“Linux is Linux is Linux,” is a direct quote I heard in a meeting I had recently with a major multi-national, critical-infrastructure company. Surprisingly and correctly, there was one intelligent and brave engineering executive who replied to this statement, made by one of his team members, with a resounding, “That’s not true.” Let’s be clear, selecting a commercial Linux is not like selecting corn flakes. This is especially true when you are targeting embedded systems. You must be considering key questions regarding the supplier of the distribution, the criticality of the target application, security and life-cycle support for your product.
Kubuntu is my favorite derivative of all the Ubuntu-based operating systems. I can not point out any features as favorite because I like all of them. Everything mentioned above is part of my daily workflow.
Now when you know all of this it is worth trying them out. I was skeptical at first but later when I built my flow and learned how to utilize these features I can do everything faster, with fewer keystrokes and the most important thing is that I have a nicely organized desktop that helps me to minimize brain fatigue while doing my job.
Kubuntu is a great distro to switch to if you’re coming from Windows. They have a quite similar UI, and Kubuntu has all the features Windows has, plus more.
The PineBook Pro pre-orders go live next week, July 25, meaning now would be an apt time to get a closer look at how the hotly anticipated Linux laptop is shaping up.
And what do you know, Pine64’s Lukasz Erecinski has duly obliged! He shot and uploaded a short showcase of how some of the ARM laptop’s prowess is looking.
He demos the (smooth) 1080p and 4K video playback, WebGL demo, connecting to an external monitor through the USB Type-C port, plus offers some info about screen tearing and smoothness.
The past few months openSUSE developers have been working on enabling LTO by default for its packages while now finally with the newest release of the rolling-release openSUSE Tumbleweed this goal has been accomplished.
As of today, the latest openSUSE Tumbleweed release is using Link-Time Optimizations (LTO) by default. For end-users this should mean faster -- and smaller -- binaries thanks to the additional optimizations performed at link-time. Link-time optimizations allow for different optimizations to be performed at link-time for the different bits comprising a single module/binary for the entire program. Sadly not many Linux distributions are yet LTO'ing their entire package set besides the aggressive ones like Clear Linux.
The laptop had also begun to run into blue screens of death (BSoD) whenever I used the built-in camera and when I opened Spotify or Netflix in a web browser. The slowdown and crashes were actually related, but I didn’t realize this at first. The camera-induced BSoD error message blamed the camera vendor’s driver without any further details. This sounds believable enough for a 7-year old laptop so I didn’t think any more of it.
Today, Pivotal released an alpha version of its flagship product, Pivotal Application Service, powered by Kubernetes. Access to the bits are invite-only; contact your account team or sign up via the form at the end of this post for access. The documentation is publicly available here.
Kubernetes is the new IaaS. And that means we're embedding it into more parts of Pivotal technology. It also means that we're here to help you achieve terrific business outcomes on top of this foundation.
As companies modernize their infrastructure and adopt a hybrid cloud strategy, they’re increasingly turning to Kubernetes and containers. Choosing the right technology for building cloud-native apps and gaining the knowledge you need to effectively adopt Kubernetes is difficult. On top of that, enabling architects, developers, and operations to work together easily, while having their individual requirements met, is an additional challenge when moving to cloud. To lower the barrier of entry for developers to use Kubernetes and to bring together different disciplines, IBM created new open source projects that make it faster and easier for you to develop and deploy applications for Kubernetes.
If you asked me 3 years ago, I would probably define the professional part of myself as a “Rails developer”. Back then, most of my new projects started with a proof of concept deployed on a free Heroku account. The reason is simple, that was the fastest way to get my Ruby application live. At the same time it was the cheapest (free right?) so that was a no-brainer. The last 2.5 years, my work has been mostly on CloudFoundry and Kubernetes. CloudFoundry is an Open Source PaaS solution and Kubernetes is a Container orchestration platform. I work on a project that combines these two (SUSE CloudFoundry runs CloudFoundry on top of Kubernetes). There is an argument I’ve heard more than once regarding running a PaaS on top of Kubernetes and that is: “Why deploy CloudFoundry on top of Kubernetes and not use Kubernetes directly?”. Maybe it’s my science studies, maybe it’s Myth Busters, but I had to test this theory. Thankfully, 2 times a year we get a week to hack on anything we want at SUSE (Check it out) so I got the time I needed a couple of weeks ago.
Kubeflow at OSCON 2019 – Over 10 sessions! Covering security, pipelines, productivity, ML ops and more. Some of the sessions are led by end-users, which means you’ll get the real deal about using Kubeflow in your production solution
There’s plenty of general advice when it comes to career advancement, such as, “Work hard and you’ll get ahead.”
General advice can start to feel a little pat—too simplistic to put into action, or too difficult to measure. Surely, it’s not as simple as, “Work hard and watch the promotions roll in.” Not to mention, how would you know if it’s the right promotion. Is it one that matches your goals?
This question becomes particularly important in IT. What if you’re a sysadmin who’s not particularly interested in managing a team of people? Do you grin and bear it while others move up the food chain?
In 1994, if you wanted to make money from Linux, you were selling Linux CDs for $39.95. By 2016, Red Hat became the first $2 billion Linux company. But, in the same year, Red Hat was shifting its long-term focus from Linux to the cloud.
Here's how Red Hat got from mail-order CDs to the top Linux company and a major cloud player. And, now that Red Hat is owned by IBM, where it will go from here.
One of the key differentiators of Red Hat OpenShift as a Kubernetes distribution is the ability to build container images using the platform via first class APIs. This means there is no separate infrastructure or manual build processes required to create images that will be run on the platform. Instead, the same infrastructure can be used to produce the images and run them. For developers, this means one less barrier to getting their code deployed.
With OpenShift 4, we have significantly redesigned how this build infrastructure works. Before that sets off alarm bells, I should emphasize that for a consumer of the build APIs and resulting images, the experience is nearly identical. What has changed is what happens under the covers when a build is executed and source code is turned into a runnable image.
The average user has approximately one thumb per hand. That thumb comes in handy for a number of touchpad interactions. For example, moving the cursor with the index finger and clicking a button with the thumb. On so-called Clickpads we don't have separate buttons though. The touchpad itself acts as a button and software decides whether it's a left, right, or middle click by counting fingers and/or finger locations. Hence the need for thumb detection, because you may have two fingers on the touchpad (usually right click) but if those are the index and thumb, then really, it's just a single finger click.
libinput has had some thumb detection since the early days when we were still hand-carving bits with stone tools. But it was quite simplistic, as the old documentation illustrates: two zones on the touchpad, a touch started in the lower zone was always a thumb. Where a touch started in the upper thumb area, a timeout and movement thresholds would decide whether it was a thumb. Internally, the thumb states were, Schrödinger-esque, "NO", "YES", and "MAYBE". On top of that, we also had speed-based thumb detection - where a finger was moving fast enough, a new touch would always default to being a thumb. On the grounds that you have no business dropping fingers in the middle of a fast interaction. Such a simplistic approach worked well enough for a bunch of use-cases but failed gloriously in other cases.
At Red Hat Summit, we announced new research from IDC looking at the contributions of Red Hat Enterprise Linux (RHEL) to the global economy. The study, sponsored by Red Hat, found that the workloads running on Red Hat Enterprise Linux are expected to "touch" more than $10 trillion worth of global business revenues in 2019 - powering roughly 5% of the worldwide economy. While that statistic alone is eye popping, these numbers, according to the report, are only expected to grow in the coming years, fueled by more organizations embracing hybrid cloud infrastructures. As a result, there is immense opportunity for Red Hat partners and potential partners to capitalize on the growth and power of RHEL.
On Tuesday, July 23, 2019, Red Hat senior vice president and CTO Chris Wright will host an online forum to answer questions about what IBM's landmark acquisition of Red Hat means for the company and its work in open source projects.
Welcome to Episode 292 of Linux in the Ham Shack. In this episode, the hosts are joined by Rob, KA2PBT, in a deep disucussion of digital mode operation on the amateur radio bands including what modes are available, the technology behind the creation and operation of those modes and even dive into current controversy behind FCC rules regarding encryption, PACTOR-4 and much more. Thank you for tuning in and we hope you have a wonderful week.
Randal Schwartz and Jonathan Bennett talk to Leo Laporte about FLOSS's history and the TWiT Network.
In the last episode, we talked about going from script to supported package. I worked on a project called subark and did the packaging with flit.
Today's episode is a continuation where we add new features to a supported package and how to develop and test a flit based package.
While it would have been nice seeing this next systemd release sooner due to the Zen 2 + RdRand issue with systemd yielding an unbootable system (that is now also being worked around with a BIOS upgrade), the systemd 243 release looks like it will take place in the near future.
With the VirtIO standard for cross-hypervisor compatibility of different virtualized components there is a virtual IOMMU device that is now backed by a working driver in the Linux 5.3 kernel.
The VirtIO specification provides for a virtual IOMMU device as of the v0.8 specification that is platform agnostic and manages direct memory accesses from emulated or physical devices in an efficient manner.
