As one who has been watching Linux for a long time, I'm saddened to mark the end of Linux Journal, which was just announced this week. I know what you're thinking – aren't they a competitor? But it isn't like that. The community spirit of the open source world is an umbrella for everyone in it – including publishers. If anything, there has always been a kind of camaraderie among the Linux mags.
I knew about Linux Journal long before I had this job. In fact, my associations with Linux Journal date to an earlier era in IT publishing – back to when I was working for other magazines, like SysAdmin and C Users Journal. Linux Journal has been around for so long that I was especially surprised to read the comments on their site that said, "What? You're gone already? I just found out about you!"
Huh, you use Linux, and you've never heard of Linux Journal?
That made me consider how important it is to spread the word about worthy IT publications. In the old days, publishers spent a lot of money on branding and direct marketing to be sure everyone knew they were out there, but all that ended a couple market crashes back. Nowadays, most of our readers hear about us from other readers, unless they happen to live near a full-service IT newsstand, which are also getting rarer in this world.
First, the focus is on getting devices connected to the cloud. Being able to send and receive messages is the prime target. This post will not talk about services, features, or costs by the cloud providers themselves once messages are in the cloud.
Furthermore, the idea is to only use Qt and/or Qt MQTT to establish a connection. Most, if not all, vendors provide SDKs for either devices or monitoring (web and native) applications. However, using these SDKs extends the amount of additional dependencies, leading to higher requirements for storage and memory.
Whether you’re new to the popular Windows-based backup tool Veeam or an old pro, you know that ever-growing demands on your storage resources are a true challenge. The flexibility of Ceph makes it a good choice for a back-up target, and SUSE Enterprise Storage makes it easy.
We have been using Centos for years and I must say that we are totally impressed by the outstanding reliability of it.
Why are we using it? Well, it’s simple. HDroid runs on a dedicated webserver and although this might sound to you as granted stuff to talk about, we were literally going nuts before assembling it.
Our network of websites is not just limited to this site; and this is where Centos shines, with its ease of control for hosting solution environments. And my goal was pretty unclear at the beginning. This is what I wished “to achieve” with a dedicated web hosting service, completely ‘hosted’ at home.
Many companies who use Kubernetes today do it using Red Hat’s OpenShift distribution, so one question we often hear from users asking about the Mirantis Kubernetes as a Service beta is “How is KaaS different from OpenShift?”
The short answer is that OpenShift is a Platform as a Service (PaaS) and Mirantis KaaS is…well…a KaaS. These two concepts are different. Let me explain.
OpenShift is a Platform as a Service, or PaaS, that just happens to use Kubernetes as its underlying substrate. But just because a PaaS uses K8s, that doesn’t automatically make it a KaaS.
In order to make efficient use of the lab hardware or the hourly paid compute and storage in public cloud which might get very expensive at large scale, automation does a better job at optimization than humans do at the endless wash. rinse and repeat cycle of CI-based testing. This led us to create automation and tooling which works on any cloud provider and runs performance and scale tests to cover various components of OpenShift; Kubelet, Control plane, SDN, Monitoring with Prometheus, Router, Logging, Cluster Limits and Storage can all be tested with the click of a button.
We used to spend weeks to running tests and capturing data. Scale-CI speeds up the process, thus saving lots of time and money on compute and storage resources. Most importantly: It gave us the time to work on creative tasks like tooling and designing new scale tests to add to the framework.
Not every team or user has the luxury of building automation, tooling and access to the hardware to test how well their application or OpenShift component is working at scales above 2000 nodes . Being part of the Performance and Scalability team, we have access to a huge amount of hardware resources and this motivated us to build Scale-CI in such a way that anyone can come use it and participate in the community around it. Users can submit a pull request on Github with a set of templates to get their workload onboarded into the pipeline. The onboarded workloads are automatically tested at scale on an OpenShift cluster built with the latest and greatest builds. It doesn’t hurt that this entire process is managed and maintained by the OpenShift Scalability team.
We’re excited to announce that for the ninth consecutive year, the Red Hat Customer Portal has been named one of the "Top Ten Best Support Websites" by the Association of Support Professionals (ASP).
The ASP is a global membership organization for customer support managers and professionals. Its "Ten Best Support Websites" competition, now celebrating its 21st year, showcases excellence in online service and support. Selected by a panel of judges with experience in web support design and implementation, winners are scored in 25 different areas.
For the last nine years, the awards program has highlighted the continued evolution of Red Hat’s Customer Portal and commitment to improving our customers’ experience.
This year’s award submission highlighted how the Red Hat Customer Portal is implementing tools that help users self-solve issues, as well as improving user experiences across the site based on customer feedback.
Data availability, confidentiality, and integrity are important aspects of security. One concern is securing the data and control information used by Gluster nodes which flows over the network. To address this problem network encryption can now be enabled in Gluster using TLS. Encrypting communications between glusterd, Gluster client, and the Gluster server will add significant complexity to any attacker attempting to abuse the Gluster nodes and services.
Deployment guidelines recommend that Gluster?s internal network should be isolated and not accessible to general users. Even with an isolated network, requiring these connections to use cryptography can prevent access to in-flight network data from attackers with access to these internal networks.
Enabling encryption requires an attacker to be able to successfully authenticate before being able to interact with Gluster nodes and services.
The Quarkus project is becoming quite popular among developers. Quarkus provides a fast-dev environment, and it has already a set of libraries, standards, and frameworks that are made available through extensions like RestEasy, Panache, SmallRye, Keycloak, and Kafka. Additionally, you can start using Kogito today to create intelligent Quarkus applications.
That level of success was perhaps most succinctly explained to me at the event by Chris Aniszczyk, COO at the Cloud Native Computing Foundation (CNCF). “This is the golden age of open source and we are hitting more industries now,” Aniszczyk told me during an interview at the show. “If you are a developer in open source you can find a good job in so many different areas.”
Aniszczyk’s optimistic tone followed a brief keynote address by Red Hat CTO Chris Wright, who stated flatly that “open source has won,” citing the dramatic increase in GitHub users and numbers from the Linux Foundation touting the financial benefits of open source software. That statement of open source success wasn’t necessarily the most controversial as it was made at an open source-focused event.
However, Wright also spent some of his limited time on stage and a considerable part of a follow up interview questioning how the ecosystem was going to deal with its success.
“Part of winning is that with great power comes great responsibility,” Wright said on stage. He explained that the community had changed from its humble origins based on the benefits of sharing software code to where it’s at today in powering some of the largest corporate entities.
Katherine Druckman, Doc Searls and Petros Koutoupis talk to Chris Davis of adwaterandstir.com about his Arduino-based Altair 8800 replica kits.
An exciting new podcast episode is out: Reality 2.0 – Retro Computing with the Altair-Duino. This is a follow-up conversation about the Altair-Duino. Katherine Druckman, Doc Searls and myself talk to Chris Davis of www.adwaterandstir.com about his Arduino-based Altair 8800 replica kits. I had a lot of fun with this conversation.
I'm announcing the release of the 5.2.11 kernel.
All users of the 5.2 kernel series must upgrade.
The updated 5.2.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.2.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
Today, there are nearly 300 active distributions. Some target specific audiences and come prepackaged with special-purpose tools, such as Kali for penetration testing. Others are very general purpose.
By some accounts, more than 95% of the top 1 million web servers run Linux, along with over 90% of the public cloud and well over 80% of smartphones. So, even if you're walking around offices still dominated by Windows desktops, Linux is winning big time in some of the most important markets and remains the beating heart of the open source movement.
Happy birthday, Linux! Here's to wishing you many decades of continued success, dedicated contributers, and happy users.
LF Edge, an umbrella organization within the Linux Foundation that aims to establish an open, interoperable framework for edge computing independent of hardware, silicon, cloud, or operating system, today announced Version 2.0 of its Open Glossary of Edge Computing. This latest version of the Open Glossary adds a year of updates from the edge community while further iterating vocabulary across the entirety of LF Edge projects.
The Open Glossary of Edge Computing was created in 2018 as a vehicle to organize a shared, vendor-neutral vocabulary for edge computing to improve communication and accelerate innovation in the field. Launched as part of the first annual State of the Edge report, the Open Glossary is now an open source project under the LF Edge umbrella. The Open Glossary 2.0 is available in a publicly-accessible GitHub repo, and the new versions will be included in the State of the Edge 2019 report, to be released later this fall.
“The Open Glossary of Edge Computing exemplifies a community-driven process to document and refine the language around edge computing,” said Arpit Joshipura, general manager, Networking, Edge, and IoT, the Linux Foundation. “As the diversity of LF Edge increases, we want frameworks in place that make it easy to talk about edge computing in consistent and less-biased ways. It’s imperative the community comes together to converge on a shared vocabulary, as it will play a substantial role in how our industry discusses and defines the next-generation internet.”
