the NY Times report. What Apple did is it added the ability to share stuff like photos, he told NPR in an interview.
Following the revelation that Facebook was sharing user data with phone and hardware makers, the social network came out to say it has partnerships with at least four Chinese electronics companies.
A French expert on China says that while there is no public evidence that Chinese telecommunications company Huawei has conducted espionage on behalf of Beijing, countries in the West should be careful because "China is not a country like Australia or the UK or the US".
The post-Snowden effects on Germany's surveillance architecture have been muted. Oversight in the US is a joke, but it's marginally better than what's being offered in other countries. You'd think a country that survived almost-consecutive crushing surveillance states would be a bit more cautious about deploying dragnets. Not so. All evidence points to German surveillance programs flourishing under the lack of effective oversight, limited only by technical prowess rather than concerns for those swept up by them.
Internal investigations prompted by revelations seemed like a step forward, but the government gave German surveillance programs a thumbs up three years later. The information revealed by Snowden and other leakers did give residents and advocates enough ammunition for legal battles, but the German courts haven't really given them anything in return.
David Meyer of ZDNet reports a court has handed a win to Germany's Federal Intelligence Service (BND) in a lawsuit filed by Frankfort's De-Cix, the largest internet hub in the world. The BND has tapped this for years, sweeping up massive amounts of data and communications, and frequently passing this on to surveillance partners around the world. De-Cix was compliant until 2016, when it decided to sue BND for violating German law.
Five years ago today, The Guardian began publishing a series of stories exposing the National Security Agency’s warrantless mass surveillance regime. Three days later, the whistleblower behind the historic disclosures unmasked himself as NSA contractor Edward Snowden.
In the weeks and months that would follow, Snowden would transform the national and international conversation about privacy in our digital lives.
An appeals court ruled mass surveillance unconstitutional. Tech companies were forced to both increase security for their billions of customers, and push back harder on legal demands for individuals’ information. Congress was pressured into passing historic—albeit ultimately inadequate—intelligence reform. The White House was forced to declassify thousands of additional documents on government surveillance powers.
On January 1 of this year, it became legal under state law for California adults to purchase cannabis products for recreational use. But the more than 5,000 cannabis operators who are already licensed are amassing sensitive data about their customers. That’s why EFF supports a bill to stop vendors from sharing this data without customers' consent.
Without controls on how consumers’ cannabis-related data gets passed around, lawful cannabis customers could face discrimination when seeking work, housing, or government benefits. To prevent that, EFF is supporting A.B. 2402, a proposal to prevent state-licensed cannabis sellers from selling or sharing customers’ personal information without their consent. The bill also prohibits dispensaries from discriminating against a customer who chooses to withhold that consent.
This isn’t a theoretical problem. Recent news reports have found that dispensaries are, in fact, keeping computer databases with customer profiles in them. A survey by Politifact California found that most dispensaries scan customer driver licenses, and require names and phone numbers to be filled out before purchases are made. EFF’s letter to the bill’s sponsor goes into more detail on these reports.
Apple has years of your internet browsing history if you selected “sync browser tabs” in Safari. This internet history does not disappear from their servers when you click “Clear internet history” on Safari – which has led to many users being surprised to receive this data from Apple. This recently was brought to the internet’s attention by Denis Bosnic, who filed a GDPR request for his data from Apple and was shocked to find detailed logs of his internet history showing URL and timestamp of visit. This apparently happens if you consent to sharing browser bookmarks and tabs between Apple devices – though Bosnic noted that there was no explicit notice of this when setting up that feature in Apple Safari.
"I saw the installation process, an icon appear on the home screen, the police ran the application and then the icon hid itself. Not sure if it rooted my phone or what. I know something was running on my phone because they used a handheld device to confirm our phones were communicating with their system before letting us go."
While many people argue that not much has changed, Snowden disagreed. "People say nothing has changed: that there is still mass surveillance. That is not how you measure change. Look back before 2013 and look at what has happened since. Everything changed."
"The government and corporate sector preyed on our ignorance. But now we know. People are aware now. People are still powerless to stop it but we are trying. The revelations made the fight more even."
Migrants, prisoners, old people, school kids, poor people -- they're the beta-testers for everything bad that's headed for wide distribution, so it pays to keep close tabs on their treatment.
As part of a nationwide MuckRock survey, the request under the Wyoming Public Records Act was looking for the contract between the Sheriff’s Office, which oversees the local jail, and the company providing telephone services to its inmates. Many local and state jails contract the provision of these services to companies like Securus, Global Tel Link, and ICSolutions; these contracts often include a commission for the Sheriff’s Department or prison, allowing the agency to receive a portion of the charges shouldered by inmates, sometimes as high as 70 to 80% of total costs.