Coming soon to a kernel near you could be the removal of 32-bit Xen PV guest support as better jiving with Xen's architectural improvements and more of the Linux/open-source community continuing to shift focus to 64-bit x86 with trying to finally sunset 32-bit x86.
Gustavo A. R. Silva is nearly done with marking (and fixing) all the implicit fall-through cases in the kernel. Based on the pull request from Gustavo, it looks very much like v5.3 will see -Wimplicit-fallthrough added to the global build flags and then this class of bug should stay extinct in the kernel.
That’s it for now; let me know if you think I should add anything here. We’re almost to -rc1 for v5.3!
For several generations now of Intel graphics there have been the GuC/HuC firmware binaries while beginning with Icelake "Gen 11" graphics those binary blobs will be loaded by default.
Intel's GuC has been used for graphics workload scheduling while the HuC firmware provides some "media functions from the CPU to GPU" for different video codec functions and CPU-GPU synchronization among other abilities.
Those running ZFS On Linux (ZoL) on post-5.0 (and pre-5.0 supported LTS releases) have seen big performance hits to the ZFS encryption performance in particular. That came due to upstream breaking an interface used by ZFS On Linux and admittedly not caring about ZoL due to it being an out-of-tree user. But now several kernel releases later, a workaround has been devised.
Some Linux distributions have resorted to reverting the kernel patch that stopped exporting the kernel FPU begin/restore functions used by ZoL for tapping vector-based (SSE/AVX) algorithms. But now ZFS On Linux itself has figured out a solution to restore said SIMD support on these recent kernel releases.
LF Edge, an umbrella organization within the Linux Foundation that aims to establish an open, interoperable framework for edge computing independent of hardware, silicon, cloud, or operating system, today announced Fujitsu, a leading Japanese information and communication technology (ICT) company, and GE Research, GE’s innovation powerhouse where research meets reality, have joined LF Edge as Premier members.
“We are pleased to welcome Fujitsu and GE Research as the newest Premier members of LF Edge,” said Arpit Joshipura, general manager, Networking, Automation, Edge & IoT, the Linux Foundation. “Their expertise across technology sectors and experience in delivering leading products, solutions, and research at the forefront of the industry will be instrumental in helping the LF Edge community establish a common platform for edge computing.”
Launched in January of this year, LF Edge is initially comprised of five projects – including Akraino Edge Stack, EdgeX Foundry, Home Edge, Open Glossary of Edge Computing, and Project EVE – that will support emerging edge applications across areas such as non-traditional video and connected things that require lower latency, and faster processing and mobility. By forming a software stack that brings the best of cloud, enterprise and telecom, LF Edge is helping to unify a fragmented edge market around a common, open vision for the future of the industry.
Longtime X.Org developer Alan Coopersmith who also maintains the X.Org stack for Oracle's Solaris has been trying to get out some updated X.Org modules with different code-bases having collected enough changes over the years to warrant new versions.
While he has been releasing a number of X.Org module updates recently, he's left out many for varying reasons. Even for these modules accumulating enough changes, among those he has left out for releasing new versions include TWM, XKBCOMP, XKBUTILS, XRandR, Xrestop, XScope, xf86-input-keyboard, and xf86-video-dummy.
Later this month marks two years since the release of OpenGL 4.6 and just ahead of that date it looks like Mesa could finally land its complete GL 4.6 implementation, at least as far as the Intel open-source graphics driver support is concerned.
Mesa is now just six patches away from OpenGL 4.6! Following recent SPIR-V patches being merged, there are just five patches left plus the sixth that updates the documentation and flips on OpenGL 4.6 for the i915 Mesa driver. The remaining patches are in regards to base vertex work.
Having a game run on Linux that isn't built for Linux? That's certainly a cool thing. Performance is another thing entirely. It's not a compelling enough argument for Linux enthusiasts to tell their Windows-using friends that "hey, but the games you play run on Linux!" They have to run well. Maybe the notion of switching to Linux is an enticing one for the stability and increased privacy control, but you can't show me an enthusiast gamer who'll willingly trade that for a 20% drop in the framerates they're used to on their hardware, right?
That 20% is an important number, albeit not a scientific one. When I got into Linux last year, that's the figure I kept seeing thrown around. "Sure, it runs on Linux but about 15% to 20% lower FPS." With constant improvements to the kernel, Vulkan drivers and Steam Proton, however, I think the situation has changed.
Enough of my rambling. Here's what we're looking at today...
In the fields of molecular biology and genetics, a genome is the genetic material of an organism. It consists of DNA (or RNA in RNA viruses). Each genome contains all of the information needed to build and maintain that organism. In humans, a copy of the entire genome—more than 3 billion DNA base pairs—is contained in all cells that have a nucleus. The study of the genome is called genomics.
In bioinformatics, a genome browser is a graphical interface for display of information from a biological database for genomic data. They are important tools for studying genomes given the vast amounts of data available. They typically load very large files, such as whole genome FASTA files and display them in a way that users can make sense of the information there. They can be used to visualize a variety of different data types.
Genome browsers enable researchers to visualize and browse entire genomes with annotated data including gene prediction and structure, proteins, expression, regulation, variation, comparative analysis, etc. They use a visual, high-level overview of complex data in a form that can be grasped at a glance and provide the means to explore the data in increasing resolution from megabase scales down to the level of individual elements of the DNA sequence.
There’s a wide range of web based genome browsers. We’re going to restrict our selection to the top 4.
EtherCalc is an open source spreadsheet that makes it easy to work remotely and collaborate with others.
Six weeks after our previous bug-fix release, we ship a second release in a row with nothing but bug-fixes. We call it 7.65.2. We decided to go through this full release cycle with a focus on fixing bugs (and not merge any new features) since even after 7.65.1 shipped as a bug-fix only release we still seemed to get reports indicating problems we wanted fixed once and for all.
Download curl from curl.haxx.se as always!
Also, I personally had a vacation already planned to happen during this period (and I did) so it worked out pretty good to take this cycle as a slightly calmer one.
Of the numbers below, we can especially celebrate that we’ve now received code commits by more than 700 persons!
A veritable surfeit of office suites have seen updates this past month, including WPS Office, SoftMaker Office 2018 and FreeOffice. Clearly not wanting to be left out, OnlyOffice has issued a new update too.
OnlyOffice – which is supposed to be styled ONLYOFFICE, but I find that a bit too shouty – is a free, open-source office suite for Windows, macOS and (of course) Linux.
Health-check is a very useful, practical tool. It does not replace strace or netstat or perf, but it can sure help you get a very accurate multi-dimensional snapshot of whatever you're profiling. This is a very good first step that can point you in the right direction. You can then select a utility that specifically examines the relevant facet of the software run (maybe Wireshark for network or Valgrind for memory). In a way, this makes health-check into a Jack o' All Trades.
You do need some understanding of how Linux systems work - and the application you're running. But even if you don't have that knowledge, health-check can be used for comparative studies and troubleshooting of performance bottlenecks. If you know something isn't running quite as well as it should, you can trace it once on a good system, once on a bad (affected) system, and then compare the two. The many types of data that health-check provides will greatly assist in solving the issue. And that brings us to the end of this tutorial. With some luck, you have learned something new, and it was an enjoyable ride, too. Take care.
Xsnow, let it snow on your desktop, now is working on Gnome, KDE, FVWM desktop in Ubuntu 18.04 and higher.
Xsnow is a handy command tool that brings Christmas to your desktop. However, it does not work properly in Ubuntu since Ubuntu 12.04 Precise.
Now a brand new Xsnow based on the original xsnow-1.42 is available to work on many desktop environments, along with a simple graphical interface.
So what's the problem? Well, from the sound of the workaround, it appears that Google has been mucking about with the API under the hood again.
For the past several months, Google Home owners have been encountering spotty issues between Assitant and Philips Hue products. In recent weeks especially, this problem has only gotten worse, and currently, the two products can’t talk to each other whatsoever. For most users, this results in attempting to unlink and relink a Hue account to Assistant, but that only results in an error when trying to relink the two accounts.
However, in response to a written parliamentary question from shadow Cabinet Office minister Jo Platt, the government this week revealed that, despite being six months away from that target, 2,300 NHS computers are still running Windows XP.
Normal Linux user knows almost all the basic Linux day-to-day use commands to perform basic task such as installing any application, copying files from one directory to another, etc. But in this article I’m going to list 100 essential Linux commands which can be useful for every Linux user right from the noobs to the professional Linux developers and system administrators.So before wasting any time let’s get started with this huge list of essential Linux commands.
Valve have released a new stable version of the Steam Client today to add new features, improve existing features and catch some pesky bugs flying around.
There's some better "client logic" to choose and connect to download servers, which should hopefully give better download speeds, better connection login in initializing the friends list, screenshots in SteamVR Home should be sorted, a fix for certain web page elements continuing to render in the Steam client when it is minimized or closed to the system tray, some "improved reliability of registry saving on Linux and macOS" and the SteamVR dashboard should no longer obscure transition overlays when launching a game.
You're going to need some quick reflexes for LOST ORBIT: Terminal Velocity, a game about being stranded in deep space. Note: Key provided by the developer.