Since June there has been the Intel open-source development team volleying Linux patches for bringing up Tiger Lake "Gen 12" graphics. There have been several rounds of patches working on the new Gen 12 graphics and that experimental open-source support is coming with Linux 5.4. A new patch series sheds more light on one of the new Gen 12 hardware features: the Display State Buffer engine.
The Display State Buffer (or shortened as the "DSB") is a new engine to handle batch submit display register programming. The Intel Linux driver at least will be making use of the DSB for LUT programming and yet-to-materialize patches will leverage the DSB for HDR (High Dynamic Range) meta-data programming and page-flipping related operations. The DSB hardware allows for reduced loading time and CPU activity with punting more work to this engine attached to the display controller and is said to improve the context switching performance with Gen 12 graphics.
As a follow-up to the recent story on AMD looking to land Navi 14 support in the imminent Mesa 19.2, that code for the smaller Navi GPU did successfully land into Mesa 19.3-devel and was back-ported to the 19.2 series for the upcoming 19.2.0 stable release.
As explained previously, the Navi 14 Linux driver support wasn't a trivial PCI ID addition but other changes were necessary. Most notably, Navi 14 required disabling of the "Next-Gen Geometry" support and falling back to the legacy pipeline as apparently NGG is buggy on Navi 14.
Two weeks have passed since AMDVLK 2019.Q3.4 while out this morning is the next iteration of this open-source AMD Radeon Vulkan driver derived from the company's official cross-platform driver code-base.
AMDVLK 2019.Q3.5 is built against the Vulkan 1.1.119 headers and now exposes the second revision to the VK_EXT_subgroup_size_control extension.
While NVIDIA is focused upon their CUDA-based video encode/decode solution moving forward, they do continue supporting and maintaining their existing VDPAU-based video decode stack. Of the driver-neutral VDPAU library (libvdpau) on Wednesday they issued the newest update.
Libvdpau is the vendor-neutral library for the Video Decode and Presentation API for Unix that was engineered by NVIDIA and also leveraged by Mesa's Gallium3D VDPAU state tracker. While NVIDIA moving forward has NVENC/NVDEC as their premiere video solution, VDPAU still works out well on their current Linux driver releases.
Here is our most extensive look yet at the AMD Ryzen 9 3900X Linux gaming performance up against the Intel Core i9 9900K while testing the latest Linux drivers with the Radeon RX 5700 XT as well as the NVIDIA GeForce RTX 2070 and RTX 2080 graphics cards. Beyond testing all the benchmark-friendly Linux-native and Steam Play OpenGL/Vulkan games, the performance-per-Watt and performance-per-dollar of the tested systems are also being covered.
The Ryzen 9 3900X vs. Core i9 9900K gaming performance on Windows has been a hot race and it's quite competitive as well on Linux both for native OpenGL/Vulkan ports as well as for Windows games running on Linux via Valve's Steam Play paired with DXVK for mapping D3D11 to Vulkan.
BuyDRM has announced Linux support for its MultiKey Server, a multi-DRM software platform specifically designed for deployments in remote or limited connectivity environments.
In June, Apple recalled the 2015 MacBook Pro with Retina Display, sold between September 2015 and February 2017, because the battery “may pose a fire safety risk,” and the FAA soon reminded airlines not to carry those laptops with defective batteries on board. But some airlines are now banning Apple laptops whether they’ve got a bad battery or not, as reported by Bloomberg.
All 15-inch versions of Apple Inc.’s MacBook Pro must be carried in the cabin and switched off, Qantas said in a statement Wednesday. The rule went into effect Tuesday morning. Rival Virgin Australia Holdings Ltd. went further on Aug. 26, banning all Apple laptops from checked-in luggage.
The security smart folks note that the app itself doesn't appear to be a malicious one, but rather it contains a trojan that gathers spyware and other malware from a malicious server and then runs in on a victim's phone. This trojan, dubbed Necro.n appears to have been sneaked into the app through the use of a legit-looking advertising library package.
As such, the developers of the app, which has received some 100 million downloads, might not even realise their software is causing their users a malware headache.
Your car’s immobilizer is supposed to be used for good. If a crook steals your car, it's possible for you to connect to the immobilizer, which tracks the vehicle and allows you to stop anyone from turning on the engine. But with one particular immobilizer - the U.K.-made SmarTrack tool from Global Telemetrics - an easy-to-hack vulnerability meant it was simple for researchers at Pen Test Partners to turn on the immobilizer permanently, without the customer knowing a thing.
To prove it was possible, the researchers from British cybersecurity company Pen Test Partners hacked the vehicle of one of their own employees, disabling his car whilst they were in the U.K. and he was in Greece, not long before he was due to head to a wedding.
French police have neutralised a [cracking] operation that had taken control of more than 850,000 computers, mainly in Latin America, while also managing to remove the malware from the infected devices.
The agents went into action last spring after the Czech antivirus firm Avast alerted them to the software worm, called Retadup, that was being controlled by a server in the Paris region.
Retadup is a malicious worm affecting Windows machines throughout Latin America. Its objective is to achieve persistence on its victims’ computers, to spread itself far and wide and to install additional malware payloads on infected machines. In the vast majority of cases, the installed payload is a piece of malware mining cryptocurrency on the malware authors’ behalf. However, in some cases, we have also observed Retadup distributing the Stop ransomware and the Arkei password stealer.
After gaining persistence, Retadup goes on to distribute secondary malware on infected machines. It most commonly delivers a Monero cryptomining program, but also has been observed spreading over malware programs including Stop ransomware and the Arkei password stealer, Avast reports.
The vast majority of Retadup victims whose infections were neutralized in last month’s crackdown are based in Latin American countries. However, the law enforcement operation itself specifically targeted C2 infrastructure based in France and the U.S.
The majority of ransomware attacks in the U.S. in 2019 have targeted state and local governments, a report published Wednesday by cybersecurity group Barracuda Networks found.
The report counted a total of 55 ransomware attacks on U.S. state and local government entities between January and July of 2019. These attacks involve a malicious actor or group encrypting a network and asking for money, often in the form of bitcoin, to allow the user access.
Barracuda researchers have identified more than 50 cities and towns attacked so far this year. The team’s recent analysis of hundreds of attacks across a broad set of targets revealed that government organizations are the intended victims of nearly two-thirds of all ransomware attacks. Local, county, and state governments have all been targets, including schools, libraries, courts, and other entities.
Here’s a closer look at state and local government ransomware attacks and solutions to help detect, block, and recover from them.
Taking a break to go on A Short Hike turned out to be a rather beautiful experience, one that has allowed me to sit back and appreciate the calmer side of life for a moment.
Another Competitive Season ends and a fresh one begins, Rocket League Season 12 is now officially live and so is the new Rocket Pass 4 with a tweaked Weekly Challenge system.
This season comes with some new stats for those who manage to pull of some fun tricks. You can now perform a High-Five by bumping into a team mate above the goal after scoring, a Low-Five by bumping into a team mate on the ground after scoring and a Swish Goal for the Hoops mode where you score by not touching the rim before the goal. Additionally, in the patch notes they did some audio work on the game to include "audio priority rebalancing, HDR audio, and object elevation".
Knights And Bikes is a tale of two lost souls discovering friendship, going on an adventure inspired by Earthbound, Secret of Mana and The Goonies. Note: Key provided by Double Fine's PR team.
Taking place on a fictional island called Penfurzy, off the coast of Cornwall in the UK. It's a co-op "coming-of-age story" although you don't have to play it with a partner as you are able to switch between the two, which is pretty handy and didn't cause any issues for me.
For 72 hours Humble Store are giving away DiRT Rally (has Linux support - ported by Feral Interactive) during their big end of Summer sale.
Moi Rai Games and Team17 Digital Ltd have released Monster Sanctuary in Early Access with Linux support.
Following a successful Kickstarter, Moi Rai Games have blended a few different experiences together in Monster Sanctuary. It has the exploration and adventuring found in metroidvania-like titles, with creature catching and combat that Pokemon made popular.
Arriving on Linux "shortly" after the Windows release, the next expansion for Total War: WARHAMMER II has been announced and it does sound quite enticing.
We're not just getting a new DLC though, everyone will also get a free update to the base game which will include the Lizardmen Legendary Lord Gor-Rok, a campaign map region rework for Mortal Empires, Empire Fort Battles, a new starting position for Balthasar Gelt and an Old World update for the Empire with more info to come on other things coming.
Execution Unit have now officially released their fantastically styled exploration shooter Smith and Winston, with great Linux support.
I’m pleased to announce the immediate availability of Plasma Browser Integration version 1.6 on the Chrome Web Store as well as Firefox Add-Ons page.
Plasma Browser Integration bridges the gap between your browser and the Plasma desktop. It lets you share links, find browser tabs in KRunner, monitor download progress in the notification center, and control music and video playback anytime from within Plasma, or even from your phone using KDE Connect!