Mynor Vargas-Salguero was arrested and convicted of second-degree murder, robbery, and theft. The lower court sided with the government, finding his demands for a lawyer "ambiguous." The Appeals Court disagrees, finding it clear enough, especially when the recording of the interrogation is compared to law enforcement's transcript of the recording's contents.
That's where the real ambiguity lies. Or rather, there doesn't seem to be much ambiguous about law enforcement's attempt to retcon the post-arrest questioning to make Salguero's request for a lawyer vanish into the ether.
There was a language barrier but not an insurmountable one. Salguero's first language is Spanish but he knows some English. Two of the detectives present spoke Spanish. One spoke only English. Occasionally, translation was needed for the single English-only speaker in the room. But, for the most part, the interrogation flowed. The detectives told Salguero he wasn't being charged with anything, despite hauling him in with an arrest warrant. Salguero made it clear he wasn't interested in talking if he didn't get a lawyer.
For many, John Perry Barlow’s name might be inseparable from the digital advocacy work he did in the early days of the Internet. But the EFF co-founder’s impact—and adventures—spanned areas as diverse as Hollywood, politics, popular music, and environmental policy. His newly-released memoir, Mother American Night: My Life in Crazy Times, follows Barlow, who passed away earlier this year, from his upbringing in Wyoming as “ranching royalty,” through to the experience of writing his first song for the Grateful Dead (“Mexicali Blues”), up to the phone calls with hackers in the Legion of Doom that led him to work with Mitch Kapor in creating the Electronic Frontier Foundation—and beyond.
Barlow’s “crazy times” extend beyond his more well-known interactions with the Dead during the Summer of Love and his conversations on the “Whole Earth ‘Lectronic Link” (AKA the WELL, an early virtual community) during the first years of the Internet. Barlow writes of the time he spent at Andy Warhol’s famous Factory; of traveling on a pilgrimage through India after selling the rights to a novel straight out of college; and of his relationships with people as diverse as Steve Jobs, Timothy Leary, and John F. Kennedy, Jr. He was, it seems, good at being in the right places at the right times with the right people, while doing what he calls, in a typical Barlow-ism, “hanging out with intent.”
As a result, Mother American Night reads like a history of the culture clashes of the last fifty years: offline versus online, rural versus urban, government versus private life. As a rancher who ended up co-founding EFF and the Freedom of the Press Foundation as well as working as Dick Cheney’s campaign coordinator, one of Barlow’s most impressive qualities was straddling, and bringing together, these sometimes opposing cultures.
Weeks before his death he and his co-author Robert Greenfield completed Mother American Night, his long-promised memoir. I just ordered a copy; I would have done that anyway, but Jesse Jarnow's Wired review made it clear that this is basically Barlow in paper form.
New York state legislators are back at it, attempting to tackle cyberbullying with a "new" law. In reality, this would be the legislature's fifth attempt to enact an anti-cyberbullying law. New York attorney Eric Turkewitz was the first to catch the New York's Senate's self-congratulatory tweet. The tweet touted the bill's unanimous passage (a 56-0 vote). But "widespread support" isn't synonymous with "well-crafted law." No state senator wants to appear "soft" on bullying, so the law passes without anyone bothering to ascertain its effectiveness, much less its constitutionality.
“To be a first responder, your DNA is built differently,” said Omar Delgado, a former Florida police officer who responded to Orlando’s Pulse nightclub shooting, in which 49 people were killed and at least 53 others wounded. “Everyone’s going to be running out of danger; you’re going to be running in.”
Nearly two years after the tragedy, Delgado and other first responders who were on the scene at Pulse shared their consequent struggles with post-traumatic stress disorder at an event co-hosted by ProPublica, 90.7 WMFE and the Orlando Public Library on Wednesday night. Held at the Orlando Public Library’s Melrose Center for Technology, Innovation and Creativity, the event also featured family members of first responders, advocates, mental health counselors and elected officials. The conversation was moderated by WMFE reporter Abe Aboraya, who is spending the year investigating PTSD in first responders as part of the ProPublica Local Reporting Network.
Everett posted pictures of cash and weapons. As a convicted felon, he certainly wasn't supposed to be in possession of the latter. There's a discussion of privacy settings in the court's decision, but it only shows nothing conclusive was determined by the lower court. Apparently, Everett did set his account to "Friends-only" at some point, but that most likely did not occur until after the photos used to obtain a search warrant had already been viewed.