This is actually a revamp of the 2015 title LOST ORBIT. This new definitive edition includes a brand new 12 level epilogue and story, new abilities and ways to die, 15 new challenge levels, a reworking of the original levels with new cinematics and so on. If you owned the original, you should see this new edition in your Steam library free.
Heads up GOG fans, Eagle Island from Pixelnicks is now available to pick up from GOG with the Linux build expected soon.
Releasing soon, Total War: THREE KINGDOMS is to get an "Eight Princes" DLC set 100 years after the Three Kingdoms period began.
Announced yesterday, Creative Assembly are moving quickly to add in a whole lot more content to THREE KINGDOMS and it does sound pretty sweet.
It will feature: an entirely new campaign; eight new playable princes with "substantially different" play-styles with unique buildings, assignments and court options; along with new elite units like cataphracts; four new alignments Wealth, Spirit, Might, and Mind and more.
Robo Instructus from Big AB Games, which is mainly a solo-operation, is a puzzle game where you need to guide a robot using a simple programming language.
Is it odd to think programming can be relaxing? If so, I guess I'm pretty strange in that way. Even if you don't know any programming, Robo Instructus walks you through things quite easily and getting started with it is pretty quick.
Interested in slick retro first-person shooters? You may want to act fast as the price of Ion Fury (previously Ion Maiden) goes up tomorrow.
Currently in Early Access, Ion Fury offers a very good preview campaign to play through while you wait for the full release on August 15th. The price is currently around $19.99 but from tomorrow they will bump it up to $24.99.
After being previously removed from the DRM-free store GOG, TRI: Of Friendship and Madness has now made a return with full Linux support included.
Today we’re releasing Krita 4.2.3. This is mostly a bug fix release, but has one new feature: it is now possible to rotate the canvas with a two-finger touch gesture. This feature was implemented by Sharaf Zaman for his 2019 Google Summer of Code work of porting Krita to Android. The feature also works on other platforms, of course.
The most important bug fix is a workaround for Windows installations with broken, outdated or insufficient graphics drivers. The core of the issue is that our development platform, Qt, in its current version needs a working OpenGL or Direct3D installation as soon as there is a single component in the application that uses QML, a technology for creating user interfaces. We have managed to work around this issue and especially users of Windows 7 systems that have become a bit messy should be able to run Krita again.
We today provide a stabilization and bugfix release with version 5.3.3. This is a bugfix-only release, which introduces no new features and as such is a safe and recommended update for everyone currently using a previous version of KDevelop 5.3.
You can find a Linux AppImage as well as the source code archives on our download page. Windows installers are no longer offered, we are looking for someone interested to take care of that.
First Latte beta release for v0.9.0 is getting ready and I am really happy about it :) . But today instead of talking for the beta release I am going to focus at two last minute "arrivals" for v0.9; that is Layouts Reports and Documentation. If you want to read first the previous article you can do so at Latte and "Flexible" settings...
After some problems were encountered in Kaidan 0.4.1, we tried to fix the most urgent bugs.
I often write about apps that make the leap from Windows or Mac to Linux, but it’s much rarer than I get to write about things the other way around.
But today I do as KDE Connect, the open-source smartphone-to-desktop bridge that enables a crop of handy integrations, is now available on macOS.
Sure, macOS sports “continuity” integrations with iOS devices, letting iPhone owners benefit from some nifty sync smarts. But there’s precious little out there for Mac users who use Android smartphones.
And that something that this port of the KDE Connect app and indicator , strange though it may seem, goes some way to addressing.
Sriram Ramkrishna, frequently known as Sri, is perhaps GNOME’s oldest contributor. He’s been around the community for almost as long as it’s been around!
[...]
But more than that, GNOME was a project that if you think about it was audacious in its purpose. Building a desktop in 1997 around an operating system that was primitive in terms of user experience, tooling, and experience. I wanted to be part of that.
Members of the GNOME Foundation voted in the annual elections for this year’s board of directors. The current board consists of:
Allan Day Carlos Soriano Federico Mena Quintero Robert McQueen Philip Chimento Britt Yazel Tristan Van Berkom Congratulation to the new board! You can learn more about the board and what it does online.
While Clear Linux as part of its standard bare metal installations has long defaulted to having an AVX2-optimized GNU C Library installed by default, it turns out that it wasn't part of the default os-core bundle as used by containers. That though is changing and should yield even better out-of-the-box performance when running Clear Linux within containers.
Intel's William Douglas sent out the proposal for adding the AVX2 version of the Glibc libraries into the os-core bundle in order to get picked up by containers and other bare/lightweight Clear configurations.
Endeavour OS uses the familiar Calamares installer to automate the normally complex and command line-based Arch installation process. I gave it a quick spin inside a Virtual Machine and it couldn't be simpler, although the team does warn of some early issues with manual partitioning. Give that a read before you proceed!
For four and a half years now, OPNsense is driving innovation through modularising and hardening the open source firewall, with simple and reliable firmware upgrades, multi-language support, HardenedBSD security, fast adoption of upstream software updates as well as clear and stable 2-Clause BSD licensing.
19.7, nicknamed "Jazzy Jaguar", embodies an iteration of what should be considered enjoyable user experience for firewalls in general: improved statistics and visibility of rules, reliable and consistent live logging and alias utility improvements. Apart from the usual upgrades of third party software to up-to-date releases, OPNsense now also offers built-in remote system logging through Syslog-ng, route-based IPsec, updated translations with Spanish as a brand new and already fully translated language and newer Netmap code with VirtIO, VLAN child and vmxnet support.
Last but not least we would like to thank m.a.x. it for their sponsorship of the default gateway priority switching feature and their continued work of writing and maintaining plenty of community plugins. This time around, Maltrail, Netdata and WireGuard VPN have been freshly added to the mix.
OPNsense, the FreeBSD-based pfSense-forked firewall offering that has continued experiencing increased adoption following the closure of m0n0wall, is out with version 19.7 as its newest feature update.
We have been working on including the NEURON simulator in NeuroFedora for a while now. The build process that NEURON uses has certain peculiarities that make it a little harder to build.
For those that are interested in the technical details, while the main NEURON core is built using the standard ./configure; make ; make install process that cleanly differentiates the "build" and "install" phases, the Python bits are built as a "post-install hook". That is to say, they are built after the other bits in the "install" step instead of the "build" step. This implies that the build is not quite straightforward and must be slightly tweaked to ensure that the Fedora packaging guidelines are met.
A question about the future of package distribution is at the heart of a disagreement about the snap plugin for the GNOME Software application in Fedora. In a Fedora devel mailing list thread, Richard Hughes raised multiple issues about the plugin and the direction that he sees Canonical taking with snaps for Ubuntu. He plans to remove support for the plugin for GNOME Software in Fedora 31.
There are currently two major players for cross-distribution application bundles these days: snaps, which were developed by Canonical for Ubuntu and the Snap Store, and Flatpak, which was developed by Alexander Larsson of Red Hat as part of freedesktop.org. Both systems are available for multiple Linux distributions. They are meant to give an "app-like" experience, where users simply install an application, which comes with any dependencies it has that are not provided by the snap or Flatpak runtime.
The GNOME Software application has a snap plugin that, when enabled, supports the distribution, installation, and management of snaps. The Fedora project currently provides the snap plugin as a package in Fedora 30, though it is not installed by default. Hughes is the Fedora maintainer for the plugin; he announced his intention to disable the plugin since, he says, he was told that Canonical was not going to be installing GNOME Software in the next Ubuntu Long Term Support (LTS) release.
On behalf of the Fedora CoreOS Working Group, I'm thrilled to announce the first preview release of Fedora CoreOS. Fedora CoreOS is built to be the secure and reliable host for your compute clusters. It's designed specifically for running containerized workloads without regular maintenance, automatically updating itself with the latest OS improvements, bug fixes, and security updates. The initial preview release of Fedora CoreOS runs on bare metal, QEMU, VMware, and AWS, on x86_64 only. It supports provisioning via Ignition spec 3.0.0 and the Fedora CoreOS Config Transpiler, automatic updates with Zincati and rpm-ostree, and running containers with Podman and Moby. In the coming months, we'll be adding more platforms, building out functionality, and creating documentation to get Fedora CoreOS ready for production use. For now, the Fedora CoreOS preview should not be used for production workloads, and it might change in incompatible ways before the stable release.
There are new live/install media of SparkyLinux 5.8 “Nibiru” available to download. This is the 1st release of the new stable line, which is based on the Debian 10 “Buster”.
Changes: – based on Debian 10 stable “Buster” now, repositories changed from ‘testing’ to ‘stable’ – system upgraded from Debian stable “Buster” repos as of July 14, 2019 – Linux kernel 4.19.37-5 (i686 & amd64) – Linux kernel 4.19.57-v7+ (ARMHF) – the Calamares installer updated up to version 3.2.11 – apt-daily.service disabled – sparky-tube installed as dafault – removed old 3rd party repositories – added obconf-qt (LXQt edition) – nm-tray installed instead of network-manager-gnome (LXQt edition) – network-manager added to CLI ARMHF image – small fixes
Wow. Once again, a Debian release impresses me — a guy that’s been using Debian for more than 20 years. For the first time I can ever recall, buster not only supported suspend-to-disk out of the box on my laptop, but it did so on an encrypted volume atop LVM. Very impressive!