Since my latest post two months ago, a lot of things changed regarding the KDE websites. More and more KDE websites are switching to the Aether theme designed by Ken Vermette. You can follow the progress at the Phabricator task T10827.
One of the big problems encountered was the multiplication of different versions of the CSS files. There is a CCS file used by konsole.kde.org and choqok.kde.org, one for all the MediaWiki instances, and one for kde.org. This was getting harder and harder to maintain, so I decided to create a single SASS codebase for all the KDE websites.
The code is located in the KDE Gitlab instance and uses Symfony Encore to generate all the CSS files from the SASS codebase.
For the moment, the CSS code is only split into multiple SASS modules and the tooling builds multiple versions using some generic components (breeze buttons) and other more specific components (MediaWiki dark theme).
Paul Brown: Hello Lars, how are you this morning? You seem very busy...
Lars Knoll: Hi Paul, I'm doing good. There's more than enough to do, but I had a good weekend.
Paul: Great! So tell me a bit about yourself. Looking over your résumé, you seem to have been in software production forever. Is this something you always wanted to do, since you were young?
Lars: No, not really. Of course I played around with computers a bit when I was young. I had a Commodore 64 back then, but I mostly used it for games.
I actually went and studied physics when I went to University, and had quite a few years where I did very little with computers.
Things started picking up again during my masters and PhD thesis time in Heidelberg. I needed to use computers a lot to analyze the data that we collected during our experiments. We used Linux computers and Unix machines at that time, and I had to do quite a bit of my programming in Fortran. I really didn't like that language, so I started teaching myself C and some C++ to have a better language to work with. That was around 1996, 1997, if I remember correctly.
At that time, I also read about KDE for the first time, as a project to create a Desktop for Linux. That was something that also triggered my interest, and I started looking into it a bit and started subsequently to use it, as it was way easier than FVWM which is what I was using before.
Amine Sossi Alaoui and Sonia Didier write to tell us about their experience teaching children 2D animation using Krita, with some very cool results:
We’re a Moroccan animation studio, created 6 months ago and based in Rabat, Morocco. Before that we worked in animation studios in France during 10 years. Our goal now is to develop animation industry in Morocco and Africa. It’s a long way to go, and for the moment, we’re just beginning with 2d animation. Krita is a great tool for that, and we’re very happy to use it, and to share the knowledge we have about it.
So, this summer, we wanted children to learn about 2D animation, so we created an one-week animation course for children from 8 to 14 years old. It was 2 hours per day during 5 days, for a group of 8 to 12 children. The goal was to create an one-minute animated shortfilm in 2D, from the writing of the story, storyboard, background, animation, colorisation and compositing.
For that we chose to use Krita (and Shotcut for the final compositing and sound). It’s great software, very complete and fun to work with. And as it’s free, we’re sure that the children could use it at home if they like, to make their own projects.
We also discussed things outside GTK proper that will keep applications from porting to GTK4. This includes commonly used libraries such as GtkSourceView, vte and webkitgtk, which all will need GTK4 ports before applications that depend on them can be ported. Some of this work is already underway; but any help in this area is appreciated!
Another potential blocker for GTK4 porting is platform support. The GL renderer works well on Linux; the Vulkan renderer needs some fixups. On Windows we currently use cairo fallback, which may be good enough for 4.0. Alternatively, we could merge existing work for using the GL renderer with ANGLE. The situation is less pleasant on OS X, where we don’t have a working backend; if you want to help us here, the first still would be to adapt the GDK backend to changes in GDK.
GTK 4.0 won't be out this year, nor is it expected next spring as part of the GNOME 3.36 cycle, but now the developers believe this next major tool-kit update will be ready to ship in just over one year's time with the autumn release of GNOME 3.38.
Taking place the past few days was GNOME's annual GUADEC conference where understandably were a lot of discussions around GTK4.
It was a lot of fun hanging out with all the GNOME people who were in Berlin for this. I unfortunately had some unexpected deadlines from my University. Therefore I couldn’t hack as much as I wanted but I still got a couple of things done.
I spent most of the time on an example which shows how to implement drag and drop reordering of rows in a GtkListbox which is bound to a ListModel. Sadly I didn’t have the time to fix the few reaming issues (mostly commenting the code), therefore it’s not yet merged. This is the pull request to gtk-rs.
This year I worked on Pitivi, an Open Source Video Editor. With GSoC coming to an end, this post is a brief summary of the tasks that were done during the period, the things that were implemented, the work that is ongoing and the future plans that are left to do.
My project involved implementing Nesting Timelines in Pitivi, such that the clips can be easily nested to form one single clip.
There have been three openSUSE Tumbleweed snapshots released this week.
The snapshots brought new versions of VLC, Apache, Plopper and an update of the Linux Kernel.
Snapshot 20190824 delivered a fix that was made to the swirl option, which produced an unexpected result, with the update of ImageMagick?s 7.0.8.61 version. Improved adaptive streaming and a fix for stuttering for low framerate videos became available in VLC 3.0.8; 13 issues, including 5 buffer overflows we fixed and 11 Common Vulnerabilities and Exposures were assigned and addressed in the media player version. More than a handful of CVEs were addressed with the apache2 2.4.41 update. One of the CVEs addressed was that of a malicious client that could perform a Denial of Services attack by flooding a connection with requests and basically never reading responses on the TCP connection. The new version also improves the balancer-manager protection against XSS/XSRF attacks from trusted users. The x86 emulation library fixed a compiler warning in the 2.4 version and the X11 RandR utility updated the geometry text file configure.ac for gitlab migration with the xrandr 1.5.1 version. The snapshot is trending at a rating of 86, according to the Tumbleweed snapshot reviewer.
This distro lacks an OS upgrade mechanism. So upgrading to the next release requires a fresh installation. However, system updates to the existing installation come from Ubuntu and are regularly updated by Drauger OS.
If you play around with the live session, the default user name is "user" or "default." The default password is "toor."
Complete instructions are found in the Readme.pdf file. Also, check out the Welcome screen. It provides access to help files and shows buttons that open links to the distribution's website, launch a tool for installing third-party drivers, and link to some online resources.
There is also a tutorial button on the Welcome screen that opens a series of pop-up messages about the desktop elements. The welcome window is pretty straightforward to use and navigate.
The BlackArch Linux Community has released the new version of BlackArch Linux 2019.06.01 ISOs and OVA image on yesterday (28th Aug, 2019).
This new release brings the 5.2.x Linux kernel.
Linux Kernel 5.2 includes Sound Open Firmware, Pressure Stall Information resource monitoring, BFQ I/O scheduler has gained some performance improvements, the ARM Mali t4xx and newer 6xx/7xx have been added and lot more.
Also, they have added more than 150 new tools that allows penetration testers to discover new things.
The Modularity Team was able to hold a session at Flock 2019 to gather feedback and discuss a few issues. The session was well attended and there was a bunch of great discussion.
[...]
We then asked people to vote on what they felt were the most important items that we should focus on. As you can see in the picture, which is a little cryptic, “offline local builds,” “OBS/COPR Compat,” “upgrade path,” and “default streams in BR”. As we elaborate on the outcomes of each topic we will also explain the somewhat cryptic shorthand we used for each topic.
This week we?ve been using Unity and learning about code of conduct incident response. We bring you a bumper crop of news and events from the Ubuntu community plus we round up some of our favourite stories from the tech world.
It?s Season 12 Episode 21 of the Ubuntu Podcast! Alan Pope, Mark Johnson and Martin Wimpress are connected and speaking to your brain.
In this video, we are looking at Ubuntu 19.10 Daily Builds. as of 28 August, with Gnome 3.34 Beta For links and more, look here: https://www.linuxmadesimple.info/2019/08/ubuntu-1910-daily-builds.html Background Music: The Big Beat 80s by Kevin MacLeod, Syrinx Starr
Snap installations are also different from debs. Since snaps are fully self-contained applications, during the installation, the snap package (SquashFS filesystem archive) is decompressed and mounted as a read-only loopback device, with a separate writable private area created in the user’s home directory. Because snaps contains all the elements required to run an application, their disk footprint is typically larger than an equivalent Deb package. This is partially mitigated by having snaps compressed, and in some cases they might actually have a smaller size on the disk.
During the installation, a security profile will be created for the snap, which will determine what the snap can or cannot do once run. By default, snaps cannot access other snaps, or ever the underlying system. Specific overrides are required, which we will touch upon shortly. Furthermore, the isolated manner in which snaps are configured means that once the user removes a snap, all the assets are completely removed from the system.
Snaps are cryptographically signed. Users can install snaps that originate outside the Snap Store by providing an explicit, manual override flag. This is common during development, allowing developers to test their snaps before uploading them to the store.
