After months of user testing in developer and beta channels, the Crostini project at Google finally delivered the goods, Linux apps for most users of Chromebooks in the stable channel—definitely worth the wait. While this still is aimed primarily at developers using Chromebooks, I think there's a good chance these Linux apps will be used and enjoyed by the general public using Chromebooks as well. There's still a bit of a learning curve to overcome before that possibility is realized, but if you already are a user of any Linux distro, it will feel very familiar. Here's an overview of how to install it and what to expect afterward.
After getting the update to version 69, go to Settings and scroll down a bit, and you'll see the option to turn on Linux apps. Figure 1 shows this first step. Note that this isn't available on all Chromebooks; if you're using an older one, you'll have to wait a while before this function is available. If you don't see the option to turn on Linux apps, your Chromebook currently lacks that functionality. But, if you have a Chromebook produced in the past two years, you probably will see the option.
If your Windows is updated to the latest Windows 10 October 2018 update then there are chances that you might be facing audio problems , something along the lines of “No Audio Output Device is installed”.
The October 2018 patch caused this issue on many machines running Windows 10 version 1803 or above. Many users tweeted about this problem almost instantly as it was happening on such a wide scale when they realized that they Windows has stopped giving them audio when they start playing games, or launch a video player all while the sounds on their browser as well as the system sounds were working perfectly fine.
As mentioned last week, here's a -rc8 release as it seems needed.
There were a lot of "little" pull requests this week, semi-normal for this late in the cycle, but a lot of them were "fix up the previous fix I just sent" which implies that people are having a few issues still.
I also know of at least one "bad" bug that finally has a proposed fix, so that should hopefully get merged this week. And there are some outstanding USB fixes I know of that have not yet landed in the tree (I blame me for that...)
Anyway, the full shortlog is below, lots of tiny things all over the tree. Please go and test and ensure that all works well for you. Hopefully this should be the last -rc release.
The Qualcomm/Atheros "Ath10k" Linux driver coming up in the Linux 4.20~5.0 kernel merge window is picking up two prominent features.
First up, the Ath10k driver is finally having WoWLAN support -- Wake on Wireless LAN. WoWLAN has been supported by the kernel for years and more recently is getting picked up by Linux networking user-space configuration utilities. Ath10k is becoming the latest Linux wireless driver supporting WoWLAN (WIPHY_WOWLAN_NET_DETECT) for automatically waking up the system when within range of an a known SSID.
FUSE file-systems in user-space are set to be running faster with the upcoming Linux 4.20~5.0 kernel thanks to several performance optimizations.
The FUSE kernel code for this next Linux kernel cycle already has a hash table optimization and separately is copy file range support for efficient file copy operations. Staged today into the FUSE tree for the next cycle was yet another performance-boosting patch.
With the Linux 4.19-rc8 kernel release overnight, one change not to be found in this latest Linux 4.19 release candidate are any alterations to the new Code of Conduct. The latest proposal forbids discussing off-topic matters while protecting any sentient being in the universe.
While some immediate changes to the Linux kernel Code of Conduct have been talked about by upstream kernel developers, for 4.19-rc8 there are no changes yet. We'll presumably see some basic changes land this week ahead of Linux 4.19.0 expected next Sunday as not to have an unenforceable or flawed CoC found in a released kernel version.
Linux v4.18 has been out a two months now; making this post a bit late, but still in time before the next release. Also so much drama in the CoC to care about performance topics :P As always comes with a series of performance enhancements and optimizations across subsystems.
Developed through a joint effort by dozens of member companies, the AGL Unified Code Base (UCB) is an open source software platform that can serve as the de facto industry standard for infotainment, telematics and instrument cluster applications. Sharing a single software platform across the industry reduces fragmentation and accelerates time-to-market by encouraging the growth of a global ecosystem of developers and application providers that can build a product once and have it work for multiple automakers.
[...]
The AGL UCB 6.0 includes an operating system, middleware and application framework. Key features include: [...]
For current users of CodeXL, this new release may look and feel a little different. The AMD Developer Tools team has been busy working on many new tools, some of which replicate functionality found in older versions of CodeXL. Thus, to limit confusion for our users, we have removed several major components from CodeXL.
But what is found within CodeXL 2.6 for GPU developers are the GPU profiling features, static analysis features, and GPU debugging features.
Lots of bugfixes all over the map. Thanks to all for testing and patches!
It's almost been a half-year already since the release of the long delayed X.Org Server 1.20, but with no signs of X.Org Server 1.21 releasing soon, xorg-server 1.20.2 was announced today as the latest stable point release.
FreeDesktop.org is already effectively part of X.Org given the loose structure of FreeDesktop.org, the key members/administrators being part of both projects, and FreeDesktop.org long being the de facto hosting platform from the X.Org Server to Mesa and much more. But now they may be officially joining forces.
As a formality, the X.Org Foundation is seeking to change their foundation's by-laws to reflect that the X.Org Foundation shall also "Support free and open source projects through the freedesktop.org infrastructure. For projects outside the scope [of the X.Org Foundation] support extends to project hosting only."
Existing Intel graphics hardware already supports SIMD32 fragment shaders and the Intel open-source Linux graphics driver has supported this mode for months, but it hasn't been enabled. That though is in the process of changing.
Since June the Intel Mesa driver's fragment shader code has supported the SIMD32 mode supported by the past number of generations of Intel graphics hardware, but it hasn't actually been turned on. That enabling wasn't done over not having the heuristics in place for determining when to enable it over the other code paths.
As the latest of our benchmarks using the newly re-released Microsoft Windows 10 October 2018 Update, here are benchmarks of this latest Windows 10 build against seven different Linux distributions on the same hardware for checking out the current performance of these operating systems.
For this latest Linux OS benchmarking comparison against Windows, the following platforms were tested:
- The Windows 10 April 2018 release as the previous major milestone of Windows 10.
- The newest Windows 10 October 2018 build as the latest Windows 10 build from Microsoft.
- OpenSUSE Tumbleweed as the openSUSE rolling-release distribution that as of testing was on the Linux 4.18.12 kernel, KDE Plasma 5.14, Mesa 18.1.7, and GCC 8.2.1 atop an XFS home file-system with Btrfs root file-system (the default partitioning scheme).
A comic book is a magazine which consists of narrative artwork in the form of sequential images with text that represent individual scenes. Panels are often accompanied by brief descriptive prose and written narrative, usually dialog contained in word balloons emblematic of the comics art form. Comics are used to tell a story, and are published in a number of different formats including comic strips, comic books, webcomics, Manga, and graphic novels. Some comics have been published in a tabloid form. The largest comic book market is Japan.
Many users associate desktop Linux with their daily repetitive grind. However, we are always on the look out for applications that help make Linux fun to use. It really is a great platform for entertainment.
Some document viewers offer a good range of different formats. Although they are not dedicated comic book viewers, Evince and okular have support for the common comic book archive files, and merit mention here.
Nativefier is a CLI tool that easily create a executable desktop application of any website with succinct and minimal configuration. Anybody can use it and it is a lot lighter than typical Electron apps.
Nativefier is based on the electron-package and since Electron apps are platform independent, any Nativefiered app will run on GNU/Linux distros as well as on Windows and Mac Operating Systems.
Linux NVENC OBS Screen Capture. How does it compare to a USB hardware capture device? With select NVIDIA cards and a NVIDIA modern driver for Linux, my OBS installation is able to take advantage of GPU video capturing.
Ubuntu 18.04 aka Bionic Beaver was released on April 26th, 2018 with a lot of changes on front end as well as on backend. Major change that anybody who has ever used Ubuntu, will notice is the Desktop Environment.
This is the second part of our migrating from Windows 7 to Linux guide. We talked about general preparations in the first guide that looked at choosing the right Linux distribution, finding out if a certain Linux flavor supports needed features or software, or how one would go about migrating data to Linux.
Microsoft will retire Windows 7 on January 2020 for home users and small businesses. The company won't release security updates for the operating system after January 2020 which means that any vulnerability that is detected after January 2020 remains unpatched.
AI War 2 from Arcen Games has finally entered Early Access today after being funded on Kickstarter back at the end of 2016. Thankfully, they've lived up to their promise of Linux support as it's available right away.
Welcome to the another review in the PIN (Play It NOW) series, where we highlight under-rated games that didn’t get the praise and attention they deserved on release and still don’t to this day. Until now! This time, we’ll take a look at PixelJunk Shooter by Q-Games Ltd.
For those after their next RPG fix, the monster taming game Siralim 3 [Official Site] is now officially out with Linux support as it has left Early Access.
While not the most graphically pleasing, the Siralim series do always have a really good amount of depth in them allowing you a ridiculous amount of fun.
Feral Interactive just put up a YouTube video to show off Total War: WARHAMMER II running on Linux, it's looking good and they confirmed again their future Linux plans.
What's interesting, is that in this video they did confirm a few interesting bits of extra information. Firstly, they confirmed that Total War: WARHAMMER II is using Vulkan (which we knew already) but the more interesting thing is what they said after. They said "By the way, we do have more sweet sweet Vulkan plans up our sleeves, but they're secret.". It's going to be interesting to find out what they mean by that, since they wouldn't say such a thing if it just meant future ports will use Vulkan, since we already know that as they've said it multiple times before.
Inspired by ’80s arcade cabinet games, Eternum EX aims to be a challenging retro action platformer that's releasing this month.
The developer said they were inspired by games like Bomb Jack (Tehkan, 1984), Ghosts’n Goblins (Capcom, 1985), Baluba-louk no Densetsu (Able, 1986) and Psychic 5 (Jaleco, 1987).
For those who love a good twin-stick shooter, Smith and Winston certainly looks quite interesting and it has some pretty sweet design.
A small update for those interested in keeping up with the news surrounding Steam Play and Proton development.