For those upgrading from previous releases, I have a few tips to enhance the experience with buster.
And if you hit boot configuration problems – maybe you’re running Mint alongside Windows in a dual-boot setup – a new Boot Repair feature is able to fix the most frequent problems encountered, which could be pretty nifty.
There are various other minor changes, as you would expect, including a load of new wallpapers. Another interesting thing to note is that the Cinnamon version of the OS uses significantly less system memory than before – something in the order of two-thirds of the RAM with the move from Cinnamon 4.0 to 4.2, the developers note.
If you want to see the full list of what’s different with Mint 19.2, you can check the release notes here. As ever, remember this is still in beta, so there will likely be some teething issues.
You can grab Linux Mint 19.2 from the following links each of which point to the version which carries the mentioned desktop: Cinnamon, Mate, or Xfce.
Mint is a popular distro and is a good option for those who are new to the world of Linux, and those switching from Windows or Mac, as we explain in our best Linux distros roundup.
Linux Mint is an operating system based on the wildly popular Ubuntu. It comes with some interesting tweaks that many users appreciate, making it a popular choice in the Linux community for both beginners and experts alike. It is stable, easy to use, and has a well-designed Update Manager that puts many other distros to shame.
Today, Linux Mint 19.2 BETA is finally released. Codenamed "Tina," it will be supported until 2023 -- long after Windows 7 support ends in January of 2020. In other words, when it achieves stable status, Linux Mint 19.2 should make a great replacement for Windows 7.
Canonical, earlier this month, announced that Ubuntu 18.10 Cosmic Cuttlefish will be reaching end-of-life status this Thursday, making now the ideal time to upgrade to a later version. As with all non-Long Term Support (LTS) releases, 18.10 had nine months of support following its release last October.
When distributions reach their end-of-life stage, they no longer receive security updates. While you may be relatively safe at first, the longer you keep running an unpatched system, the more likely it is that your system will become compromised putting your data at risk. If you’d like to move on from Ubuntu 18.10, you’ve got two options; you can either perform a clean install of a more up-to-date version of Ubuntu or you can do an in-place upgrade.
CANONICAL HAS confirmed that Ubuntu 18.10 (aka Cosmic Cuttlefish) has reached end of life (EoL).
Just as with Windows, each build of Ubuntu, one of the biggest Linux distros on the market, has a finite level of support. In this case, as it isn't an LTS release, 18.10 had nine months of support, but all good things must come to an end.
From this point, users of 18.10 will no longer receive security updates to their operating system, which could leave it open to attacks from external nasties.
In a statement, the company confirmed: "Ubuntu announced its 18.10 (Cosmic Cuttlefish) release almost 9 months ago, on October 18, 2018. As a non-LTS release, 18.10 has a nine-month support cycle and, as such, the support period is now nearing its end and Ubuntu 18.10 will reach end of life on Thursday, July 18th."
Ubuntu Server with command-line interface might sound little bit wired to newbies because of no previous familiarization. Thus, if you are new to Ubuntu Linux server running on your local hardware or some Cloud hosting and planning to install some Linux Desktop Graphical environment (GUI) over it; I would like to recommend don’t, until and unless you don’t have supported hardware. Instead, think about free and open-source Ubuntu server Web GUI Management panels.
Moreover, for a moment, you can think about Desktop Graphical environment for your local server but if you have some Linux cloud hosting server, never do it. I am saying this because Ubuntu or any other Linux server operating systems are built to run on low hardware resources, thus even old computer/server hardware can easily handle it. GUI means more RAM and hard disk storage space.
Today we are looking at Linux Mint 19.2 Beta, the XFCE edition. The XFCE edition of Linux Mint is one of my favorites as it comes with the stable lightweight XFCE, version 4.12 and the latest of Linux Mint, which is a great combination.
This release of XFCE comes with Linux Kernel 4.15, based on Ubuntu 18.04 (supported until April 2023). It uses between 400-800MB of ram.
Today we are looking at Linux Mint 19.2 Beta, the MATE edition. It comes with Linux Kernel 4.15, based on Ubuntu 18.04 (supported until April 2023) and MATE 1.22. It uses about 700B of Ram when idling.
Linux Mint 19.2 feels for me more, like a maintenance update, to make it even more stable, but it has improvements in the automatic updates as well as a whole heap of new beautiful backgrounds.
Then, in our news, Linux Mint is beta testing the 19.2 updates, Ubuntu considers ZFS, some Raspberry Pi successes and flaws, and more.
Three years ago we checked out the CompuLab Airtop as a high-performance fanless PC. Back then it was exciting to passively cool an Intel Core i7 5775C, 16GB of RAM, SATA 3.0 SSD, and a GeForce GTX 950 graphics card. But now in 2019 thanks to the continued design improvements by CompuLab and ever advancing tech, their newly-launched CompuLab 3 can accommodate an eight-core / sixteen-thread Xeon CPU, 64GB of RAM, NVMe SSD storage, and a NVIDIA Quadro RTX 4000 graphics card without any fans!
The Airtop 3 just arrived from Israel earlier this month and I've begun putting it through its paces with our Linux benchmarks. Over the weeks ahead I'll begin posting more benchmarks from this passively-cooled, industrial-grade PC with Intel Xeon E-2288G processor and RTX 4000 Turing graphics, but given the reader interest when CompuLab announced the Airtop 3 back in April, I'm just sharing some initial impressions and first round of performance data today.
Brandeis University’s Graduate Professional Studies division (GPS) will partner with The Open Source Initiative€® (OSI) to provide new educational offerings for the open source community, the university announced at OSCON 2019.
As more companies start leveraging Open Source Software to reduce costs, decrease time to deployment and foster innovation, the organizations that have realized success as open source consumers are now extending their participation within open source communities as collaborators and contributors. This shift can create new challenges to traditional business processes and models, requiring dedicated policies, programs and personnel to ensure that the investments in open source projects produce the desired benefits while still aligning with the values of the open source communities. The Brandeis GPS-OSI partnership will help address the growing demand for expertise within organizations seeking to authentically collaborate with, and productively manage, open source resources.
“Understanding how to assess, engage, and contribute to open source communities while also delivering value to your company is the next generation skill set employers are looking for,” said Patrick Masson, general manager of the Open Source Initiative. “We're thrilled to work with Brandeis to help continue the incredible growth of open source software and projects.”
Using open source infrastructure can reduce operating costs and streamline upgrades, but it's important to weigh the pros and cons before you jump on the bandwagon.
We are pleased to announce that the System Boot and Security Microconference has been accepted into the 2019 Linux Plumbers Conference! Computer-system security is a topic that has gotten a lot of serious attention over the years, but there has not been anywhere near as much attention paid to the system firmware. But the firmware is also a target for those looking to wreak havoc on our systems. Firmware is now being developed with security in mind, but provides incomplete solutions. This microconference will focus on the security of the system especially from the time the system is powered on.
Last week it seemed that all our limited resource machines were perpetually backlogged. I wrote yesterday to provide insight into what we run and some of our limitations. This post will be discussing the Android phones backlog last week specifically.
The Android phones are hosted at Bitbar and we split them into pools (battery testing, unit testing, perf testing) with perf testing being the majority of the devices.
When you were in school, you may have taken a trip to a museum or a local park, but you probably never got to see an active volcano or watch great whites hunt. As Virtual Reality grows, this could be the way your kids will learn — using headsets the way we use computers.
When you were in school, you may have gone on a trip to the museum, but you probably never stood next to an erupting volcano, watching molten lava pouring down its sides. As Virtual Reality (VR) grows, learning by going into the educational experience could be the way children will learn — using VR headsets the way we use computers.
This kind of technology holds huge potential in shaping young minds, but like with most technology, not all public schools get the same access. For those who come from underserved communities, the high costs to technology could widen an already existing gap in learning, and future incomes.
This Week in Rust is openly developed on GitHub.
libsyntax has three tables in a global data structure, called Globals, storing information about spans (code locations), symbols, and hygiene data (which relates to macro expansion). Accessing these tables is moderately expensive, so I found various ways to improve things.
Even though other companies have made defensive moves against Amazon to protect their business, the YugaByte co-founders explain why they're not worried about Amazon.
LibreOffice 6.3 isn’t release but I have already plans for the 6.4 winter release.
If you’ve seen our LibreOffice contributor map, you’ll note that we have a few community members in north America. (Of course, the map doesn’t show absolutely everyone in the LibreOffice project – just people we’ve interviewed recently.) So we want to grow this community!
Epic MegaGrants is a program by Epic Games to support game developers, enterprise professionals, content creators and tool developers doing amazing things with Unreal Engine or enhancing open-source capabilities for the 3D graphics community.
As part of that, Epic Games granted Blender Foundation $1.2 million to help improve their development. If you didn’t know already, Blender is one of the best open source video editors and specifically famous for creating professional 3D computer graphics.