Ibase’s compact, Ubuntu-ready “CMI300-988” embedded computer is based on its MI988 Mini-ITX board equipped with a quad-core AMD Ryzen Embedded V1807B. Highlights include up to 32GB DDR4, HDMI and DP, and 4x USB 3.1 ports.
[...]
The CMI300-988 runs Windows 10 or Ubuntu 18.04 with Linux Kernel 4.14.14 on AMD’s top-of-the-line V1807B model with 4x Zen cores and 8x threads clocked to 3.35/3.8GHz. The 35-54W TDP V1807B features the high-end, 11-compute-unit version of AMD’s impressive Vega GPU.
GIMP (GNU Image Manipulation Program) offers 130-plus amazing filters and special effects. See Alvin Alexander’s blog for all the cool stuff GIMP can do. I especially like the Borders Sparkles, Reflections, and Gradient Flare effects; and the Whirl and Pinch features. I also appreciate that GIMP works on multiple platforms, uses minimal system resources, and is super-easy to use.
Earlier this morning I shared the news internally that – while I’ve been a Mozillian for 15 years so far, and plan to be for many more years – this will be my last year as CEO.
When I returned to Mozilla just over five years ago, it was during a particularly tumultuous time in our history. Looking back it’s amazing to reflect on how far we’ve come, and I am so incredibly proud of all that our teams have accomplished over the years.
Today our products, technology and policy efforts are stronger and more resonant in the market than ever, and we have built significant new organizational capabilities and financial strength to fuel our work. From our new privacy-forward product strategy to initiatives like the State of the Internet we’re ready to seize the tremendous opportunity and challenges ahead to ensure we’re doing even more to put people in control of their connected lives and shape the future of the internet for the public good.
In short, Mozilla is an exceptionally better place today, and we have all the fundamentals in place for continued positive momentum for years to come.
It’s with that backdrop that I made the decision that it’s time for me to take a step back and start my own next chapter. This is a good place to recruit our next CEO and for me to take a meaningful break and recharge before considering what’s next for me. It may be a cliché — but I’ll embrace it — as I’m also looking forward to spending more time with my family after a particularly intense but gratifying tour of duty.
Thank you, Chris.
Chris Beard has been Mozilla Corporation’s CEO for 5 and a half years. Chris has announced 2019 will be his last year in this role. I want to thank Chris from the bottom of my heart for everything he has done for Mozilla. He has brought Mozilla enormous benefits — new ideas, new capabilities, new organizational approaches. As CEO Chris has put us on a new and better path. Chris’ tenure has seen the development of important organization capabilities and given us a much stronger foundation on which to build. This includes reinvigorating our flagship web browser Firefox to be once again a best-in-class product. It includes recharging our focus on meeting the online security and privacy needs facing people today. And it includes expanding our product offerings beyond the browser to include a suite of privacy and security-focused products and services from Facebook Container and Enhanced Tracking Protection to Firefox Monitor.
Chris will remain an advisor to the board. We recognize some people may think these words are a formula and have no deep meaning. We think differently. Chris is a true “Mozillian.” He has been devoted to Mozilla for the last 15 years, and has brought this dedication to many different roles at Mozilla. When Chris left Mozilla to join Greylock as an “executive-in-residence” in 2013, he remained an advisor to Mozilla Corporation. That was an important relationship, and Chris and I were in contact when it started to become clear that Chris could be the right CEO for MoCo. So over the coming years I expect to work with Chris on mission-related topics. And I’ll consider myself lucky to do so.
The Thunderbird team has released Thunderbird 68.0, a new major version of the desktop email client that is going to replace the current branch Thunderbird 60.x in the long run.
Thunderbird 68.0 is a major update that changes quite a few things; that explains why it is not pushed via the email client's automatic updating system at this point in time. Thunderbird users who are interested in the new version may download it from the project website to install it manually. Organisations may point the browser to the Thunderbird for Organisations page instead to download a MSI package or the 64-bit installer for Windows.
Check out our guide on upgrading 32-bit Thunderbird to 64-bit if you still run a 32-bit copy.
The team plans to push Thunderbird 68.1 via the automatic update systems.
LibreOffice is a really great free software project which provides its product in all formats possible, whether it is DEB or RPM, Snap, Flatpak, or even AppImage. If you don't know, AppImage is just like DMG on MacOS, it's application in single file format just click to run it. However, if you see closer, LibreOffice AppImage looks good on elementary OS 5.0. That's why it's very interesting to use on elementary OS. In this article I just want to report screenshots and my short comments about it. I hope you are interested to run LibreOffice AppImage version on elementary OS too. Enjoy!
If you do not have office suite on elementary OS yet, I recommend you to use LibreOffice AppImage. It runs instantly, unlike Snap or Flatpak version, without dependencies installation. You can run it by double-click on file manager. It works, and it looks so elementary fashioned.
Over in Europe, members of the German LibreOffice community attended FrOSCon, one of the largest FOSS events in the country. We had a stand with flyers, stickers and a computer demonstrating LibreOffice Online and its integration in eGroupWare. It was great to meet so many passionate free software fans, and all being well, we’ll be back there again next year…
[...]
While we’re gearing up for the aforementioned LibreOffice Conference 2019, we’re also looking ahead to proposals for the 2020 event. The Document Foundation received two different proposals for the organisation of LibOCon 2020, from the Turkish and German communities. TDF members are voting to decide on exactly where it will take place, so stay tuned for the announcement…
You might be thinking, which is the best WordPress translation plugin for a Multilingual Website. If you research, you’ll find a lot of options, circling on the internet.
But which is the best plugin, and how to use it? Google suggests many, but how many of them are reliable? How to use a particular plugin and why is it so popular? These are some of the things you might be contemplating as you begin your search for the best WordPress translation plugin for a Multilingual Website.
WordPress is the world-famous open-source platform giving options to create your website in your language. Millions around the world use WordPress to create their website but, the crux of the problem is WordPress doesn’t have enough linguistic tools.
GNU Emacs text editor 26.3 was released last night. Here’s how to install it in Ubuntu 18.04 and higher.
Glimpse is a fork of the popular open source image editor, GIMP, created primarily to offer the software under an alternative name.
GIMP is a longstanding project, first announced in November 1995. The name was originally an acronym for General Image Manipulation Program but this was changed to GNU Image Manipulation Program.
The new fork springs from a discussion on Gitlab, where the source code is hosted. The discussion has been hidden but is available on web archives here.
When SparkFun Electronics founder and CEO Nathan Seidle was an engineering student at the University of Colorado, he was taught, "Real engineers come up with an idea and patent that idea." However, his experience with SparkFun, which he founded from his college apartment in 2003, is quite the opposite.
All 600 "SparkFun original" components are for sale on the site in addition to 1000+ resell products. All of the company's schematics and code are licensed under CC BY-SA, with some firmware CC0, and its design files are available on public GitHub repos. In addition, some of the company's designs are Open Source Hardware Association (OSHWA) certified.
The issue suggested renaming Perl 6. While some may think that the name of the issue is trolling, or offensive, the actual issue was created by Elizabeth (Liz) Mattijsen, one of the core Perl 6 developers, a long-time Perl 5 developer, and with her spouse, Wendy, has long been an enthusiastic support of Perl 5/6. There is no trolling here. There is a lot of deep thought, careful discussion, and a genuine desire to find a way to bypass some deeply divisive issues in the Perl community.
[...]
So yeah, there's bitterness and the Perl community not only needs to heal, but we need to find a way forward for both languages. The suggestion to change the name of Perl 6 to 'raku' is effectively designed to make this happen. Perl 5 can figure out how to get beyond the branding issue that's been plaguing it and Perl 6 can do the same thing.
There’s a common idea out there that I want to refute. It’s this: when measuring coverage, you should omit your tests from measurement. Searching GitHub shows that lots of people do this.
This is a bad idea. Your tests are real code, and the whole point of coverage is to give you information about your code. Why wouldn’t you want that information about your tests?
You might say, “but all my tests run all their code, so it’s useless information.” Consider this scenario: you have three tests written, and you need a fourth, similar to the third. You copy/paste the third test, tweak the details, and now you have four tests. Except oops, you forgot to change the name of the test.
Tests are weird: you have to name them, but the names don’t matter. Nothing calls the name directly. It’s really easy to end up with two same-named tests. Which means you only have one test, because the new one overwrites the old. Coverage would alert you to the problem.
A fresh and very exciting release of the anytime package is arriving on CRAN right now. This is the seventeenth release, and it comes pretty much exactly one month after the preceding 0.3.5 release.
anytime is a very focused package aiming to do just one thing really well: to convert anything in integer, numeric, character, factor, ordered, … format to either POSIXct or Date objects – and to do so without requiring a format string. See the anytime page, or the GitHub README.md for a few examples.