In September, we spoke to Linux game porter Ethan Lee where he went on to mention how he would like to officially work on Steam Play's Proton. Not long after our article went up, he ended up speaking to Valve so things started moving pretty quickly. All was quiet, then, at the start of this month he wrote a post on Google+ to mention that he was working out some sort of contract to officially begin working on it.
We have had a lot of news about games in the Linux world coming out in recent weeks. We already have an interesting performance for games like Grand Theft Auto V, and the trend is for the compatibility level to improve every day, with Valve's recent announcement of Proton as announced here! This even was the head behind the development of DXVK which brought a new step in the compatibility of Windows games on Linux.
To go along with this new feature, they also added a Player Ragdoll for when you're knocked out or dead. You partner can help you up with bandages before you bleed out and bodies can be dragged as well for maximum fun. It's good to see them add more from their roadmap, with plenty more still to come before it leaves Early Access.
They also added a Raft Passenger Seat, fixed a bunch of bugs and updated Unity to "2017.4.13f1". Also the shark music won't play until you're actually attacked so no more early warnings for you.
.Age (dot Age) seems like it could be a very interesting game. A harsh turn-based village builder that will throw events at you like candy, don't be fooled by the cute and colourful style as this is a menacing game.
Developed by CKC Games, it's due out sometime next year. When spotted on Twitter, we spoke to the developer who confirmed "I've had a linux build for years" so it's coming to Linux at release.
For those waiting on the native Linux version of The Bard's Tale IV, fear not, as inXile Entertainment have confirmed they're working on it.
No longer hidden behind a beta of Steam, AI combat arena Gladiabots from GFX47 is now officially supported on Steam for Linux. Do note, the game is still in Early Access.
If you love strategy games and feel like you want a little more control over unit AI, this might be the game for you. In Gladiabots you assemble a team of robots, design their AI with a handy drag and drop interface and attempt to beat another AI in battle. There's decent tutorials, a campaign, cross-platform online play that doesn't require you to be online at the same time and it's really quite clever.
For those who love their first-person dungeon crawlers, The 7th Circle actually looks pretty good and they recently added Linux support.
It's not going to win any awards for originality here, but 68k Studios seem to have created a reasonably good retro-inspired dungeon crawler. With traditional turn-based combat, more than 60 spells to wield, a crafting and upgrades system and so on it's pretty full on features.
It's time to close up shop and go on another run through the dungeons as Moonlighter has a free update now out. This update originally released last week, with the Linux version only seeing the update today.
I am pleased to announce the release of Xfce Screensaver (xfce4-screensaver) 0.1.0! This is an early release targeted to testers and translators. Bugs and patches welcome!
As a new alternative over XScreenSaver or using other desktop environments' screensaver functionality, xfce4-screensaver has out its first release albeit of alpha quality.
The xfce4-screensaver project made its preliminary (v0.1.0) release today that is described of alpha quality intended for testers and translators. This new screensaver option for Xfce users is forked from the MATE Screensaver code, which in turn was forked from the GNOME Screensaver.
Linux is much like the stock market. Moments of happiness broken by crises. Or is the other way around? Never mind. Today shall hopefully be a day of joy, for I am about to test Plasma 5.14, the latest version of this neat desktop environment. Recently, I’ve had a nice streak of good energy with Linux, mostly thanks to my experience with Slimbook Pro2, which I configured with Kubuntu Beaver. Let’s see if we can keep the momentum.
Now, before we begin, there are more good news woven into this announcement. As you can imagine, you do need some kind of demonstrator to test the new desktop. Usually, it’s KDE neon, which offers a clean, lean, mean KDE-focused testing environment. You can boot into the live session, try the desktop, and if you like it, you can even install it. Indeed, neon is an integral part of my eight-boot setup on the Lenovo G50 machine. But what makes things really interesting is that neon has also switched to the latest Ubuntu LTS base. It now comes aligned to the 18.04 family, adorned with this brand new Plasma. Proceed.
KDE Frameworks are 70 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. For an introduction see the Frameworks 5.0 release announcement.
This release is part of a series of planned monthly releases making improvements available to developers in a quick and predictable manner.
Of the total donation amount, 100,000 USD will be specifically allocated to pursue the development of the Calligra office suite.
"Handshake is pleased to be able to support KDE's international community of dedicated volunteers and their continued commitment to a free desktop environment with the current release of KDE Plasma 5 and the Calligra office suite", says Rob Myers from the Handshake Foundation.
The fruits of this contribution will soon become visible and available to everyone. Meanwhile, don't hesitate to join the KDE Community and be part of our mission to help everyone protect their privacy and control their digital lives with Free Software.
KDE e.V. announces it received a $300,000 USD donation from the Handshake Foundation. According to the KDE blog post, it plans to use $100,000 USD of the donation specifically toward development of the Calligra office suite. Also, KDE celebrated its 22nd anniversary yesterday—Happy Birthday KDE!
It’s time for another digiKam Recipes update. The most visible change in this update is the new book cover. All screenshots were also updated to reflect changes in the current version of digiKam.
2014 is the year that I first started to try Linux on my laptop, and then I knew that Windows programs don’t run perfectly on Linux even using “wine”. My curiosity about Linux and the alternative programs led me to Krita. The more time I spent with Linux, the more I fell in love with it. And finally I thought that “I’ll choose Linux as a single OS on my laptop and Krita as a digital painting program for work someday after I get my first graphic tablet.”
Yesterday was the last day of the developers sprint^Wmarathon, and the last day of the fundraiser. We’re all good and knackered here, but the fundraiser ended at a very respectable 26,426 euros! That’s really awesome, thanks everybody!
We’re glad to announce that we received donation of 100,000 USD, which is part of 300,000 USD offered to our KDE organization. Quite appropriate for a birthday present, as the KDE project just turned 22 this last weekend! It’s true recognition for KDE as one of the world’s largest open source project.
We have published Qt 5.12 beta2 today. As earlier you can get it via online installer. Delta to beta1 attached.
Just two weeks after the Qt 5.12 beta release, a second beta is now available for testing of this forthcoming tool-kit update.
The Qt 5.12 Beta 2 update is made up of bug fixes with changes ranging from build fixes for different platforms to disabling mouse tracking by default within the QtWebGLPlugin to fixed Ozone platform detection. There are more than 200 changes to Qt 5.12 that have been queued over the past two weeks.
The complete list of the 200+ changes that are mostly fixes in Qt 5.12 Beta 2 can be found via today's release announcement with the attached change-log.
Sebastian Labi ha sido invitado para presentar Krita en el Laboratorio de herramientas de software libre de la Universidad de La Plata. Hablará sobre ilustración digital y usará Krita para dar una demostración de cómo usar Krita para el campo de la Ilustración Digital.
El SLAD- FBA (Software libre para Arte y diseño) es una nueva unidad de de investigación y formación en la Facultad de Bellas Artes que promueve el conocimiento y uso del software libre en la capacitación académica de la Universidad de La Plata.
The third day of LaKademy 2018 was my last day participating on the event.
During October 13th, we started the day with a promo reunion. This reunion was done to discuss about some plans and actions for the Latin American KDE community over the next year. Some decisions were made and topics were discussed involving KDE participation in some events, promotion of our own events in Latin America, including LaKademy 2019 and Kafé com Qt, and some details in general about our community.
Over the past few months we’ve had a lively debate about “theming” in GNOME, and how it affects our ecosystem. In this discussion I’ve found that there is a divide between people who design and/or develop apps, and people who don’t. I have yet to see an app developer who thinks the current approach to “theming” can work, while many people who aren’t app developers are arguing that it can.
After a few long discussions I started to realize that part of the reason why there’s so little agreement and so much drama around this issue is that we don’t agree what the problem is. Those who don’t work on apps often can’t see the issues with theming and think we want to remove things for no reason, while those who do are very frustrated that the other side doesn’t want to acknowledge how broken everything is.
Also, while I'm at it, I wanted to highlight the "call for help" at the end of that post by repeating it here again. I apologize of repeating to those who already read it but a friend pointed out that it's likely going to be missed by many folks: The future of Mozilla Location Service When Mozilla announced their location service in late 2013, Geoclue became one of its first users as it was our only hope for a reliable WiFi-geolocation source. We couldn't use Google's service as their ToC don't allow it to be used in an open source project (I recall some clause that it can only be used with Google Maps and not any other Map software). Mozilla Location Service (MLS) was a huge success in terms of people contributing WiFi data to it. I've been to quite a few places around Europe and North America in the last few years and I haven't been to any location, that is not already covered by MLS.
If you want to join us in GNOME usability testing as part of the upcoming cycle in Outreachy, you'll need to make a first contribution as part of your application process. Every project in Outreachy asks for a first contribution; this is a requirement in Outreachy.
Don't make too big of a deal about your first contribution in usability testing. We don't expect interns to know much about usability testing as they enter the internship. Throughout the internship, you'll learn about usability testing. So for this first contribution, we set a low bar.
Kali Linux is the industry’s leading Linux distribution in penetration testing and ethical hacking. It is a distribution that comes shipped with tons and tons of hacking and penetration tools and software by default, and is widely recognized in all parts of the world, even among Windows users who may not even know what Linux is.
Because of the latter, many people are trying to get alone with Kali Linux although they don’t even understand the basics of a Linux system. The reasons may vary from having fun, faking being a hacker to impress a girlfriend or simply trying to hack the neighbors’ WiFi network to get a free Internet, all of which is a bad thing to do if you are planning to use Kali Linux.
3. PicarOS Diego. My daughter's desktop dual-boots Mageia and PicarOS Diego, a great MiniNo GalpON respin for children. Since the game she likes is neither running with WINE on Mageia 6.1 nor with Windows Vista, I tried to run it on WINE in PicarOS. The packages were old, so I updated the system. Big mistake! In the end, I was left with an up-to-date MiniNo that removed all the special tweaks for children and, to add insult to injury, the game would not run at all!