GnuCash is one of the best open source accounting software that is 100% free. It offers simplicity, flexibility, and amazing features such as handling multiple currencies and some payroll features. The application is available on Android, Linux, OpenBSD, Windows, GNU, and macOS devices. Some of the other features are managing accounts payable and receivable and managing employee expenses.
This tutorial explains several ways to generate random numbers list in Python. Here, we’ll mainly use three Python random number generation functions. These are random.randint(), random.randrange(), and random.sample().
You can find full details of these methods here: Generate random numbers in Python. All these functions are part of the Random module. It employs a fast pseudorandom number generator which uses the Mersenne Twister algorithm.
However today, we’ll focus on producing a list of non-repeating integers only. Go through the below bullets to continue.
I’ve released another alpha of coverage.py 5.0: coverage.py 5.0a6. There are some design decisions ahead that I could use feedback on.
[...]
I know this is a lot, and the 5.0 alpha series has been going on for a while. The features are shaping up to be powerful and useful. All of your feedback has been very helpful, keep it coming.
Gradient boosting classifiers are a group of machine learning algorithms that combine many weak learning models together to create a strong predictive model. Decision trees are usually used when doing gradient boosting. Gradient boosting models are becoming popular because of their effectiveness at classifying complex datasets, and have recently been used to win many Kaggle data science competitions.
The Python machine learning library, Scikit-Learn, supports different implementations of gradient boosting classifiers, including XGBoost.
You’ve probably seen the option for Google Login on various websites. Some sites also have more options like Facebook Login or GitHub Login. All these options allow users to utilize existing accounts to use a new service.
In this article, you’ll work through the creation of a Flask web application. Your application will allow a user to log in using their Google identity instead of creating a new account. There are tons of benefits with this method of user management. It’s going to be safer and simpler than managing the traditional username and password combinations.
This article will be more straightforward if you already understand the basics of Python. It would also help to know a bit about web frameworks and HTTP requests, but that’s not strictly necessary.
I've been a gadget person as long as I can remember, so I was delighted when I discovered an Adafruit Circuit Playground Express (CPX) in the swag bag I got at PyConUS in May. I became fascinated with these little devices last year, when Nina Zakharenko highlighted them in her All Things Open presentation, Five Things You Didn't Know Python Could Do, with Python-powered earrings.
After finding one in my PyCon bag, I set out to learn more about these mesmerizing little devices. First, I attended a "how-to" session at one of the Open Spaces meetups at PyCon. But learning always requires hands-on practice, and that's what I did when I got home. I connected the CPX device to my Linux laptop with a USB-to-MicroUSB cable. The unit mounts just like any standard USB drive, listed as CIRCUITPY.
While certainly less common, it's perfectly possible to write Python code in a functional style, and there are plenty of tools in the Python standard library to faciliate functional programming. One such tool is called map, and in this post we're look at what map is for, and how you might use it in your own code.
Amazon would never have existed, he said, without pre-existing infrastructure: postal services to deliver packages; home computers to order goods; credit cards to make payments. The job of the current generation would be to build an equivalent “infrastructure” for space. Mr Bezos identified two elements of this: much lower launch costs and the exploitation of resources in space. But he might have mentioned another, more basic requirement for enterprise: a proper legal environment.
What rules there are largely date from the cold-war era. The Outer Space Treaty of 1967 is the foundational space-law text. It sets out some basic principles, among them that space is free for exploration and use by all states, and that no claims of sovereignty can be made. Later agreements assign liability for damage caused by space objects and require states to help rescue astronauts in distress.
A common thread runs through these texts. They all assume that space is a realm dominated by states, not by companies, let alone individual billionaires. As space industrialises, the gaps in the law are becoming clearer. Two areas of concern stand out: debris and resource extraction.
A joke Facebook event encouraging people to band together and storm the highly secretive Area 51 site in Nevada has gone viral, inspiring alien memes on Facebook and Instagram.
Like the original moon shot, these are big, hard problems that demand significant investments of time and money, along with innovative technology and thinking. But these projects differ in two critical ways. First, they demand nowhere near the resources the United States used to reach the Sea of Tranquility. To make good on John F. Kennedy’s pledge to land a man on the moon and bring him home by the end of the 1960s, NASA spent $25.4 billion on the Apollo program—more than $150 billion in today’s dollars. At its peak, Apollo accounted for nearly 4 percent of the federal budget. More than 400,000 Americans worked on it in some capacity, nearly all of them in private industry.
Fernando Corbató, a scientist who fostered the digital revolution by developing shared computer operating systems and put his stamp on daily life by introducing the computer password, died July 12 at a nursing home in Newburyport, Massachusetts. He was 93.
Today we are looking at the Samsung Chromebook 3 (XE501C13-K01US). It is an affordable computer for all your basic everyday needs for a great price and good quality from Samsung.
It comes with a fanless Dual-Core Intel Celeron Processor N3060 CPU, an 11.6 inch, 1366x768, LED display, and non-touch screen. It has 2GB of RAM and a 16GB eMMC SSD.
It has Android Apps (Google Play) but it does not have Linux Apps (crostini) support and it will receive auto-updates until June 2021.
Today we are looking at the Acer Chromebook 11 7th Gen (CB3-132-C4VV / NX.G4XAA.002). It is a budget Chromebook, perfect for daily tasks like browsing the web, watching movies and writing documents.
It comes with a fanless Dual-Core Intel Celeron Processor N3060 CPU, an 11.6 inch, 1366x768, IPS display, and non-touch screen. It has 4gb of RAM and a 16GB eMMC SSD.
Today we are looking at the ASUS Chromebook Flip C434 - C434TA-DS384T. It is a 2 in 1 Chromebook, familiar laptop and tablet, and it comes with a sleek all-metal look and diamond-cut edges, makes it a perfect Chromebook for anyone who wants a stylish modern Chromebook!
Today we are looking at the Samsung Chromebook 3 - XE500C13-K06US. It is an affordable, yet powerful, small and thin computer for all your basic everyday needs for a great price and good quality from Samsung.
Those books, however, have been questioned by some experts who dismiss long-held conspiracy theories that the federal government aided the spread of tick-borne diseases, and federal agencies, including the CDC, may have participated in a cover-up of sorts to conceal findings about the spread of Lyme disease.
Smith has been a fierce advocate of raising awareness about Lyme disease and increasing prevention efforts. Smith, the co-chair of the House Lyme Disease Caucus, earlier this year introduced the "Ticks: Identify, Control, and Knockout Act'' (TICK Act), a bill to come up with a national strategy to fight Lyme disease. If passed, the measure would authorize an additional $180 million to boost funding for Lyme disease research, prevention and treatment programs.
The CDC currently spends about $11 million on Lyme disease research.
but noone considered that now-controversial near-truism at all when the core internet protocols were first designed and implemented. the idea of abuse was considered novel in the 1990's when commercialization and privatization brought abuse into the internet world and burst the academic bubble. a lot of old timers blamed AOL and MSN and even Usenet for the problems, but in actuality, it's what humans _always_ do at scale. putting the full spectrum of human culture atop a technology platform designed for academic and professional culture should have been understood to be a recipe for disaster.
Bulb says that the problem has occurred in around 200 cases and that it takes five steps to fix it, though if you don't know Welsh, you'll need to get Bulb to talk you through it by way of numbers of button pushes.
"While we think Welsh is a great language, we understand that in many cases people will want their display to be in English." it jibbered in a statement.
One customer, James Tombs, who lives well over 100 miles from the Welsh border, in West Sussex, told us: "I don't live in Wales and don't know Welsh. One day I saw my meter was in Welsh but ignored it as I was busy. I then came back to it later and realised that the screen was locked, the buttons didn't do anything and the unit wasn't updating. The clock was stuck at 15.47.
This allows for access to iCloud Keychain passwords, which pretty much means access to a whole suite of usernames and passwords stored by Apple's cloud service. We can envision the potential for another iCloud hack, only with leaked nudes of early adopter Apple fanatics rather than celebs indulging their promiscuous sides.
Security updates have been issued by Debian (libreoffice), Red Hat (thunderbird), SUSE (ardana and crowbar, firefox, libgcrypt, and xrdp), and Ubuntu (nss, squid3, and wavpack).
Offensive Security, the creators of open-source Kali Linux, has launched the Kali NetHunter App Store, "a new one stop shop for security relevant Android applications. Designed as an alternative to the Google Play store for Android devices, the NetHunter store is an installable catalogue of Android apps for pentesting and forensics". The press release also notes that the NetHunter store is a slightly modified version of F-Droid: "While F-Droid installs its clients with telemetry disabled and asks for consent before submitting crash reports, the NetHunter store goes a step further by removing the entire code to ensure that privacy cannot be accidentally compromised". See the Kali.org blog post for more details.
The Washington Post reports that the document by a Canadian senator for the Defense and Security Committee of the NATO Parliamentary Assembly detailed the future of the organization’s nuclear deterrence policy but accidentally exposed the open secret.
The report stated that U.S. nuclear weapons are being stored in Belgium, Germany, Italy, the Netherlands and Turkey.