This release updates a number of things (see below for details). For users, maybe the most important change is that we now also convert single-digit months, i.e. a not-quite ISO input like “2019-7-5” passes. This required adding %e as a month format; I had overlooked this detail in the (copious) Boost date_time documentation. Another nice change is that we now use standard S3 dispatching rather a manual approach as we probably should have for a long time :-) but better late than never. The code change was actually rather minimal and done in a few minutes. Another change is a further extended use of unit testing via the excellent tinytest package which remains a joy to use. We also expanded the introductory pdf vignette; the benchmark comparisons we included look pretty decent for anytime which still combines ease of use and versability with performance.
In general, all Cartesian geometric objects, like circles, squares, triangles, lines, and points, have basic properties, like location and extension. Objects with zero extension, like points, usually don't have anything more than that. Objects like lines have more—e.g., the start and endpoint of a line segment or two points along a line (if it's a "true line"). Objects like squares or triangles have still more—the corner points, for example—whereas circles may have a center and radius.
We can see there is a simple hierarchy at work here: The general geometric object can be extended into specific geometric objects, like points, lines, squares, etc. Each specific geometric object inherits the basic geometric properties of location and extension and adds its own properties.
This is an example of single inheritance. Java's original object-oriented model allowed only single inheritance, where objects cannot belong to more than one inheritance hierarchy. This design decision comes out of the kinds of ambiguities programmers found themselves facing in complex multiple-inheritance scenarios, typically in cases where "interesting design decisions" led to several possible implementations of the function foo() as defined (and re-defined) in the hierarchy.
Programming is about solving problems and good communication. But before code is written, you need to know how to solve the problem. Breaking the problem into component parts assists in the process. And being able to model the problem so that it’s easy to implement and test also helps. Combine this with a solid understanding of the programming language itself – a good programming book contributes to all aspects of problem solving. Perl has the virtue it can solve a problems in a few lines of code. Perl programmers solve problems and get things done.
The popularity of a book is influenced by personal feelings, tastes, and opinions. Programming books accord to this general rule. There is a wide range of Perl books. As Perl is an open source programming language, with an eclectic heritage written by Larry Wall with thousands of contributors, it is welcome some authors have released their Perl books under a freely distributable license.
Al Jazeera has uncovered doping among Kenyan athletes, training alongside some of the world's top runners.
The country's officials say they are doing their best to stop it. But banned drugs - such as the blood-booster EPO - are easily available.
A tool for beating others to buying the items you want consists of three main components, finalphoenix explained. A monitoring bot, which scouts the target websites for new items; an account creation part, which will make a load of accounts on the site so you have a higher chance of pushing through the crowd as you control more of it; and a purchase bot, the part that actually orders and pays for your item. Users will also need to get some server space to run their bots.
Hiding from the clothes websites that you're using a bot is a bit more complicated; companies will likely ban you if they suspect you're scraping their website. Here, buyers need to use different accounts, proxies to route their traffic, and other technical means as workarounds.
Podcast reviews can be easy to game, and Apple Podcasts has become the main target for angry fans interested in taking down a show. Apple’s service is the biggest name in podcasting, and it’s one of the few major platforms that allows listeners to leave public reviews. While hosts abused that feature in the past to beat the system with fake positive reviews, others have used it to inundate hosts they don’t like with a barrage of one-star marks, making the shows look like a bust.
Changing narratives is a new buzz term. I even heard a Distinguished Professor say he can change the narrative about himself. He can’t change it much. Narratives are intellectual, depending on concepts that depend on societies. They are ultimately conservative.
Towards the end of the 1960s, a small group of programmers were embarking upon a project which would transform the face of computing forever.
Today, Unix powers iOS and Android—its legend begins with a gator and a trio of researchers.
If you think about it for a minute, it is amazing that any of the old-time IT suppliers, like IBM and Hewlett Packard, and to a certain extent now Microsoft and Dell, have persisted in the datacenter for decades or, in the case of Big Blue, for more than a century. It is difficult to be constantly adapting to new conditions, but to their great credit, they still do as they world is changing – sometimes tumultuously – both around them and underneath their feet.
So it is with HPE, which is going through its umpteenth restructuring and refocusing since we entered IT publishing more than three decades ago, this time under the helm of Antonio Neri, its relatively new president and chief executive officer. The current Hewlett Packard is a very different animal than the one that sold proprietary minicomputers and then Unix systems in the 1980s and 1990s, and it is in many ways more of a successor to the systems businesses of Compaq and Digital Equipment, which the company absorbed two decades ago.
Security updates have been issued by Debian (apache2 and faad2), openSUSE (schismtracker), Red Hat (ceph and pango), Scientific Linux (pango), SUSE (apache-commons-beanutils, ceph, php7, and qemu), and Ubuntu (ceph, dovecot, and ghostscript).
One of the first casualties of the 2009 Honduras coup was the 19-year-old son of a pastor, who was shot in the back of the head by U.S.-outfitted snipers.
The dawn of the twenty-first century is giving us a whiff of another Dark Age. Christianity and Islam have been hovering over each other, fighting small-scale crusades. More than a billion Moslems hate America because America has been an ally of Israel and because America destroyed Iraq, eyeing the oil of the entire Middle East. Even€ Europeans€ resent America, its pretense of exceptionalism, superiority and military prowess.
“By 4 p.m. we had to light a fire to stay warm here,” says Augustine Vadakil on his struggling farm in Kerala’s hilly Wayanad district. “But that was 30 years ago. Wayanad is no longer the cold, misty place it once was.” From a maximum of 25 degrees Celsius by early March, temperatures here now easily cross 30 degrees by that time of the year.
Thunberg made the trip across the Atlantic to attend a United Nations climate summit taking place in September — and she did it without leaving a carbon footprint. She traveled aboard the Malizia II, which has its own solar panels and hydro-generators to power the yacht. (Her journey did spark some criticism for the emissions associated with it because others will fly to New York to bring the yacht back to Europe, although those flights will reportedly be offset.)
Greta Thunberg, a 16-year-old Swedish climate activist, sailed into New York Harbor Wednesday after an occasionally harrowing, two-week trans-Atlantic voyage. Greta walks the walk, living her life with as small a carbon footprint as she can. She decided to forgo flying as part of that commitment, so, in order to make it from Europe to North America, she sailed on a zero-emissions racing yacht. The day before Greta’s arrival, on Tuesday, another activist ended a remarkable voyage. Frances Crowe, a lifelong peace activist, died at home in Western Massachusetts, surrounded by her family, at the age of 100. Frances was a firebrand, a nonviolent warrior for justice, arrested countless times protesting war, nuclear weapons, nuclear power plants and more. The departure of one elder activist on the eve of the arrival of one so young symbolizes, bittersweetly, the passing of a torch.
Democrat Kirsten Gillibrand is dropping out of the presidential race as a campaign that once looked poised to ride strong #MeToo credentials to formidability was instead plagued by low polling and major fundraising struggles.
By now most environmentally conscious people understand that Jair Bolsonaro is a bad guy. Brazil’s president has scandalously blamed environmentalists for starting fires burning in the Amazon region, after having called for more “development” of the huge forests.
Of course, my title conjures up images of the Emperor Nero (37-68 A.D.) fiddling while ancient Rome burned, and for many reasons, this mythwas a historical falsehood. Fiddles did not exist in 64 A.D. when a great fire ravaged ancient Rome, but stringed instruments did nonetheless, like the citharaand lyre. Moreover, Nero himself was not responsible for the conflagration. He was away at his villa but quickly returned to Rome to deal with the crisis. Even so, the myth supports the notion that Nero was an idle and an incompetent governor. Regardless of whether or not he was responsible for Rome’s burning, to many, Emperor Nero, was incapable of leading the empire. Nero was overly self-indulgent and had more thespian ambitions than political ones.
Cheap and plentiful renewable energy is possible: pure hydrogen power in the ground, enough wind in European skies to power the world.
Brazil insisted on Tuesday that it would set conditions for accepting any aid from the world’s richest nations to help fight Amazon fires, saying France couldn’t protect the Notre Dame Cathedral from fire devastation and should focus on its own problems.
To great fanfare Monday, the chief executives who make up the Business Roundtable declared that companies should pursue a variety of social goals rather than focus solely on shareholders. The CEOs said they should invest in employees, foster diversity and protect the environment. As Jamie Dimon, the CEO of JPMorgan Chase and head of the Business Roundtable, put it, “If companies and CEOs do not get involved in public policy issues, making progress on all these problems may be more difficult.”
We are again reaching the point in the business cycle known as “peak debt,” when debts have compounded to the point that their cumulative total cannot be paid. Student debt, credit card debt, auto loans, business debt and sovereign debt are all higher than they have ever been. As economist Michael Hudson writes in his provocative 2018 book, “And Forgive Them Their Debts,” debts that can’t be paid won’t be paid. The question, he says, is how they won’t be paid.