Ultimately, the court decides the privacy settings don't really matter -- at least not as far as Everett extended them. It would have still allowed the detective to see the photos Everett posted, given that the law enforcement officer was already a Facebook friend.
Attempting to claim his privacy was violated by the three-year subterfuge, Everett's challenge partially hinged on a key omission from the detective's warrant affidavit. The detective never informed the judge he had spent three years pretending to be Everett's friend to gather probable cause for a search. If nothing else, this seems like a waste of law enforcement resources, given the only charge Everett was convicted for was firearms possession. Then again, surveillance through a Facebook account is a largely passive enterprise.
Security experts said that it didn't look like a DDoS, and rumours emerged that the "analysis" never took place.
Both the 2014 and 2017 comment system downtimes happened right after comedian John Oliver used his HBO show to urge net neutrality supporters to submit comments to the FCC.
I don’t know what the Supreme Court thinks of alternative statements of the question presented — but it has become a regular practice of parties opposing certiorari to restate the question in an attempt to shift attention of the court.
The pending petition in Helsinn is on point.
[...]
Opposition: Whether this Court should review the Federal Circuit’s factual conclusion that Helsinn’s sale agreement with a third party publicly disclosed its claimed invention “in detail” (Pet. 33a) more than a year before it filed its patent application, thus triggering the “on sale” bar on patentability set forth in 35 U.S.C. €§102(a).
My view is that in most situations reverse engineering and other experimentation should be a permissible fair use despite the existence of patents.
The European Union has filed a World Trade Organization dispute settlement complaint against China for unfair treatment of foreign intellectual property rights holders. The case follows a similar filing by the United States against China.
A new report published by The Software Alliance shows that usage of pirated PC software is decreasing worldwide. While this is a positive trend for the industry, piracy remains rampant in many countries. This includes Libya, where a massive 90 percent of all software is used without permission.
The pending update to the EU Copyright Directive is coming up for a committee vote on June 20 or 21 and a parliamentary vote either in early July or late September. While the directive fixes some longstanding problems with EU rules, it creates much, much larger ones: problems so big that they threaten to wreck the Internet itself.
Under Article 13 of the proposal, sites that allow users to post text, sounds, code, still or moving images, or other copyrighted works for public consumption will have to filter all their users' submissions against a database of copyrighted works. Sites will have to pay to license the technology to match submissions to the database, and to identify near matches as well as exact ones. Sites will be required to have a process to allow rightsholders to update this list with more copyrighted works.
While it is true that Member States retain significant freedom in devising relevant procedures for repressing copyright infringements and awarding damages, Article 8 of the InfoSoc Directive requires resulting sanctions and remedies be effective, proportionate and dissuasive. This provision is in line with what also Article 3 of the Enforcement Directive mandates.
In this sense, the question that arises – and has actually arisen – is whether it is compatible with EU law to provide that the owner of an internet connection, through which copyright infringements have been committed, may escape liability thereof by indicating, without the need to provide any further details, a family member that has also had access to such connection.
New research has revealed that 60 percent of all UK citizens have used pirate services to stream or download TV, films or music. However, the vast majority of these self-proclaimed pirates say they tend to find legal options first. These and other findings suggest that piracy remains an availability problem and that 'pirates' are among the most engaged consumers.
Spotify is reportedly offering advances and appealing business terms to independent artists in hopes of convincing them to license their music directly with the streaming music app instead of going through a third-party distribution service.
Under the terms of some of the deals, management firms can receive several hundred thousand dollars as an advance fee for agreeing to license a certain number of tracks by their independent acts directly to Spotify. Then, in at least some cases, the managers and acts stand to earn 50 percent of the revenue per stream on those songs on Spotify. That’s slightly less than the 54 percent of revenue the major record labels in the U.S. get per stream, on average, according to Billboard’s calculations, but major-label artists and their managers typically receive only 20 percent to 50 percent of the label’s share, depending on an act’s individual royalty rates, and don’t usually get to own their master recordings.
It currently looks like there is a razor-thin majority in favor of Article 13. The negotiators for the EPP (conservatives), ALDE (liberals), ECR (eurosceptic conservatives) and ENF (anti-EU far right) in the Legal Affairs Committee recently expressed their support for the latest version of Article 13.
[...]
It will come down to every single vote. Our mission until June 20: Make it clear to at least one MEP who’s currently undecided or in favour that their constituents want them to reject these plans. The NGO EDRi has made a list of key swing votes.
Julia Reda sounds the alarm that the European Parliament will vote on mandatory upload filtering in two weeks, with nowhere near enough attention to this issue from the public at large. Once this vote has taken place, it will be very hard to make additional changes to the bill as it proceeds through the lawmaking machinery.