Nicknamed Gadget, the bomb had been three years in the making. At 10 p.m. local time on July 15 it was winched to the top of a metal tower 800 meters from the ground zero site Oppenheimer had named Trinity, after a poem by the 17th-century English writer John Donne.
The team originally planned to detonate the bomb at 4 a.m., but a passing storm caused delays, and it wasn't until just before 5:29 a.m. that the countdown began.
The Navy phased out of Vieques at the turn of the millennium, pushed by decades of intense local activism and international outcry after David Sanes Rodríguez, a Puerto Rican security guard, was killed in a bombing run — one of thousands conducted by the military over more than 60 years. During that period, the Navy staged training exercises on the beaches of Vieques and dropped thousands of bombs on the land and its surrounding waters — not to mention depleted uranium shells, napalm and Agent Orange.
Almost 20 years after their departure, island leaders are still demanding the Navy clean up buried munitions and toxic pollution, and craft a sustainable development plan meant to bolster the local economy and revitalize long-fallow land.
Many Viequenses fear the island is still not their own. Instead of military occupation, they now face “an invasion of ‘foreign’ capital,” as Guadalupe Ortiz describes it — people from the US mainland buying up property for vacation homes and Airbnbs at prices exponentially higher than what most locals can afford.
While politicians, media and commentators strut the world stage crying ‘press freedom’ an actual journalist from Australia rots in a British prison for doing his job. Clinical psychologist Dr Lissa Johnson weighs in with the science behind why we stay silent.
On Wednesday 10th and Thursday 11th July, the UK Foreign Office and Canadian Ministry of Foreign Affairs hosted a Global Conference for Media Freedom. Politicians and opinion-shapers from around the world gathered in London to discuss how best to promote a “free and independent media”, and ensure the “safety and protection of journalists”, who are “under threat” around the world.
Meanwhile, publisher and journalist Julian Assange languished in Belmarsh supermax prison a short train ride away. His plight failed to rate a mention on the conference agenda, despite the event’s professed concern for journalists in jail.
The CIA is pushing for an expansion of a 37-year-old law that would deter journalists from covering national security issues or reporting on leaked documents. Thanks to a disillusioned CIA case officer's actions in 1975, there are currently a few limits to what can or can't be reported about covert operatives working overseas.
In 1975, Philip Agee published a memoir about his years with the CIA. Attached to his memoir -- which detailed his growing discontentment with the CIA's clandestine support of overseas dictators -- was a list of 250 CIA agents or informants. In response to this disclosure, Congress passed the Intelligence Identities Protection Act (IIPA), which criminalized disclosing the identity of covert intelligence agents.
The IIPA did what it could to protect journalists by limiting the definition of "covert agent" to agents serving overseas and then only those who were currently working overseas when the disclosure occurred. It also required the government to show proof the person making the disclosure was "engaged in a pattern of activities intended to identify and expose" covert agents. The law was amended in 1999 to expand the coverage to include covert agents working overseas within five years of the disclosure.
A30-year study suggests that pollution may pose a more imminent threat to struggling coral reefs than waters warmed by climate change. The research points to excess nitrogen from topsoil runoff and inadequately treated sewage as the main driver of coral death in Florida’s Looe Key reef, researchers reported July 15 in Marine Biology.
The study led by Florida Atlantic University’s Harbor Branch Oceanographic Institute at Looe Key, in the Florida Keys, showed that higher nutrient levels in Florida waters is a key cause of coral bleaching and death. As nutrient runoff from farming and from a growing population increases the amount of nitrogen levels in the water, corals are actually dying before being affected by warmer water temperatures, said Brian Lapointe, one of the authors of the study and a professor at FAU’s Harbor Branch.
Garbage tends to especially accumulate in waters near highly-populated areas. Despite the use of water purification systems as well as other anti-pollution techniques, small items such as cotton swabs often end up in waterways.
Though Roska-Roope isn't able to collect all of the unwanted elements in the water, part of its role is to educate the public about the effects of litter.
By 2050, hundreds of U.S. cities could see an entire month each year with heat index temperatures above 100 degrees if nothing is done to rein in global warming.
The heat index, also known as the apparent temperature, is what the temperature feels like to the human body when relative humidity is combined with the air temperature. This is the first study to take the heat index – instead of just temperature – into account when determining the impacts of global warming, Dahl said.
The number of days per year when the heat index exceeds 100 degrees will more than double nationally, according to the study, which was published Tuesday in the peer-reviewed journal Environmental Research Communications.
On July 16, 2019, the National Geodetic Survey (NGS) began collecting aerial damage assessment images in the aftermath of Hurricane Barry. Imagery is being collected in specific areas identified by NOAA in coordination with FEMA and other state and federal partners. Collected images are available to view online via the NGS aerial imagery viewer. View tips on how to use the imagery viewer.
NOAA's aerial imagery aids safe navigation and captures damage to coastal areas caused by a storm. Aerial imagery is a crucial tool to determine the extent of the damage inflicted by flooding, and to compare baseline coastal areas to assess the damage to major ports and waterways, coastlines, critical infrastructure, and coastal communities. This imagery provides a cost-effective way to better understand the damage sustained to both property and the environment.
Cryptocurrency traders say their business got a boost in June when authorities banned the use of foreign currencies and reissued the Zimbabwe dollar. The currency was abandoned in 2009 after inflation estimated at 500 billion percent made it worthless.
The CEO has brought in new talent to do that. Bernd Leukert, who left the management board of software company SAP SE earlier this year, will start in September. Neal Pawar will join as chief information officer from AQR Capital Management the same month.
But most election-related legislation has stalled in the Senate, including a mammoth ethics and election reform, known as H.R. 1, that was passed by House Democrats.
State-backed [attackers] have attempted to infiltrate targets related to U.S. elections more than 700 times in the past year, furthering concerns about potential meddling in upcoming races, according to a blog posted Wednesday by Microsoft Corp.
He was commissioned as an officer in the Navy on Dec. 6, 1941, the day before the Japanese attack on Pearl Harbor. He spent most of his Navy service, which lasted until 1945, stationed at Pearl Harbor working on breaking Japanese codes, for which he was awarded the Bronze Star.
[...]
With two older brothers who were lawyers, John was encouraged after his discharge from the Navy to attend law school himself. He used the G.I. Bill to attend Northwestern University Law School, where he completed his degree in two years. He was editor in chief of the law review and graduated first in the class of 1947 with the highest grade-point average in the school’s history.
Dorsey, who co-founded Twitter Inc. and Square Inc., is one of several speakers talking to select Apple employees as part of an ongoing series, people familiar with the matter said. The billionaire spoke with staff from the marketing department, they said, asking not to be identified discussing internal matters.
Von der Leyen promised to defend the rule of law, took aim at U.S. tech giants' low tax bill in Europe and said she would update EU-wide norms for tackling the migrant issue.
But it was not. The centre-right EPP group and the liberals were, it is true, broadly supportive. Under a deal done by national leaders in a marathon European Council summit culminating on July 2nd, Mrs von der Leyen would be nominated for the commission, Charles Michel, a liberal, to the European Council’s own presidency and Josep Borrell, a socialist, to the role of high representative for foreign policy—with Christine Lagarde, the French head of the IMF, taking charge at the European Central Bank. But plenty of greens and socialists (led by contingents from Germany itself) objected that this was a stitch-up, that it was unfair on the left and that it contravened a post-2014 convention whereby a party-political “lead candidate” should win a mandate at the European election to become commission president. That raised the spectre of Mrs von der Leyen owing her majority to right-wing populists from outside the mainstream, some of whom backed her to avoid getting Frans Timmermans, the socialists’ preferred choice.
Clearly Mrs von der Leyen wanted to avoid that outcome. Her speech this morning was her last effort to do so. The vote was secret. But its narrowness suggests that without the votes of, say, Poland’s right-populist Law and Justice (PiS) MPs or those of Hungary’s authoritarian Fidesz, she would not have won. One rumour, encouraged by sources in Warsaw, has it that Angela Merkel called PiS leaders to secure their support for her compatriot and ally (perhaps in exchange for German support to keep EU regional funds flowing to poor Polish regions). By contrast none of Germany’s 16 Social Democrat MEPs claims to have voted for her and almost no members of the parliament’s Green fraction did. So the incoming commission president will take office with her authority already dented. Far from commanding a centrist majority in the parliament, she faces charges of being in hock to some of the more unpleasant and unpredictable elements of the European right.
Action on the floor froze at that point, as lawmakers and the parliamentarian debated next steps.
WeChat implements realtime, automatic censorship of chat images based on text contained in images and on an image’s visual similarity to those on a blacklist
WeChat facilitates realtime filtering by maintaining a hash index populated by MD5 hashes of images sent by users of the chat platform
WeChat’s censors face two types of challenges. Big public posts on WeChat Moments, a public feature similar to Facebook’s Timeline, are scrutinized and filtered by algorithms that can sometimes take over 10 seconds to run—a glacial pace on social media. But one-on-one and group messages are a different problem entirely, because they are often intimate and instant conversations. That requires real-time censorship.