What follows is a conversation between author Mehrsa Baradaran and Jacqueline Luqman of The Real News Network. Read a transcript of their conversation below or watch the video at the bottom of the post.
President Donald Trump’s fit over China speaks to the rise of neofascism in American politics, at a time when neither Congress nor the courts are showing any interest in rolling back presidential power. Trump’s unique brand of neofascism first emerged in the form of his attempt to crack down on journalistic critics for “treason,” and via the onset of his white ethno-nationalist, which he declared via a “state of emergency” that allowed him to criminalize immigrants in “concentration camp”-style detainment settings, and to confiscate taxpayer funds to build a wall with Mexico that was never authorized by Congress. This nascent fascism is quickly morphing into full-blown fascism, via Trump’s efforts to dictate the rules of investment to U.S. corporations, and in relation to his emerging trade war with China.
While this headline may be especially egregious, it is characteristic of trade coverage that takes an almost entirely Trumpian view of the topic. Trump portrays the issue as one of some countries, most obviously China, benefiting at the expense of the United States. The media take a somewhat different tack on this country versus country story, but they nonetheless embrace the nonsense Trumpian logic.
The Federal Elections Commission was left without a quorum Monday when vice chairman€ Matthew Petersen, the fourth member of the already depleted agency, resigned, just months before the 2020 election cycle kicks into gear with the primaries in Iowa and New Hampshire.
Ilya Yashin, who attempted to run for the Moscow City Duma as an opposition candidate, was arrested today as he left the holding cell where he was serving his fourth jail term this month, MBK Media reported. The exclusion of independent candidates like Yashin from the Moscow City Duma elections has sparked ongoing protests in Moscow since mid-July.
9. Lastly, don’t lose faith in America. We’ve been through dark times before, but we have come out stronger on the other side. We will do so again.
It was clear even at the time that it was a reference to the Vault 7 files, now alleged to have been leaked to WikiLeaks by Joshua Schulte; the first installment of files were released eight days earlier.
The next day, Adam Schiff, who as the then-Ranking HPSCI member, likely had been briefed on the leak, responded to Trump’s comments and suggested that, while Trump couldn’t have broken the law for revealing classified information, he should nevertheless try to avoid releasing it like this, without any kind of consideration of the impact of it.
These constraints do not impose impossible barriers to a fake science operation. Indeed, activists have repeatedly demonstrated that the peer-review process can be deliberately deceived. But these differences limit the ability of such an operation to function as a clear analog to fake news by creating additional difficulties. While an operation could attempt to rely purely on open-access platforms, such as SSRN, to spread fake science, these open-access platforms lack the implicit credibility of a publication with a peer-review system, so the effect of an open-access operation would likely be more limited.
Of course, popular, nonacademic readers could be deceived by such publications, but then the dynamics of the operation would not be meaningfully different from fake news. The Segals’ report, for instance, convinced large swaths of the general public but had only modest effects in the scientific community. Many scientists from the Soviet bloc disagreed with the Segals conclusions. By 1988, as the Soviet Union began to grapple with HIV/AIDS among its own population, the Soviet academy of scientists disavowed any link between the government and the virus.
Our obsequious media is actively perpetuating the myth than the monarch can do no wrong, and is apolitical. In fact the monarchy has been active and absolutely central to the seizure of power from the Westminster parliament in a right wing coup. Yesterday’s collaboration at Balmoral between the Queen and Jacob Rees Mogg is only the latest phase.
Boris Johnson has crossed the Rubicon today by announcing the suspension of Parliament at this crucial time, no matter how many days the suspension lasts. The United Kingdom has found itself with the most right wing government in nearly two hundred years. I still find it hard to believe that Sajid Javid, Dominic Raab and Priti Patel hold great offices. Even that minority of those voting who put this Tory minority government in place did not expect that. Now that right wing coup is being doubled down on by the deliberate suspension of the Westminster parliament just as the most crucial and divisive issue in several generations is being resolved.
Native American representation in Congress made great strides with the 2018 election of two American women to Congress. Now, the Cherokee Nation in Oklahoma says it will send its own delegate to Congress, a move that will test both the tribe's sovereignty and the willingness of the U.S. to meet its treaty promises.
Newly-elected Cherokee Principal Chief Chuck Hoskin, Jr., announced the decision on August 22, naming Cherokee Nation Vice President of Government Relations Kimberly Teehee as his choice to represent the tribe on Capitol Hill.
In the last 10 months, the Justice Department has brought charges against Chinese nationals and entities in at least seven separate economic espionage cases, up from three during the prior 10 months. In addition, the department has obtained guilty pleas and convictions in six older espionage cases, while charging four Chinese nationals for evading sanctions against North Korea.
The Cybersecurity Infrastructure Security Agency, or CISA, a division of the Homeland Security Department, fears the databases could be targeted by ransomware, a type of virus that has crippled city computer networks across the United States, including recently in Texas, Baltimore and Atlanta.
Reality Winner was arrested by FBI agents at her home in Augusta, Georgia, June 3rd, 2017, two days before The Intercept published an exposé revealing Russian military intelligence conducted a cyberattack on at least one U.S. voting software company just days before the U.S. presidential election in 2016. The exposé was based on a classified NSA report from May 5th, 2017, that shows the agency is convinced the Russian General Staff Main Intelligence Directorate, or GRU, was responsible for interfering in the 2016 presidential election.
It’s always been the classic routine to gain sympathy, and no one does it better than BDS-flavored Palestinian Arabs, or more cynically than Rashida Tlaib, who was elected to represent Michigan’s 13th congressional district, largely Detroit. Imagine the surprise, among voters, to listen to her say, “When I won, it gave the Palestinian people hope…”
Wasn’t she elected to give the “Michigan people hope?”
Eugene Volokh has come across another attempt by a litigant to bury his own court proceedings. This isn't a malicious or underhanded attempt to remove embarrassing info from the court system in order to... say... scrub a client's reputation. This is simply a pro se litigant perhaps misunderstanding what he was getting into when he decided to start filing lawsuits.
For many years now, I've talked about why so many of the problems that face the current internet could be understood by looking at how we moved from an internet dominated by open protocols to one dominated by central platforms -- and I continue to note that many of those problems could be solved by moving back to open protocols (with some modern additions). I first raised this idea nearly five years ago, when people were first debating how internet platforms should moderate toxic speech. It came up again last summer in the context of the various fights over "deplatforming" certain individuals. I mentioned it, yet again, earlier this year in noting that this would be the most effective way to truly create competition and "break up" the big internet platforms.
"This case is likely one of the first filed in this Court that addresses the relationship between the First Amendment and the Internet-based [Facebook] communications platform" claims a new lawsuit filed against Facebook by a guy very angry that his account got shut down (case first spotted by John Roddy). Suffice it to say that this is not one of the first such lawsuits. Many have been filed, and literally every single one of them has failed. Facebook is not bound by the First Amendment. Courts are clear on this. Over and over and over again, courts have been clear on this. But this lack of understanding of what's come before is just the first of many fun things in this 174 page pro se lawsuit. The complaint is so long that only the first 91 pages were filed as the official complaint, and the rest were put in the docket as an "attachment."
Al-Taee, meanwhile, is being investigated for a series of writings disparaging religious and sexual minorities on Facebook between 2011 and 2012. Helsinki Police Department said the investigation was opened after it was determined that the right to prosecute has not expired because the writings have circulated in public in the past five years.
EFF is€ teaming up with the Mozilla Foundation to tell Venmo to clean up its privacy act. In a public letter sent to President/CEO Dan Schulman and COO Bill Ready today, we are telling Venmo to make transactions private by default and let users hide their friend lists.
Both EFF and Mozilla have voiced concern with Venmo’s privacy practices in the past. Venmo is marketed as a way for friends to send and receive money, so people can easily split bills like restaurant checks or concert tickets. However, those transactions are public by default, which can reveal private details about who you spend time with and what you do with them. While users do have an option to hide their transactions if they dig into Venmo’s privacy settings, there is no way for users to hide their friend lists. That means that anyone can uncover who you pay regularly, creating a public record of your personal and professional community.
San Francisco – The Electronic Frontier Foundation (EFF) and Mozilla have teamed up in an open letter to Venmo, telling the popular payment app to clean up its privacy settings, which leaves sensitive financial data exposed to the public.
Venmo is marketed as a way for friends to send and receive money, so people can easily split bills like restaurant checks or concert tickets. However, those transactions are public by default, which can reveal private details about who you spend time with and what you do with them. While users do have an option to hide their transactions if they dig into Venmo’s privacy settings, there is no way for users to hide their friend lists. That means that anyone can uncover who you pay regularly, creating a public record of your personal and professional community.