I recently saw the announcement for Kali Linux on Vagrant. I have been a huge fan of Kali Linux for a very long time, and I am interested in virtualization (and currently using VirtualBox in an educational environment), so this was a very interesting combination to me. I have now installed it on a few of my systems, and so far I am quite impressed with it.
The logical place to start is with a brief overview of Vagrant itself. What is Vagrant? According to their web page:
Vagrant is a tool for building and managing virtual machine environments in a single workflow
What Vagrant actually does is provide a way of automating the building of virtualized development environments using a variety of the most popular providers, such as VirtualBox, VMware, AWS and others. It not only handles the initial setup of the virtual machine, it can also provision the virtual machine based on your specifications, so it provides a consistent environment which can be shared and distributed to others.
...this is the official release announcement for IPFire 2.21 – Core Update 124. It brings new features and immensely improves security and performance of the whole system.
New Redis Enterprise Kubernetes Operator simplifies the development of cloud-native applications and services across hybrid and multi-cloud footprints
The growth of a new technology as it enters the industry can tend to take on a certain pattern. At first, users begin to get a feel for what it does and what problems it can solve. That can lead to the next step of deploying successive generations of the technology, a greater understanding of it by customers, and more widespread use, which then drives more deployments, expanded use, and greater developer participation.
The evolution of Kubernetes, which has become the dominant container orchestration technology since being contributed to the open source community by Google several years ago, has been so fierce that it has caught up to and outran similar tools like Docker Swarm, Mesos, and OpenStack in the market. Since 2015, Kubernetes has marched through the first two phases of its evolution and is now entering its third phase, according to Brian Gracely, director of product strategy at Red Hat, which has embraced Kubernetes in its OpenShift platform.
In the recent months I have been getting more and more questions about identity management (IdM) in Red Hat Enterprise Linux and best practices around load balancing. This post dives into the details and recommendations related to this subject.
In this post, we will focus on processing CloudEvents, which provide a standard mechanism for describing event data in a platform-independent manner. The CloudEvents specification aims to make it easier to write portable applications that produce and consume event-based services. The specification provides a base level of metadata, which might be of interest for an event, and the payload, which can be of arbitrary structure. CloudEvents are distinct from a binding to any particular serialization format, but the event-flow platform uses a JSON representation of them. Even though we are focussing on CloudEvents in this post, the EventFlow platform is not specific to them. It can be used to transport any other type of “serializable” data between processors.
The newest release of Red Hat OpenShift, version 3.11, introduces Kubernetes Operator support. Operators, along with Custom Resource Definitions, allow OpenShift to be extended to support custom types and manage complex services. The Kubernetes MongoDB Enterprise Operator in conjunction with MongoDB Ops Manager supports provisioning and lifecycle management for multiple MongoDB Enterprise clusters. An OpenShift user can more easily deploy MongoDB replica sets or sharded clusters, perform upgrades to future versions, and change configurations directly from the standard Kubernetes API’s, or from tooling (such as kubectl). The Kubernetes MongoDB Enterprise Operator is available directly in Dev Preview as an optional install in OpenShift 3.11.
For the past few months, I’ve contributed to ChRIS (Childrens’ Research Integration Service) as a user experience (UX) designer.ChRIS is a cloud-based, open source framework for processing medical imaging data; it was originally conceived by a team at Boston Children’s Hospital and successfully executed with help from the Mass Open Cloud (MOC) and Red Hat.
Working on the ChRIS project is fulfilling in a direct way; it applies open source technology and principles to improve patient care. Doctors shouldn’t have to be computer scientists to be able to use the best innovations in medical image processing technology to improve their patients’ outcomes.
Continuing to lead in high-performance backup and restore for large enterprises, hosting companies and managed services providers, Bacula Systems today announced Bacula Enterprise Edition 10.2, featuring new functionality for integrated backup and recovery of Red Hat Virtualization environments.
The annual Fedora contributor conference, Flock, took place from August 8-11, 2018. Several members of the Community Operations (CommOps) team were present for the conference. We also held a half-day team sprint for team members and interested people to participate and share feedback with the team.
Last week the Flatpak community woke to the “news” that we are making the world a less secure place and we need to rethink what we’re doing. Personally, I’m not sure this is a fair assessment of the situation. The “tl;dr” summary is: Flatpak confers many benefits besides the sandboxing, and even looking just at the sandboxing, improving app security is a huge problem space and so is a work in progress across multiple upstream projects. Much of what has been achieved so far already delivers incremental improvements in security, and we’re making solid progress on the wider app distribution and portability problem space.
Sandboxing, like security in general, isn’t a binary thing – you can’t just say because you have a sandbox, you have 100% security. Like having two locks on your front door, two front doors, or locks on your windows too, sensible security is about defense in depth. Each barrier that you implement precludes some invalid or possibly malicious behaviour. You hope that in total, all of these barriers would prevent anything bad, but you can never really guarantee this – it’s about multiplying together probabilities to get a smaller number. A computer which is switched off, in a locked faraday cage, with no connectivity, is perfectly secure – but it’s also perfectly useless because you cannot actually use it. Sandboxing is very much the same – whilst you could easily take systemd-nspawn, Docker or any other container technology of choice and 100% lock down a desktop app, you wouldn’t be able to interact with it at all.
Coinciding with IoT World Solutions Congress in Barcelona this week, Canonical is pleased to announce a dual-pronged technological partnership with Eurotech to help organisations advance their internet of things enablement. Eurotech is a long time leader in embedded computing hardware as well as providing software solutions to aid enterprises to deliver their IoT projects either end to end or by providing intervening building blocks.
As part of the partnership, Canonical has published a Snap for the Eclipse Kura project – the popular, open-source Java-based IoT edge framework. Having Kura available as a Snap – the universal Linux application packaging format – will enable a wider availability of Linux users across multiple distributions to take advantage of the framework and ensure it is supported on more hardware. Snap support will also extend on Eurotech’s commercially supported version; the Everywhere Software Framework (ESF). By installing Kura as a Snap on a device, users will benefit with automatic updates to ensure they are always working from the latest version while with the reassurance of a secure, confined environment.
Welcome to the Ubuntu Weekly Newsletter, Issue 549 for the week of October 7 – 13, 2018.
Hi everyone! Phew, it has been a busy and exciting time these last several weeks. Here is a fairly detailed summary of the progress that has been made on the various pieces of the Librem 5 project.
[...]
In phosh, there have been many bugs fixed and the code has been cleaned up. Also an effort has gone towards translations, updating the German and French translations as well as standardizing the po headers to hopefully make it less confusing for new translators.
Purism has shared the latest details on their efforts to deliver the open-source Linux Librem 5 smartphone to market in 2019.
Arm on Monday is announcing a series of new partnerships that will enhance Pelion, its Internet of Things platform, making it easier for customers to deploy and manage a wider range of IoT devices on the platform.
First, the Peltion Platform can now be used to manage Intel Architecture (x86) platforms, in addition to Arm-based IoT devices and gateways. Next, Arm is partnering with myDevices to make it easier to quickly onboard a wider array of devices. Additionally, Arduino is partnering with Pelion Connectivity Management to enable developers to quickly create and scale cellular IoT designs.
In addition, the company announced Mbed Linux OS, which builds on its Mbed OS for IoT devices based on Cortex-A. Mbed Linux OS is integrated with the Pelion IoT Platform and is designed to open up new classes of IoT devices with complex applications, such as those processing video or edge gateways. Developers can sign-up now for early access to the new software.
The La Frite board is a follow up to Libre Computing's $25 Le Potato board and is "loosely based" on the design of the Raspberry Pi A+ -- a smaller and cheaper Pi than the $35 Raspberry Pi B+ -- due to the 40-pin GPIO header setup.
It's currently available to backers on the device's Kickstarter page and will be generally available in November.
A new security key solution is poised to further extend the reach of the FIDO Alliance’s new FIDO2 authentication standard.
Called “Solo”, the security key is currently in the works from San Francisco-based SoloKeys, which currently has a Kickstarter campaign underway to support the product. Like other prominent security key solutions, Solo is designed to plug into a computer or laptop’s USB port, allowing the user to confirm with an authenticating service that they are physically present at the device by pressing a button on the key.
The rise of IOTA as a top DLT continues. Earlier this year, the city of Taipei announced that they were using the IOTA tangle in implementing their smart city project. The project has largely been a success in implementing a decentralized digital identity system that runs on the IOTA tangle. That’s a major plus towards the growth of the IOTA ecosystem, and gives a huge intrinsic value to the IOTA coin. However, the best news is that this system is now open source. This means that it can be applied to any other city all across the world.
The debut issue of the Open Source Healthcare Journal, a magazine advocating innovative open-source solutions in health, will be available for preview by over 2,000 technology innovators and healthcare providers at the Connected Health Conference at the Seaport World Trade Center in Boston, October 17-19. The Open Source Healthcare Journal's forward-looking point of view is the perfect match for the industry-leading conference, known for provocative discussions on the future of tech-enabled health. The first issue of the journal — published by GoInvo, a healthcare design studio located in Arlington, Massachusetts — features a Q&A with digital health leader and best-selling author Eric Topol, MD as well as articles by Jane Sarasohn-Kahn of HealthcareDIY and Juhan Sonin of MIT and GoInvo.
Hedera Hashgraph, the public distributed ledger that enables globally decentralized applications recently announced the public release of the Hedera SDK in Java.
The SDK is open source under an Apache 2 license. With the SDK, developers can now begin to develop Hedera-based applications for use on the Hedera platform.
Just as with commercial, for-pay monitoring software, there are open-source options that have varying features, and the goal of an enterprise is to find the best fit for its environment.