Text is relatively easy to search and censor. Image filtering is harder, especially when you’re trying to examine and censor the images almost instantly. To accomplish this task, WeChat keeps a massive and always growing index of MD5 hashes, small cryptographic data signatures that are unique to every file. When a censored image is sent, it will be caught by the hash index and deleted. Neither the sender nor the recipient is ever likely to know anything was censored.
If the image isn’t instantly censored, it’s sent for automatic analysis. Using optical character recognition, [...]
A core aim is to replace the e-Commerce Directive, passed in 2000. This is presented as "outdated", but the suggestions in the paper are clearly a continuation of attacks on the fundamental principles underlying the open Internet that began with the Copyright Directive.
One of the problems for the EU when pushing through the upload filters of Article 13/17 in the Copyright Directive is that Article 15 of the e-Commerce Directive explicitly states that there is "No general obligation to monitor". Constant surveillance is the only way that upload filters can work -- if you don't monitor all the time, you can't be sure you block everything that the law requires. Furthermore, Article 14 of the e-Commerce Directive emphasizes that "the service provider is not liable for the information stored at the request of a recipient of the service". That's subject to certain conditions, such as being required to remove material that infringes on copyright, but only after being informed of its presence on their servers.
Alexander Wirt (formorer) has tried to justify censoring the mailing list in various ways. Wirt is also one of Debian's GSoC administrators and mentors, it appears he has a massive conflict of interest when censoring posts about Google.
Wirt has also made public threats to censor other discussions, for example, the DebConf Israel debate. The challenges of holding a successful event in that particular region require a far more mature approach.
Why are these donations and conflicts of interest hidden from the free software community who rely on, interact with contribute to Debian in so many ways? Why doesn't Debian provide a level playing field, why does money from Google get this veil of secrecy?
[...]
Google also operates a mailing list for mentors in Google Summer of Code. It looks a lot like any other free software community mailing list except for one thing: censorship.
Look through the "Received" headers of messages on the mailing list and you can find examples of messages that were delayed for some hours waiting for approval. It is not clear how many messages were silently censored, never appearing at all.
Recent attempts to discuss the issue on Google's own mailing list produced an unsurprising result: more censorship.
Daisy Soderberg-Rivkin, who used to work at Google as an in-house content moderator, has written a fascinating piece for the Washington Times, explaining just what a disaster Josh Hawley's anti-Section 230 bill would be for the internet. As we've discussed, Hawley's bill would require large internet companies to beg the FTC every two years to get a "certificate" granting them Section 230 protections -- and they'd only get it if they could convince 4 out of 5 of the FTC Commissioners that their content moderation efforts were "politically neutral."
Soderberg-Rivkin points out how that will stifle the kind of "clean up" efforts that most everyone -- especially folks like Senator Josh Hawley -- often claim they want when they complain about all the "bad stuff" on social media. Remember, just before introducing this bill, Hawley was whining about all the bad and dangerous content on social media.
However, the attack appears to have come courtesy of a [criminal] with a Russian email address who offered local media to the pilfered data. It remains unclear what motivated the attack, but the person claiming to be behind the [attack] said the Bulgarian government was corrupt, which would suggest this was a politically motivated attack.
The reason for the attack was not immediately clear.
But the email’s author, who described the government as corrupt, said hackers had compromised more than 110 databases, including “critically confidential” information from key administrations, some of which was being offered to journalists.
Phillips's involvement came during Kenya's controversial 2017 election campaign, when president Uhuru Kenyatta deployed a secret team to help him retain power.
Phillips initially strenuously denying any involvement with the data firm, which has been accused of influencing the Brexit result in the UK and the American election result.
The MEP is said to have only backtracked after the programme obtained a recording of an interview from 2017 in which she confirms she had been "employed by Cambridge Analytica".
The firm was exposed by an undercover Channel 4 News investigation last year in which company bosses were filmed boasting of dirty tricks, and impacting election results around the world.
A city ordinance passed Tuesday night which prohibits the city of Oakland from "acquiring, obtaining, retaining, requesting, or accessing" facial recognition technology, which it defines as “an automated or semi-automated process that assists in identifying or verifying an individual based on an individual's face.”
Technology should work for the public good, not against it. Yet recent revelations that the FBI and Immigration and Customs Enforcement (ICE) are pillaging state driver's license records to conduct facial recognition surveillance recall the controversy beginning in 2013 over secret mass surveillance by the National Security Agency.
Under the pretense of preventing crime, these tools are once again being trained on the innocent American public.
The news came on the heels of a report by the U.S. Government Accountability Office that showed federal authorities now have access to over 641 million photos of people's faces in searchable databases. Since 2011, federal agents have submitted requests for over 390,000 searches. The FBI currently conducts about 4,000 searches per month through its "next generation" photo ID system.
The agreements they signed with Girls Do Porn are multi-page contracts full of fine legal print, and make no mention of the videos being posted online or even the name "Girls Do Porn," according to O'Brien. "So they do sign something, but they never get a copy of it. The first time they ever see it is in this litigation," he said.
However, Ring and Neighbors market themselves as a crime-fighting tools only by actively encouraging people to fear their neighbors. And by extension, Amazon positions itself as a company that can uniquely address these safety concerns stoked by Ring and Neighbors. Amazon uses Prime Day as a means of getting people to buy heavily discounted Amazon products that lock customers into their broader ecosystem. In this case, that includes Ring. But there are many reasons not to buy a ring. Here's a summary of Motherboard’s reporting on Ring and Neighbors: [...]
Watch out for the change is 19H2 - which will be the first bi-annual update to the operating system to be a patch rollup, similar to the old Service Packs, instead of a full new build.
“Like a toddler who has gotten his hands on a book of matches, Facebook has burned down the house over and over, and called every arson a learning experience,” Brown said. “We would be crazy to give them a chance to experiment with people’s bank accounts, and to use powerful tools they don’t understand, like monetary policy, to jeopardize hardworking Americans’ ability to provide for their families.”
At issue is standard contractual clauses used by Facebook and other companies to transfer personal data to the United States and other parts of the world and whether these violate Europeans’ fundamental right to privacy.
Cross-border data transfers worth billions of dollars are a fact of life for businesses ranging from banks to carmakers to industrial giants.
Schrems, an Austrian law student, successfully fought against the EU’s previous privacy rules called Safe Harbour in 2015. He is now challenging Facebook’s use of such standard clauses on the grounds that they do not offer sufficient data protection safeguards.
There are, as you’re about to see, lots of problems with PGP. Fortunately, if you’re not morbidly curious, there’s a simple meta-problem with it: it was designed in the 1990s, before serious modern cryptography. No competent crypto engineer would design a system that looked like PGP today, nor tolerate most of its defects in any other design. Serious cryptographers have largely given up on PGP and don’t spend much time publishing on it anymore (with a notable exception). Well-understood problems in PGP have gone unaddressed for over a decade because of this.
Two quick notes: first, we wrote this for engineers, not lawyers and activists. Second: “PGP” can mean a bunch of things, from the OpenPGP standard to its reference implementation in GnuPG. We use the term “PGP” to cover all of these things.
At the beginning of this month, UK’s Information Commissioner’s Office (ICO) published much awaited new guidance on the use of cookies and similar technologies for storing information, and accessing information stored, on a user's equipment, such as a computer or mobile device. It is primarily addressed to the providers/operators of online services, such as a website or a mobile app, and provides more clarity and certainty about how cookies can be used as part of such services.
[...]
ICO has developed an online tool that may prove useful when determining where consent applies for the use of cookies.
New guidance also tightens the requirements for obtaining the consent by pointing to the valid consent standards under the GDPR-- freely given, specific, informed, unambiguous and expressly given. Consent requests must be ‘clearly distinguishable from other matters’, be presented in an intelligible and easily accessible form, and the consent mechanism must allow the data subjects to withdraw their consent at any time. Accordingly, the continued use of the website does not constitute a valid consent.
Before the consent is given, users must be clearly informed about what cookies are in use (including any third party cookies) and what function they perform. Further, before making a choice, users must also be prevented from accessing the website. For non-essential cookies, pre-ticked boxes or equivalent default fixtures are not allowed, and user access should not be denied if they do not consent to such cookies. ICO is very specific about placement, formatting and wording of cookie information and consent request.
Notably, the cookie rules do not apply in the same way to the intranet, which is unlikely to be a public electronic communications service.
In May, federal magistrate judge Ronald E. Bush said compelled production of fingerprints violates both the Fourth and Fifth Amendment. He declared the fingerprint application itself to be a search, one performed with the assistance of the suspect. There's the Fourth Amendment issue.
And since the government hadn't provided evidence tying the suspect to the phone, producing fingerprints would provide the government with testimonial evidence it didn't have. The government wanted to search the phone for "indica of ownership" -- something it hoped to perform after it had already compelled production of fingerprints. The government had no "foregone conclusion" to work with, so forcing a suspect to give up information only they know (namely, possibly verifying ownership by unlocking the phone) implicated his Fifth Amendment protections against being forced to testify against himself.