Some Western press reports imply that the Chinese populace is suffocating in a nationwide Skinner box of oppressive behavioral modification. But some Chinese are unaware that it even exists. And many others actually like the idea. One survey found that 80% of Chinese citizens surveyed either somewhat or strongly approve of social credit system.
It can happen here
Many Westerners are disturbed by what they read about China’s social credit system. But such systems, it turns out, are not unique to China. A parallel system is developing in the United States, in part as the result of Silicon Valley and technology-industry user policies, and in part by surveillance of social media activity by private companies.
Here are some of the elements of America’s growing social credit system.
The Swedish Data Protection Authority (DPA) said that under its rules, the use of biometric data, including images of faces, were protected under special rules which require separate licensing which those involved had not sought.
It also added that the three week limit on the trial was the only thing that had kept the fine from being much higher. Only 22 students from one school had been monitored, with the only data recorded being a presence indication as they entered or exited the classroom.
Earlier this year, an implementation error in the Messenger Kids app had allowed children to create group chats with unauthorized users. That violated a core promise of the app, which had pledged to give children a way to talk with friends without potentially exposing them to strangers online.
In the wake of the news, Senators Ed Markey (D-MA) and Richard Blumenthal (D-CT) wrote to Facebook seeking more information on the flaw, specifically raising the question of whether the company had violated the Children’s Online Privacy Protection Act (or COPPA). But Facebook’s response, sent August 27th, makes clear that the company does not believe the app ultimately violated that law.
In the letter, which Markey’s office provided on Wednesday, Martin did not say when any conversations with the FTC occurred or what they were about. The flaw, which Martin called a “technical error,” allowed some children to chat with users their parents had not approved.
It’s no secret that password security is often terrible. Good passwords – ones that are long and include a mix of lower case, upper case, numbers, and special characters – are hard to remember unless you use a password manager, which few seem to do. As a result, people tend to choose easy-to-guess passwords like names or dates of birth, or even absurd ones like “password” and “1234”. Attempts to wean people off such passwords continue to fail, and as a result many companies and organizations are trying to avoid the problem by getting rid of passwords completely. The alternative, to use biometrics like fingerprints, iris scans and facial recognition, is well developed, and increasingly widespread.
The Electronic Frontier Foundation (EFF) sued the Department of Homeland Security (DHS) and its component agencies today to obtain information about the agencies’ warrantless use of global positioning system (GPS) devices to track vehicles entering the U.S.
In 2012, the Supreme Court unanimously ruled in a landmark decision in U.S. v. Jones that such warrantless GPS tracking inside the U.S. is unconstitutional under the Fourth Amendment. When Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) disclosed in court filings in 2018 that they used GPS devices without a warrant at the border, the federal judge overseeing the case extended the Supreme Court’s ban to include such searches at the border. EFF’s Freedom of Information Act (FOIA) lawsuit seeks to uncover information and provide the public with details about the agencies’ policies and procedures for warrantless GPS tracking.
He is the author of three spy novels set in China, according to Reuters. In the past, he has written voluminously on his blog about the rule of law, democracy and human rights, according to news.com.au. However, according to Reuters, in recent years, he has stayed away from sensitive topics and concentrated instead on running an import-export business.
Yang was first detained seven months ago in China's southern province of Guangzhou after arriving there from New York en route to Beijing, according to the news agency. Australia's Foreign Minister Marise Payne says Yang has been held under "harsh conditions" and that Canberra has "serious concerns" for his welfare.
For many years, we've pointed out that for all the salacious stories and claims about how Backpage.com was somehow supporting and facilitating sex trafficking, the site was actually an amazing tool for finding, arresting, and convicting sex traffickers. Earlier this year, we wrote about a very detailed piece in Wired that highlighted just how far Backpage went in helping law enforcement stop sex trafficking:
“The hasty stroke goes oft astray.” This piece of remembered wisdom from The Lord of the Rings seems to be an apt description of the Indian military siege of Kashmir.
Fifty Years after rhapsodic auguries of the acid-informed era involving the coming “Woodstock Nation,” the US citizenry — convulsed by violence, strung out on all the wrong drugs, and with the Rolling Stones still touring — stumble in mortification through the grim phantasmagoria of the United States Of Altamont. What a long, strange, bad (Nixonian in its dour, paranoid cultural and political aura; Reagan/Clinton/Obama in noxious, neoliberal fantasy; Bush/Trump in cresting tsunamis of raging stupid) trip it has been.
Recently I received an angry note about the persistence of religion in the modern world as proof of the world’s ongoing irrationality in response to some of my comments in my lately published article “The Metaphysics of Revolution”.
The National Rifle Association over the past two years has grappled with two separate sexual harassment allegations against Josh Powell, a senior official, including a case involving an employee.
The employee’s complaint was settled in 2017 using the nonprofit’s funds, according to three sources familiar with the matter. Earlier that year, Wayne LaPierre, the organization’s leader, had promoted Powell to executive director of general operations.
In response to controversial shootings of citizens by police officers, California's governor has (far too proudly) signed into law a bill that will do almost nothing to prevent more of these kinds of killings...
On February 22, thousands took to the streets in Algeria to protest the ruling regime, triggered by the infirmed President Bouteflika’s candidacy for a fifth mandate. The April resignation of the long-time president did not stop the demonstrations. Au contraire: the demonstrations have continued. August 16, 2019, marked the twenty-six consecutive Friday of protests in Algiers and elsewhere in the country. For the moment, there has been no violence similar to clashes in France between the police and Gilets Jaunes and no obvious external interference. But no resolution of the crisis is in sight.
On December 5, 2011, Russians demonstrated against vote rigging in the State Duma elections. Throughout the winter, Moscow witnessed the largest protests of the Putin era, as tens of thousands of people turned out to chant slogans and listen to speeches criticizing the political system’s lack of power turnover between the country’s different factions. Before dawn on December 6, activists had formed what would become OVD-Info — an independent human rights media project that helps the victims of political persecution. OVD-Info makes it easy for anyone to find out who’s been arrested at a rally, the police station where they’ve been booked, and whether they need any assistance or legal aid. Detainees can call the project’s hotline and get psychological or legal counseling. OVD-Info has been a vital resource for activists during the summer of 2019, as Moscow’s City Duma elections have sparked another round of major protests. Meduza looks back at the project’s origins, and explains how OVD-Info became full-time work for the activists who run it.
Fabricated drug busts are so common in Russia that the law used to prosecute Russians for alleged drug use is known as “the people’s statute.” In June 2019, when police “found” multiple bags of narcotics on Meduza correspondent Ivan Golunov, that law united journalists and activists in an unprecedented solidarity campaign. As it turns out, though, that’s far from the only way Article 228 of the Russian Criminal Codex can bring people together.
A court in Kyiv has released Russian journalist Kirill Vyshinsky, the editor-in-chief of RIA Novosti — Ukraine, on his own recognizance. Vyshinsky€ was arrested by Ukraine's National Security Agency more than a year ago, in May 2018, for allegedly carrying out subversive, treasonous activities on the Kremlin's behalf.
On August 28, roughly a dozen men disrupted a performance of “Coming Out of the Closet,” a documentary stage production about Russia’s LGBTQ community. The theater’s website says the show is “about life, love, and the search for truth among modern-day Russian gay people.”
Multiple prominent white nationalist YouTube personalities lost their channels, Right Wing Watch reported Tuesday. As writer Jared Holt explains, “The move came as a shock to the white nationalist community, and now racist content creators are panicking.”
A new Missouri ban on abortions at or after eight weeks of pregnancy won’t take effect Wednesday after a federal judge temporarily blocked it from being implemented.
Senator Bernie Sanders’ presidential campaign put out a plan for addressing the collapse in journalism in the United States. He became the first presidential candidate to propose solutions to a crisis that has greatly intensified since 2000.
The plan was introduced through an op-ed that was published by the Columbia Journalism Review.
The Felice Brothers are a veteran folk-rock band, who throughout their career have sacrificed commercial success by sticking to their principles. They have turned down offers to work with big-name producers and resisted pressure to adopt a more mainstream sound.
Thousands of Native Hawaiians and their supporters have been congregating since July 15 at the base of Mauna Kea, a dormant volcano and mountain on the island of Hawaii. Known in Hawaiian as the kia’i, the protectors—a term the group prefers to “protesters”—seek to deter construction of the $1.4 billion Thirty Meter Telescope (TMT), the largest telescope in the Northern Hemisphere. Business owners and state officials promise the telescope will provide jobs, educational opportunities and high-resolution astronomical imagery.
In March 2011, a tactical team of guards at a state prison in Lincoln, Illinois gathered 200 women and ushered them into a gymnasium, where they were brought in small groups into a separate room nearby. Inside that room, they were told to strip naked in plain view of other guards, cadets, and civilians, without any explanation. Women on their periods were ordered to remove their tampons and sanitary pads. One-by-one, each woman was ordered to lift her breasts, cough and squat, and display her vaginal and anal cavities. Those who refused were threatened with punishment. In total, the ordeal lasted nearly four hours.