That’s where this downloadable PDF package of reviews can help. It evaluates four popular free, open-source network-monitoring platforms – Icinga, Nagios, Observium and Zabbix – highlighting pros and cons and giving enough context that this bundle can serve as a guide for IT pros seeking advice.
So what's next? Another ONAP update is due soon (in November, dubbed Dublin) but that will only cover up some of the cracks.
But you know what -- that's OK! No one actually expects an open source development comprising millions of lines of code to be made useful in a blink of an eye, or even a few months. Iterative progress and a very clear indication of the state of documentation, exactly which modules might be ready to be either used by an operator's team or considered for "industrialization" by a vendor and even highlighting areas where more community activity would all be useful and not at all damaging: Promoting ONAP as "ready to deploy" currently invites suspicion, because that suggests 100% readiness and that's very far from reality.
Once upon a time there was a maharaja who decided to raise a baby elephant as a pet (stick with me…). As the elephant grew, it became more and more expensive to feed and created such a mess that eventually the maharaja told his courtiers that he was gifting them the elephant out of the generosity of his heart. In return they would have to look after the elephant and bring it back to him when it was a bit more mature and stable enough for him to ride.
Some might say that, in the context of NFV MANO (management and orchestration), the elephant is Open Network Automation Platform (ONAP) and the maharaja is AT&T Inc. (NYSE: T). But that would be unfair. In reality there are two maharajas -- AT&T and China Mobile Ltd. (NYSE: CHL) -- and two elephants that have been merged into a six-legged Loxodonta with two tails and three tusks. (See MANO Marriage: ECOMP, OPEN-O Converge as ONAP.)
It seldom happens that certain circumstances do not allow one idea to prosper as planned. But Open Source can solve that issue, once the idea is shared with the world. Others can take on that work, build upon and keep improving it.
This recently happened with Transatomic Power (founded by Mark Massie and Dr. Leslie Dewan in April 2011), a Nuclear Startup that introduced a brand new design of its own Nuclear Reactor that is a lot more efficient than conventional ones.
As they haven’t been able to build it within their targeted timeframe, they announced suspending operations on September 25, 2018. But declaring their designs Open Source is certainly going to help change things for the better.
Hacktoberfest is an annual event sponsored by DigitalOcean in partnership with GitHub and Twilio and while "Hacktoberfest" might sound or give the impression of something doable only by very experienced hacker programmers, in essence, it's just a wrapper around having to submit 5 Pull Requests to any Github hosted repository and earn some swag in return.
Sahyadri Open Source Community (SOSC) at Sahyadri hosted Hacktoberfest HackNight in association with K-Tech Innovation Hub on October 13 and 14 at Sahyadri to celebrate the month of open source with Hacktoberfest.
The event was inaugurated by Shashank Krishna, Padma Shri 2019 (nominee) and director of Katmai Infotechnology Pvt Ltd, Bengaluru, followed by interaction with students regarding Smart India Hackathon. Dr R Srinivasa Rao Kunte, principal of Sahyadri College of Engineering and management, Prakhyath Rai, faculty coordinator, asst professor of Information Science, and Arjun Suvarna, chairperson of Sahyadri Open Source Community, addressed the crowd.
Linux Autumn is an annual meeting of Free Software and Linux enthusiast from Poland organized since 2003 which means this year it will be its 16th time. This year it will be organized in Ustroà â in the southern Poland from 9 to 11 November. The town is the same as the last year but in a different hotel.
As the place is located near the Czech and Slovak border we would like to invite more people, both speakers and attendees, from other countries. We are aware of strong presence of Fedora contributors in Brno and other nearby cities just across the border.
hen Google rolled out Chrome 66 earlier this May, it offered a tweak that pleased almost everyone by muting sites that would play sound automatically. Unfortunately, it also ended up breaking several projects’ audio.
This meant that a variety of different media, from popular web games to some of Google’s own projects effectively had their audio broken beyond repair. Users were understandably upset, and in response to an overwhelming amount of backlash, Google retained the browser alteration that blocked autoplaying video and audio, but decided to push back the feature’s application for games and web apps to Chrome 71, which is set to debut in December.
Do you love extensions? Do you have a keen sense of what makes a great extension? Want to help users discover extensions that will improve how they experience the web? If so, please consider applying to join our Featured Extensions Community Board!
Board members nominate and select new featured extensions each month to help millions of users find top-quality extensions to customize their Firefox browsers. Click here to learn more about the duties of the Featured Extension Advisory Board. The current board is currently wrapping up their six-month tour of duty and we are now assembling a new board of talented contributors for the months January – June, 2019.
Extension developers, designers, advocates, and fans are all invited to apply to join the board. Priority will be given to applicants who have not served on the board before, followed by those from previous boards, and finally from the outgoing board.
In previous research, The Extended Mind has documented how a 3D space automatically signals to people the rules of behavior. One of the key findings of that research is that when there is synchrony in the design of a space, it helps communicate behavioral norms to visitors. That means that when there is complementarity among content, affordances, and avatars, it helps people learn how to act. One example would be creating a gym environment (content), with weights (affordances), but only letting avatars dress in tuxedos and evening gowns. The contraction of people’s appearances could demotivate weight-lifting (the desired behavior).
This article shares learnings from the Hubs by Mozilla user research on how the different locations that they visited impacted participant’s behavior. Briefly, the researchers observed five pairs of participants in multiple 3D environments and watched as they navigated new ways of interacting with one another. In this particular study, participants visited a medieval fantasy world, a meeting room, an atrium, and a rooftop bunker.
In March of 2020, Firefox will disable support for TLS 1.0 and TLS 1.1.
On the Internet, 20 years is an eternity. TLS 1.0 will be 20 years old in January 2019. In that time, TLS has protected billions – and probably trillions – of connections from eavesdropping and attack.
In that time, we have collectively learned a lot about what it takes to design and build a security protocol.
Though we are not aware of specific problems with TLS 1.0 that require immediate action, several aspects of the design are neither as strong or as robust as we would like given the nature of the Internet today. Most importantly, TLS 1.0 does not support modern cryptographic algorithms.
A few days ago Google announced ensuring privacy for your Android data backups. The essence is that your lockscreen PIN/pattern/passcode is used to encrypt your data and nobody should be able to decrypt it without knowing that passcode. Hey, that’s including Google themselves! Sounds good? Past experience indicates that such claims should not always be taken at face value. And in fact, this story raises some red flags for me.
The trouble is, whatever you use on your phone’s lockscreen is likely not very secure. It doesn’t have to be, because the phone will lock up after a bunch of failed attempts. So everybody goes with a passcode that is easy to type but probably not too hard to guess. Can you derive an encryption key from that passcode? Sure! Will this encryption be unbreakable? Most definitely not. With passwords being that simple, anybody getting their hands on encrypted data will be able to guess the password and decrypt the data within a very short time. That will even be the case for a well-chosen key derivation algorithm (and we don’t know yet which algorithm Google chose to use here).
I am part of a program called Mozilla Reps. Though I am involved as a volunteer contributor with Mozilla for quite some time now, I am relatively new to the Mozilla Reps program and hardly know anything about the program apart from my scope of work in it. Apparently, this is the Election time for voting the nominated candidates for the Council who will spearhead the program for the next session. Since I am new to the program reading about everyone's election campaign and hearing about what they will do for the program was not giving me any clear motivation to vote for anyone specific. Though this wasn't anything super important, I still thought since I have a bit of time in my hand why not do something interesting about it.
This was at IBM, New York where I was interning and working on the TJ Watson project. I returned back to my desk, turned on my dual monitors, started reading some blogs and engaging on Mozilla IRC (a new found and pretty short lived hobby). Just a few days before that, FirefoxOS was launched in India in the form of an Intex phone with a $35 price tag. It was making waves all around, because of its hefty price and poor performance . The OS struggle was showing up in the super low cost hardware. I was personally furious about some of the shortcomings, primarily the keyboard which at that time didn’t support prediction in any language other than English and also did not learn new words. Coincidentally, I came upon Dietrich Ayala in the FirefoxOS IRC channel, who at that time was a Platform Engineer at Mozilla. To my surprise he agreed with many of my complaints and asked me if I want to contribute my ideas. I very much wanted to, but then again, I had no idea how. The idea of contributing to the codebase of something like FirefoxOS terrified me. He suggested I first send a proposal and then proceed from there. With my busy work schedule at IBM, this discussion slipped my mind and did not fully boil in my head until I returned home from my internship.
Unfortunately my suite of annoying verbal tics – um right um right um, which I continue to treat like Victor Borge’s phonetic punctuation – are on full display here, but I guess we’ll have to live with that. Here’s a talk I gave at the GTA Linux User Group on “The State Of Mozilla”, split into the main talk and the Q&A sections. I could probably have cut a quarter of that talk out by just managing those twitches better, but I guess that’s a project for 2019.
Any measure that permits a government to lay down specifications for the design of Internet systems would cause significant risk to the security, stability and trust of such systems, the Mozilla Foundation has said in a submission about Australia's proposed encryption bill.
Mozilla is worried that Australia’s proposed decryption laws will break the principles and licensing terms of open source software.
The foundation said in a submission [pdf] to the government that being forced to secretly create vulnerabilities in an open source product would be extremely difficult.
“For an open source organisation, which would need to close portions of its source code and/or release builds that are not made from its publicly released code bases, this is at odds with the core principles of open source, user expectations, and potentially contractual license obligations,” Mozilla said.
Nginx Inc. held its annual customer conference on Oct. 9-10, announcing a series of updates to its namesake Application Platform.
While Nginx was originally best known for the open source nginx web server, Nginx Inc. has expanded in recent years to enable a larger set of web application capabilities, with a series of different products.
Nginx first announced its Application Platform in September 2017, which includes the Nginx Plus Application service combined with the Nginx Controller management and Nginx Unit application server.