In this case, Judge Bush has handed down another denial [PDF]. Once again, the government wants to compel the unlocking of a device but doesn't have everything it needs. What the government does have isn't much. The evidence tying the suspect to child porn possession is mostly ephemeral: IP addresses, email addresses, and online accounts. Using this as probable cause, the government is asking to search electronics seized from a searched residence. (The government also wants to search the suspect's car, presumably in case any electronics are stashed there.)
The latest release of Privacy Badger gives it the power to detect and block a new class of evasive, pervasive third-party trackers, including Google Analytics.
Most blocking tools, like uBlock Origin, Ghostery, and Firefox’s native blocking mode (using Disconect’s block lists), use human-curated lists to decide whether to block or allow third-party resources. But Privacy Badger is different. Rather than rely on a list of known trackers, it discovers and learns to block new trackers in the wild. It works using heuristics, or patterns of behavior, to identify trackers.
Last week, we updated Privacy Badger with a new heuristic to help it identify trackers that have flown under its radar in the past. Here’s how it works.
Three years ago, a failed coup in Turkey led to a media crackdown. Since then, journalists have banded together to document the cases of reporters imprisoned or charged with crimes against the state.
Sabal lived in the US for more than a decade and joined the Marines in 1987, eager to serve the US. In 2008, he returned to Belize for a visit and while he was gone, a judge ordered him to be deported at a court hearing he was not aware of because he was not in the US.
Sabal has been stuck outside the US since that 2008 trip.
Mateo Ramirez, age 20 from Florida, said via Instagram DM that he’s boycotting Prime Day in order to show opposition to Amazon’s union-busting and low minimum wages. Amazon recently raised its company minimum wage to $15/hour, but only while cutting stock benefits and incentive pay.
“I work in marketing and economics so I know about the logistics of Amazon and I know that in order to provide the services that they provide, employees needs to be working diligently Around the Clock, but I also believe that a company with as much money and assets as Amazon can afford to give its employees sufficient breaks,” Ramirez said. “As a consumer, I would be more than willing to sacrifice one day shipping to ensure that employees are working in a healthy environment.”
Under the heading, "Personal safety - tips and advice on how to avoid getting into unwanted situations", the municipality advises its employees to "Plan your itinerary - know your area...try to minimize the time from when you park your bike / car until you enter [the destination]". Also, "Before leaving a building, look out first and make an assessment of the surroundings to avoid getting into an unwanted situation... keep away from people who are considered potentially threatening or dangerous and increase the distance if there are no other people nearby".
One city employee, who received the guidelines, accused the municipality of hypocrisy: "To the media, the municipality says that everything is fine, even though it is not. Then they send this type of mail to their employees".
“These are not the Napoleons of crime,” Tim McGinty told me. He paused, reflecting on those 7,000 rape kits sitting in storage in Cleveland while the perpetrators were free on the streets. “They’re morons. We were letting morons beat us.”
Liz Garcia considers herself fortunate. At least the Cleveland police submitted her rape kit for testing, even if they weren’t able to identify her assailant until they retested it 12 years later. But what about the other victims, the ones who endured an invasive forensic exam, expecting the police to marshal that evidence to catch their assailants? “How can somebody just let them sit there?” Garcia asks. “You know, the women calling and calling, trying to find answers. You’re giving them some story, and all along this rape kit is sitting there, not even being tested. ‘No, we don’t have anything further.’ But you could have if you would have tested that kit! You could have avoided other rapes if you would have tested that kit.”
This is the question that haunts every advocate, researcher, and enlightened detective or prosecutor I spoke with: How many rapes could have been prevented if the police had believed the first victim, launched a thorough investigation, and caught the rapist? How many women would have been spared a brutal assault?
New York police officers were attempting to arrest Garner, then 43, for selling untaxed cigarettes on the street. When Garner resisted, asking officers not to touch him and batting their hands away, they restrained him. Garner, who was heard saying he couldn't breathe, died in the altercation that followed.
The DOJ concluded there wasn’t enough evidence to prove beyond a reasonable doubt that Daniel Pantaleo, the officer accused of killing Garner, had violated the federal Civil Rights Act. To do so, Donahue said, the government would have had to prove Pantaleo willfully used more force than he could have believed was necessary.
It's been five years. The only punishment Pantaleo received is being demoted to desk duty.
The person who captured video of the NYPD killing Eric Garner, Ramsey Orta, may face over 50 years in prison for filming a murder.
I once opened a speech by confessing to a crowd of Jews that I used to hate them. It was 2006 and I was a young native of Somalia who’d been elected to the Dutch Parliament. The American Jewish Committee was giving me its Moral Courage Award. I felt honored and humbled, but a little dishonest if I didn’t own up to my anti-Semitic past. So I told them how I’d learned to blame the Jews for everything.
i
Fast-forward to 2019. [...]
Buried underneath the blistering hype surrounding fifth-generation (5G) wireless is a quiet but growing consensus: the technology is being over-hyped, and early incarnations were rushed to market in a way that prioritized marketing over substance. That's not to say that 5G won't be a good thing when it arrives at scale several years from now, but early offerings have been almost comical in their shortcomings. AT&T has repeatedly lied about 5G availability by pretending its 4G network is 5G. Verizon's falsely telling everyone 5G will help cure cancer, but its actual deployments have been spotty and expensive.
5G device support barely exists. Apple is in no rush to get its first phones to market. The promise of 5G as a competitive and rural coverage panacea has been vastly overstated. And most surveys suggest US consumers (who already pay some of the highest data prices in the developed world) are more interested in lower bills than faster speeds. All of which is to say that 5G isn't quite the Earth-shattering revolution it has been heralded as by carriers and network vendors eager to sell more cell phones and network hardware.
Chairman David Cicilline laid out the facts as to why his Subcommittee is engaging in this antitrust inquiry: a small handful of companies wield enormous influence over Internet activity and investors that are important in funding startups noted the “kill-zone” that exists when challenging the dominant tech companies. Rather than try to launch startups that were meant to displace the Internet giants, the market seems to have trended towards building companies that the tech giants will seek to acquire through vertical mergers. Professor Fiona Scott Morton testified that what may be needed is a rethinking of mergers and acquisitions. EFF agrees that this area of antitrust law is sorely in need of a reboot. Other witnesses noted that small businesses now see companies like Amazon as potentially hostile to their ability to use the Internet to grow, Stacey Mitchell of the Institute for Local Self-Reliance. This represents a dramatic shift in how Internet industries have worked historically, where the garage startup became the next billion-dollar corporation only to be replaced by the next garage startup, and no company could gatekeep others.
It’s a powerful indication that the Internet markets have changed when the giant corporations under scrutiny could only list each other as competitors, in response to requests from Congressman Hank Johnson. In a follow-up inquiry, Congressman Joe Neguse noted 4 of the 6 largest global social media companies are all owned by Facebook, which highlights how its series of mergers appeared to have gotten ahead of users who switched away from Facebook but were brought back into the fold in the end.
Prime Day, then, is the ultimate loss leader for the company. In exchange for spending billions of dollars on services and losing billions of dollars on deep discounts, Amazon is making the bet that you will join Prime and then spend more money on more things offered on the platform and by the company itself. Last year, most commentators paid attention to the fact that Amazon sold $3.5 billion worth of products on Prime Day, its biggest haul ever for the event. The real move here, however, is Amazon uses Prime Day to increase Prime memberships and, as analysts at the consulting firm McKinsey & Company explained, "lock consumers more tightly into its growing ecosystem of products, services, and media."
Amazon continues to lose money on shipping, but its long game is to lock people into its ecosystem.
If Amazon is found to have breached antitrust rules, it could be fined up to 10 per cent of its annual global turnover - which given Amazon's complicated financial affairs might not prove as easy to calculate as you'd hope.
A distinguishing feature of a good patent practitioner is his or her ability to analogize. But the usefulness of such analogizing is not limited to patent prosecutors. In fact, patent litigators are increasingly using ex parte appeals data in court with the same approach.
First some context. Patent practitioners have long used a technique analogizing to rules and case law to bolster their position. For example, a patent lawyer can use the universe of MPEP, case law or other USPTO guidance to point out that an examiner’s rejection is improper. A problem with this is that with only finite hours to spend to sift through the thousands of pages of such resources for such analogizing information. This is where help from big data comes in.
Ex parte PTAB appeals data can help patent practitioners analogize to overcome a particular rejection. With Anticipat Research, a savvy practitioner can simply input an examiner name, art unit or technology class of interest, along with the rejection type, filter for all reversals, and then quickly distill which argumentation and case law the Board found persuasive in overturning an application’s current rejection.
The Covert Development and Disruption Team of the UK’s North West Regional Organised Crime Unit says it has issued cease and desist notices in England and Wales to people involved in the sale of 'pirate' IPTV subscriptions. The sweep took place Tuesday and also targeted sellers of modified set-top boxes.
In a case filed in California, Cloudflare stands accused of failing to terminate customers that have been repeatedly called out as copyright infringers. The case wasn't filed by Hollywood or the major record labels, but by two manufacturers of wedding dresses. The CDN provider tried to have the case dismissed recently but in a new order, the court refuses to do so.