“I responded that I have no business with such posts and that I didn’t like, [s]hare or comment on them and told her that I shouldn’t be held responsible for what others post,” he said. “I have no single post on my timeline discussing politics.”
Ismail said that the officer then canceled his visa and told him he’d be sent home. Ismail is currently working with the nonprofit who granted him a scholarship to study in the U.S., Amideast, to get legal help, the Crimson reported. Harvard is also “working closely with the student’s family and appropriate authorities to resolve this matter,” according to a university spokesperson.
At least 1,200 people were killed and close to 200,000 were displaced in northeast Nigeria in 2018 alone due to the brutal and genocidal campaign being waged by the Islamist terror group Boko Haram. To date, nearly 30,000 have been killed and two million displaced.
The group, which literally means “secular education is forbidden,” is indiscriminate in its mission, targeting Christians as well as Muslims they do not agree with.
According to "We Will Stop Femicide", a women's rights platform, 245 women have been killed in Turkey in the first seven months of 2019.
The case highlights a heap of inane government incompetence. Why would an immigration detainer remain in place for a misdemeanor drug offense, even after the government shutdown ended on January 25? Why was Haughton's honey tested at the first lab if that facility was not prepared to render a result? Why did it need to be tested three times to get an accurate result, and why did that take so many months to complete?
During the ordeal, Haughton lost both of his jobs, one as a cleaner and the other as a construction worker. He also has six children, and he says that their school performance suffered immensely while he was away.
Another field drug test has managed to misidentify a common legal substance. This doesn't matter to the government, which is only out ~$2. But it does matter to the non-criminals being treated like criminals because the ultra-faulty tests are even worse than K-9s at detecting actual drugs.
Field drug tests have determined everything from cotton candy to donut crumbs to drywall dust to bird poop (on the hood of a car no less!) to be illegal substances, resulting in a cascade of horrors on the innocent, starting with the arrest and criminal charges, and proceeding directly to indefinite pretrial detention and the loss of income, housing, etc. that comes with it.
Field drug tests are more "reliable" than drug dogs. I mean, to the extent that they'll more reliably generate the "probable cause" needed to search a car or arrest a person. If you're looking to boost your drug war stats, nothing's more useful than a cheap kit that can't tell the difference between narcotics and common household items.
“There is a serious lack of quality information about the ongoing unrest in West Papua because the Indonesian authorities have blocked internet connectivity to the province,” said Digital Rights Watch Chair Tim Singleton Norton.
Today, Laura and I want to introduce you to Small Technology Foundation, where we will be continuing the work we started at Ind.ie five years ago.
In those five years, we’ve developed a strong understanding of the problem (surveillance capitalism) and we’ve been iterating on solutions to it.
Our work led us to leave the UK, move to Sweden, and finally, last year, to settle in Ireland.
David Streitfeld is a NY Times reporter who, among other things, covers Amazon. As far as I can tell, he has never written about Amazon in an article where he doesn't present things in the worst, most distorted anti-Amazon light. It's gotten to the point where I generally just won't bother with a Times article about Amazon if it's by Streitfeld, because it's guaranteed to be misleading. Somehow, however, I made it through most of this recent article about counterfeit George Orwell books on Amazon before realizing it was yet another Streitfeld hit piece. The article itself is kind of interesting: there are a bunch of folks attempting to sell unofficial George Orwell books on Amazon, and sometimes they're garbage.
What I find odd, is that while the article admits that many are published in India, where Orwell's works are in the public domain, the article makes no mention of the odd copyright situation in the US and UK, where Orwell's books all should be in the public domain based on the copyright deal that was made with Orwell when he wrote the books. Under those terms, all of Orwell's books -- including Animal Farm (1945) and Nineteen Eighty-Four (1949) -- should have entered the public domain years ago, meaning that there would be a robust market for legitimate copies of those works.
For a country that likes to talk about "being number one" a lot, that's sure not reflected in the United States' broadband networks, or the broadband maps we use to determine which areas lack adequate broadband or competition (resulting in high prices and poor service). Our terrible broadband maps are, of course, a feature not a bug. ISPs have routinely lobbied to kill any efforts to improve data collection and analysis, lest somebody actually realize the telecom market is a broken mono/duopoly whose dysfunction reaches into every aspect of tech.
While these shaky maps have been the norm for several decades, recent bipartisan pressure by states (upset that they're not getting their share of taxpayer subsidies because we don't actually know where broadband is) has finally forced even the Ajit Pai FCC and the telecom industry to take some modest action.
Here’s the full quote: “I wish Apple on its own has split off a long time ago and spun off independent divisions to far away places and let them work independently, like Hewlett Packard did when I was there.”
In an interview at her Paris office last month, de Silva said she’s set her sights on Apple Inc. and Facebook Inc.’s forays into online payments. She’s also wary of the power Amazon.com Inc. and Alphabet Inc.’s Google could gain via their digital assistants.
We've been talking about the trademark crisis facing the craft brewing industry for some time. To recap, an industry explosion coupled with the habit of that industry to come up with creative and referential names for its products has collided with trademark attacks coming both from within and outside of the industry. The industry, which once had a quite permissive and fraternal approach to intellectual property, has since become corporatized. New entrants to the market, therefore, face challenges with how to name their craft beers without facing legal threats.
Here's another one of those weird signs of the time. Under any normal presidential administration, this move by the US Patent and Trademark Office might look a bit strange. But only a bit. There are some legitimate reasons for doing this, but filtered through the administration's xenophobia, it seems to be just another way to hassle non-citizens. (h/t Jef Pearlman)
A while back, an MPAA whistleblower sent me a big file of internal MPAA documents. I spent many months going through them and trying to track down any actual story in them, but there really wasn't much there. Most of the documents were quite old and not all that revealing beyond what was already known (or widely assumed) about how the MPAA acted. The only thing that struck me as interesting, was a very old memo, written by lawyer Steven Fabrizio, before he became the MPAA's General Counsel, when he was still at the MPAA's favorite law firm, Jenner & Block. The memo outlined a very long list of potential anti-piracy strategies, and whether or not they were legal. Some of them were... quite surprising in what they were even considering (it included things like taking over a pirate site and using it as a honeypot). Many were what I would personally classify as somewhere between sleazy, dishonest and unethical. I never wrote up any details, because there was no evidence that the MPAA ever actually did any of the proposed programs, and a few people I ran questions by pointed out that, as as corporate lawyer, reviewing crazy ideas by clients and giving a legal opinion on them is standard practice.
The Fabrizio connection struck me as interesting on a few levels, though. Beyond being the MPAA's top legal attack dog for nearly a decade, the Sony Pictures email leak showed that Fabrizio was the mastermind behind Hollywood's Project Goliath to use MPAA/Hollywood Studio funds to pay for having state Attorney's General and news media owned by those studios, to attack Google to try to pressure it into some sort of "deal" with the studios. Fabrizio was also formerly the top litigator at the RIAA, and led its charge against Napster. Fabrizio was deeply involved in key copyright lawsuits, including the fights against Grokster, Hotfile, and Aereo. Basically, much of the history of "anti-piracy" litigation and "anti-piracy" efforts regarding the internet, was somehow touched by Steve Fabrizio.
This isn’t how privacy or copyright law works. This isn’t how contract law, which governs your relationship with a company’s terms of service, works. And it does not matter that Judd Apatow, Julia Roberts, Usher, or Secretary of Energy Rick Perry all fell for it.
While this phenomenon has been called a hoax, a scam, and a new iteration of the chain letter, it’s also something like a superstition. People are legitimately concerned about the power of giant companies like Facebook, and it’s kind of believable that it’d be able to make these kinds of rules and you, the user, would be stuck with them. Thinking there must be some legal way out of this unequal relationship—that the law wouldn’t let one company act with impunity in this way—isn’t so irrational. And so these words keep popping up and, since there was no change in the first place, they seem to “work” and do no harm—like knocking on wood—so everyone forgets for a couple of years.
The claim is that before leaving Waymo, Mr Levandowski downloaded thousands of files in 2015 related to Alphabet's self-driving car technology, including details related to Lidar, a crucial sensor technology for self-driving cars.
[...]
Mr Levandowski faces up to 10 years in jail and could be fined $250,000 per count, $8.25m in total.
The RIAA is refusing to share information about the effectiveness of the "Six Strikes" Copyright Alert System with Cox Communications. The ISP subpoenaed the data as part of an ongoing piracy liability lawsuit. The company wants to show that its own anti-piracy measures worked better than the alternative that was praised by the music industry.
We’re happy to announce that the 2020 CC Global Summit will once again be in Lisbon from May 14-16, 2020! Please save the date!