San Francisco headquartered software analytics company New Relic has acquired Belgian container and microservices monitoring firm CoScale.
Neither firm is essentially open source in its core approach, but the technologies being interplayed here essentially are.
CoScale’s expertise is in monitoring container and microservices environments, with a special focus on Kubernetes — the open source container orchestration system for automating deployment, scaling and management of containerized applications originally designed by Google.
AWS Service Operator relies on the Kubernetes controller pattern, which packages various basic tasks, integrates disparate components and keeps an application in a desired state. This information is stored on a single API server for the Kubernetes and AWS assets, with AWS services defined as custom resources, and a user can potentially deploy the entire lifecycle process through a single YAML manifest.
[...]
Etc.io, a Dallas-based consulting firm, doesn't use any AWS container services at scale, and relies primarily on Google Container Engine. AWS Service Operator could make it more convenient to use Kubernetes on AWS, but it doesn't help organizations that want to move to a microservices architecture that doesn't rely on a single vendor, said E.T. Cook, managing partner at Etc.io.
There’s something quite novel being introduced today at the Fall COMMON conference in Pittsburgh: An open source ERP package written in free-form RPG. Dubbed intERPprise, the software project is intended to harness core IBM i strengths – its integrated database and ILE environment – but above all, provide an example for what modern and native open source software can look like on IBM i.
DragonFlyBSD lead developer Matthew Dillon has been quite impressed with AMD's Threadripper 2 processors particularly the Threadripper 2990WX with 32-cores / 64-threads. Dillon has made various optimizations to DragonFly for helping out this processor in past months and overnight he made another significant improvement.
The Fosdem is a free event for software hackers to meet, share ideas and collaborate. Every year 8000+ open source developers from all the world gather at the event in Brussels, Belgium. During the Fosdem, developer rooms (devrooms) are assigned to self organized open source groups and projects to meet together and showcase their projects.
GNU released Guile 2.9.1 beta of the extension language for the GNU project. It is the first pre-release leading up to the 3.0 release series.
In comparison to the current stable series, 2.2.x, Guile 2.9.1 brings support for just-in-time native code generation to speed up all Guile programs.
I'm excited to share that we've launched a new forum for our associate members. We hope that you find this forum to be a great place to share your experiences and perspectives surrounding free software and to forge new bonds with the free software community. If you're a member of the FSF, head on over to https://forum.members.fsf.org to get started. You'll be able to log in using the Central Authentication Service (CAS) account that you used to create your membership. (Until we get WebLabels working for the site, you'll have to whitelist its JavaScript in order to log in and use it, but rest assured that all of the JavaScript is free software, and a link to all source code can be found in the footer of the site.) Participation in this forum is just one of many benefits of being an FSF member – if you're not a member yet, we encourage you to join today, for as little as $10 per month, or $5 per month for students.
The purpose of this member forum is to provide a space where members can meet, communicate, and collaborate with each other about free software, using free software. While there are other places on the Internet to talk about free software, this forum is unique in that it is focused on the common interests of FSF members, who care very much about using, promoting, and creating free software.
The forum software we chose to use is Discourse.
Solaris 10, what may will argue as the last "good" Solaris operating system release before Sun Microsystems fell under control of Oracle, may soon see its support deprecated by the GCC compiler stack.
With upstream Solaris 10 soon reaching its end of life and an increasing number of failures/issues coming up when testing the GNU Compiler Collection on Solaris 10, the GNU toolchain developers are looking at obsoleting that support.
Two years ago, I've taken over uTidylib maintainership. Two years has passed without any bigger contribution, but today there is a new version with support for recent html-tidy and Python 3.
I've been learning Rust lately. As part of that, I rewrote my summain program from Python to Rust (see summainrs). It's not quite a 1:1 rewrite: the Python version outputs RFC822-style records, the Rust one uses YAML. The Rust version is my first attempt at using multithreading, something I never added to the Python version.
Our writer community grows each month as new, interesting folks write for us and join in on the fun of sharing their expertise and experiences in open source technology. So, it's no surprise that they are brimming with fascinating information. It's just asking the right question to release it.
Recently, I asked: What programming languages do you use at work, and which ones do you use on the weekend?
Of the many things the go executable can do, most people know only go run and go build. And, of the many packages in the standard Go library, most people know only the fmt package. This cheat sheet will list many uses of the go executable and the most important packages in the Go standard library.
One of the great things about the Python programming language is PyPI, the Python Package Index, where third-party libraries are hosted, available for anyone to install and gain access to pre-existing functionality without starting from scratch. These libraries are handy utilities, written by members of the community, that aren't found within the Python standard library. But they work in much the same way—you import them into your code and have access to functions and classes you didn't write yourself.
Roughly 96 percent of the general population struggles with solving problems relating to statistics and probability. Yet being a well-informed citizen in the 21st century requires us to be able to engage competently with these kinds of tasks, even if we don't encounter them in a professional setting. "As soon as you pick up a newspaper, you're confronted with so many numbers and statistics that you need to interpret correctly," says co-author Patrick Weber, a graduate student in math education at the University of Regensburg in Germany. Most of us fall far short of the mark.
“This report maps the fault lines of this system and sets out principles for a new model,” it states. “While it suggests quick fixes that policymakers can implement in the short term, it crucially proposes concrete policy actions that can be taken in the long term to actively shape and co-create a health system that delivers real public value.”
The report is structured into two sections. The first is “DIAGNOSIS,” with chapters on “Problems with the current health innovation system,” and “Principles for a health innovation model that delivers public value.” The second section, “REMEDIES,” includes chapters on “Immediate policy actions: Getting better prices today,” and “Transformative proposals: Re-imagining our health innovation system to deliver public value.”
[...]
“A pharmaceutical industry that makes billions in profits without providing the affordable medicines that people need is one of the scandals of our time,” Heidi Chow, senior campaigns manager at Global Justice Now, said in the report press release.
“Until governments follow the recommendations in this report and set about creating a pharmaceutical system that puts patients and public health at its core, our health and our health systems will continue to suffer as pharmaceutical profits continue to soar,” Diarmaid McDonald, lead organiser from Just Treatment, also said in the release.
It's been fashionable lately to quote Sun Tzu or von Clausewitz on cyberwar, but it's just pretentious nonsense. Cyber needs to be understand as something in its own terms, not as an extension of traditional warfare or revolution. We need to focus on the realities of asymmetric cyber attacks, like the nation states mentioned above, or the actions of Anonymous, or the successes of cybercriminals. The reason they are successful is because of the Birthday Paradox: they aren't trying to achieve specific, narrowly defined goals, but are are opportunistically exploiting any achievement that comes their way. This informs our own offensive efforts, which should be less centrally directed. This informs our defenses, which should anticipate attacks based not on their desired effect, but what our vulnerabilities make possible.
Josh and Kurt talk about Cloudflare's new IPFS and Onion services. One brings distributed blockchain files to the masses, the other lets you host your site on tor easily.
The diagram shows the percentage of websites using PHP version 5 as server-side programming language.
Among the most prominent ransomware victims were NHS facilities, including hospitals, across the UK. All told, the epidemic cost the cash-starved health system €£92m (€£19 in lost output, €£73m in IT expenses in the aftermath).
Until now, the financial damage caused by the sweeping cyber attack - which it's now been revealed affected 8 per cent of GP clinics and forced the NHS to cancel 19,000 appointments - has been unclear, but the DHSC estimates in a new report that the total figure cost in at €£92m.
WannaCry cost approximately €£19 in lost output, while a whopping €£73m was racked up in IT costs in the aftermath of the attack, according to the report. Some €£72m was spent on restoring systems and data in the weeks after the attack struck.
And secondly, the exploit they crafted only works against older versions of Windows 10 (pre-Anniversary Update), but that isn’t really the point. It’s about showing the lines along which these sort of exploits can evolve, and reminding folks not to sit back smugly even when the OS they’re running appears to be bulletproof to a new threat.
Speaking at the Wired25 conference in San Francisco, Mr Bezos said he would continue to work with defence agencies even if it was unpopular among his own staff, because the US "needs to be defended".
Forty-eight journalists have been killed so far this year, according to a VOA tally, adding to the thousand killed in the past decade-and-half.
Badawi was arrested in Jeddah in 2012 for “insulting Islam through electronic channels.” He was a blogger and, according to his wife, a humanitarian and free thinker. In 2013, he was convicted of several charges, including apostasy, and sentenced to 7 years and 600 lashes, a form of punishment with a whip or stick the United Nations says is cruel and inhumane. A year later, the prison term was increased to 10 years and 1,000 lashes. Badawi suffers from hypertension and Haidar, who was granted asylum in Canada with her three children, said her husband’s health is deteriorating. “I hope President Trump can help release my husband,” she said when asked whether Khashoggi’s case would bring new scrutiny of Badawi’s plight. One of Badawi’s alleged crimes was to mock Saudi Arabia’s prohibition against celebrating Valentine’s Day.
Yet it was also shockingly distinctive; the body slumped in the car seat was not a politician, official, insurgent or warlord. She was a former beauty queen; a young woman with both profile and attitude, one of four high-profile Iraqi women to have been killed across the country in quick succession.
The four were unknown to each other, but their lives – recently at least – had shared common themes. All had a public presence and a voice that had unsettled elements of Iraqi society, which has retained rigid views on how women should behave, even as relative freedoms have crept into a still conservative culture.
According to the Wayne Circuit Court lawsuit, Rebecca Sevilla of Britton was driven to a Motel 6 in Southgate by her husband on June 17, 2017. In the parking lot, her husband shot her three times — in the stomach, chest and head — and then killed himself.
Police responding to the scene determined that the husband committed suicide and saw Sevilla "sitting upright, bleeding from gunshot wounds to her body and head," according to the lawsuit.
It goes on to assert that officers "began yelling verbal commands to" Sevilla, who "was unable to (respond]) as a result of her injuries."
“Pertinently, the terrorists fired on a search party from a nearby mosque and subsequently the area was cordoned off. The local Auqaf committee was engaged to convince the terrorists to come out. Security forces also appealed to the terrorists to come out,” the police spokesperson said.
Long before the dissident Saudi journalist Jamal Khashoggi vanished, the kingdom has sought influence in the West — perhaps intended, in part, to make us forget what it is. A medieval theocracy that still beheads by sword, doubling as a modern nation with malls (including a planned mall offering indoor skiing), Saudi Arabia has been called “an ISIS that made it.” Remarkably, the country has avoided pariah status in the United States thanks to our thirst for oil, Riyadh’s carefully cultivated ties with Washington, its big arms purchases, and the two countries’ shared interest in counterterrorism. But lately the Saudis have been growing their circle of American enablers, pouring billions into Silicon Valley technology companies.
Though it was reported this week that WikiLeaks founder Julian Assange would be granted limited internet access by the Ecuadorian embassy in London should he agree to stipulations mentioned in a nine-page memo, it shouldn't be considered a victory, Randy Credico told Sputnik.
The memo, which was published by Ecuadorian website Codigo Vidrio on Monday, offers a series of conditions that Assange must abide by if he chooses to continue his residency at the London-based embassy. In order for Assange to have his internet privileges restored, he must steer clear of political matters that could disrupt Ecuador's diplomatic interests. Assange will only be allowed to use the embassy's Wi-Fi network.
After putting WikiLeaks founder Julian Assange in solitary confinement by effectively banning his internet usage, Ecuadorian embassy has restored the controversial figure's WiFi usage, allowing him communication with the outside world.
According to The Guardian, "Ecuador has partly restored Julian Assange’s communications with the outside world from its London embassy where the WikiLeaks founder has been living for over six years."
Ecuador will reportedly restore Julian Assange’s internet connection, in return for a long list of leaked restrictions on his behaviour.
The BBC were accused of spreading ‘fake news’ about Julian Assange after attributing quotes to the whistleblower that originated from a parody account.
The story was instigated after conditions put on Assange for allowing him access to the internet were leaked online.
In an article headlined: “Julian Assange given feline ultimatum by Ecuador” on the alleged warning the embassy has given the activist over his treatment of his cat, the BBC write: “It is unclear what is behind Ecuador's concern over Mr Assange's treatment of his roommate.
According to sources, Julian Assange has been given a list of restrictions on his behaviour by the Embassy of Ecuador, London which includes less visits.
Wikileaks co-founder Julian Assange has been given a set of house rules at the Ecuadorean embassy in London that include cleaning his bathroom and taking better care of his cat.
The whistle-blower was sent a memo in which he was warned that his feline companion could be confiscated.
He was also told to look after its "well-being, food and hygiene" in the set of guidelines, written in Spanish.
To keep access to the internet, he has been told to refrain from activities “that could prejudice Ecuador’s good relations with other states”, the nine-page document said.
The nine-page memo published by Ecuadorean website Codigo Vidrio said Assange is prohibited from "interfering in the internal affairs of other states" or from activities "that could prejudice Ecuador's good relations with other states."
RT's Anastasia Churkina reports as Julian Assange's internet access is 'partly restored' by Ecuadorian embassy.
WikiLeaks said in a statement: “Ecuador has told WikiLeaks publisher Julian Assange that it will remove the isolation regime imposed on him following meetings between two senior UN officials and Ecuador’s president, Lenin Moreno, on Friday.”
Kristinn Hrafnsson, WikiLeaks editor-in-chief, added: “It is positive that through UN intervention Ecuador has partly ended the isolation of Mr Assange although it is of grave concern that his freedom to express his opinions is still limited.
Assange, an Australian citizen, was compelled to turn to Ecuador because the Labor Party-led government of Australia had fully lined up with Washington and denied him his right to assistance and protection against persecution.
The British government, acting in concert with the Obama administration and most likely Australia, responded to Ecuador’s granting of asylum with the most vindictive measures. British authorities threatened that Assange would be immediately arrested on bail-related charges if he ever set foot outside the embassy. As a result, Assange has been unable to get adequate medical treatment for a range of serious conditions.
Julian Assange has had his phone and internet access at the Ecuadorean embassy partly restored, seven months after they were cut off.
Sweden dropped its investigation last year, but British authorities say they still want to arrest him for breaching his bail conditions.
WikiLeaks has published what it claims is a 'highly confidential' document outlining the addresses and operational details of Amazon Web Services (AWS) data centres.
The whistle-blowing organisation claims to have published the document, originating from late 2015, as an attempt to shed light on the 'largely hidden' nature of cloud infrastructure locations.
"While one of the benefits of the cloud is the potential to increase reliability through geographic distribution of computing resources, cloud infrastructure is remarkably centralised in terms of legal control," the company wrote in a statement. "Until now, this cloud infrastructure controlled by Amazon was largely hidden, with only the general geographic regions of the data centres publicised."
AWS' global infrastructure page outlines geographical locations in terms of 'regions'; for instance, US East has six in North Virginia and three in Ohio, while Europe has presence in Frankfurt, Ireland, London and Paris - with three zones, or data centres, each.
The Wikileaks founder, who has been holed up at the embassy since 2012, was stopped from using the internet or a mobile phone to communicate with the outside world in March.
Despite numerous reports claiming that the communications of Julian Assange have been restored, they are not yet — and there will be a severe regime of penalties and sanctions on his speech and writing when they are.
The team at WikiLeaks was informed on Friday that his communications would be restored on Monday, October 15, but so far there has not been any change. In a grave violation of free speech, Assange was also presented with a nine page document that includes outlining limitations and restrictions on what he will be able to do and say online.
If Bitcoin were to cease trading tomorrow, 0.5% of the world’s electricity demand would simply disappear. This is roughly equivalent to the output of ten coal-fired power plants, emitting 50 million tonnes of CO2 per year – which would cover one year’s worth of the carbon emission cuts required to limit temperature rises this century to 2C. It is not a solution by itself, but it would be a good year’s work.
Facebook will also include new features on its website to show who has paid for adverts and begin an archive of all political ads that are purchased on the site in an effort to clamp down on election fraud.
She filed the case after the president tweeted that she had invented a story about being threatened for speaking out about the alleged affair.
But the judge ruled that the tweet was protected by the First Amendment, which guarantees freedom of speech.
Stormy Daniels was also ordered to pay Mr Trump's legal fees, although the amount is yet to be determined. Her lawyer said she would appeal against the decision.
Nearly one in 10 vote-by-mail ballots have been rejected by Gwinnett County election officials, alarming voting rights groups.
Gwinnett is throwing out far more absentee ballots than any other county in Georgia, according to records from the Secretary of State’s Office. Ballots were discarded because of allegedly mismatched signatures, incomplete forms or missing residential addresses.
The county rejected 390 absentee ballots through Sunday, which represents 8.5 percent of all mailed ballots received in Gwinnett so far, according to state figures. Across Georgia, less than 2 percent of absentee ballots have been rejected. Gwinnett accounts for about 37 percent of all rejected ballots in Georgia.
“They’re putting an extra burden on someone to come back in to get another absentee ballot. That’s unheard of,” said Helen Butler, executive director for the Coalition for the Peoples’ Agenda, a civil rights group.
But in any case they feared for their future living in Pakistan under the blasphemy laws, they told AFP.
Her family said that if Bibi is released, it would be difficult to stay in her homeland.
For quite some time we've highlighted the horrible laws being pushed by aggressively misrepresenting the size of the problem of sex trafficking -- and especially sex trafficking of children. This is not to say that it never happens. Nor is it to suggest that the crime of sex trafficking, especially of minors, is not horrific and hugely problematic. But we shouldn't overreact to false information. A year ago, we looked at some of the numbers being presented in favor of passing FOSTA, and found they were almost entirely bullshit. This included Rep. Ann Wagner's (who is the leading pusher of bad laws around "sex trafficking") claim child sex trafficking alone was a $9.5 billion industry. As we noted, this number came from a bizarre nonsensical extrapolation of a very misleading and confused report by ICE that covered issues of smuggling (not just sex trafficking). Other stats -- such as the supposed number of kids "lured" into sex trafficking -- showed even more extrapolation, while police were finding very, very few actual cases of this happening.
[...]
So, remember, the headline screamed that 123 missing children were found in a sex trafficking "operation." Now it seems that most of them were "found" at home with their parents, and only three of them might have been victims of sex trafficking. These seem like important details, especially when you have election officials like Rep. Ann Wagner pushing a vast surveillance bill on the basis of the problem of sex trafficking. Pushing bogus information like over a hundred missing kids being engaged in sex trafficking only helps build that narrative -- one that appears to actually be much, much more limited than the media or lying politicians will let you know about.
As we frequently note, most of the "smart" products you buy are anything but intelligent when it comes to your privacy and security. Whether it's your refrigerator leaking your gmail credentials or your new webcam being hacked in mere minutes for use in massive new DDoS attacks, the so-called "smart" home is actually often dumb as nails and potentially hazardous. So-called smart-televisions have been particularly problematic, whether that has involved companies failing to encrypt sensitive data, or removing features if you refuse to have your daily viewing habits measured and monetized.
Last year Vizio joined this not-so-distinguished club when it was discovered that the company's TVs had been spying on users for the last several years, starting back in 2014. Vizio's $2.2 million settlement with the FTC indicates that the company at no time thought it might be a good idea to inform customers this was happening. The snooping was part of a supposed "Smart Interactivity" feature deployed in 2014 that claimed to provide users with programming recommendations, but never actually did so. Its sole purpose was to hoover up your data and help Vizio sell it, without your express consent.
Ballot question 2 seeks to guarantee that residents' right to privacy in their "private or personal information is natural, essential, and inherent."
“Live free or die.”
As reflected in its official state motto, no state has unequivocally embraced the principles of liberty and privacy more than the state of New Hampshire. These ideals make up the core of the state’s philosophical DNA. It is therefore surprising that New Hampshire is conspicuously missing from the list of the 10 diverse states that have explicitly enshrined the right to privacy in their constitutions. But on Election Day, Granite State voters will have a chance to remedy that oversight.
Earlier this year, the New Hampshire Legislature passed by a necessary two-thirds vote a proposed amendment to the state constitution guaranteeing the right to privacy in the digital age. Now it’s up to voters to enshrine that natural right. New Hampshire’s ballot Question 2 (Q2) would do just that by adding simple but mighty language to the constitution: “An individual's right to live free from governmental intrusion in private or personal information is natural, essential, and inherent.”
The scam pages share a variety of common characteristics, and in many cases they use the same profile pictures. This type of scam should be easy for a site as sophisticated and well-resourced as Facebook to uproot. But four days after Abrams began reporting it, the campaign remained active, with the exception of 11 profiles Ars reported to PR representatives.
The Facebook representatives have yet to explain why the security department is having such a hard time dismantling the campaign. People who use the site should remain alert.
Pakistan's embattled Ahmadiyya minority enjoyed a brief moment of hope earlier this month when one of its own, a U.S.-based Princeton economist, was appointed to an economic advisory council.
But the backlash from Islamic hard-liners, which led newly elected Prime Minister Imran Khan to quickly rescind the appointment under political pressure, has only underscored the Ahmadis' fraught position in the conservative, Muslim-majority country.
His mother left, warning that he will "pay the price" for his decision. Abdel was kidnapped by a Muslim gang two months later and beaten nearly to the point of death, with cigarettes burned to his body.
New York City's prosecutors just admitted they use the bail system to punish people for being accused of criminal acts. It's not there to serve its intended purpose: to ensure the return of charged individuals to court, where they're presumed innocent until proven guilty.
The bail system isn't supposed to keep people locked up. But that's the way it's been used for years. Prosecutors often ask for excessive bail amounts. Judges often grant them. The argument made for high bail amounts -- which ensure only the most well-to-do can remain free while awaiting trial -- is that arrested people are flight risks and/or more inherently dangerous than all the people the police haven't gotten around to arresting yet.
The stats don't back up the parade of horribles offered by prosecutors at bail hearings. People have done the math. And this excellent article by the Boston Review compiles the damning numbers.
New York City's district attorneys are on edge. Beginning this week and extending through the month of October, as many as 500 women and teenagers currently imprisoned on Rikers Island and juvenile jail facilities will walk free when volunteers pay their bail. This Mass Bail Out Action, which is sponsored by RFK Human Rights and a network of grassroots groups, is hoping to post bail for every woman, sixteen- and seventeen- year-old currently sitting in jail in New York City because she or he cannot afford bail. The effort is similar to the powerful work of community bail funds and the recent National Bail Out projects, in which grassroots groups throughout the country have engaged in mass bailouts of black people incarcerated pretrial because of their poverty. The Mass Bail Out volunteers hope to bring urgency both to the effort to close Rikers Island (which the City has said it plans to close within ten years) and the push to eliminate the use of money bail nationwide. They are engaging in a profound act of resistance even as officials such as the DAs insist that freeing these incarcerated people will threaten the “public safety.” New York’s officials have strongly resisted the Mass Bail Out and are “scrambling to prepare,” according to the New York Times. If released from jail, their story goes, these women and teenagers will engage in violence, re-offend, or as Bronx District Attorney Darcel Clark warned, “end up being a victim of violence themselves,” especially if they are mentally ill or homeless.
[...]
Much like the famed “Willie Horton effect,” when we focus on sporadic acts of violent crime we overreact with excessive punishment and obscure the everyday mass violence that pre-trial incarceration does to millions of ordinary people—and their families. In the case of bail, this punitiveness is especially pernicious because it pretends to be a neutral financial calculation: if only this person had enough money, they could be free and would not be a threat to the public.
The Mass Bail Out forces us to confront the ways in which pretrial incarceration is itself a public safety threat. Placing women and minors (or anyone, for that matter) in jail exposes them to violence and misery. It exposes their families and neighborhoods to loss of income, stability, and the everyday companionship of a parent, spouse, sister, brother, neighbor, or coworker. When volunteers post bail for women and minors detained at Rikers Island, they will demonstrate that they, as members of the local community, actually feel safer knowing that a woman or teen has left the violence of jail and returned home to go to school, earn money at their job, raise their children, and participate in their own defense, while waiting for trial or other resolution of their case. Individual freedom is a part of public safety, too.
Katie Meyler, the founder of More Than Me, temporarily stepped down from her position as the American charity’s chief executive officer pending the results of a Liberian panel’s review of an investigation published by ProPublica and Time magazine last Thursday. The focus of the article was the rapes of girls by a senior employee of the charity Meyler created to protect them from sexual exploitation.
“In reviewing the allegations as published by ProPublica and TIME, we uncovered several statements that were either inconsistent with the information provided to us by More Than Me leadership or that were new information,” the charity’s Liberian advisory board said in a statement.
As Ondara told NPR Music, “The video follows a man, as he sets upon a journey to purchase a weapon. While on his way, we get a glimpse of the world around him through his eyes, which gives us some insight into his state of mind.”
“Ultimately, the video explores the turbulent times in the country, socially and politically, thereby throwing a shade of irony to the popular notion of ‘The American Dream.'”
The video also references Dylan’s classic protest anthem “The Times They Are a-Changin’,” with the lyric, “Your sons and your daughters are beyond your command,” inscribed on a sheet of paper.
During the 1960s, Dylan wrote several timeless socially conscious tunes. With “American Dream,” Ondara offers his Dylanesque reflection on America.
Massachusetts prosecutors are seeing a bunch more Drug War wins turned into losses by drug lab misconduct. Annie Dookhan, a drug lab technician, falsified countless tests, ultimately resulting in the overturning of more than 20,000 convictions. Dookhan was valued for her productivity, but no one above her bothered to wonder why she was able to process samples so quickly. Turns out tests go much faster when you don't actually perform the tests.
If that were it, it would have been more than enough indication the nation's crime labs need more oversight and auditing. But it isn't. Another tech at another Massachusetts drug lab is erasing thousands of convictions. Chemist Sonja Farak, an 11-year veteran of the Amherst drug lab, apparently spent much of that time using the substances she was supposed to be testing, turning in falsified test results that landed people behind bars.
The Farak investigation uncovered the drug lab's lack of standards, which included more than allowing an employee to use drugs while on the clock for at least eight of the eleven years she was employed. There's no way of telling how many drug tests might be tainted, not just by employee malfeasance, but by a lack of best practices, like running blanks through testing equipment to ensure new tests weren't tainted by residue left behind by previous tests.
The total number of convictions expected to be thrown out due to Farak's abuse is currently sitting at 7,690 cases. But this won't be the final total. Zach Huffman of Courthouse News Service reports an entire decade's-worth of convictions is being examined.
In a move that's tone deaf if nothing else, the DOJ is going to court to block a consent decree put in place to overhaul Chicago's unconstitutional policing. This announcement comes days after a jury convicted Chicago police officer Jason Van Dyke of second-degree murder for killing 17-year-old Laquan McDonald. He was also convicted of 16 counts of aggravated battery -- one count for each bullet he fired at the teen as the teen walked away from him.
This also follows more tone-deafness from the "law and order" presidency. Trump's speech to a law enforcement convention contained several comments about Chicago and its perceived police problem. But the problem Trump sees is police not policing hard enough. Trump wants stop-and-frisk brought back -- one of the key modifications contained in the consent decree.
High school seniors Zyahna Bryant and Trinity Hughes have been friends since they were 6 years old, raised by blue-collar families in this affluent college town. They played on the same T-ball and softball teams and were in the same church group.
But like many African-American children in Charlottesville, Trinity lived on the south side of town and went to a predominantly black neighborhood elementary school. Zyahna lived across the train tracks on the north side and was zoned to a mostly white school, near the University of Virginia campus, that boasts the city’s highest reading scores.
[...]
“I know what I’m capable of and what I can do,” Trinity said, “but the counselors and teachers, they don’t really care about that.”
For every student like Zyahna in Charlottesville’s schools, there are scores like Trinity, caught in one of the widest educational disparities in the United States. Charlottesville’s racial inequities mirror college towns across the country, from Berkeley, California, to Evanston, Illinois. But they also match the wider world of education, which is grappling with racial gaps — in areas from gifted programs to school discipline — that can undercut the effort to equitably prepare students for college in a competitive economy.
Based on civil rights data released by the U.S. Department of Education, ProPublica has built an interactive database to examine racial disparities in educational opportunities and school discipline. Look up more than 96,000 individual public and charter schools and 17,000 districts to see how they compare with their counterparts.
More importantly today’s readers need to be a little more than cautious when believing anything. Native advertising is a most insidious concept and should be rejected by every publisher. Instead it is welcomed by the broadcasting networks and most of the major newspapers including the New York Times. Are the writers saying nice things or are they paid to say nice things?
As hardware vendors and cellular carriers prepare deployment of fifth-generation wireless networks, you may have noticed that the hype has gotten a little out of control. Claims that 5G will magically revolutionize the broadband sector sound nice and all, but as we've noted repeatedly, 5G is really more of a modest evolution in existing networks, not some kind of revolutionary panacea that's going to change everything. Still, claims that 5G will somehow usher in amazing smart cities or somehow result in a four day work week for everyone (what?) get far more traction than they probably deserve.
Alongside the generalized hype, carriers are pushing another narrative: that 5G wireless is so incredible, it's going to fix all of the telecom sector's biggest problems by delivering a massive new wave of competition. This competition will be so amazing that net neutrality will apparently be made irrelevant. It's largely bunk originating with telecom industry marketing departments, dutifully swallowed and regurgitated by an unskeptical press.
It's no secret the printer business relies on hefty ink refill markups. The printers are disposable, often cheaper than the ink they come packaged with. But customers aren't usually willing to toss out a printer when it runs out of ink, even if refilling it costs more than replacing it.
And good for them! I mean, at least in an environmental sense. Let's not toss a bunch more non-decomposables into the nearest landfill the moment they refuse do anything until their inkwells are filled. But this does nothing for consumers, forcing them to become unwilling adherents to the sunk cost fallacy, especially after they've paid for a couple of ink refills.
Printer companies know their system is ripoff. They know their customers know it's a ripoff. That's why they engage in shady tactics to ensure this steady stream of revenue doesn't dry up. For years, third parties have offered compatible ink refills. And for years, printer companies have been lying to customers to lock these competitors out of the market.
A couple of years back, HP pushed out a firmware update that made it impossible to use third-party refills. It didn't tell customers the update would do this. It just sent out the DRMbomb and triggered it remotely, saying things about "security" and "protecting customers," even as it eliminated their refill options.
A recurring topic of discussion in patent infringement proceedings in Spain is the degree of evidence required to prove the damage caused by acts of patent infringement. According to a line of case law handed down by the Supreme Court, the existence of the damage may be proved by demonstrating the existence of the unlawful act in cases where such damage is the logical consequence of the unlawful act considered. In such circumstances, the facts speak for themselves (“res ipsa loquitur“).
The Barcelona Court of Appeal (Section 15), in a judgment handed down on 26 July 2018, used the following arguments to justify the applicability of this principle:
“60. Case law has specified that the existence of losses or profits not obtained as a result of the infringing act must, in all cases, be proven, albeit “not with greater rigour or restrictive criteria than any which constitutes the basis of a claim” (Supreme Court judgments of 2 March 2001 and 7 July 2005). However, demanding this proof is compatible with the possibility of establishing their “ex re ipsa” existence, with it being sufficient to prove the unlawful act in those cases where its connection to the alleged damage allows it to be considered that, according to the rules of logic, the latter is a necessary, logical and inevitable consequence of the illicit action.
Consequently, it is stated that there are times when the facts speak
Judge Koh gave this administrative motion short shrift: she denied it quickly, without any further explanation.
Since my first commentary on the motion, I've always felt that nothing would make a settlement more likely at this stage than an order granting the motion and reminding Qualcomm of obligations it entered into when it made FRAND licensing declarations to two U.S. standard-development organizations, TIA and ATIS. Yesterday's administrative motion validates that assessment: while the FTC and Qualcomm have presumably talked about settlement on numerous occasions (even if just calling someone to find out whether the other party's position has changed), the current situation is unique. The importance of SEP licenses to competitors couldn't be made clearer than by a motion that says the parties don't have a problem with decisions on any other pending motion but this one. This motion unsurprisingly appears to scare the living daylights out of Qualcomm.
Last month, in Supernus Pharmaceuticals, Inc. v. TWi Pharmaceuticals, Inc., the Federal Circuit affirmed a decision by the U.S. District Court for the District of New Jersey finding that U.S. Patent Nos. 7,722,898; 7,910,131; and 8,821,930 were not invalid and would be infringed by Defendants-Appellants TWi Pharmaceuticals, Inc. and TWi International LLC, DBA TWi Pharmaceuticals. The '898, '131, and '930 patents are owned by Plaintiff-Appellee Supernus Pharmaceuticals, Inc.
Seeking approval to market generic versions of Oxtellar XR€®, an oxcarbazepine extended-release tablet for treatment of partial epilepsy seizures in adults and children over the age of six, TWi filed an Abbreviated New Drug Application (ANDA) with the FDA. In response to that filing, Supernus brought an action for infringement of the '898, '131, and '930 patents, and TWi counterclaimed for invalidity.
In a case concerning two patents in the field of underwater mine clearance, the Court of Appeal upheld the Patents Court’s decision that claims 1 and 2 of the 576 Patent were invalid for obviousness, but allowed the appeal in relation to the validity of the 861 Patent, finding that the claims in question were invalid for obviousness.
U.S. District Judge Louis Stanton recently issued an opinion granting an injunction requested by New York City’s Museum of Modern Art (MoMA). The injunction prevents the operator of an art gallery and café located in close proximity to a MoMA Design Store in New York’s SoHo neighborhood from using a pair of marks that infringe upon MoMA’s own marks. The marks in question in this case are ‘MOMA’ and ‘MOMACHA,’ both of which were filed by MOMACHA, the SoHo café that began operating in April of this year.
The marks were filed with the U.S. Patent and Trademark Office for use in commerce with beverages and restaurant and café services. Although MOMACHA has changed the font used in its original logo, that logo uses a font that “greatly resembles ITC Franklin Gothic Heavy,” a font which served as the basis for a MoMA logo first designed in 2003. MOMACHA continued its use of its old logo on its coffee cups and on its social media accounts.
Can a US corporation selling construction software only in the Americas under the name ARGOS be sued for infringement of a registered trade mark by a UK based consumer goods retailer who trades mainly in the UK and Ireland under the same name?
This question is posed by Floyd LJ in the introduction to the Court of Appeal decision on the Argos Ltd v Argos Systems Inc [2018] EWCA Civ 2211. The formulation of the question may make it easy to guess the Court of Appeal's ultimate decision.
The Nigerian Copyright Commission has filed a criminal charge against the Copyright Society of Nigeria, its Chairman, Chief Tony Okoroji, and principal officers for carrying out the duties of a collecting society without the approval of the Nigerian Copyright Commission.
The NCC, in a statement signed by its Director-General, Afam Ezekude, and made available to our correspondent on Tuesday, said, “In Charge No FHC/L/338C/18, filed on October 8, 2018 at the Lagos Division of the Federal High Court, the accused persons were alleged to have performed the duties of a collecting Society by demanding and collecting royalties from Noah’s Ark of 9 Sowemimo Street, GRA, Ikeja, Lagos.”
You may recall that we have discussed the complete chaos that is copyright collection societies in Kenya over the past few years. At issue in Kenya is that the country has multiple collection societies, which are overseen by a government sanctioned body that can request to look at their books to make sure artists are being paid appropriately, and officially licenses the collection societies themselves. Some of those collection groups have apparently not felt the need to respond to requests for oversight, leading the government to pull or not renew their licenses. Instead of being the end of the story, a number of those collection societies continue to threaten people and collect royalties anyway, acting essentially as an illegal extortion outfit.
Kenya is not the only African nation going through this, it seems. Across the continent on the opposite coast, the Nigerian Copyright Commission has been going through similar issues, specifically with a collection group called COSON.
A few weeks ago, we wrote about the 9th Circuit overturning the district court's ruling in a copyright case questioning whether the song "Stairway to Heaven" had infringed on the song "Taurus" by Spirit. We were less than pleased with this result, as we felt the original ruling was correct. Copyright lawyer Rick Sanders disagreed with part of our analysis and made some really great points in a two part blog post series, which he's graciously allowed us to repost in slightly edited form here. Part II will be published tomorrow.
Yes, the new 9th Circuit surprising reversal of the jury verdict looks like "Blurred Lines" all over again -- only in reverse. Whereas in "Blurred Lines," the jury reached the "wrong" conclusion, and the Ninth Circuit refused to fix the jury's mistake, here it looks like the jury reached the "right" conclusion," and the Ninth Circuit is screwing up the jury's work. Techdirt all but said so, in an article 9th Cir Never Misses a Chance to Mess Up Copyright Law: Reopens Led Zeppelin 'Stairway to Heaven' Case.
I'm pleased to report that, far from taking this opportunity to further screw up copyright law, as Techdirt fears, the panel of judges is attempting to improve copyright law by replacing the Ninth Circuit's (very bad) framework for copyright infringement with a much better one. Indeed, the "Stairway to Heaven" opinion may be seen as a rebuke to the "Blurred Lines" opinion. The pity is that Led Zeppelin must bear this burden by having to do the trial all over again.
The reason the "Stairway to Heaven" has to do with our old, misunderstood frenemy, the "Inverse-Ratio rule," which is only tangentially related to why the case is being sent back for a second trial. I blogged extensively about the "inverse-ratio" rule in connection with the "Blurred Lines" case, and how the Ninth Circuit (correctly) amended its opinion to excise (its terrible) discussion of the rule. But here's the deal: the inverse-ratio rule provides that the more similarity there is between the two works, the less proof of access you need, and vice-versa. It is highly beneficial when applied to the right legal framework for copyright. It is a perverse disaster when applied to the wrong legal framework.
Last year the film industry launched a legal search engine that targets 'pirates' specifically. The site is set up in such a way, that it draws people who search for pirate related terms. However, this also appears to have confused the "Web Sheriff," who targeted the site's URLs with takedown notices.
But while tailored, a la carte services have long been the promise of streaming TV, it's starting to look more like a series of pricey buffets. Competing megacorporations are all pumping billions into original content, much of it designed for mass appeal. (Apple has reportedly mandated no "gratuitous sex, profanity or violence" on its incoming streaming service.) And even if each also produces more experimental or idiosyncratic options, you’ll be hard pressed to access all or even most of them. The show that scratches your itch won't necessarily be on a platform you can afford to pay for.
Rockstar Games and Take-Two Interactive Software are taking a clear stand against cheat developers. An Australian Federal court has granted search and seizure orders against several people who are believed to be connected to the cheating software "Infamous."
Sites that link to copyright-infringing content aren't currently illegal under Japanese law but efforts are underway to close the loophole. The government is considering prison terms of up to five years for site operators who knowingly link to pirated content and refuse to respond to takedowns requests.